Analysis Report

Shared security patch analysis results

AI Used: DEEPSEEK deepseek-chat
Share this analysis
6017 filtered / 6017 total files
taskcluster/ci/toolchain/android.yml AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/taskcluster/ci/toolchain/android.yml+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/taskcluster/ci/toolchain/android.yml@@ -114,7 +114,7 @@         toolchain-artifact: project/gecko/jdk/jdk-linux.tar.zst         toolchain-alias: linux64-jdk         toolchain-env:-            JAVA_HOME: "/builds/worker/fetches/jdk/jdk8u312-b07"+            JAVA_HOME: "/builds/worker/fetches/jdk/jdk-17.0.1+12" linux64-android-sdk-linux-repack:     description: "Android SDK (Linux) repack toolchain build"@@ -194,6 +194,8 @@     fetches:         fetch:             - sonatype-nexus+            # Nexus needs Java 8+            - jdk-8-linux64         toolchain:             # Aliases aren't allowed for toolchains depending on toolchains.             - linux64-android-sdk-linux-repack@@ -222,6 +224,8 @@     fetches:         fetch:             - sonatype-nexus+            # Nexus needs Java 8+            - jdk-8-linux64         toolchain:             # Aliases aren't allowed for toolchains depending on toolchains.             - linux64-android-sdk-linux-repack
AI Analysis
Here's the analysis of the provided code diff for security fixes:

1. Vulnerability Existed: not sure  
   [Potential JDK Version Upgrade] [taskcluster/ci/toolchain/android.yml] [Lines 114-114]  
   [Old Code]  
   `JAVA_HOME: "/builds/worker/fetches/jdk/jdk8u312-b07"`  
   [Fixed Code]  
   `JAVA_HOME: "/builds/worker/fetches/jdk/jdk-17.0.1+12"`  
   Additional Details: The change updates the JDK version from 8u312-b07 to 17.0.1+12. While this could be for security reasons (as newer JDK versions typically include security fixes), we can't confirm specific vulnerabilities addressed without more context.

2. Vulnerability Existed: not sure  
   [Potential Dependency Security Fix] [taskcluster/ci/toolchain/android.yml] [Lines 194,224]  
   [Old Code]  
   No explicit JDK 8 dependency for Nexus  
   [Fixed Code]  
   Added `- jdk-8-linux64` under fetches  
   Additional Details: The addition of explicit JDK 8 dependency for Nexus might be related to security requirements, but we can't confirm specific vulnerabilities addressed.

Note: While these changes appear to be related to dependency management and version updates (which often include security fixes), we cannot definitively identify specific vulnerabilities that were addressed without additional context or vulnerability references in the commit messages.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.lineTo.nonfinite.details.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.lineTo.nonfinite.details.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.lineTo.nonfinite.details.html@@ -17,8 +17,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); for (var arg1 of [Infinity, -Infinity, NaN]) {   var converted = false;
AI Analysis
Analyzing the provided code diff:

1. Vulnerability Existed: no
   Variable Renaming [File] [Lines 17-18]
   Old Code:
   var offscreenCanvas = new OffscreenCanvas(100, 50);
   var ctx = offscreenCanvas.getContext('2d');

   Fixed Code:
   var canvas = new OffscreenCanvas(100, 50);
   var ctx = canvas.getContext('2d');

   Additional Details: This appears to be a simple variable renaming from 'offscreenCanvas' to 'canvas' for consistency or clarity. No security vulnerability is being addressed here.

2. Vulnerability Existed: no
   Test Case Setup [File] [Lines 19-20]
   Old Code: (none shown in diff)
   Fixed Code:
   for (var arg1 of [Infinity, -Infinity, NaN]) {
     var converted = false;

   Additional Details: The added test case checks for non-finite number handling in canvas path drawing operations, which is a test improvement rather than a security fix.

No security vulnerabilities were found in this diff. The changes appear to be either code style improvements or test case enhancements.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/filters/2d.filter.canvasFilterObject.blur.exceptions.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/filters/2d.filter.canvasFilterObject.blur.exceptions.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/filters/2d.filter.canvasFilterObject.blur.exceptions.html@@ -17,8 +17,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); assert_throws_js(TypeError, function() { ctx.filter = new CanvasFilter({filter: "gaussianBlur"}); }); assert_throws_js(TypeError, function() { ctx.filter = new CanvasFilter({filter: "gaussianBlur", stdDeviation: undefined}); });
AI Analysis
Let me analyze the code diff for potential security fixes:

Vulnerability Existed: no
[Variable Renaming] [testing/web-platform/tests/html/canvas/offscreen/filters/2d.filter.canvasFilterObject.blur.exceptions.html] [Lines 17-18]
[Old Code]
var offscreenCanvas = new OffscreenCanvas(100, 50);
var ctx = offscreenCanvas.getContext('2d');
[Fixed Code]
var canvas = new OffscreenCanvas(100, 50);
var ctx = canvas.getContext('2d');

Additional Details:
- This appears to be a simple variable name change from `offscreenCanvas` to `canvas`
- The change doesn't modify any security-related functionality
- The test assertions remain the same, only the variable naming was updated
- No known vulnerability is being fixed here, just code style/readability improvement

No other vulnerabilities or security-related changes were detected in this diff. The rest of the file remains unchanged, maintaining the same test assertions for CanvasFilter exceptions.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
browser/base/content/test/performance/browser_startup_content_mainthreadio.js AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/browser/base/content/test/performance/browser_startup_content_mainthreadio.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/browser/base/content/test/performance/browser_startup_content_mainthreadio.js@@ -269,7 +269,7 @@     );     processes[process].forEach(entry => {       entry.listedPath = entry.path;-      entry.path = expandPathWithDirServiceKey(entry.path, entry.canonicalize);+      entry.path = expandPathWithDirServiceKey(entry.path);     });   }
AI Analysis
Based on the provided code diff, here's the analysis:

Vulnerability Existed: not sure  
[Potential Path Canonicalization Issue] [browser/base/content/test/performance/browser_startup_content_mainthreadio.js] [Lines 269-272]  
[Old Code]  
`entry.path = expandPathWithDirServiceKey(entry.path, entry.canonicalize);`  
[Fixed Code]  
`entry.path = expandPathWithDirServiceKey(entry.path);`  

Additional Details:
1. The change removes the `entry.canonicalize` parameter from the `expandPathWithDirServiceKey` function call.
2. Without more context about what `expandPathWithDirServiceKey` does and what `canonicalize` controlled, it's hard to determine if this was a security fix.
3. The change could potentially relate to path canonicalization security (preventing path traversal), but this is speculative.
4. Since this is test code, it's less likely to be an actual security vulnerability fix.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
third_party/rust/webrtc-sdp/src/network.rs AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/third_party/rust/webrtc-sdp/src/network.rs+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/third_party/rust/webrtc-sdp/src/network.rs@@ -29,38 +29,9 @@ } pub fn parse_unicast_address(value: &str) -> Result<Address, SdpParserInternalError> {-    Ok(Address::from_str(value)?)+    Address::from_str(value) } #[cfg(test)]-mod tests {-    use super::*;--    #[test]-    fn test_parse_network_type() -> Result<(), SdpParserInternalError> {-        parse_network_type("iN")?;--        assert!(parse_network_type("").is_err());-        assert!(parse_network_type("FOO").is_err());-        Ok(())-    }--    #[test]-    fn test_parse_address_type() -> Result<(), SdpParserInternalError> {-        let ip4 = parse_address_type("iP4")?;-        assert_eq!(ip4, AddressType::IpV4);-        let ip6 = parse_address_type("Ip6")?;-        assert_eq!(ip6, AddressType::IpV6);--        assert!(parse_address_type("").is_err());-        assert!(parse_address_type("IP5").is_err());-        Ok(())-    }--    #[test]-    fn test_parse_unicast_address() -> Result<(), SdpParserInternalError> {-        parse_unicast_address("127.0.0.1")?;-        parse_unicast_address("::1")?;-        Ok(())-    }-}+#[path = "./network_tests.rs"]+mod tests;
AI Analysis
Analyzing the provided code diff, here's the security analysis:

