Matt Gardner
|
86e757182a
enable building ARM64 for ChakraCore
|
7 anni fa |
Kenji Fukuda
|
288d7fec0d
[MERGE #5418 @kfukuda2] Fixing RegExp parsing for character classes interacting with ranges.
|
7 anni fa |
Atul Katti
|
0f3f5bec00
[MERGE #5444 @atulkatti] JULY 2018 Security Update
|
7 anni fa |
Kenji Fukuda
|
5f90640537
Refactoring RegExp parsing and modifying SyntaxError message
|
7 anni fa |
Matt Gardner
|
70866fdaaf
[MERGE #5436 @sigatrev] Track bailout restoration based on TypeSpec flag rather than current symbol type
|
7 anni fa |
Atul Katti
|
17f8fe32b9
Bumping version prior to release: 1.10.1
|
7 anni fa |
Jack Horton (CHAKRA)
|
cb9957e276
[CVE-2018-8298] Edge - Chakra: Bugs in InitializeNumberFormat and InitializeDateTimeFormat - Google, Inc.
|
7 anni fa |
Matt Gardner
|
8bd6826aea
[CVE-2018-8290] OOB profile read/write - Google, Inc
|
7 anni fa |
Atul Katti
|
7af07fdfb3
[CVE-2018-8294] Edge - In Cross Context scenario check for new target first before marshalling the last parameter to a FrameDisplay - Internal
|
7 anni fa |
Atul Katti
|
227fc37d08
[CVE-2018-8279] Edge - Chakra: Parameter scope parsing bug - Google, Inc.
|
7 anni fa |
Akrosh Gandhi
|
64cd4d20d1
[CVE-2018-8275] Edge - Chakra Array.splice UAF RCE - Zero Day Initiative
|
7 anni fa |
Rajat Dua
|
f9b1cded66
[CVE-2018-8288] Edge - Chakra JIT ImplicitCallFlags check bypass with Intl - Google, Inc.
|
7 anni fa |
Meghana Gupta
|
0ac4253cbc
[CVE-2018-8286] [ChakraCore] Edge - Chakra Type Confusion - Internal
|
7 anni fa |
Michael Holman
|
4196f8097a
[CVE-2018-8276] Edge - Bypass CFG by Exploiting Design Flaw in Chakra - Individual
|
7 anni fa |
Atul Katti
|
fa89a7031e
[CVE-2018-8287] Edge - Chakra Internet Explorer - Use after free in jscript9.dll after closing WebBrowserControl - Internal.
|
7 anni fa |
Atul Katti
|
3ad284acd3
[CVE-2018-8280] Edge - Js::DataView SetValue and GetValue to a detached buffer allows for semi arbitrary memory read write.
|
7 anni fa |
Jimmy Thomson
|
b2f092ea42
[CVE-2018-8283] Edge - ChakraCore Memory Corruption - Individual
|
7 anni fa |
Jimmy Thomson
|
c322694178
[CVE-2018-8291] DictionaryPropertyDescriptor::CopyFrom missed copying some properties
|
7 anni fa |
Seth Brenith
|
0cbed34904
[MERGE #5384 @sethbrenith] fix a warning about buffer bounds
|
7 anni fa |
Mike Kaufman
|
0e93c3a928
[MERGE #5430 @mike-kaufman] Adding new trace event to emit just the heap size & usage ratio.
|
7 anni fa |
Atul Katti
|
2389070905
[MERGE #5441 @atulkatti] Revert "MSFT:18139538 Remove the use of Guest Arena from parser code to avoid ScriptContext leak."
|
7 anni fa |
Atul Katti
|
1393e18a34
Revert "MSFT:18139538 Remove the use of Guest Arena from parser code to avoid ScriptContext leak."
|
7 anni fa |
Matt Gardner
|
776c22503b
Track bailout restoration based on TypeSpec flag rather than current symbol type
|
7 anni fa |
Paul Leathers
|
23533190d3
[MERGE #5411 @pleath] OS#16092623: When we have an accessor cache hit on a setter, we still need to check for exception conditions such as undefined setter in strict mode
|
7 anni fa |
Seth Brenith
|
0206f59b88
Tell the static analysis tool that UInt32Math::Add adds and guarantees no overflow.
|
7 anni fa |
Vladimir Sadov
|
b9f60df00f
[MERGE #5433 @VSadov] Fixing possible overflow in BoundFunction::NewInstance.
|
7 anni fa |
Paul Leathers
|
4d0681a03b
OS#16092623: When we have an accessor cache hit on a setter, we still need to check for exception conditions such as undefined setter in strict mode
|
7 anni fa |
Rajat Dua
|
e6988254bf
[MERGE #5420 @rajatd] Invariant check for a propertySym before loading a property from it in the landing pad. OS #17516086
|
7 anni fa |
Vladimir Sadov
|
1348adeda2
PR feedback
|
7 anni fa |
Vladimir Sadov
|
25dfd416e1
Fixing possible overflow in BoundFunction::NewInstance.
|
7 anni fa |