Cronologia Commit

Autore SHA1 Messaggio Data
  Matt Gardner 86e757182a enable building ARM64 for ChakraCore 7 anni fa
  Kenji Fukuda 288d7fec0d [MERGE #5418 @kfukuda2] Fixing RegExp parsing for character classes interacting with ranges. 7 anni fa
  Atul Katti 0f3f5bec00 [MERGE #5444 @atulkatti] JULY 2018 Security Update 7 anni fa
  Kenji Fukuda 5f90640537 Refactoring RegExp parsing and modifying SyntaxError message 7 anni fa
  Matt Gardner 70866fdaaf [MERGE #5436 @sigatrev] Track bailout restoration based on TypeSpec flag rather than current symbol type 7 anni fa
  Atul Katti 17f8fe32b9 Bumping version prior to release: 1.10.1 7 anni fa
  Jack Horton (CHAKRA) cb9957e276 [CVE-2018-8298] Edge - Chakra: Bugs in InitializeNumberFormat and InitializeDateTimeFormat - Google, Inc. 7 anni fa
  Matt Gardner 8bd6826aea [CVE-2018-8290] OOB profile read/write - Google, Inc 7 anni fa
  Atul Katti 7af07fdfb3 [CVE-2018-8294] Edge - In Cross Context scenario check for new target first before marshalling the last parameter to a FrameDisplay - Internal 7 anni fa
  Atul Katti 227fc37d08 [CVE-2018-8279] Edge - Chakra: Parameter scope parsing bug - Google, Inc. 7 anni fa
  Akrosh Gandhi 64cd4d20d1 [CVE-2018-8275] Edge - Chakra Array.splice UAF RCE - Zero Day Initiative 7 anni fa
  Rajat Dua f9b1cded66 [CVE-2018-8288] Edge - Chakra JIT ImplicitCallFlags check bypass with Intl - Google, Inc. 7 anni fa
  Meghana Gupta 0ac4253cbc [CVE-2018-8286] [ChakraCore] Edge - Chakra Type Confusion - Internal 7 anni fa
  Michael Holman 4196f8097a [CVE-2018-8276] Edge - Bypass CFG by Exploiting Design Flaw in Chakra - Individual 7 anni fa
  Atul Katti fa89a7031e [CVE-2018-8287] Edge - Chakra Internet Explorer - Use after free in jscript9.dll after closing WebBrowserControl - Internal. 7 anni fa
  Atul Katti 3ad284acd3 [CVE-2018-8280] Edge - Js::DataView SetValue and GetValue to a detached buffer allows for semi arbitrary memory read write. 7 anni fa
  Jimmy Thomson b2f092ea42 [CVE-2018-8283] Edge - ChakraCore Memory Corruption - Individual 7 anni fa
  Jimmy Thomson c322694178 [CVE-2018-8291] DictionaryPropertyDescriptor::CopyFrom missed copying some properties 7 anni fa
  Seth Brenith 0cbed34904 [MERGE #5384 @sethbrenith] fix a warning about buffer bounds 7 anni fa
  Mike Kaufman 0e93c3a928 [MERGE #5430 @mike-kaufman] Adding new trace event to emit just the heap size & usage ratio. 7 anni fa
  Atul Katti 2389070905 [MERGE #5441 @atulkatti] Revert "MSFT:18139538 Remove the use of Guest Arena from parser code to avoid ScriptContext leak." 7 anni fa
  Atul Katti 1393e18a34 Revert "MSFT:18139538 Remove the use of Guest Arena from parser code to avoid ScriptContext leak." 7 anni fa
  Matt Gardner 776c22503b Track bailout restoration based on TypeSpec flag rather than current symbol type 7 anni fa
  Paul Leathers 23533190d3 [MERGE #5411 @pleath] OS#16092623: When we have an accessor cache hit on a setter, we still need to check for exception conditions such as undefined setter in strict mode 7 anni fa
  Seth Brenith 0206f59b88 Tell the static analysis tool that UInt32Math::Add adds and guarantees no overflow. 7 anni fa
  Vladimir Sadov b9f60df00f [MERGE #5433 @VSadov] Fixing possible overflow in BoundFunction::NewInstance. 7 anni fa
  Paul Leathers 4d0681a03b OS#16092623: When we have an accessor cache hit on a setter, we still need to check for exception conditions such as undefined setter in strict mode 7 anni fa
  Rajat Dua e6988254bf [MERGE #5420 @rajatd] Invariant check for a propertySym before loading a property from it in the landing pad. OS #17516086 7 anni fa
  Vladimir Sadov 1348adeda2 PR feedback 7 anni fa
  Vladimir Sadov 25dfd416e1 Fixing possible overflow in BoundFunction::NewInstance. 7 anni fa