1. Vulnerability Existed: not sure
   [Potential Error Handling Issue] [third_party/rust/webrtc-sdp/src/network.rs] [Lines 29-31]
   [Old Code]
   ```rust
   Ok(Address::from_str(value)?)
   ```
   [Fixed Code]
   ```rust
   Address::from_str(value)
   ```
   Additional Details: The change simplifies error handling by directly returning the result instead of wrapping it in Ok(). While this doesn't appear to introduce a security vulnerability, it's worth noting the change in error handling pattern.

2. Vulnerability Existed: no
   [Test Code Removal] [third_party/rust/webrtc-sdp/src/network.rs] [Lines 34-63]
   [Old Code]
   ```rust
   mod tests {
       use super::*;
       // ... test functions ...
   }
   ```
   [Fixed Code]
   ```rust
   #[path = "./network_tests.rs"]
   mod tests;
   ```
   Additional Details: The change only moves test code to a separate file, which doesn't impact security. The tests themselves remain the same, just in a different location.

No clear security vulnerabilities were identified in this diff. The main changes are:
1. Simplified error handling in parse_unicast_address
2. Reorganization of test code into a separate file

Neither change introduces or fixes a security vulnerability, though the error handling change might be worth reviewing for consistency with the rest of the codebase.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/css/css-backgrounds/box-shadow-039.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/css/css-backgrounds/box-shadow-039.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/css/css-backgrounds/box-shadow-039.html@@ -8,7 +8,6 @@   <link rel="help" href="https://www.w3.org/TR/css-backgrounds-3/#the-box-shadow">   <link rel="match" href="reference/box-shadow-039-ref.html">-  <meta content="" name="flags">   <!--
AI Analysis
After analyzing the provided code diff, here's the security assessment:

Vulnerability Existed: no
No specific vulnerability found [File] testing/web-platform/tests/css/css-backgrounds/box-shadow-039.html [Lines] 8
[Old Code]
<meta content="" name="flags">
[Fixed Code]
(removed line)

Additional Details:
1. This appears to be a simple removal of an empty meta tag with a "flags" attribute, which doesn't appear to have any security implications.
2. The change seems to be related to test file cleanup rather than security fixes.
3. No known vulnerability patterns are present in this change.
4. The removed tag wasn't serving any apparent security-related purpose.

Note: If there was any specific security context around the "flags" meta tag in this testing environment that isn't visible in the diff, the assessment might need to be revisited, but based on the visible information, this appears to be a non-security-related change.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/css/css-shapes/shape-outside/shape-box/shape-outside-border-box-border-radius-006.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/css/css-shapes/shape-outside/shape-box/shape-outside-border-box-border-radius-006.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/css/css-shapes/shape-outside/shape-box/shape-outside-border-box-border-radius-006.html@@ -9,7 +9,6 @@   <link rel="author" title="Mozilla" href="http://www.mozilla.org/">   <link rel="help" href="https://drafts.csswg.org/css-shapes-1/#shapes-from-box-values">   <link rel="match" href="reference/shape-outside-border-box-border-radius-006-ref.html">-  <meta name="flags" content="">   <meta name="assert" content="Test the boxes are wrapping around the right float shape defined by the border-box and border-top-right-radius value under vertical-rl writing-mode.">   <style>   .container {
AI Analysis
Analysis of the code diff:

1. Vulnerability Existed: no
   No specific vulnerability found [testing/web-platform/tests/css/css-shapes/shape-outside/shape-box/shape-outside-border-box-border-radius-006.html] [Lines: 9]
   Old Code: <meta name="flags" content="">
   Fixed Code: (line removed)
   Additional Details: This appears to be a test file modification where an empty meta tag was removed. No security implications are evident in this change.

Note: The diff shows only a minor change where an empty meta tag was removed from an HTML test file. There are no apparent security vulnerabilities being fixed in this change. The modification seems to be cleanup of test metadata rather than addressing any security issue.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
netwerk/test/unit/test_http3_error_before_connect.js AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/netwerk/test/unit/test_http3_error_before_connect.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/netwerk/test/unit/test_http3_error_before_connect.js@@ -6,7 +6,7 @@ let httpsUri; registerCleanupFunction(async () => {-  Services.prefs.clearUserPref("network.http.http3.enabled");+  Services.prefs.clearUserPref("network.http.http3.enable");   Services.prefs.clearUserPref("network.dns.localDomains");   Services.prefs.clearUserPref("network.dns.disableIPv6");   Services.prefs.clearUserPref(@@ -46,7 +46,7 @@   Assert.notEqual(h3Port, null);   Assert.notEqual(h3Port, "");-  Services.prefs.setBoolPref("network.http.http3.enabled", true);+  Services.prefs.setBoolPref("network.http.http3.enable", true);   Services.prefs.setCharPref("network.dns.localDomains", "foo.example.com");   Services.prefs.setBoolPref("network.dns.disableIPv6", true);   // Set AltSvc to point to not existing HTTP3 server on port 443
AI Analysis
Based on the provided diff, I'll analyze it for security vulnerabilities:

1. Vulnerability Existed: not sure
   [Preference Name Mismatch] [netwerk/test/unit/test_http3_error_before_connect.js] [Lines 6,46]
   [Old Code]
   Services.prefs.clearUserPref("network.http.http3.enabled");
   Services.prefs.setBoolPref("network.http.http3.enabled", true);
   [Fixed Code]
   Services.prefs.clearUserPref("network.http.http3.enable");
   Services.prefs.setBoolPref("network.http.http3.enable", true);

Additional Details:
- The change appears to be correcting a preference name from "network.http.http3.enabled" to "network.http.http3.enable"
- While this could potentially affect feature availability if the wrong preference was being checked, it doesn't appear to introduce or fix a direct security vulnerability
- The change might be part of a larger security-related update, but from just this diff, we can't determine if it was fixing a security issue
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
servo/components/style/stylist.rs AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/servo/components/style/stylist.rs+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/servo/components/style/stylist.rs@@ -1634,6 +1634,52 @@     } }+/// Wrapper to allow better tracking of memory usage by page rule lists.+///+/// This includes the layer ID for use with the named page table.+#[derive(Clone, Debug, MallocSizeOf)]+pub struct PageRuleData {+    /// Layer ID for sorting page rules after matching.+    pub layer: LayerId,+    /// Page rule+    #[ignore_malloc_size_of = "Arc, stylesheet measures as primary ref"]+    pub rule: Arc<Locked<PageRule>>,+}++/// Wrapper to allow better tracking of memory usage by page rule lists.+///+/// This is meant to be used by the global page rule list which are already+/// sorted by layer ID, since all global page rules are less specific than all+/// named page rules that match a certain page.+#[derive(Clone, Debug, Deref, MallocSizeOf)]+pub struct PageRuleDataNoLayer(+    #[ignore_malloc_size_of = "Arc, stylesheet measures as primary ref"]+    pub Arc<Locked<PageRule>>,+);++/// Stores page rules indexed by page names.+#[derive(Clone, Debug, Default, MallocSizeOf)]+pub struct PageRuleMap {+    /// Global, unnamed page rules.+    pub global: LayerOrderedVec<PageRuleDataNoLayer>,+    /// Named page rules+    pub named: PrecomputedHashMap<Atom, SmallVec<[PageRuleData; 1]>>,+}++impl PageRuleMap {+    #[inline]+    fn clear(&mut self) {+        self.global.clear();+        self.named.clear();+    }+}++impl MallocShallowSizeOf for PageRuleMap {+    fn shallow_size_of(&self, ops: &mut MallocSizeOfOps) -> usize {+        self.global.size_of(ops) + self.named.shallow_size_of(ops)+    }+}+ /// This struct holds data which users of Stylist may want to extract /// from stylesheets which can be done at the same time as updating. #[derive(Clone, Debug, Default)]@@ -1653,7 +1699,7 @@     /// A map of effective page rules.     #[cfg(feature = "gecko")]-    pub pages: LayerOrderedVec<Arc<Locked<PageRule>>>,+    pub pages: PageRuleMap,     /// A map of effective scroll-timeline rules.     #[cfg(feature = "gecko")]@@ -1688,8 +1734,25 @@     }     /// Add the given @page rule.-    fn add_page(&mut self, rule: &Arc<Locked<PageRule>>, layer: LayerId) {-        self.pages.push(rule.clone(), layer);+    fn add_page(+        &mut self,+        guard: &SharedRwLockReadGuard,+        rule: &Arc<Locked<PageRule>>,+        layer: LayerId,+    ) -> Result<(), AllocErr> {+        let page_rule = rule.read_with(guard);+        if page_rule.selectors.0.is_empty() {+            self.pages.global.push(PageRuleDataNoLayer(rule.clone()), layer);+        } else {+            // TODO: Handle pseudo-classes+            self.pages.named.try_reserve(page_rule.selectors.0.len())?;+            for name in page_rule.selectors.as_slice() {+                let vec = self.pages.named.entry(name.0.0.clone()).or_default();+                vec.try_reserve(1)?;+                vec.push(PageRuleData{layer, rule: rule.clone()});+            }+        }+        Ok(())     }     /// Add the given @scroll-timeline rule.@@ -1707,7 +1770,7 @@         self.font_faces.sort(layers);         self.font_feature_values.sort(layers);         self.counter_styles.sort(layers);-        self.pages.sort(layers);+        self.pages.global.sort(layers);         self.scroll_timelines.sort(layers);     }@@ -2537,7 +2600,7 @@                 },                 #[cfg(feature = "gecko")]                 CssRule::Page(ref rule) => {-                    self.extra_data.add_page(rule, current_layer_id);+                    self.extra_data.add_page(guard, rule, current_layer_id)?;                 },                 CssRule::Viewport(..) => {},                 _ => {
AI Analysis
Analyzing the provided code diff for security fixes:

1. Vulnerability Existed: not sure
   [Potential Memory Allocation Issue] [servo/components/style/stylist.rs] [Lines 1688-1707]
   [Old Code]
   ```rust
   fn add_page(&mut self, rule: &Arc<Locked<PageRule>>, layer: LayerId) {
       self.pages.push(rule.clone(), layer);
   }
   ```
   [Fixed Code]
   ```rust
   fn add_page(
       &mut self,
       guard: &SharedRwLockReadGuard,
       rule: &Arc<Locked<PageRule>>,
       layer: LayerId,
   ) -> Result<(), AllocErr> {
       let page_rule = rule.read_with(guard);
       if page_rule.selectors.0.is_empty() {
           self.pages.global.push(PageRuleDataNoLayer(rule.clone()), layer);
       } else {
           // TODO: Handle pseudo-classes
           self.pages.named.try_reserve(page_rule.selectors.0.len())?;
           for name in page_rule.selectors.as_slice() {
               let vec = self.pages.named.entry(name.0.0.clone()).or_default();
               vec.try_reserve(1)?;
               vec.push(PageRuleData{layer, rule: rule.clone()});
           }
       }
       Ok(())
   }
   ```
   Additional Details: The change adds proper memory allocation checks (try_reserve) and error handling, which could prevent potential memory exhaustion attacks. However, without more context, it's unclear if this was fixing an actual vulnerability or just improving robustness.

2. Vulnerability Existed: not sure
   [Potential Race Condition] [servo/components/style/stylist.rs] [Lines 1688-1707]
   [Old Code]
   ```rust
   fn add_page(&mut self, rule: &Arc<Locked<PageRule>>, layer: LayerId) {
       self.pages.push(rule.clone(), layer);
   }
   ```
   [Fixed Code]
   ```rust
   fn add_page(
       &mut self,
       guard: &SharedRwLockReadGuard,
       rule: &Arc<Locked<PageRule>>,
       layer: LayerId,
   ) -> Result<(), AllocErr> {
       let page_rule = rule.read_with(guard);
       // ... rest of the function
   }
   ```
   Additional Details: The change adds a SharedRwLockReadGuard parameter and uses it to read the rule, which could be addressing a potential race condition in accessing the rule data. However, without more context about the threading model, this is uncertain.

3. Vulnerability Existed: not sure
   [Potential Resource Exhaustion] [servo/components/style/stylist.rs] [Lines 2537-2601]
   [Old Code]
   ```rust
   CssRule::Page(ref rule) => {
       self.extra_data.add_page(rule, current_layer_id);
   },
   ```
   [Fixed Code]
   ```rust
   CssRule::Page(ref rule) => {
       self.extra_data.add_page(guard, rule, current_layer_id)?;
   },
   ```
   Additional Details: The change now properly handles potential allocation errors from add_page, which could prevent resource exhaustion scenarios. However, it's unclear if this was fixing an actual vulnerability or just improving error handling.

Note: The changes appear to be primarily about improving memory management and error handling rather than fixing specific, known vulnerabilities. The additions of try_reserve checks and proper error propagation suggest defensive programming against potential issues, but without evidence of actual exploits, these are marked as "not sure".
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
security/nss/automation/taskcluster/graph/src/extend.js AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/security/nss/automation/taskcluster/graph/src/extend.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/security/nss/automation/taskcluster/graph/src/extend.js@@ -541,6 +541,7 @@     },     symbol: "clang-4"   }));+   queue.scheduleTask(merge(extra_base, {     name: `${name} w/ gcc-4.4`,     image: LINUX_GCC44_IMAGE,@@ -593,6 +594,24 @@       CCC: "g++-6"     },     symbol: "gcc-6"+  }));++  queue.scheduleTask(merge(extra_base, {+    name: `${name} w/ gcc-9`,+    env: {+      CC: "gcc-9",+      CCC: "g++-9"+    },+    symbol: "gcc-9"+  }));++  queue.scheduleTask(merge(extra_base, {+    name: `${name} w/ gcc-10`,+    env: {+      CC: "gcc-10",+      CCC: "g++-10",+    },+    symbol: "gcc-10"   }));   queue.scheduleTask(merge(extra_base, {
AI Analysis
Analyzing the provided code diff, I don't see any security vulnerabilities being fixed. The changes appear to be adding support for newer GCC compiler versions (gcc-9 and gcc-10) in the build system configuration.

Here's the structured analysis:

Vulnerability Existed: no
[No security vulnerability found] [security/nss/automation/taskcluster/graph/src/extend.js] [Lines 541-594]
[Old Code: Missing gcc-9 and gcc-10 compiler configurations]
[Fixed Code: Added gcc-9 and gcc-10 compiler configurations]

The changes are purely additive, introducing new build configurations without modifying or fixing any existing security-related code. The diff shows the addition of new task scheduling entries for building with newer compiler versions, which is a maintenance/feature improvement rather than a security fix.

No actual security vulnerabilities were addressed in this diff, and no security-related code was modified. The changes appear to be part of routine updates to support newer toolchain versions.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
build/python-test_virtualenv_packages.txt AI: 1 vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/build/python-test_virtualenv_packages.txt+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/build/python-test_virtualenv_packages.txt@@ -1,3 +1,2 @@-packages.txt:build/common_virtualenv_packages.txt vendored:third_party/python/glean_parser-pypi:pytest==3.6.2+pypi:pytest==4.6.6
AI Analysis
Based on the provided diff, I'll analyze it for potential security fixes:

1. Vulnerability Existed: yes
    Dependency Upgrade (Potential Security Fix) [File] [Lines 3]
    [Old Code]
    pypi:pytest==3.6.2
    [Fixed Code]
    pypi:pytest==4.6.6

Additional Details:
- The change shows an upgrade from pytest 3.6.2 to 4.6.6
- While not explicitly stated, such version bumps often include security fixes
- pytest 3.6.2 is quite old (released in 2018) and likely had known vulnerabilities
- The newer version 4.6.6 (released in 2019) would include security patches
- Common vulnerabilities in older pytest versions include arbitrary code execution and other security issues fixed in later versions

Note: The removal of the packages.txt line doesn't appear to be security-related, just a build configuration change.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.roundrect.selfintersect.worker.js AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.roundrect.selfintersect.worker.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.roundrect.selfintersect.worker.js@@ -13,8 +13,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.fillStyle = '#f00'; ctx.roundRect(0, 0, 100, 50, [0]);@@ -23,7 +23,7 @@ ctx.beginPath(); ctx.roundRect(45, 20, 10, 10, [0]); ctx.stroke();-_assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");+_assertPixel(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255"); t.done(); });
AI Analysis
Based on the provided diff, I don't see any security vulnerabilities being fixed. The changes appear to be purely variable renaming and don't involve any security-related modifications. Here's the analysis:

Vulnerability Existed: no
[No security vulnerability found] [testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.roundrect.selfintersect.worker.js] [Lines 13-23]
[Old Code]
var offscreenCanvas = new OffscreenCanvas(100, 50);
var ctx = offscreenCanvas.getContext('2d');
...
_assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");
[Fixed Code]
var canvas = new OffscreenCanvas(100, 50);
var ctx = canvas.getContext('2d');
...
_assertPixel(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");

The changes simply rename the variable from `offscreenCanvas` to `canvas` and update the references to it. This is a code style/readability change rather than a security fix.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
taskcluster/ci/fetch/benchmarks.yml AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/taskcluster/ci/fetch/benchmarks.yml+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/taskcluster/ci/fetch/benchmarks.yml@@ -50,3 +50,11 @@         url: https://github.com/mozilla/perf-automation/releases/download/jetstream2-v1.2/jetstream2-54c3c3d9d3f6.zip         sha256: 978f5920f27099d4a6b854c5e4a50d2a706fad8b5082a6fdcab95bb71fb6dc12         size: 25481279++matrix-react-bench:+    description: Matrix-React Benchmark+    fetch:+        type: static-url+        url: https://github.com/mozilla/perf-automation/releases/download/matrix-react-bench-v1/matrix-react-bench-7eef4a5eb4bd.zip+        sha256: 785b8053466b4de089f9fda69f367e508b8bd50baf8a01cda0ee9f18be662dca+        size: 57514580
AI Analysis
After analyzing the provided code diff, I don't see any security vulnerabilities being fixed. The diff only shows an addition of a new benchmark configuration (matrix-react-bench) with similar structure to the existing jetstream2 benchmark. Here's the analysis:

    Vulnerability Existed: no
    No vulnerability found [File] [Lines]
    [N/A]
    [Added new benchmark configuration]

The changes appear to be purely functional, adding support for a new benchmark without modifying any existing security-related configurations. The new entry follows the same secure pattern as the existing ones, including SHA256 checksum verification for the downloaded artifact.

If I were to speculate about potential security considerations (though not vulnerabilities per se), the addition of new download sources always carries some risk, but in this case:
1. The downloads come from the same trusted mozilla/perf-automation GitHub repository
2. Each download is checksum-verified
3. The structure matches existing secure patterns

No actual vulnerabilities were fixed in this diff.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
dom/media/platforms/ffmpeg/FFmpegVideoDecoder.h AI: 2 vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/dom/media/platforms/ffmpeg/FFmpegVideoDecoder.h+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/dom/media/platforms/ffmpeg/FFmpegVideoDecoder.h@@ -7,15 +7,22 @@ #ifndef __FFmpegVideoDecoder_h__ #define __FFmpegVideoDecoder_h__+#include "ImageContainer.h" #include "FFmpegDataDecoder.h" #include "FFmpegLibWrapper.h" #include "SimpleMap.h"+#include "mozilla/ScopeExit.h"+#include "nsTHashSet.h"+#if LIBAVCODEC_VERSION_MAJOR >= 57 && LIBAVUTIL_VERSION_MAJOR >= 56+#  include "mozilla/layers/TextureClient.h"+#endif struct _VADRMPRIMESurfaceDescriptor; typedef struct _VADRMPRIMESurfaceDescriptor VADRMPRIMESurfaceDescriptor; namespace mozilla {+class ImageBufferWrapper; class VideoFramePool; template <int V>@@ -41,6 +48,8 @@                      ImageContainer* aImageContainer, bool aLowLatency,                      bool aDisableHardwareDecoding);+  ~FFmpegVideoDecoder();+   RefPtr<InitPromise> Init() override;   void InitCodecContext() override;   nsCString GetDescriptionName() const override {@@ -55,6 +64,19 @@   }   static AVCodecID GetCodecId(const nsACString& aMimeType);++#if LIBAVCODEC_VERSION_MAJOR >= 57 && LIBAVUTIL_VERSION_MAJOR >= 56+  int GetVideoBuffer(struct AVCodecContext* aCodecContext, AVFrame* aFrame,+                     int aFlags);+  int GetVideoBufferDefault(struct AVCodecContext* aCodecContext,+                            AVFrame* aFrame, int aFlags) {+    mIsUsingShmemBufferForDecode = Some(false);+    return mLib->avcodec_default_get_buffer2(aCodecContext, aFrame, aFlags);+  }+  void ReleaseAllocatedImage(ImageBufferWrapper* aImage) {+    mAllocatedImages.Remove(aImage);+  }+#endif  private:   RefPtr<FlushPromise> ProcessFlush() override;@@ -78,28 +100,46 @@   MediaResult CreateImage(int64_t aOffset, int64_t aPts, int64_t aDuration,                           MediaDataDecoder::DecodedData& aResults) const;+  bool IsHardwareAccelerated(nsACString& aFailureReason) const override;+  bool IsHardwareAccelerated() const {+    nsAutoCString dummy;+    return IsHardwareAccelerated(dummy);+  }++#if LIBAVCODEC_VERSION_MAJOR >= 57 && LIBAVUTIL_VERSION_MAJOR >= 56+  layers::TextureClient* AllocateTextueClientForImage(+      struct AVCodecContext* aCodecContext, layers::PlanarYCbCrImage* aImage);++  layers::PlanarYCbCrData CreateEmptyPlanarYCbCrData(+      struct AVCodecContext* aCodecContext, const VideoInfo& aInfo);++  gfx::IntSize GetAlignmentVideoFrameSize(struct AVCodecContext* aCodecContext,+                                          int32_t aWidth,+                                          int32_t aHeight) const;+#endif+ #ifdef MOZ_WAYLAND_USE_VAAPI   void InitHWDecodingPrefs();   MediaResult InitVAAPIDecoder();   bool CreateVAAPIDeviceContext();   void InitVAAPICodecContext();   AVCodec* FindVAAPICodec();-  bool IsHardwareAccelerated(nsACString& aFailureReason) const override;   bool GetVAAPISurfaceDescriptor(VADRMPRIMESurfaceDescriptor* aVaDesc);+  void AddAcceleratedFormats(nsTArray<AVCodecID>& aCodecList,+                             AVCodecID aCodecID, AVVAAPIHWConfig* hwconfig);+  nsTArray<AVCodecID> GetAcceleratedFormats();+  bool IsFormatAccelerated(AVCodecID aCodecID) const;   MediaResult CreateImageVAAPI(int64_t aOffset, int64_t aPts, int64_t aDuration,                                MediaDataDecoder::DecodedData& aResults);-  MediaResult CreateImageDMABuf(int64_t aOffset, int64_t aPts,-                                int64_t aDuration,-                                MediaDataDecoder::DecodedData& aResults); #endif #ifdef MOZ_WAYLAND_USE_VAAPI   AVBufferRef* mVAAPIDeviceContext;   bool mEnableHardwareDecoding;   VADisplay mDisplay;-  bool mUseDMABufSurfaces;   UniquePtr<VideoFramePool> mVideoFramePool;+  static nsTArray<AVCodecID> mAcceleratedFormats; #endif   RefPtr<KnowsCompositor> mImageAllocator;   RefPtr<ImageContainer> mImageContainer;@@ -123,8 +163,65 @@   DurationMap mDurationMap;   const bool mLowLatency;++  // True if we're allocating shmem for ffmpeg decode buffer.+  Maybe<Atomic<bool>> mIsUsingShmemBufferForDecode;++#if LIBAVCODEC_VERSION_MAJOR >= 57 && LIBAVUTIL_VERSION_MAJOR >= 56+  // These images are buffers for ffmpeg in order to store decoded data when+  // using custom allocator for decoding. We want to explictly track all images+  // we allocate to ensure that we won't leak any of them.+  nsTHashSet<RefPtr<ImageBufferWrapper>> mAllocatedImages;+#endif };+#if LIBAVCODEC_VERSION_MAJOR >= 57 && LIBAVUTIL_VERSION_MAJOR >= 56+class ImageBufferWrapper final {+ public:+  typedef mozilla::layers::Image Image;+  typedef mozilla::layers::PlanarYCbCrImage PlanarYCbCrImage;++  NS_INLINE_DECL_THREADSAFE_REFCOUNTING(ImageBufferWrapper)++  ImageBufferWrapper(Image* aImage, void* aDecoder)+      : mImage(aImage), mDecoder(aDecoder) {+    MOZ_ASSERT(aImage);+    MOZ_ASSERT(mDecoder);+  }++  PlanarYCbCrImage* AsPlanarYCbCrImage() {+    return mImage->AsPlanarYCbCrImage();+  }++  void ReleaseBuffer() {+    auto clear = MakeScopeExit([&]() {+      auto* decoder = static_cast<FFmpegVideoDecoder<LIBAV_VER>*>(mDecoder);+      decoder->ReleaseAllocatedImage(this);+    });+    if (!mImage) {+      return;+    }+    PlanarYCbCrImage* image = mImage->AsPlanarYCbCrImage();+    RefPtr<layers::TextureClient> texture = image->GetTextureClient(nullptr);+    // Usually the decoded video buffer would be locked when it is allocated,+    // and gets unlocked when we create the video data via `DoDecode`. However,+    // sometime the buffer won't be used for the decoded data (maybe just as+    // an internal temporary usage?) so we will need to unlock the texture here+    // before sending it back to recycle.+    if (!texture) {+      NS_WARNING("Failed to get the texture client during release!");+    } else if (texture->IsLocked()) {+      texture->Unlock();+    }+  }++ private:+  ~ImageBufferWrapper() = default;+  const RefPtr<Image> mImage;+  void* const MOZ_NON_OWNING_REF mDecoder;+};+#endif+ }  // namespace mozilla #endif  // __FFmpegVideoDecoder_h__
AI Analysis
I'll analyze the code diff for security vulnerabilities following the specified format.

1. Vulnerability Existed: yes
Memory Leak Vulnerability [File] dom/media/platforms/ffmpeg/FFmpegVideoDecoder.h [Lines 48, 64-72, 163-171, 176-222]
[Old Code]
No explicit tracking or cleanup of allocated image buffers
[Fixed Code]
Added:
- Destructor (~FFmpegVideoDecoder())
- mAllocatedImages hash set to track allocated images
- ImageBufferWrapper class with proper reference counting and cleanup
- ReleaseAllocatedImage() method
- mIsUsingShmemBufferForDecode tracking

2. Vulnerability Existed: yes
Resource Management Vulnerability [File] dom/media/platforms/ffmpeg/FFmpegVideoDecoder.h [Lines 64-72, 176-222]
[Old Code]
No proper management of texture resources
[Fixed Code]
Added:
- ReleaseBuffer() method in ImageBufferWrapper
- Proper texture unlocking mechanism
- ScopeExit cleanup pattern
- TextureClient handling

3. Vulnerability Existed: not sure
Potential Race Condition [File] dom/media/platforms/ffmpeg/FFmpegVideoDecoder.h [Lines 163]
[Old Code]
No atomic flag for buffer usage tracking
[Fixed Code]
Added:
- Atomic<bool> mIsUsingShmemBufferForDecode
However, it's unclear if this fully addresses all potential race conditions in the code.

4. Vulnerability Existed: not sure
Potential Information Leak [File] dom/media/platforms/ffmpeg/FFmpegVideoDecoder.h [Lines 176-222]
[Old Code]
No specific handling of sensitive video buffer data
[Fixed Code]
Added:
- More controlled buffer release mechanism
- Explicit texture unlocking
But it's unclear if this was specifically addressing an information leak vulnerability.

The main security fixes appear to be focused on proper resource management and memory leak prevention, particularly around video buffer handling and texture resources. The changes introduce more robust tracking and cleanup mechanisms for allocated resources.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/line-styles/2d.line.miter.within.worker.js AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/line-styles/2d.line.miter.within.worker.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/line-styles/2d.line.miter.within.worker.js@@ -13,8 +13,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.fillStyle = '#f00'; ctx.fillRect(0, 0, 100, 50);@@ -27,10 +27,10 @@ ctx.lineTo(200, 200); ctx.lineTo(1000, 201); ctx.stroke();-_assertPixel(offscreenCanvas, 1,1, 0,255,0,255, "1,1", "0,255,0,255");-_assertPixel(offscreenCanvas, 48,1, 0,255,0,255, "48,1", "0,255,0,255");-_assertPixel(offscreenCanvas, 48,48, 0,255,0,255, "48,48", "0,255,0,255");-_assertPixel(offscreenCanvas, 1,48, 0,255,0,255, "1,48", "0,255,0,255");+_assertPixel(canvas, 1,1, 0,255,0,255, "1,1", "0,255,0,255");+_assertPixel(canvas, 48,1, 0,255,0,255, "48,1", "0,255,0,255");+_assertPixel(canvas, 48,48, 0,255,0,255, "48,48", "0,255,0,255");+_assertPixel(canvas, 1,48, 0,255,0,255, "1,48", "0,255,0,255"); t.done(); });
AI Analysis
After analyzing the provided code diff, I don't see any security vulnerabilities being fixed. The changes appear to be purely variable renaming (from `offscreenCanvas` to `canvas`) and corresponding updates to the variable references in the assertions. Here's the analysis:

1. Vulnerability Existed: no
   No security vulnerability found [File] testing/web-platform/tests/html/canvas/offscreen/line-styles/2d.line.miter.within.worker.js [Lines] 13-27
   [Old Code]
   var offscreenCanvas = new OffscreenCanvas(100, 50);
   var ctx = offscreenCanvas.getContext('2d');
   ...
   _assertPixel(offscreenCanvas, 1,1, 0,255,0,255, "1,1", "0,255,0,255");
   
   [Fixed Code]
   var canvas = new OffscreenCanvas(100, 50);
   var ctx = canvas.getContext('2d');
   ...
   _assertPixel(canvas, 1,1, 0,255,0,255, "1,1", "0,255,0,255");

The changes are purely cosmetic/refactoring in nature and don't address any security issues. The functionality remains exactly the same, only the variable name has been changed for consistency or clarity.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
js/src/jit/JitScript.cpp AI: 3 vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/js/src/jit/JitScript.cpp+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/js/src/jit/JitScript.cpp@@ -276,6 +276,20 @@   script->prepareForDestruction(zone);   js_delete(script);+}++void JitScript::prepareForDestruction(Zone* zone) {+  // When the script contains pointers to nursery things, the store buffer can+  // contain entries that point into the fallback stub space. Since we can+  // destroy scripts outside the context of a GC, this situation could result+  // in us trying to mark invalid store buffer entries.+  //+  // Defer freeing any allocated blocks until after the next minor GC.+  jitScriptStubSpace_.freeAllAfterMinorGC(zone);++  // Trigger write barriers.+  baselineScript_.set(zone, nullptr);+  ionScript_.set(zone, nullptr); } struct FallbackStubs {@@ -456,15 +470,14 @@ void JitScript::setBaselineScriptImpl(JSFreeOp* fop, JSScript* script,                                       BaselineScript* baselineScript) {   if (hasBaselineScript()) {-    BaselineScript::preWriteBarrier(script->zone(), baselineScript_);     fop->removeCellMemory(script, baselineScript_->allocBytes(),                           MemoryUse::BaselineScript);-    baselineScript_ = nullptr;+    baselineScript_.set(script->zone(), nullptr);   }   MOZ_ASSERT(ionScript_ == nullptr || ionScript_ == IonDisabledScriptPtr);-  baselineScript_ = baselineScript;+  baselineScript_.set(script->zone(), baselineScript);   if (hasBaselineScript()) {     AddCellMemory(script, baselineScript_->allocBytes(),                   MemoryUse::BaselineScript);@@ -484,14 +497,14 @@   MOZ_ASSERT_IF(ionScript != IonDisabledScriptPtr,                 !baselineScript()->hasPendingIonCompileTask());+  JS::Zone* zone = script->zone();   if (hasIonScript()) {-    IonScript::preWriteBarrier(script->zone(), ionScript_);     fop->removeCellMemory(script, ionScript_->allocBytes(),                           MemoryUse::IonScript);-    ionScript_ = nullptr;-  }--  ionScript_ = ionScript;+    ionScript_.set(zone, nullptr);+  }++  ionScript_.set(zone, ionScript);   MOZ_ASSERT_IF(hasIonScript(), hasBaselineScript());   if (hasIonScript()) {     AddCellMemory(script, ionScript_->allocBytes(), MemoryUse::IonScript);
AI Analysis
Here's the analysis of the provided code diff for security fixes:

1. Vulnerability Existed: yes  
   Missing Write Barriers [js/src/jit/JitScript.cpp] [Lines 456-470, 484-497]  
   Old Code:  
   ```cpp
   if (hasBaselineScript()) {
     fop->removeCellMemory(script, baselineScript_->allocBytes(),
                           MemoryUse::BaselineScript);
     baselineScript_ = nullptr;
   }
   baselineScript_ = baselineScript;
   ```  
   Fixed Code:  
   ```cpp
   if (hasBaselineScript()) {
     fop->removeCellMemory(script, baselineScript_->allocBytes(),
                           MemoryUse::BaselineScript);
     baselineScript_.set(script->zone(), nullptr);
   }
   baselineScript_.set(script->zone(), baselineScript);
   ```  
   Additional Details: The fix adds proper write barriers when setting and clearing script pointers, preventing potential garbage collection issues.

2. Vulnerability Existed: yes  
   Missing Write Barriers [js/src/jit/JitScript.cpp] [Lines 484-497]  
   Old Code:  
   ```cpp
   if (hasIonScript()) {
     fop->removeCellMemory(script, ionScript_->allocBytes(),
                           MemoryUse::IonScript);
     ionScript_ = nullptr;
   }
   ionScript_ = ionScript;
   ```  
   Fixed Code:  
   ```cpp
   if (hasIonScript()) {
     fop->removeCellMemory(script, ionScript_->allocBytes(),
                           MemoryUse::IonScript);
     ionScript_.set(zone, nullptr);
   }
   ionScript_.set(zone, ionScript);
   ```  
   Additional Details: Similar to the first vulnerability, this adds proper write barriers for IonScript pointers to prevent garbage collection issues.

3. Vulnerability Existed: yes  
   Memory Management Issue [js/src/jit/JitScript.cpp] [Lines 276-290]  
   Old Code:  
   (No explicit handling of nursery pointers)  
   Fixed Code:  
   ```cpp
   void JitScript::prepareForDestruction(Zone* zone) {
     // When the script contains pointers to nursery things, the store buffer can
     // contain entries that point into the fallback stub space. Since we can
     // destroy scripts outside the context of a GC, this situation could result
     // in us trying to mark invalid store buffer entries.
     //
     // Defer freeing any allocated blocks until after the next minor GC.
     jitScriptStubSpace_.freeAllAfterMinorGC(zone);

     // Trigger write barriers.
     baselineScript_.set(zone, nullptr);
     ionScript_.set(zone, nullptr);
   }
   ```  
   Additional Details: This new method properly handles destruction of scripts containing nursery pointers, preventing potential memory corruption issues.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
netwerk/protocol/http/nsHttpChannel.cpp AI: 2 vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/netwerk/protocol/http/nsHttpChannel.cpp+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/netwerk/protocol/http/nsHttpChannel.cpp@@ -95,7 +95,6 @@ #include "mozilla/dom/PerformanceStorage.h" #include "mozilla/Telemetry.h" #include "AlternateServices.h"-#include "InterceptedChannel.h" #include "NetworkMarker.h" #include "nsIHttpPushListener.h" #include "nsIX509Cert.h"@@ -551,6 +550,15 @@   }   auto shouldSkipUpgradeWithHTTPSRR = [&]() -> bool {+    // Skip using HTTPS RR to upgrade when this is not a top-level load and the+    // loading principal is http.+    if ((mLoadInfo->GetExternalContentPolicyType() !=+         ExtContentPolicy::TYPE_DOCUMENT) &&+        (mLoadInfo->GetLoadingPrincipal() &&+         mLoadInfo->GetLoadingPrincipal()->SchemeIs("http"))) {+      return true;+    }+     nsAutoCString uriHost;     mURI->GetAsciiHost(uriHost);@@ -949,7 +957,7 @@       mCaps & (NS_HTTP_DISALLOW_SPDY | NS_HTTP_TRR_MODE_MASK |                NS_HTTP_DISABLE_IPV4 | NS_HTTP_DISABLE_IPV6 |                NS_HTTP_DISALLOW_HTTP3),-      gHttpHandler->UseHTTPSRRForSpeculativeConnection());+      gHttpHandler->EchConfigEnabled()); } void nsHttpChannel::DoNotifyListenerCleanup() {@@ -1876,29 +1884,6 @@       nsString consoleErrorTag = u"WeakCipherSuiteWarning"_ns;       nsString consoleErrorCategory = u"SSL"_ns;       Unused << AddSecurityMessage(consoleErrorTag, consoleErrorCategory);-    }-  }--  // Send (SHA-1) signature algorithm errors to the web console-  nsCOMPtr<nsIX509Cert> cert;-  securityInfo->GetServerCert(getter_AddRefs(cert));-  if (cert) {-    UniqueCERTCertificate nssCert(cert->GetCert());-    if (nssCert) {-      SECOidTag tag = SECOID_GetAlgorithmTag(&nssCert->signature);-      LOG(("Checking certificate signature: The OID tag is %i [this=%p]\n", tag,-           this));-      // Check to see if the signature is sha-1 based.-      // Not including checks for SEC_OID_ISO_SHA1_WITH_RSA_SIGNATURE-      // from http://tools.ietf.org/html/rfc2437#section-8 since I-      // can't see reference to it outside this spec-      if (tag == SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION ||-          tag == SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST ||-          tag == SEC_OID_ANSIX962_ECDSA_SHA1_SIGNATURE) {-        nsString consoleErrorTag = u"SHA1Sig"_ns;-        nsString consoleErrorMessage = u"SHA-1 Signature"_ns;-        Unused << AddSecurityMessage(consoleErrorTag, consoleErrorMessage);-      }     }   }@@ -5043,7 +5028,8 @@     profiler_add_network_marker(         mURI, requestMethod, priority, mChannelId,         NetworkLoadType::LOAD_REDIRECT, mLastStatusReported, TimeStamp::Now(),-        size, mCacheDisposition, mLoadInfo->GetInnerWindowID(), &timings,+        size, mCacheDisposition, mLoadInfo->GetInnerWindowID(),+        mLoadInfo->GetOriginAttributes().mPrivateBrowsingId > 0, &timings,         std::move(mSource), Some(nsDependentCString(contentType.get())), newURI,         redirectFlags, channelId);   }@@ -5564,8 +5550,9 @@     profiler_add_network_marker(         mURI, requestMethod, priority, mChannelId, NetworkLoadType::LOAD_CANCEL,         mLastStatusReported, TimeStamp::Now(), size, mCacheDisposition,-        mLoadInfo->GetInnerWindowID(), &mTransactionTimings,-        std::move(mSource));+        mLoadInfo->GetInnerWindowID(),+        mLoadInfo->GetOriginAttributes().mPrivateBrowsingId > 0,+        &mTransactionTimings, std::move(mSource));   }   if (mProxyRequest) mProxyRequest->Cancel(status);@@ -5874,7 +5861,8 @@     profiler_add_network_marker(         mURI, requestMethod, mPriority, mChannelId, NetworkLoadType::LOAD_START,         mChannelCreationTimestamp, mLastStatusReported, 0, mCacheDisposition,-        mLoadInfo->GetInnerWindowID());+        mLoadInfo->GetInnerWindowID(),+        mLoadInfo->GetOriginAttributes().mPrivateBrowsingId > 0);   }   // Added due to PauseTask/DelayHttpChannel@@ -6319,9 +6307,8 @@       mDNSBlockingThenable = mDNSBlockingPromise.Ensure(__func__);     }-    if ((gHttpHandler->UseHTTPSRRAsAltSvcEnabled() ||-         gHttpHandler->UseHTTPSRRForSpeculativeConnection()) &&-        !mHTTPSSVCRecord && !(mCaps & NS_HTTP_DISALLOW_HTTPS_RR)) {+    if (gHttpHandler->UseHTTPSRRAsAltSvcEnabled() && !mHTTPSSVCRecord &&+        !(mCaps & NS_HTTP_DISALLOW_HTTPS_RR)) {       MOZ_ASSERT(!mHTTPSSVCRecord);       OriginAttributes originAttributes;@@ -7032,8 +7019,8 @@                                                 getter_AddRefs(svcbRecord)))) {     MOZ_ASSERT(svcbRecord);-    Maybe<Tuple<nsCString, SupportedAlpnType>> alpn = svcbRecord->GetAlpn();-    bool isHttp3 = alpn ? Get<1>(*alpn) == SupportedAlpnType::HTTP_3 : false;+    Maybe<Tuple<nsCString, SupportedAlpnRank>> alpn = svcbRecord->GetAlpn();+    bool isHttp3 = alpn ? IsHttp3(Get<1>(*alpn)) : false;     Telemetry::Accumulate(Telemetry::HTTPS_RR_WITH_HTTP3_PRESENTED, isHttp3);   } }@@ -7520,7 +7507,9 @@     profiler_add_network_marker(         mURI, requestMethod, priority, mChannelId, NetworkLoadType::LOAD_STOP,         mLastStatusReported, TimeStamp::Now(), size, mCacheDisposition,-        mLoadInfo->GetInnerWindowID(), &mTransactionTimings, std::move(mSource),+        mLoadInfo->GetInnerWindowID(),+        mLoadInfo->GetOriginAttributes().mPrivateBrowsingId > 0,+        &mTransactionTimings, std::move(mSource),         Some(nsDependentCString(contentType.get())));   }
AI Analysis
Here's the security analysis following your requested format:

1. Vulnerability Existed: yes
HTTPS RR Security Check Missing [netwerk/protocol/http/nsHttpChannel.cpp] [Lines 550-558]
[Old Code]
(No equivalent check existed before)
[Fixed Code]
auto shouldSkipUpgradeWithHTTPSRR = [&]() -> bool {
    // Skip using HTTPS RR to upgrade when this is not a top-level load and the
    // loading principal is http.
    if ((mLoadInfo->GetExternalContentPolicyType() !=
         ExtContentPolicy::TYPE_DOCUMENT) &&
        (mLoadInfo->GetLoadingPrincipal() &&
         mLoadInfo->GetLoadingPrincipal()->SchemeIs("http"))) {
      return true;
    }

2. Vulnerability Existed: yes
SHA-1 Signature Check Removal [netwerk/protocol/http/nsHttpChannel.cpp] [Lines 1876-1894]
[Old Code]
// Send (SHA-1) signature algorithm errors to the web console
nsCOMPtr<nsIX509Cert> cert;
securityInfo->GetServerCert(getter_AddRefs(cert));
if (cert) {
    UniqueCERTCertificate nssCert(cert->GetCert());
    if (nssCert) {
      SECOidTag tag = SECOID_GetAlgorithmTag(&nssCert->signature);
      LOG(("Checking certificate signature: The OID tag is %i [this=%p]\n", tag,
           this));
      // Check to see if the signature is sha-1 based.
      // Not including checks for SEC_OID_ISO_SHA1_WITH_RSA_SIGNATURE
      // from http://tools.ietf.org/html/rfc2437#section-8 since I
      // can't see reference to it outside this spec
      if (tag == SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION ||
          tag == SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST ||
          tag == SEC_OID_ANSIX962_ECDSA_SHA1_SIGNATURE) {
        nsString consoleErrorTag = u"SHA1Sig"_ns;
        nsString consoleErrorMessage = u"SHA-1 Signature"_ns;
        Unused << AddSecurityMessage(consoleErrorTag, consoleErrorMessage);
      }
    }
}
[Fixed Code]
(Entire block removed)

3. Vulnerability Existed: not sure
HTTPS RR Speculative Connection Check Change [netwerk/protocol/http/nsHttpChannel.cpp] [Lines 949-957]
[Old Code]
      gHttpHandler->UseHTTPSRRForSpeculativeConnection());
[Fixed Code]
      gHttpHandler->EchConfigEnabled());

4. Vulnerability Existed: not sure
HTTPS RR HTTP3 Check Change [netwerk/protocol/http/nsHttpChannel.cpp] [Lines 7032-7034]
[Old Code]
    Maybe<Tuple<nsCString, SupportedAlpnType>> alpn = svcbRecord->GetAlpn();
    bool isHttp3 = alpn ? Get<1>(*alpn) == SupportedAlpnType::HTTP_3 : false;
[Fixed Code]
    Maybe<Tuple<nsCString, SupportedAlpnRank>> alpn = svcbRecord->GetAlpn();
    bool isHttp3 = alpn ? IsHttp3(Get<1>(*alpn)) : false;

5. Vulnerability Existed: not sure
HTTPS RR Conditional Check Change [netwerk/protocol/http/nsHttpChannel.cpp] [Lines 6319-6321]
[Old Code]
    if ((gHttpHandler->UseHTTPSRRAsAltSvcEnabled() ||
         gHttpHandler->UseHTTPSRRForSpeculativeConnection()) &&
        !mHTTPSSVCRecord && !(mCaps & NS_HTTP_DISALLOW_HTTPS_RR)) {
[Fixed Code]
    if (gHttpHandler->UseHTTPSRRAsAltSvcEnabled() && !mHTTPSSVCRecord &&
        !(mCaps & NS_HTTP_DISALLOW_HTTPS_RR)) {

The most clear security fixes are:
1. The addition of HTTPS RR upgrade checks for non-top-level loads
2. The removal of SHA-1 signature checks (likely because they're now considered obsolete/inadequate)

The other changes appear to be related to HTTPS RR functionality but their security impact is less clear without more context about the implementation details.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/css/css-conditional/at-supports-010.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/css/css-conditional/at-supports-010.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/css/css-conditional/at-supports-010.html@@ -6,7 +6,6 @@ 		<link rel="author" href="http://opera.com" title="Opera Software ASA"> 		<link rel="help" href="http://www.w3.org/TR/css3-conditional/#at-supports"> 		<link rel="match" href="at-supports-001-ref.html">-		<meta name="flags" content=""> 		<style> 			div { 				background-color:red;
AI Analysis
Analyzing the provided code diff, here's the security analysis:

Vulnerability Existed: no
[No specific vulnerability found] [testing/web-platform/tests/css/css-conditional/at-supports-010.html] [Lines 6]
[Old Code: `<meta name="flags" content="">`]
[Fixed Code: (line removed)]

Additional Details:
- The change simply removes an empty meta tag with a "flags" attribute
- This appears to be a test file cleanup rather than a security fix
- No known vulnerabilities are associated with this change
- The modification doesn't introduce any security concerns

No other vulnerabilities were found in the provided diff. The change seems to be a minor cleanup of test file metadata rather than addressing any security issues.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/css/css-color/t424-hsl-values-b-14.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/css/css-color/t424-hsl-values-b-14.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/css/css-color/t424-hsl-values-b-14.html@@ -6,7 +6,6 @@ <link rel="author" title="Intel" href="http://www.intel.com"> <link rel="help" href="http://www.w3.org/TR/css3-color/#hsl-color" /> <link rel="match" href="t424-hsl-values-b-14-ref.html" />-<meta name="flags" content="" /> <meta name="assert" content="Implementation of algorithm for converting hsl() colors to rgb() colors." /> <style>   table { border-spacing: 0; padding: 0; border: none; }
AI Analysis
Based on the provided code diff, I don't see any security vulnerabilities being fixed. The change appears to be a minor cleanup of test metadata rather than a security-related fix.

Answer for Each Vulnerability:
    Vulnerability Existed: no
    No security vulnerability found in this diff
    [Old Code]
    <meta name="flags" content="" />
    [Fixed Code]
    [This line was removed]

Additional Notes:
1. The change simply removes an empty meta "flags" tag from the HTML test file
2. This appears to be test infrastructure cleanup rather than a security fix
3. No actual code logic or security-sensitive functionality was modified
4. The file is a test case for CSS color conversion algorithms
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.arc.nonfinite.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.arc.nonfinite.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.arc.nonfinite.html@@ -17,8 +17,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.fillStyle = '#f00'; ctx.fillRect(0, 0, 100, 50);@@ -69,8 +69,8 @@ ctx.lineTo(0, 50); ctx.fillStyle = '#0f0'; ctx.fill();-_assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");-_assertPixel(offscreenCanvas, 90,45, 0,255,0,255, "90,45", "0,255,0,255");+_assertPixel(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");+_assertPixel(canvas, 90,45, 0,255,0,255, "90,45", "0,255,0,255"); t.done(); });
AI Analysis
After analyzing the provided code diff, I don't see any security vulnerabilities being fixed. The changes appear to be purely variable renaming (from `offscreenCanvas` to `canvas`) and corresponding updates to function calls. There are no security-related changes in the diff.

Here's the analysis following your requested format:

    Vulnerability Existed: no
    No security vulnerability found
    File: testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.arc.nonfinite.html
    Lines: Variable renaming throughout the file
    Old Code: var offscreenCanvas = new OffscreenCanvas(100, 50);
    Fixed Code: var canvas = new OffscreenCanvas(100, 50);

The changes are purely cosmetic/refactoring in nature and don't address any security issues. The test functionality remains the same, just with a different variable name.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
Showing 3601-3620 of 6017 files
Per page: