Analysis Report

Shared security patch analysis results

AI Used: DEEPSEEK deepseek-chat
Share this analysis
6017 filtered / 6017 total files
js/src/vm/BuiltinObjectKind.h AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/js/src/vm/BuiltinObjectKind.h+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/js/src/vm/BuiltinObjectKind.h@@ -33,6 +33,7 @@   ArrayBuffer,   Int32Array,   Iterator,+  Map,   Promise,   RegExp,   Set,
AI Analysis
Analysis of the provided code diff:

1. Vulnerability Existed: no
    No specific vulnerability found [File] js/src/vm/BuiltinObjectKind.h [Lines] 33-40
    [Old Code]
    ArrayBuffer,
    Int32Array,
    Iterator,
    Promise,
    RegExp,
    Set,
    [Fixed Code]
    ArrayBuffer,
    Int32Array,
    Iterator,
    Map,
    Promise,
    RegExp,
    Set,

Additional Details:
- The diff shows only an addition of "Map" to the BuiltinObjectKind enum
- This appears to be a feature addition rather than a security fix
- No security vulnerability is being addressed in this change
- The change is likely related to adding support for Map objects in the JavaScript engine
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/the-offscreen-canvas/context.unrecognised.badsuffix.worker.js AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/the-offscreen-canvas/context.unrecognised.badsuffix.worker.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/the-offscreen-canvas/context.unrecognised.badsuffix.worker.js@@ -13,8 +13,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); assert_throws_js(TypeError, function() { offscreenCanvas2.getContext("2d#"); });
AI Analysis
Analyzing the provided code diff for security fixes:

1. Vulnerability Existed: no
   No specific vulnerability found [File] testing/web-platform/tests/html/canvas/offscreen/the-offscreen-canvas/context.unrecognised.badsuffix.worker.js [Lines] 13-16
   Old Code:
   var offscreenCanvas = new OffscreenCanvas(100, 50);
   var ctx = offscreenCanvas.getContext('2d');

   Fixed Code:
   var canvas = new OffscreenCanvas(100, 50);
   var ctx = canvas.getContext('2d');

2. Vulnerability Existed: no
   No specific vulnerability found [File] testing/web-platform/tests/html/canvas/offscreen/the-offscreen-canvas/context.unrecognised.badsuffix.worker.js [Lines] 18
   Old Code: (none, new line added)
   Fixed Code:
   assert_throws_js(TypeError, function() { offscreenCanvas2.getContext("2d#"); });

The changes appear to be:
1. A variable name change from `offscreenCanvas` to `canvas` (likely for consistency/readability)
2. Addition of a test case for invalid context type ("2d#")

No security vulnerabilities were identified in these changes. The modifications seem to be related to test improvements rather than security fixes.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
browser/components/preferences/dialogs/syncChooseWhatToSync.js AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/browser/components/preferences/dialogs/syncChooseWhatToSync.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/browser/components/preferences/dialogs/syncChooseWhatToSync.js@@ -2,7 +2,7 @@  * License, v. 2.0. If a copy of the MPL was not distributed with this file,  * You can obtain one at http://mozilla.org/MPL/2.0/. */-/* import-globals-from ../../../../toolkit/content/preferencesBindings.js */+/* import-globals-from /toolkit/content/preferencesBindings.js */ const { Services } = ChromeUtils.import("resource://gre/modules/Services.jsm");
AI Analysis
Let me analyze the code diff for security fixes.

Vulnerability Existed: not sure
[Potential Path Traversal or Incorrect Module Import] [browser/components/preferences/dialogs/syncChooseWhatToSync.js] [Lines 2]
[Old Code]
/* import-globals-from ../../../../toolkit/content/preferencesBindings.js */
[Fixed Code]
/* import-globals-from /toolkit/content/preferencesBindings.js */

Additional Details:
The change involves modifying the path for importing globals from a JavaScript file. The old code used a relative path (../../../../), while the new code uses an absolute path (/toolkit/content/). While this doesn't directly indicate a security vulnerability, it could potentially be related to:
1. Preventing path traversal issues by using absolute paths
2. Ensuring correct module resolution
3. Making the import more reliable across different file locations

However, without more context about the application's file structure and security requirements, I can't definitively say this was a security fix. It might simply be a code maintenance improvement.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
devtools/client/inspector/rules/test/browser_rules_print_media_simulation.js AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/devtools/client/inspector/rules/test/browser_rules_print_media_simulation.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/devtools/client/inspector/rules/test/browser_rules_print_media_simulation.js@@ -28,6 +28,11 @@   info("Select a div that will change according to print simulation");   await selectNode("div", inspector);   ok(ruleViewHasColor("#f00"), "The rule view shows the expected initial rule");+  is(+    getRuleViewAncestorRulesDataElementByIndex(view, 1),+    null,+    "No media query information are displayed initially"+  );   info("Click on the button and wait for print media to be applied");   button.click();@@ -40,6 +45,11 @@     true,     "The rules view was updated with the rule view from the print media query"   );+  is(+    getRuleViewAncestorRulesDataTextByIndex(view, 1),+    "@media print",+    "Media queries information are displayed"+  );   info("Select the node from the remote iframe");   await selectNodeInFrames(["iframe", "html"], inspector);@@ -47,6 +57,11 @@   ok(     ruleViewHasColor("#0ff"),     "The simulation is also applied on the remote iframe"+  );+  is(+    getRuleViewAncestorRulesDataTextByIndex(view, 1),+    "@media print",+    "Media queries information are displayed for the node on the remote iframe as well"   );   info("Select the top level div again");@@ -59,10 +74,20 @@   ok(true, "The button is no longer checked");   await waitFor(() => ruleViewHasColor("#f00"));+  is(+    getRuleViewAncestorRulesDataElementByIndex(view, 1),+    null,+    "media query is no longer displayed"+  );   info("Select the node from the remote iframe again");   await selectNodeInFrames(["iframe", "html"], inspector);   await waitFor(() => ruleViewHasColor("#ff0"));   ok(true, "The simulation stopped on the remote iframe as well");+  is(+    getRuleViewAncestorRulesDataElementByIndex(view, 1),+    null,+    "media query is no longer displayed on the remote iframe as well"+  ); });
AI Analysis
After analyzing the provided code diff, I don't see any security vulnerabilities being fixed. The changes appear to be test case enhancements adding more assertions to verify media query information display behavior. Here's the analysis:

1. Vulnerability Existed: no
   No security vulnerability [devtools/client/inspector/rules/test/browser_rules_print_media_simulation.js] [Lines 28-74]
   The changes are test case improvements adding assertions for media query information display

The diff shows:
1. Added assertions to verify media query information is not displayed initially
2. Added assertions to verify media query information is displayed when print simulation is active
3. Added assertions to verify media query information is displayed for nodes in remote iframes
4. Added assertions to verify media query information is cleared after simulation ends

These are all test case enhancements rather than security fixes. The changes help ensure the print media simulation feature works correctly across frames, but don't address any security vulnerabilities.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
dom/media/webrtc/transport/ipc/StunAddrsRequestChild.h AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/dom/media/webrtc/transport/ipc/StunAddrsRequestChild.h+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/dom/media/webrtc/transport/ipc/StunAddrsRequestChild.h@@ -32,8 +32,7 @@   friend class PStunAddrsRequestChild;  public:-  explicit StunAddrsRequestChild(StunAddrsListener* listener,-                                 nsISerialEventTarget* mainThreadEventTarget);+  explicit StunAddrsRequestChild(StunAddrsListener* listener);   NS_IMETHOD_(MozExternalRefCountType) AddRef();   NS_IMETHOD_(MozExternalRefCountType) Release();
AI Analysis
Analyzing the provided code diff, here's the security assessment:

Vulnerability Existed: not sure
[Potential Thread Safety Issue] [dom/media/webrtc/transport/ipc/StunAddrsRequestChild.h] [Lines 32-33]
[Old Code]
explicit StunAddrsRequestChild(StunAddrsListener* listener,
                              nsISerialEventTarget* mainThreadEventTarget);
[Fixed Code]
explicit StunAddrsRequestChild(StunAddrsListener* listener);

Additional Details:
- The change removes the nsISerialEventTarget parameter from the constructor
- This could potentially affect thread safety if the event target was used for proper synchronization
- Without more context about how this class is used, it's unclear if this introduces a security vulnerability
- The change might be related to simplifying the API rather than fixing a security issue

Note: This appears to be an API change rather than a clear security fix. The removal of the event target parameter could potentially affect thread safety if proper synchronization was dependent on it, but we can't confirm this without seeing the implementation details.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
toolkit/mozapps/extensions/test/browser/browser_html_list_view.js AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/toolkit/mozapps/extensions/test/browser/browser_html_list_view.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/toolkit/mozapps/extensions/test/browser/browser_html_list_view.js@@ -61,6 +61,7 @@ add_task(async function testExtensionList() {   let id = "[email protected]";+  let headingId = "test_mochi_test-heading";   let extension = ExtensionTestUtils.loadExtension({     manifest: {       name: "Test extension",@@ -94,6 +95,16 @@   // Check the properties of the card.   is(card.addonNameEl.textContent, "Test extension", "The name is set");+  is(+    card.querySelector("h3").id,+    headingId,+    "The add-on name has the correct id"+  );+  is(+    card.querySelector(".card").getAttribute("aria-labelledby"),+    headingId,+    "The card is labelled by the heading"+  );   let icon = card.querySelector(".addon-icon");   ok(icon.src.endsWith("/test-icon.png"), "The icon is set");
AI Analysis
Here's the analysis of the provided code diff for security fixes:

1. Vulnerability Existed: no
   No specific vulnerability found [File] [Lines 61-95]
   [Old Code]
   No explicit heading ID or aria-labelledby attribute
   [Fixed Code]
   Added heading ID and aria-labelledby attribute for better accessibility

Additional Details:
- The changes appear to be accessibility improvements rather than security fixes
- The modifications add proper ARIA labeling and element IDs for better screen reader support
- No security vulnerabilities (like XSS, injection, etc.) were present in either version
- The changes follow accessibility best practices by ensuring proper labeling relationships between elements

Note: While these changes improve the code quality and accessibility, they don't represent security fixes for any known vulnerabilities. The modifications are focused on making the extension list view more accessible to users with disabilities.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/text/2d.text.measure.width.empty.worker.js AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/text/2d.text.measure.width.empty.worker.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/text/2d.text.measure.width.empty.worker.js@@ -13,8 +13,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); var f = new FontFace("CanvasTest", "url('/fonts/CanvasTest.ttf')"); let fonts = (self.fonts ? self.fonts : document.fonts);
AI Analysis
Let me analyze the provided code diff for security fixes.

Vulnerability Existed: no
[Variable Renaming] [testing/web-platform/tests/html/canvas/offscreen/text/2d.text.measure.width.empty.worker.js] [Lines 13-14]
[Old Code]
var offscreenCanvas = new OffscreenCanvas(100, 50);
var ctx = offscreenCanvas.getContext('2d');
[Fixed Code]
var canvas = new OffscreenCanvas(100, 50);
var ctx = canvas.getContext('2d');

Additional Details:
The change appears to be purely a variable renaming from `offscreenCanvas` to `canvas`. There is no security vulnerability being fixed here - this seems to be a code style or consistency improvement. The functionality remains exactly the same, just with a different variable name. No security-related changes were made to the FontFace creation or font loading parts of the code.

No other vulnerabilities were identified in this diff. The rest of the changes are either whitespace or unrelated to security.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
third_party/rust/syn/tests/macros/mod.rs AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/third_party/rust/syn/tests/macros/mod.rs+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/third_party/rust/syn/tests/macros/mod.rs@@ -39,18 +39,24 @@     (($expr:ident) as $t:ty, @$snapshot:literal) => {         let $expr = crate::macros::Tokens::parse::<$t>($expr).unwrap();         let debug = crate::macros::debug::Lite(&$expr);-        insta::assert_debug_snapshot!(debug, @$snapshot);+        if !cfg!(miri) {+            insta::assert_debug_snapshot!(debug, @$snapshot);+        }     };     (($($expr:tt)*) as $t:ty, @$snapshot:literal) => {{         let syntax_tree = crate::macros::Tokens::parse::<$t>($($expr)*).unwrap();         let debug = crate::macros::debug::Lite(&syntax_tree);-        insta::assert_debug_snapshot!(debug, @$snapshot);+        if !cfg!(miri) {+            insta::assert_debug_snapshot!(debug, @$snapshot);+        }         syntax_tree     }};     (($($expr:tt)*) , @$snapshot:literal) => {{         let syntax_tree = $($expr)*;         let debug = crate::macros::debug::Lite(&syntax_tree);-        insta::assert_debug_snapshot!(debug, @$snapshot);+        if !cfg!(miri) {+            insta::assert_debug_snapshot!(debug, @$snapshot);+        }         syntax_tree     }};     (($($expr:tt)*) $next:tt $($rest:tt)*) => {
AI Analysis
Analyzing the provided code diff, here's the security assessment:

Vulnerability Existed: no
[No specific vulnerability found] [third_party/rust/syn/tests/macros/mod.rs] [Lines 39-60]
[Old Code]
Various instances of direct `insta::assert_debug_snapshot!` calls without Miri check
[Fixed Code]
Added `if !cfg!(miri)` condition before `insta::assert_debug_snapshot!` calls

Additional Details:
The changes introduce conditional execution of snapshot assertions when not running under Miri (Rust's experimental interpreter). This appears to be a test reliability improvement rather than a security fix. The modification prevents snapshot tests from running under Miri, which might be due to Miri's limitations or different behavior in interpretation mode. No actual security vulnerability is being addressed here.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
gfx/wr/webrender/src/visibility.rs AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/gfx/wr/webrender/src/visibility.rs+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/gfx/wr/webrender/src/visibility.rs@@ -332,7 +332,7 @@             } else {                 if prim_local_rect.width() <= 0.0 || prim_local_rect.height() <= 0.0 {                     if prim_instance.is_chased() {-                        println!("\tculled for zero local rectangle");+                        info!("\tculled for zero local rectangle");                     }                     continue;                 }@@ -349,7 +349,7 @@                     Some(local_rect) => local_rect,                     None => {                         if prim_instance.is_chased() {-                            println!("\tculled for being out of the local clip rectangle: {:?}",+                            info!("\tculled for being out of the local clip rectangle: {:?}",                                      prim_instance.clip_set.local_clip_rect);                         }                         continue;@@ -394,19 +394,19 @@                     Some(clip_chain) => clip_chain,                     None => {                         if prim_instance.is_chased() {-                            println!("\tunable to build the clip chain, skipping");+                            info!("\tunable to build the clip chain, skipping");                         }                         continue;                     }                 };                 if prim_instance.is_chased() {-                    println!("\teffective clip chain from {:?} {}",+                    info!("\teffective clip chain from {:?} {}",                              prim_instance.vis.clip_chain.clips_range,                              if apply_local_clip_rect { "(applied)" } else { "" },                     );-                    println!("\tpicture rect {:?} @{:?}",-                             prim_instance.vis.clip_chain.pic_clip_rect,+                    info!("\tpicture rect {:?} @{:?}",+                             prim_instance.vis.clip_chain.pic_coverage_rect,                              prim_instance.vis.clip_chain.pic_spatial_node_index,                     );                 }@@ -419,7 +419,7 @@                 if prim_instance.vis.combined_local_clip_rect.is_empty() {                     if prim_instance.is_chased() {-                        println!("\tculled for zero local clip rectangle");+                        info!("\tculled for zero local clip rectangle");                     }                     continue;                 }@@ -434,7 +434,7 @@                     }                     None => {                         if prim_instance.is_chased() {-                            println!("\tculled for zero visible rectangle");+                            info!("\tculled for zero visible rectangle");                         }                         continue;                     }@@ -484,7 +484,7 @@                     };                     if debug_color.a != 0.0 {                         if let Some(rect) = calculate_prim_clipped_world_rect(-                            &prim_instance.vis.clip_chain.pic_clip_rect,+                            &prim_instance.vis.clip_chain.pic_coverage_rect,                             &world_culling_rect,                             &map_surface_to_world,                         ) {@@ -500,7 +500,7 @@                     if is_image {                         // We allow "small" images, since they're generally UI elements.                         if let Some(rect) = calculate_prim_clipped_world_rect(-                            &prim_instance.vis.clip_chain.pic_clip_rect,+                            &prim_instance.vis.clip_chain.pic_coverage_rect,                             &world_culling_rect,                             &map_surface_to_world,                         ) {@@ -513,7 +513,7 @@                 }                 if prim_instance.is_chased() {-                    println!("\tvisible with {:?}", prim_instance.vis.combined_local_clip_rect);+                    info!("\tvisible with {:?}", prim_instance.vis.combined_local_clip_rect);                 }                 // TODO(gw): This should probably be an instance method on PrimitiveInstance?@@ -611,7 +611,7 @@             // minimize the size of the render target that is required.             if let Some(ref mut raster_config) = pic.raster_config {                 raster_config.clipped_bounding_rect = map_surface_to_world-                    .map(&prim_instance.vis.clip_chain.pic_clip_rect)+                    .map(&prim_instance.vis.clip_chain.pic_coverage_rect)                     .and_then(|rect| {                         rect.intersection(world_culling_rect)                     })@@ -664,7 +664,7 @@     // is in picture space (the clip-chain already takes into account the bounds of the     // primitive local_rect and local_clip_rect). If there is no intersection here, the     // primitive is not visible at all.-    let pic_culling_rect = match pic_culling_rect.intersection(&clip_chain.pic_clip_rect) {+    let pic_culling_rect = match pic_culling_rect.intersection(&clip_chain.pic_coverage_rect) {         Some(rect) => rect,         None => return LayoutRect::zero(),     };
AI Analysis
Let me analyze the code diff for security fixes. Here are the findings:

1. Vulnerability Existed: not sure
    [Logging Sensitive Information] [gfx/wr/webrender/src/visibility.rs] [Multiple locations]
    [Old Code]
    println!("\tculled for zero local rectangle");
    println!("\tculled for being out of the local clip rectangle: {:?}");
    println!("\tunable to build the clip chain, skipping");
    println!("\teffective clip chain from {:?} {}");
    println!("\tpicture rect {:?} @{:?}");
    println!("\tculled for zero local clip rectangle");
    println!("\tculled for zero visible rectangle");
    println!("\tvisible with {:?}");
    
    [Fixed Code]
    info!("\tculled for zero local rectangle");
    info!("\tculled for being out of the local clip rectangle: {:?}");
    info!("\tunable to build the clip chain, skipping");
    info!("\teffective clip chain from {:?} {}");
    info!("\tpicture rect {:?} @{:?}");
    info!("\tculled for zero local clip rectangle");
    info!("\tculled for zero visible rectangle");
    info!("\tvisible with {:?}");

2. Vulnerability Existed: not sure
    [Inconsistent Field Names] [gfx/wr/webrender/src/visibility.rs] [Multiple locations]
    [Old Code]
    prim_instance.vis.clip_chain.pic_clip_rect
    [Fixed Code]
    prim_instance.vis.clip_chain.pic_coverage_rect

The main changes appear to be:
1. Replacing println! with info! for logging, which is likely a security improvement as it provides better control over log levels and output
2. Renaming a field from pic_clip_rect to pic_coverage_rect, which might be related to better semantics or security through clarity

While these changes don't appear to fix any critical vulnerabilities, they do represent security-conscious improvements to the codebase. The logging changes could help prevent information leakage in production environments, and the field renaming might improve code maintainability and reduce potential confusion.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
third_party/rust/clap/src/lib.rs AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/third_party/rust/clap/src/lib.rs+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/third_party/rust/clap/src/lib.rs@@ -1,638 +1,107 @@-// Copyright ⓒ 2015-2016 Kevin B. Knapp and [`clap-rs` contributors](https://github.com/clap-rs/clap/blob/v2.33.1/CONTRIBUTORS.md).+// Copyright ⓒ 2015-2016 Kevin B. Knapp and [`clap-rs` contributors](https://github.com/clap-rs/clap/graphs/contributors). // Licensed under the MIT license // (see LICENSE or <http://opensource.org/licenses/MIT>) All files in the project carrying such // notice may not be copied, modified, or distributed except according to those terms.-//! `clap` is a simple-to-use, efficient, and full-featured library for parsing command line-//! arguments and subcommands when writing console/terminal applications.-//!-//! ## About-//!-//! `clap` is used to parse *and validate* the string of command line arguments provided by the user-//! at runtime. You provide the list of valid possibilities, and `clap` handles the rest. This means-//! you focus on your *applications* functionality, and less on the parsing and validating of-//! arguments.-//!-//! `clap` also provides the traditional version and help switches (or flags) 'for free' meaning-//! automatically with no configuration. It does this by checking the list of valid possibilities you-//! supplied and adding only the ones you haven't already defined. If you are using subcommands,-//! `clap` will also auto-generate a `help` subcommand for you in addition to the traditional flags.-//!-//! Once `clap` parses the user provided string of arguments, it returns the matches along with any-//! applicable values. If the user made an error or typo, `clap` informs them of the mistake and-//! exits gracefully (or returns a `Result` type and allows you to perform any clean up prior to-//! exit). Because of this, you can make reasonable assumptions in your code about the validity of-//! the arguments.-//!-//!-//! ## Quick Example-//!-//! The following examples show a quick example of some of the very basic functionality of `clap`.-//! For more advanced usage, such as requirements, conflicts, groups, multiple values and-//! occurrences see the [documentation](https://docs.rs/clap/), [examples/] directory of-//! this repository or the [video tutorials].-//!-//! **NOTE:** All of these examples are functionally the same, but show different styles in which to-//! use `clap`-//!-//! The first example shows a method that allows more advanced configuration options (not shown in-//! this small example), or even dynamically generating arguments when desired. The downside is it's-//! more verbose.-//!-//! ```no_run-//! // (Full example with detailed comments in examples/01b_quick_example.rs)-//! //-//! // This example demonstrates clap's full 'builder pattern' style of creating arguments which is-//! // more verbose, but allows easier editing, and at times more advanced options, or the possibility-//! // to generate arguments dynamically.-//! extern crate clap;-//! use clap::{Arg, App, SubCommand};-//!-//! fn main() {-//!     let matches = App::new("My Super Program")-//!                           .version("1.0")-//!                           .author("Kevin K. <[email protected]>")-//!                           .about("Does awesome things")-//!                           .arg(Arg::with_name("config")-//!                                .short("c")-//!                                .long("config")-//!                                .value_name("FILE")-//!                                .help("Sets a custom config file")-//!                                .takes_value(true))-//!                           .arg(Arg::with_name("INPUT")-//!                                .help("Sets the input file to use")-//!                                .required(true)-//!                                .index(1))-//!                           .arg(Arg::with_name("v")-//!                                .short("v")-//!                                .multiple(true)-//!                                .help("Sets the level of verbosity"))-//!                           .subcommand(SubCommand::with_name("test")-//!                                       .about("controls testing features")-//!                                       .version("1.3")-//!                                       .author("Someone E. <[email protected]>")-//!                                       .arg(Arg::with_name("debug")-//!                                           .short("d")-//!                                           .help("print debug information verbosely")))-//!                           .get_matches();-//!-//!     // Gets a value for config if supplied by user, or defaults to "default.conf"-//!     let config = matches.value_of("config").unwrap_or("default.conf");-//!     println!("Value for config: {}", config);-//!-//!     // Calling .unwrap() is safe here because "INPUT" is required (if "INPUT" wasn't-//!     // required we could have used an 'if let' to conditionally get the value)-//!     println!("Using input file: {}", matches.value_of("INPUT").unwrap());-//!-//!     // Vary the output based on how many times the user used the "verbose" flag-//!     // (i.e. 'myprog -v -v -v' or 'myprog -vvv' vs 'myprog -v'-//!     match matches.occurrences_of("v") {-//!         0 => println!("No verbose info"),-//!         1 => println!("Some verbose info"),-//!         2 => println!("Tons of verbose info"),-//!         3 | _ => println!("Don't be crazy"),-//!     }-//!-//!     // You can handle information about subcommands by requesting their matches by name-//!     // (as below), requesting just the name used, or both at the same time-//!     if let Some(matches) = matches.subcommand_matches("test") {-//!         if matches.is_present("debug") {-//!             println!("Printing debug info...");-//!         } else {-//!             println!("Printing normally...");-//!         }-//!     }-//!-//!     // more program logic goes here...-//! }-//! ```-//!-//! The next example shows a far less verbose method, but sacrifices some of the advanced-//! configuration options (not shown in this small example). This method also takes a *very* minor-//! runtime penalty.-//!-//! ```no_run-//! // (Full example with detailed comments in examples/01a_quick_example.rs)-//! //-//! // This example demonstrates clap's "usage strings" method of creating arguments-//! // which is less verbose-//! extern crate clap;-//! use clap::{Arg, App, SubCommand};-//!-//! fn main() {-//!     let matches = App::new("myapp")-//!                           .version("1.0")-//!                           .author("Kevin K. <[email protected]>")-//!                           .about("Does awesome things")-//!                           .args_from_usage(-//!                               "-c, --config=[FILE] 'Sets a custom config file'-//!                               <INPUT>              'Sets the input file to use'-//!                               -v...                'Sets the level of verbosity'")-//!                           .subcommand(SubCommand::with_name("test")-//!                                       .about("controls testing features")-//!                                       .version("1.3")-//!                                       .author("Someone E. <[email protected]>")-//!                                       .arg_from_usage("-d, --debug 'Print debug information'"))-//!                           .get_matches();-//!-//!     // Same as previous example...-//! }-//! ```-//!-//! This third method shows how you can use a YAML file to build your CLI and keep your Rust source-//! tidy or support multiple localized translations by having different YAML files for each-//! localization.-//!-//! First, create the `cli.yml` file to hold your CLI options, but it could be called anything we-//! like:-//!-//! ```yaml-//! name: myapp-//! version: "1.0"-//! author: Kevin K. <[email protected]>-//! about: Does awesome things-//! args:-//!     - config:-//!         short: c-//!         long: config-//!         value_name: FILE-//!         help: Sets a custom config file-//!         takes_value: true-//!     - INPUT:-//!         help: Sets the input file to use-//!         required: true-//!         index: 1-//!     - verbose:-//!         short: v-//!         multiple: true-//!         help: Sets the level of verbosity-//! subcommands:-//!     - test:-//!         about: controls testing features-//!         version: "1.3"-//!         author: Someone E. <[email protected]>-//!         args:-//!             - debug:-//!                 short: d-//!                 help: print debug information-//! ```-//!-//! Since this feature requires additional dependencies that not everyone may want, it is *not*-//! compiled in by default and we need to enable a feature flag in Cargo.toml:-//!-//! Simply change your `clap = "~2.27.0"` to `clap = {version = "~2.27.0", features = ["yaml"]}`.-//!-//! At last we create our `main.rs` file just like we would have with the previous two examples:-//!-//! ```ignore-//! // (Full example with detailed comments in examples/17_yaml.rs)-//! //-//! // This example demonstrates clap's building from YAML style of creating arguments which is far-//! // more clean, but takes a very small performance hit compared to the other two methods.-//! #[macro_use]-//! extern crate clap;-//! use clap::App;-//!-//! fn main() {-//!     // The YAML file is found relative to the current file, similar to how modules are found-//!     let yaml = load_yaml!("cli.yml");-//!     let matches = App::from_yaml(yaml).get_matches();-//!-//!     // Same as previous examples...-//! }-//! ```-//!-//! Finally there is a macro version, which is like a hybrid approach offering the speed of the-//! builder pattern (the first example), but without all the verbosity.-//!-//! ```no_run-//! #[macro_use]-//! extern crate clap;-//!-//! fn main() {-//!     let matches = clap_app!(myapp =>-//!         (version: "1.0")-//!         (author: "Kevin K. <[email protected]>")-//!         (about: "Does awesome things")-//!         (@arg CONFIG: -c --config +takes_value "Sets a custom config file")-//!         (@arg INPUT: +required "Sets the input file to use")-//!         (@arg debug: -d ... "Sets the level of debugging information")-//!         (@subcommand test =>-//!             (about: "controls testing features")-//!             (version: "1.3")-//!             (author: "Someone E. <[email protected]>")-//!             (@arg verbose: -v --verbose "Print test information verbosely")-//!         )-//!     ).get_matches();-//!-//!     // Same as before...-//! }-//! ```-//!-//! If you were to compile any of the above programs and run them with the flag `--help` or `-h` (or-//! `help` subcommand, since we defined `test` as a subcommand) the following would be output-//!-//! ```text-//! $ myprog --help-//! My Super Program 1.0-//! Kevin K. <[email protected]>-//! Does awesome things-//!-//! USAGE:-//!     MyApp [FLAGS] [OPTIONS] <INPUT> [SUBCOMMAND]-//!-//! FLAGS:-//!     -h, --help       Prints this message-//!     -v               Sets the level of verbosity-//!     -V, --version    Prints version information-//!-//! OPTIONS:-//!     -c, --config <FILE>    Sets a custom config file-//!-//! ARGS:-//!     INPUT    The input file to use-//!-//! SUBCOMMANDS:-//!     help    Prints this message-//!     test    Controls testing features-//! ```-//!-//! **NOTE:** You could also run `myapp test --help` to see similar output and options for the-//! `test` subcommand.-//!-//! ## Try it!-//!-//! ### Pre-Built Test-//!-//! To try out the pre-built example, use the following steps:-//!-//! * Clone the repository `$ git clone https://github.com/clap-rs/clap && cd clap-rs/tests`-//! * Compile the example `$ cargo build --release`-//! * Run the help info `$ ./target/release/claptests --help`-//! * Play with the arguments!-//!-//! ### BYOB (Build Your Own Binary)-//!-//! To test out `clap`'s default auto-generated help/version follow these steps:-//!-//! * Create a new cargo project `$ cargo new fake --bin && cd fake`-//! * Add `clap` to your `Cargo.toml`-//!-//! ```toml-//! [dependencies]-//! clap = "2"-//! ```-//!-//! * Add the following to your `src/main.rs`-//!-//! ```no_run-//! extern crate clap;-//! use clap::App;-//!-//! fn main() {-//!   App::new("fake").version("v1.0-beta").get_matches();-//! }-//! ```-//!-//! * Build your program `$ cargo build --release`-//! * Run with help or version `$ ./target/release/fake --help` or `$ ./target/release/fake-//! --version`-//!-//! ## Usage-//!-//! For full usage, add `clap` as a dependency in your `Cargo.toml` (it is **highly** recommended to-//! use the `~major.minor.patch` style versions in your `Cargo.toml`, for more information see-//! [Compatibility Policy](#compatibility-policy)) to use from crates.io:-//!-//! ```toml-//! [dependencies]-//! clap = "~2.27.0"-//! ```-//!-//! Or get the latest changes from the master branch at github:-//!-//! ```toml-//! [dependencies.clap]-//! git = "https://github.com/clap-rs/clap.git"-//! ```-//!-//! Add `extern crate clap;` to your crate root.-//!-//! Define a list of valid arguments for your program (see the-//! [documentation](https://docs.rs/clap/) or [examples/] directory of this repo)-//!-//! Then run `cargo build` or `cargo update && cargo build` for your project.-//!-//! ### Optional Dependencies / Features-//!-//! #### Features enabled by default-//!-//! * `suggestions`: Turns on the `Did you mean '--myoption'?` feature for when users make typos. (builds dependency `strsim`)-//! * `color`: Turns on colored error messages. This feature only works on non-Windows OSs. (builds dependency `ansi-term` and `atty`)-//! * `wrap_help`: Wraps the help at the actual terminal width when-//!  available, instead of 120 characters. (builds dependency `textwrap`-//! with feature `term_size`)-//!-//! To disable these, add this to your `Cargo.toml`:-//!-//! ```toml-//! [dependencies.clap]-//! version = "~2.27.0"-//! default-features = false-//! ```-//!-//! You can also selectively enable only the features you'd like to include, by adding:-//!-//! ```toml-//! [dependencies.clap]-//! version = "~2.27.0"-//! default-features = false-//!-//! # Cherry-pick the features you'd like to use-//! features = [ "suggestions", "color" ]-//! ```-//!-//! #### Opt-in features-//!-//! * **"yaml"**: Enables building CLIs from YAML documents. (builds dependency `yaml-rust`)-//! * **"unstable"**: Enables unstable `clap` features that may change from release to release-//!-//! ### Dependencies Tree-//!-//! The following graphic depicts `clap`s dependency graph (generated using-//! [cargo-graph](https://github.com/kbknapp/cargo-graph)).-//!-//!  * **Dashed** Line: Optional dependency-//!  * **Red** Color: **NOT** included by default (must use cargo `features` to enable)-//!  * **Blue** Color: Dev dependency, only used while developing.-//!-//! ![clap dependencies](https://github.com/clap-rs/clap/blob/v2.34.0/clap_dep_graph.png)-//!-//! ### More Information-//!-//! You can find complete documentation on the [docs.rs](https://docs.rs/clap/) for this project.-//!-//! You can also find usage examples in the [examples/] directory of this repo.-//!-//! #### Video Tutorials-//!-//! There's also the video tutorial series [Argument Parsing with Rust v2][video tutorials].-//!-//! These videos slowly trickle out as I finish them and currently a work in progress.-//!-//! ## How to Contribute-//!-//! Contributions are always welcome! And there is a multitude of ways in which you can help-//! depending on what you like to do, or are good at. Anything from documentation, code cleanup,-//! issue completion, new features, you name it, even filing issues is contributing and greatly-//! appreciated!-//!-//! Another really great way to help is if you find an interesting, or helpful way in which to use-//! `clap`. You can either add it to the [examples/] directory, or file an issue and tell-//! me. I'm all about giving credit where credit is due :)-//!-//! Please read [CONTRIBUTING.md](https://github.com/clap-rs/clap/blob/v2.34.0/.github/CONTRIBUTING.md) before you start contributing.-//!-//!-//! ### Testing Code-//!-//! To test with all features both enabled and disabled, you can run theese commands:-//!-//! ```text-//! $ cargo test --no-default-features-//! $ cargo test --features "yaml unstable"-//! ```-//!-//! Alternatively, if you have [`just`](https://github.com/casey/just) installed you can run the-//! prebuilt recipes. *Not* using `just` is perfectly fine as well, it simply bundles commands-//! automatically.-//!-//! For example, to test the code, as above simply run:-//!-//! ```text-//! $ just run-tests-//! ```-//!-//! From here on, I will list the appropriate `cargo` command as well as the `just` command.-//!-//! Sometimes it's helpful to only run a subset of the tests, which can be done via:-//!-//! ```text-//! $ cargo test --test <test_name>-//!-//! # Or-//!-//! $ just run-test <test_name>-//! ```-//!-//! ### Linting Code-//!-//! During the CI process `clap` runs against many different lints using-//! [`clippy`](https://github.com/Manishearth/rust-clippy). In order to check if these lints pass on-//! your own computer prior to submitting a PR you'll need a nightly compiler.-//!-//! In order to check the code for lints run either:-//!-//! ```text-//! $ rustup override add nightly-//! $ cargo build --features lints-//! $ rustup override remove-//!-//! # Or-//!-//! $ just lint-//! ```-//!-//! ### Debugging Code-//!-//! Another helpful technique is to see the `clap` debug output while developing features. In order-//! to see the debug output while running the full test suite or individual tests, run:-//!-//! ```text-//! $ cargo test --features debug-//!-//! # Or for individual tests-//! $ cargo test --test <test_name> --features debug-//!-//! # The corresponding just command for individual debugging tests is:-//! $ just debug <test_name>-//! ```-//!-//! ### Goals-//!-//! There are a few goals of `clap` that I'd like to maintain throughout contributions. If your-//! proposed changes break, or go against any of these goals we'll discuss the changes further-//! before merging (but will *not* be ignored, all contributes are welcome!). These are by no means-//! hard-and-fast rules, as I'm no expert and break them myself from time to time (even if by-//! mistake or ignorance).-//!-//! * Remain backwards compatible when possible-//!   - If backwards compatibility *must* be broken, use deprecation warnings if at all possible before-//!   removing legacy code - This does not apply for security concerns-//! * Parse arguments quickly-//!   - Parsing of arguments shouldn't slow down usage of the main program - This is also true of-//!   generating help and usage information (although *slightly* less stringent, as the program is about-//!   to exit)-//! * Try to be cognizant of memory usage-//!   - Once parsing is complete, the memory footprint of `clap` should be low since the  main program-//!   is the star of the show-//! * `panic!` on *developer* error, exit gracefully on *end-user* error-//!-//! ### Compatibility Policy-//!-//! Because `clap` takes `SemVer` and compatibility seriously, this is the official policy regarding-//! breaking changes and previous versions of Rust.-//!-//! `clap` will pin the minimum required version of Rust to the CI builds. Bumping the minimum-//! version of Rust is considered a minor breaking change, meaning *at a minimum* the minor version-//! of `clap` will be bumped.-//!-//! In order to keep from being surprised by breaking changes, it is **highly** recommended to use-//! the `~major.minor.patch` style in your `Cargo.toml`:-//!-//! ```toml-//! [dependencies] clap = "~2.27.0"-//! ```-//!-//! This will cause *only* the patch version to be updated upon a `cargo update` call, and therefore-//! cannot break due to new features, or bumped minimum versions of Rust.-//!-//! #### Minimum Version of Rust-//!-//! `clap` will officially support current stable Rust, minus two releases, but may work with prior-//! releases as well. For example, current stable Rust at the time of this writing is 1.21.0,-//! meaning `clap` is guaranteed to compile with 1.19.0 and beyond. At the 1.22.0 release, `clap`-//! will be guaranteed to compile with 1.20.0 and beyond, etc.-//!-//! Upon bumping the minimum version of Rust (assuming it's within the stable-2 range), it *must* be-//! clearly annotated in the `CHANGELOG.md`-//!-//! ## License-//!-//! `clap` is licensed under the MIT license. Please read the [LICENSE-MIT][license] file in-//! this repository for more information.-//!-//! [examples/]: https://github.com/clap-rs/clap/tree/v2.34.0/examples-//! [video tutorials]: https://www.youtube.com/playlist?list=PLza5oFLQGTl2Z5T8g1pRkIynR3E0_pc7U-//! [license]: https://github.com/clap-rs/clap/blob/v2.34.0/LICENSE-MIT--#![crate_type = "lib"]-#![doc(html_root_url = "https://docs.rs/clap/2.34.0")]-#![deny(+#![cfg_attr(docsrs, feature(doc_auto_cfg))]+#![doc(html_logo_url = "https://raw.githubusercontent.com/clap-rs/clap/master/assets/clap.png")]+#![cfg_attr(feature = "derive", doc = include_str!("../README.md"))]+//! <https://github.com/clap-rs/clap>+#![warn(     missing_docs,     missing_debug_implementations,     missing_copy_implementations,     trivial_casts,-    unused_import_braces,-    unused_allocation+    unused_allocation,+    trivial_numeric_casts,+    clippy::single_char_pattern )]-// Lints we'd like to deny but are currently failing for upstream crates-//      unused_qualifications       (bitflags, clippy)-//      trivial_numeric_casts       (bitflags)-#![cfg_attr(-    not(any(feature = "cargo-clippy", feature = "nightly")),-    forbid(unstable_features)+#![forbid(unsafe_code)]+// HACK https://github.com/rust-lang/rust-clippy/issues/7290+#![allow(clippy::single_component_path_imports)]+#![allow(clippy::branches_sharing_code)]+// Doesn't allow for debug statements, etc to be unique+#![allow(clippy::if_same_then_else)]++#[cfg(not(feature = "std"))]+compile_error!("`std` feature is currently required to build `clap`");++#[cfg(feature = "color")]+pub use crate::util::color::ColorChoice;+pub use crate::{+    build::{+        App, AppFlags, AppSettings, Arg, ArgFlags, ArgGroup, ArgSettings, PossibleValue, ValueHint,+    },+    parse::errors::{Error, ErrorKind, Result},+    parse::{ArgMatches, Indices, OsValues, Values},+};++pub use crate::derive::{ArgEnum, Args, FromArgMatches, IntoApp, Parser, Subcommand};++#[cfg(feature = "yaml")]+#[doc(hidden)]+#[deprecated(+    since = "3.0.0",+    note = "Deprecated in Issue #3087, maybe clap::Parser would fit your use case?" )]-//#![cfg_attr(feature = "lints", feature(plugin))]-//#![cfg_attr(feature = "lints", plugin(clippy))]-// Need to disable deny(warnings) while deprecations are active-//#![cfg_attr(feature = "cargo-clippy", deny(warnings))]-// Due to our "MSRV for 2.x will remain unchanged" policy, we can't fix these warnings-#![allow(bare_trait_objects, deprecated)]--#[cfg(all(feature = "color", not(target_os = "windows")))]-extern crate ansi_term;-#[cfg(feature = "color")]-extern crate atty;-#[macro_use]-extern crate bitflags;-#[cfg(feature = "suggestions")]-extern crate strsim;-#[cfg(feature = "wrap_help")]-extern crate term_size;-extern crate textwrap;-extern crate unicode_width;-#[cfg(feature = "vec_map")]-extern crate vec_map;-#[cfg(feature = "yaml")]-extern crate yaml_rust;--pub use app::{App, AppSettings};-pub use args::{Arg, ArgGroup, ArgMatches, ArgSettings, OsValues, SubCommand, Values};-pub use completions::Shell;-pub use errors::{Error, ErrorKind, Result};-pub use fmt::Format;-#[cfg(feature = "yaml")] pub use yaml_rust::YamlLoader;+#[cfg(feature = "derive")]+#[doc(hidden)]+pub use clap_derive::{self, *};++/// Deprecated, replaced with [`Parser`]+#[deprecated(since = "3.0.0", note = "Replaced with `Parser`")]+pub use Parser as StructOpt;++#[cfg(any(feature = "derive", feature = "cargo"))]+#[doc(hidden)]+pub use lazy_static;+ #[macro_use]+#[allow(missing_docs)] mod macros;-mod app;-mod args;-mod completions;-mod errors;-mod fmt;-mod map;-mod osstringext;-mod strext;-mod suggestions;-mod usage_parser;++mod derive;++#[cfg(feature = "regex")]+pub use crate::build::arg::RegexRef;++mod build;+mod mkeymap;+mod output;+mod parse;+mod util; const INTERNAL_ERROR_MSG: &str = "Fatal internal error. Please consider filing a bug \-                                          report at https://github.com/clap-rs/clap/issues";+                                  report at https://github.com/clap-rs/clap/issues"; const INVALID_UTF8: &str = "unexpected invalid UTF-8 code point";-#[cfg(unstable)]-pub use derive::{ArgEnum, ClapApp, FromArgMatches, IntoApp};+/// Deprecated, replaced with [`App::new`], unless you were looking for [Subcommand]+#[deprecated(+    since = "3.0.0",+    note = "Replaced with `App::new` unless you intended the `Subcommand` trait"+)]+#[derive(Debug, Copy, Clone)]+pub struct SubCommand {}-#[cfg(unstable)]-mod derive {-    /// @TODO @release @docs-    pub trait ClapApp: IntoApp + FromArgMatches + Sized {-        /// @TODO @release @docs-        fn parse() -> Self {-            Self::from_argmatches(Self::into_app().get_matches())-        }--        /// @TODO @release @docs-        fn parse_from<I, T>(argv: I) -> Self-        where-            I: IntoIterator<Item = T>,-            T: Into<OsString> + Clone,-        {-            Self::from_argmatches(Self::into_app().get_matches_from(argv))-        }--        /// @TODO @release @docs-        fn try_parse() -> Result<Self, clap::Error> {-            Self::try_from_argmatches(Self::into_app().get_matches_safe()?)-        }--        /// @TODO @release @docs-        fn try_parse_from<I, T>(argv: I) -> Result<Self, clap::Error>-        where-            I: IntoIterator<Item = T>,-            T: Into<OsString> + Clone,-        {-            Self::try_from_argmatches(Self::into_app().get_matches_from_safe(argv)?)-        }+#[allow(deprecated)]+impl SubCommand {+    /// Deprecated, replaced with [`App::new`].+    /// Did you mean Subcommand (lower-case c)?+    #[deprecated(since = "3.0.0", note = "Replaced with `App::new`")]+    pub fn with_name<'help>(name: &str) -> App<'help> {+        App::new(name)     }-    /// @TODO @release @docs-    pub trait IntoApp {-        /// @TODO @release @docs-        fn into_app<'a, 'b>() -> clap::App<'a, 'b>;+    /// Deprecated in [Issue #3087](https://github.com/clap-rs/clap/issues/3087), maybe [`clap::Parser`][crate::Parser] would fit your use case?+    #[cfg(feature = "yaml")]+    #[deprecated(+        since = "3.0.0",+        note = "Deprecated in Issue #3087, maybe clap::Parser would fit your use case?"+    )]+    pub fn from_yaml(yaml: &yaml_rust::Yaml) -> App {+        #![allow(deprecated)]+        App::from_yaml(yaml)     }--    /// @TODO @release @docs-    pub trait FromArgMatches: Sized {-        /// @TODO @release @docs-        fn from_argmatches<'a>(matches: clap::ArgMatches<'a>) -> Self;--        /// @TODO @release @docs-        fn try_from_argmatches<'a>(matches: clap::ArgMatches<'a>) -> Result<Self, clap::Error>;-    }--    /// @TODO @release @docs-    pub trait ArgEnum {} }
AI Analysis
After analyzing the provided code diff, I don't see any clear security vulnerabilities being fixed. The changes appear to be primarily documentation updates, code reorganization, and feature additions rather than security patches.

Here's my analysis:

1. The main changes are:
   - Complete rewrite of documentation/comments
   - Addition of new features like derive macros
   - Code structure reorganization
   - Removal of old code examples
   - Update of copyright notice format

2. No obvious security-related changes were found in:
   - Argument parsing
   - Input validation
   - Memory safety
   - Error handling
   - Dependency updates

3. The changes that could be security-related but don't appear to be actual vulnerabilities:
   - Added `forbid(unsafe_code)` - but this is preventative
   - Some linting rule changes - but these are code quality improvements

Vulnerability Existed: no
No security vulnerabilities found in this diff

The changes appear to be part of a major version update (likely 2.x to 3.x) with significant architectural changes and documentation updates rather than security fixes. The most notable security-related change is the addition of `forbid(unsafe_code)` which helps prevent future vulnerabilities but doesn't fix an existing one.

Would you like me to analyze any specific part of the diff in more detail?
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.arc.default.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.arc.default.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/path-objects/2d.path.arc.default.html@@ -17,8 +17,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.fillStyle = '#0f0'; ctx.fillRect(0, 0, 100, 50);@@ -27,7 +27,7 @@ ctx.moveTo(100, 0); ctx.arc(100, 0, 150, -Math.PI, Math.PI/2); ctx.fill();-_assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");+_assertPixel(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255"); t.done(); });
AI Analysis
Based on the provided code diff, I don't see any security vulnerabilities being fixed. The changes appear to be purely variable renaming for better clarity. Here's the analysis:

1. Vulnerability Existed: no
   No Vulnerability Found [File] [Lines 17-18, 27]
   Old Code:
   ```javascript
   var offscreenCanvas = new OffscreenCanvas(100, 50);
   var ctx = offscreenCanvas.getContext('2d');
   ```
   Fixed Code:
   ```javascript
   var canvas = new OffscreenCanvas(100, 50);
   var ctx = canvas.getContext('2d');
   ```

2. Vulnerability Existed: no
   No Vulnerability Found [File] [Line 27]
   Old Code:
   ```javascript
   _assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");
   ```
   Fixed Code:
   ```javascript
   _assertPixel(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");
   ```

The changes simply rename the variable `offscreenCanvas` to `canvas` for consistency or clarity, without any security implications. No security vulnerabilities were addressed in this diff.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/line-styles/2d.line.miter.lineedge.worker.js AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/line-styles/2d.line.miter.lineedge.worker.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/line-styles/2d.line.miter.lineedge.worker.js@@ -13,8 +13,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.fillStyle = '#0f0'; ctx.fillRect(0, 0, 100, 50);@@ -24,10 +24,10 @@ ctx.miterLimit = 1.414; ctx.beginPath(); ctx.strokeRect(100, 25, 200, 0);-_assertPixel(offscreenCanvas, 1,1, 0,255,0,255, "1,1", "0,255,0,255");-_assertPixel(offscreenCanvas, 48,1, 0,255,0,255, "48,1", "0,255,0,255");-_assertPixel(offscreenCanvas, 48,48, 0,255,0,255, "48,48", "0,255,0,255");-_assertPixel(offscreenCanvas, 1,48, 0,255,0,255, "1,48", "0,255,0,255");+_assertPixel(canvas, 1,1, 0,255,0,255, "1,1", "0,255,0,255");+_assertPixel(canvas, 48,1, 0,255,0,255, "48,1", "0,255,0,255");+_assertPixel(canvas, 48,48, 0,255,0,255, "48,48", "0,255,0,255");+_assertPixel(canvas, 1,48, 0,255,0,255, "1,48", "0,255,0,255"); t.done(); });
AI Analysis
After analyzing the provided code diff, here's the security assessment:

Vulnerability Existed: no
[No security vulnerability found] [testing/web-platform/tests/html/canvas/offscreen/line-styles/2d.line.miter.lineedge.worker.js] [Lines 13-24]
[Old Code]
var offscreenCanvas = new OffscreenCanvas(100, 50);
var ctx = offscreenCanvas.getContext('2d');
...
_assertPixel(offscreenCanvas, 1,1, 0,255,0,255, "1,1", "0,255,0,255");
_assertPixel(offscreenCanvas, 48,1, 0,255,0,255, "48,1", "0,255,0,255");
_assertPixel(offscreenCanvas, 48,48, 0,255,0,255, "48,48", "0,255,0,255");
_assertPixel(offscreenCanvas, 1,48, 0,255,0,255, "1,48", "0,255,0,255");

[Fixed Code]
var canvas = new OffscreenCanvas(100, 50);
var ctx = canvas.getContext('2d');
...
_assertPixel(canvas, 1,1, 0,255,0,255, "1,1", "0,255,0,255");
_assertPixel(canvas, 48,1, 0,255,0,255, "48,1", "0,255,0,255");
_assertPixel(canvas, 48,48, 0,255,0,255, "48,48", "0,255,0,255");
_assertPixel(canvas, 1,48, 0,255,0,255, "1,48", "0,255,0,255");

The changes appear to be purely cosmetic, renaming the variable from `offscreenCanvas` to `canvas` for consistency or readability. There are no security-related changes in this diff. The functionality remains exactly the same, just with a different variable name.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
gfx/ipc/InProcessCompositorSession.cpp AI: 2 vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/gfx/ipc/InProcessCompositorSession.cpp+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/gfx/ipc/InProcessCompositorSession.cpp@@ -50,6 +50,10 @@       CompositorManagerChild::CreateSameProcessWidgetCompositorBridge(           aLayerManager, aNamespace);   MOZ_ASSERT(child);+  if (!child) {+    gfxCriticalNote << "Failed to create CompositorBridgeChild";+    return nullptr;+  }   return new InProcessCompositorSession(aWidget, widget, child, parent); }@@ -86,8 +90,10 @@     mUiCompositorControllerChild = nullptr;   } #endif  // defined(MOZ_WIDGET_ANDROID)-  mCompositorBridgeChild->Destroy();-  mCompositorBridgeChild = nullptr;+  if (mCompositorBridgeChild) {+    mCompositorBridgeChild->Destroy();+    mCompositorBridgeChild = nullptr;+  }   mCompositorBridgeParent = nullptr;   mCompositorWidget = nullptr;   gfx::GPUProcessManager::Get()->UnregisterInProcessSession(this);
AI Analysis
Here's the analysis of the provided code diff:

1. Vulnerability Existed: yes
Null Pointer Dereference [File] gfx/ipc/InProcessCompositorSession.cpp [Lines] 50-54
[Old Code]
  MOZ_ASSERT(child);
  
  return new InProcessCompositorSession(aWidget, widget, child, parent);
[Fixed Code]
  MOZ_ASSERT(child);
  if (!child) {
    gfxCriticalNote << "Failed to create CompositorBridgeChild";
    return nullptr;
  }

  return new InProcessCompositorSession(aWidget, widget, child, parent);

2. Vulnerability Existed: yes
Null Pointer Dereference [File] gfx/ipc/InProcessCompositorSession.cpp [Lines] 86-90
[Old Code]
  mCompositorBridgeChild->Destroy();
  mCompositorBridgeChild = nullptr;
[Fixed Code]
  if (mCompositorBridgeChild) {
    mCompositorBridgeChild->Destroy();
    mCompositorBridgeChild = nullptr;
  }

The changes address potential null pointer dereference vulnerabilities by:
1. Adding a null check before using the 'child' pointer in the first case
2. Adding a null check before calling Destroy() on mCompositorBridgeChild in the second case

Both fixes prevent potential crashes that could occur if these pointers were null, which could be exploited in denial-of-service attacks or potentially lead to more serious vulnerabilities depending on the context.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
gfx/gl/GLContext.cpp AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/gfx/gl/GLContext.cpp+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/gfx/gl/GLContext.cpp@@ -1152,7 +1152,7 @@             { (PRFuncPtr*) &mSymbols.fResumeTransformFeedback, {{ "glResumeTransformFeedbackNV" }} },             END_SYMBOLS         };-        if (!fnLoadFeatureByCore(coreSymbols, extSymbols, GLFeature::texture_storage)) {+        if (!fnLoadFeatureByCore(coreSymbols, extSymbols, GLFeature::transform_feedback2)) {             // Also mark bind_buffer_offset as unsupported.             MarkUnsupported(GLFeature::bind_buffer_offset);         }
AI Analysis
Let me analyze the code diff for security fixes.

Vulnerability Existed: not sure
[Potential Incorrect Feature Dependency] [gfx/gl/GLContext.cpp] [Lines 1152]
[Old Code]
if (!fnLoadFeatureByCore(coreSymbols, extSymbols, GLFeature::texture_storage)) {
[Fixed Code]
if (!fnLoadFeatureByCore(coreSymbols, extSymbols, GLFeature::transform_feedback2)) {

Additional Details:
- The change corrects the feature being checked from `texture_storage` to `transform_feedback2`, which appears to be more appropriate given the context of transform feedback functions being loaded (glResumeTransformFeedbackNV)
- While this doesn't appear to be a direct security vulnerability, incorrect feature dependencies could potentially lead to undefined behavior or feature misuse
- The fix ensures proper feature checking for transform feedback functionality

Vulnerability Existed: no
[Code Correction] [gfx/gl/GLContext.cpp] [Lines 1152]
[Old Code]
if (!fnLoadFeatureByCore(coreSymbols, extSymbols, GLFeature::texture_storage)) {
[Fixed Code]
if (!fnLoadFeatureByCore(coreSymbols, extSymbols, GLFeature::transform_feedback2)) {

Additional Details:
- This appears to be a bug fix rather than a security vulnerability
- The correction ensures the proper GL feature is checked when loading transform feedback symbols
- The change maintains security by ensuring features are properly verified before use
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/drawing-images-to-the-canvas/2d.drawImage.path.worker.js AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/drawing-images-to-the-canvas/2d.drawImage.path.worker.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/drawing-images-to-the-canvas/2d.drawImage.path.worker.js@@ -14,8 +14,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.fillStyle = '#0f0'; ctx.rect(0, 0, 100, 50);@@ -32,7 +32,7 @@     createImageBitmap(response).then(bitmap => {         ctx.drawImage(bitmap, 0, 0);         ctx.fill();-        _assertPixelApprox(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255", 2);+        _assertPixelApprox(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255", 2);     }, t_fail); }).then(t_pass, t_fail);
AI Analysis
Based on the provided code diff, I don't see any security vulnerabilities being fixed. The changes appear to be purely variable renaming for better code clarity. Here's the analysis:

Vulnerability Existed: no
[No Vulnerability Found] [testing/web-platform/tests/html/canvas/offscreen/drawing-images-to-the-canvas/2d.drawImage.path.worker.js] [Lines 14-32]
[Old Code]
var offscreenCanvas = new OffscreenCanvas(100, 50);
var ctx = offscreenCanvas.getContext('2d');
...
_assertPixelApprox(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255", 2);
[Fixed Code]
var canvas = new OffscreenCanvas(100, 50);
var ctx = canvas.getContext('2d');
...
_assertPixelApprox(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255", 2);

The changes simply rename the variable `offscreenCanvas` to `canvas` throughout the file, which doesn't appear to address any security issues but rather improves code readability. No security-related vulnerabilities are being patched in this diff.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/compositing/2d.composite.canvas.source-out.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/compositing/2d.composite.canvas.source-out.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/compositing/2d.composite.canvas.source-out.html@@ -17,11 +17,11 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d');-var offscreenCanvas2 = new OffscreenCanvas(offscreenCanvas.width, offscreenCanvas.height);+var offscreenCanvas2 = new OffscreenCanvas(canvas.width, canvas.height); var ctx2 = offscreenCanvas2.getContext('2d'); var promise = new Promise(function(resolve, reject) {     var xhr = new XMLHttpRequest();@@ -39,7 +39,7 @@         ctx.fillRect(0, 0, 100, 50);         ctx.globalCompositeOperation = 'source-out';         ctx.drawImage(offscreenCanvas2, 0, 0);-        _assertPixelApprox(offscreenCanvas, 50,25, 255,255,0,96, "50,25", "255,255,0,96", 5);+        _assertPixelApprox(canvas, 50,25, 255,255,0,96, "50,25", "255,255,0,96", 5);     }, t_fail); }).then(t_pass, t_fail);
AI Analysis
Analysis of the provided code diff:

1. Vulnerability Existed: no
   No specific vulnerability found [File] testing/web-platform/tests/html/canvas/offscreen/compositing/2d.composite.canvas.source-out.html [Lines] 17-39
   [Old Code]
   var offscreenCanvas = new OffscreenCanvas(100, 50);
   var ctx = offscreenCanvas.getContext('2d');
   var offscreenCanvas2 = new OffscreenCanvas(offscreenCanvas.width, offscreenCanvas.height);
   _assertPixelApprox(offscreenCanvas, 50,25, 255,255,0,96, "50,25", "255,255,0,96", 5);

   [Fixed Code]
   var canvas = new OffscreenCanvas(100, 50);
   var ctx = canvas.getContext('2d');
   var offscreenCanvas2 = new OffscreenCanvas(canvas.width, canvas.height);
   _assertPixelApprox(canvas, 50,25, 255,255,0,96, "50,25", "255,255,0,96", 5);

Additional Details:
The changes appear to be purely variable renaming (from 'offscreenCanvas' to 'canvas') and don't indicate any security fixes. The functionality remains the same, just with different variable names. No security vulnerabilities are addressed in this diff.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
third_party/jpeg-xl/lib/jxl/dec_params.h AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/third_party/jpeg-xl/lib/jxl/dec_params.h+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/third_party/jpeg-xl/lib/jxl/dec_params.h@@ -44,6 +44,10 @@   bool allow_partial_files = false;   // Allow even more progression.   bool allow_more_progressive_steps = false;++  // Internal test-only setting: whether or not to use the slow rendering+  // pipeline.+  bool use_slow_render_pipeline = false; }; }  // namespace jxl
AI Analysis
Analyzing the provided code diff for security fixes:

1. Vulnerability Existed: no
   No vulnerability found [File] [Lines 44-48]
   [Old Code]
   (No specific old code shown beyond the existing parameters)
   [Fixed Code]
   bool use_slow_render_pipeline = false;

Additional Details:
- The diff only shows an addition of a new configuration parameter (`use_slow_render_pipeline`) marked as internal test-only
- No security-related changes or fixes are evident in this diff
- The change appears to be a feature addition rather than a security fix
- No vulnerabilities are being addressed in this modification

Since this is just adding a new test flag without modifying any security-sensitive code, I conclude there are no security vulnerabilities being fixed in this diff.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
third_party/rust/ash/src/vk/definitions.rs AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/third_party/rust/ash/src/vk/definitions.rs+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/third_party/rust/ash/src/vk/definitions.rs@@ -4,6 +4,7 @@ use crate::vk::enums::*; use crate::vk::native::*; use crate::vk::platform_types::*;+use crate::vk::prelude::*; use crate::vk::{ptr_chain_iter, Handle}; use std::fmt; use std::os::raw::*;@@ -53,7 +54,7 @@ pub const API_VERSION_1_1: u32 = make_api_version(0, 1, 1, 0); #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VK_API_VERSION_1_2.html>"] pub const API_VERSION_1_2: u32 = make_api_version(0, 1, 2, 0);-pub const HEADER_VERSION: u32 = 191u32;+pub const HEADER_VERSION: u32 = 203u32; #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VK_HEADER_VERSION_COMPLETE.html>"] pub const HEADER_VERSION_COMPLETE: u32 = make_api_version(0, 1, 2, HEADER_VERSION); #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkSampleMask.html>"]@@ -72,265 +73,257 @@ #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkQueryPoolCreateFlags.html>"] pub struct QueryPoolCreateFlags(pub(crate) Flags);-vk_bitflags_wrapped!(QueryPoolCreateFlags, 0b0, Flags);-#[repr(transparent)]-#[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)]-#[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineDepthStencilStateCreateFlags.html>"]-pub struct PipelineDepthStencilStateCreateFlags(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineDepthStencilStateCreateFlags, 0b0, Flags);+vk_bitflags_wrapped!(QueryPoolCreateFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineDynamicStateCreateFlags.html>"] pub struct PipelineDynamicStateCreateFlags(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineDynamicStateCreateFlags, 0b0, Flags);-#[repr(transparent)]-#[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)]-#[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineColorBlendStateCreateFlags.html>"]-pub struct PipelineColorBlendStateCreateFlags(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineColorBlendStateCreateFlags, 0b0, Flags);+vk_bitflags_wrapped!(PipelineDynamicStateCreateFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineMultisampleStateCreateFlags.html>"] pub struct PipelineMultisampleStateCreateFlags(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineMultisampleStateCreateFlags, 0b0, Flags);+vk_bitflags_wrapped!(PipelineMultisampleStateCreateFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineRasterizationStateCreateFlags.html>"] pub struct PipelineRasterizationStateCreateFlags(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineRasterizationStateCreateFlags, 0b0, Flags);+vk_bitflags_wrapped!(PipelineRasterizationStateCreateFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineViewportStateCreateFlags.html>"] pub struct PipelineViewportStateCreateFlags(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineViewportStateCreateFlags, 0b0, Flags);+vk_bitflags_wrapped!(PipelineViewportStateCreateFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineTessellationStateCreateFlags.html>"] pub struct PipelineTessellationStateCreateFlags(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineTessellationStateCreateFlags, 0b0, Flags);+vk_bitflags_wrapped!(PipelineTessellationStateCreateFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineInputAssemblyStateCreateFlags.html>"] pub struct PipelineInputAssemblyStateCreateFlags(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineInputAssemblyStateCreateFlags, 0b0, Flags);+vk_bitflags_wrapped!(PipelineInputAssemblyStateCreateFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineVertexInputStateCreateFlags.html>"] pub struct PipelineVertexInputStateCreateFlags(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineVertexInputStateCreateFlags, 0b0, Flags);+vk_bitflags_wrapped!(PipelineVertexInputStateCreateFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkBufferViewCreateFlags.html>"] pub struct BufferViewCreateFlags(pub(crate) Flags);-vk_bitflags_wrapped!(BufferViewCreateFlags, 0b0, Flags);+vk_bitflags_wrapped!(BufferViewCreateFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkInstanceCreateFlags.html>"] pub struct InstanceCreateFlags(pub(crate) Flags);-vk_bitflags_wrapped!(InstanceCreateFlags, 0b0, Flags);+vk_bitflags_wrapped!(InstanceCreateFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkDeviceCreateFlags.html>"] pub struct DeviceCreateFlags(pub(crate) Flags);-vk_bitflags_wrapped!(DeviceCreateFlags, 0b0, Flags);+vk_bitflags_wrapped!(DeviceCreateFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkMemoryMapFlags.html>"] pub struct MemoryMapFlags(pub(crate) Flags);-vk_bitflags_wrapped!(MemoryMapFlags, 0b0, Flags);+vk_bitflags_wrapped!(MemoryMapFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkDescriptorPoolResetFlags.html>"] pub struct DescriptorPoolResetFlags(pub(crate) Flags);-vk_bitflags_wrapped!(DescriptorPoolResetFlags, 0b0, Flags);+vk_bitflags_wrapped!(DescriptorPoolResetFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkDescriptorUpdateTemplateCreateFlags.html>"] pub struct DescriptorUpdateTemplateCreateFlags(pub(crate) Flags);-vk_bitflags_wrapped!(DescriptorUpdateTemplateCreateFlags, 0b0, Flags);+vk_bitflags_wrapped!(DescriptorUpdateTemplateCreateFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkAccelerationStructureMotionInfoFlagsNV.html>"] pub struct AccelerationStructureMotionInfoFlagsNV(pub(crate) Flags);-vk_bitflags_wrapped!(AccelerationStructureMotionInfoFlagsNV, 0b0, Flags);+vk_bitflags_wrapped!(AccelerationStructureMotionInfoFlagsNV, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkAccelerationStructureMotionInstanceFlagsNV.html>"] pub struct AccelerationStructureMotionInstanceFlagsNV(pub(crate) Flags);-vk_bitflags_wrapped!(AccelerationStructureMotionInstanceFlagsNV, 0b0, Flags);+vk_bitflags_wrapped!(AccelerationStructureMotionInstanceFlagsNV, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkDisplayModeCreateFlagsKHR.html>"] pub struct DisplayModeCreateFlagsKHR(pub(crate) Flags);-vk_bitflags_wrapped!(DisplayModeCreateFlagsKHR, 0b0, Flags);+vk_bitflags_wrapped!(DisplayModeCreateFlagsKHR, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkDisplaySurfaceCreateFlagsKHR.html>"] pub struct DisplaySurfaceCreateFlagsKHR(pub(crate) Flags);-vk_bitflags_wrapped!(DisplaySurfaceCreateFlagsKHR, 0b0, Flags);+vk_bitflags_wrapped!(DisplaySurfaceCreateFlagsKHR, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkAndroidSurfaceCreateFlagsKHR.html>"] pub struct AndroidSurfaceCreateFlagsKHR(pub(crate) Flags);-vk_bitflags_wrapped!(AndroidSurfaceCreateFlagsKHR, 0b0, Flags);+vk_bitflags_wrapped!(AndroidSurfaceCreateFlagsKHR, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkViSurfaceCreateFlagsNN.html>"] pub struct ViSurfaceCreateFlagsNN(pub(crate) Flags);-vk_bitflags_wrapped!(ViSurfaceCreateFlagsNN, 0b0, Flags);+vk_bitflags_wrapped!(ViSurfaceCreateFlagsNN, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkWaylandSurfaceCreateFlagsKHR.html>"] pub struct WaylandSurfaceCreateFlagsKHR(pub(crate) Flags);-vk_bitflags_wrapped!(WaylandSurfaceCreateFlagsKHR, 0b0, Flags);+vk_bitflags_wrapped!(WaylandSurfaceCreateFlagsKHR, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkWin32SurfaceCreateFlagsKHR.html>"] pub struct Win32SurfaceCreateFlagsKHR(pub(crate) Flags);-vk_bitflags_wrapped!(Win32SurfaceCreateFlagsKHR, 0b0, Flags);+vk_bitflags_wrapped!(Win32SurfaceCreateFlagsKHR, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkXlibSurfaceCreateFlagsKHR.html>"] pub struct XlibSurfaceCreateFlagsKHR(pub(crate) Flags);-vk_bitflags_wrapped!(XlibSurfaceCreateFlagsKHR, 0b0, Flags);+vk_bitflags_wrapped!(XlibSurfaceCreateFlagsKHR, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkXcbSurfaceCreateFlagsKHR.html>"] pub struct XcbSurfaceCreateFlagsKHR(pub(crate) Flags);-vk_bitflags_wrapped!(XcbSurfaceCreateFlagsKHR, 0b0, Flags);+vk_bitflags_wrapped!(XcbSurfaceCreateFlagsKHR, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkDirectFBSurfaceCreateFlagsEXT.html>"] pub struct DirectFBSurfaceCreateFlagsEXT(pub(crate) Flags);-vk_bitflags_wrapped!(DirectFBSurfaceCreateFlagsEXT, 0b0, Flags);+vk_bitflags_wrapped!(DirectFBSurfaceCreateFlagsEXT, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkIOSSurfaceCreateFlagsMVK.html>"] pub struct IOSSurfaceCreateFlagsMVK(pub(crate) Flags);-vk_bitflags_wrapped!(IOSSurfaceCreateFlagsMVK, 0b0, Flags);+vk_bitflags_wrapped!(IOSSurfaceCreateFlagsMVK, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkMacOSSurfaceCreateFlagsMVK.html>"] pub struct MacOSSurfaceCreateFlagsMVK(pub(crate) Flags);-vk_bitflags_wrapped!(MacOSSurfaceCreateFlagsMVK, 0b0, Flags);+vk_bitflags_wrapped!(MacOSSurfaceCreateFlagsMVK, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkMetalSurfaceCreateFlagsEXT.html>"] pub struct MetalSurfaceCreateFlagsEXT(pub(crate) Flags);-vk_bitflags_wrapped!(MetalSurfaceCreateFlagsEXT, 0b0, Flags);+vk_bitflags_wrapped!(MetalSurfaceCreateFlagsEXT, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkImagePipeSurfaceCreateFlagsFUCHSIA.html>"] pub struct ImagePipeSurfaceCreateFlagsFUCHSIA(pub(crate) Flags);-vk_bitflags_wrapped!(ImagePipeSurfaceCreateFlagsFUCHSIA, 0b0, Flags);+vk_bitflags_wrapped!(ImagePipeSurfaceCreateFlagsFUCHSIA, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkStreamDescriptorSurfaceCreateFlagsGGP.html>"] pub struct StreamDescriptorSurfaceCreateFlagsGGP(pub(crate) Flags);-vk_bitflags_wrapped!(StreamDescriptorSurfaceCreateFlagsGGP, 0b0, Flags);+vk_bitflags_wrapped!(StreamDescriptorSurfaceCreateFlagsGGP, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkHeadlessSurfaceCreateFlagsEXT.html>"] pub struct HeadlessSurfaceCreateFlagsEXT(pub(crate) Flags);-vk_bitflags_wrapped!(HeadlessSurfaceCreateFlagsEXT, 0b0, Flags);+vk_bitflags_wrapped!(HeadlessSurfaceCreateFlagsEXT, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkScreenSurfaceCreateFlagsQNX.html>"] pub struct ScreenSurfaceCreateFlagsQNX(pub(crate) Flags);-vk_bitflags_wrapped!(ScreenSurfaceCreateFlagsQNX, 0b0, Flags);+vk_bitflags_wrapped!(ScreenSurfaceCreateFlagsQNX, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkCommandPoolTrimFlags.html>"] pub struct CommandPoolTrimFlags(pub(crate) Flags);-vk_bitflags_wrapped!(CommandPoolTrimFlags, 0b0, Flags);+vk_bitflags_wrapped!(CommandPoolTrimFlags, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineViewportSwizzleStateCreateFlagsNV.html>"] pub struct PipelineViewportSwizzleStateCreateFlagsNV(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineViewportSwizzleStateCreateFlagsNV, 0b0, Flags);+vk_bitflags_wrapped!(PipelineViewportSwizzleStateCreateFlagsNV, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineDiscardRectangleStateCreateFlagsEXT.html>"] pub struct PipelineDiscardRectangleStateCreateFlagsEXT(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineDiscardRectangleStateCreateFlagsEXT, 0b0, Flags);+vk_bitflags_wrapped!(PipelineDiscardRectangleStateCreateFlagsEXT, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineCoverageToColorStateCreateFlagsNV.html>"] pub struct PipelineCoverageToColorStateCreateFlagsNV(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineCoverageToColorStateCreateFlagsNV, 0b0, Flags);+vk_bitflags_wrapped!(PipelineCoverageToColorStateCreateFlagsNV, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineCoverageModulationStateCreateFlagsNV.html>"] pub struct PipelineCoverageModulationStateCreateFlagsNV(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineCoverageModulationStateCreateFlagsNV, 0b0, Flags);+vk_bitflags_wrapped!(PipelineCoverageModulationStateCreateFlagsNV, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineCoverageReductionStateCreateFlagsNV.html>"] pub struct PipelineCoverageReductionStateCreateFlagsNV(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineCoverageReductionStateCreateFlagsNV, 0b0, Flags);+vk_bitflags_wrapped!(PipelineCoverageReductionStateCreateFlagsNV, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkValidationCacheCreateFlagsEXT.html>"] pub struct ValidationCacheCreateFlagsEXT(pub(crate) Flags);-vk_bitflags_wrapped!(ValidationCacheCreateFlagsEXT, 0b0, Flags);+vk_bitflags_wrapped!(ValidationCacheCreateFlagsEXT, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkDebugUtilsMessengerCreateFlagsEXT.html>"] pub struct DebugUtilsMessengerCreateFlagsEXT(pub(crate) Flags);-vk_bitflags_wrapped!(DebugUtilsMessengerCreateFlagsEXT, 0b0, Flags);+vk_bitflags_wrapped!(DebugUtilsMessengerCreateFlagsEXT, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkDebugUtilsMessengerCallbackDataFlagsEXT.html>"] pub struct DebugUtilsMessengerCallbackDataFlagsEXT(pub(crate) Flags);-vk_bitflags_wrapped!(DebugUtilsMessengerCallbackDataFlagsEXT, 0b0, Flags);+vk_bitflags_wrapped!(DebugUtilsMessengerCallbackDataFlagsEXT, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkDeviceMemoryReportFlagsEXT.html>"] pub struct DeviceMemoryReportFlagsEXT(pub(crate) Flags);-vk_bitflags_wrapped!(DeviceMemoryReportFlagsEXT, 0b0, Flags);+vk_bitflags_wrapped!(DeviceMemoryReportFlagsEXT, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineRasterizationConservativeStateCreateFlagsEXT.html>"] pub struct PipelineRasterizationConservativeStateCreateFlagsEXT(pub(crate) Flags);-vk_bitflags_wrapped!(-    PipelineRasterizationConservativeStateCreateFlagsEXT,-    0b0,-    Flags-);+vk_bitflags_wrapped!(PipelineRasterizationConservativeStateCreateFlagsEXT, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineRasterizationStateStreamCreateFlagsEXT.html>"] pub struct PipelineRasterizationStateStreamCreateFlagsEXT(pub(crate) Flags);-vk_bitflags_wrapped!(PipelineRasterizationStateStreamCreateFlagsEXT, 0b0, Flags);+vk_bitflags_wrapped!(PipelineRasterizationStateStreamCreateFlagsEXT, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPipelineRasterizationDepthClipStateCreateFlagsEXT.html>"] pub struct PipelineRasterizationDepthClipStateCreateFlagsEXT(pub(crate) Flags);-vk_bitflags_wrapped!(-    PipelineRasterizationDepthClipStateCreateFlagsEXT,-    0b0,-    Flags-);+vk_bitflags_wrapped!(PipelineRasterizationDepthClipStateCreateFlagsEXT, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkVideoBeginCodingFlagsKHR.html>"] pub struct VideoBeginCodingFlagsKHR(pub(crate) Flags);-vk_bitflags_wrapped!(VideoBeginCodingFlagsKHR, 0b0, Flags);+vk_bitflags_wrapped!(VideoBeginCodingFlagsKHR, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkVideoEndCodingFlagsKHR.html>"] pub struct VideoEndCodingFlagsKHR(pub(crate) Flags);-vk_bitflags_wrapped!(VideoEndCodingFlagsKHR, 0b0, Flags);+vk_bitflags_wrapped!(VideoEndCodingFlagsKHR, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkVideoDecodeH264CreateFlagsEXT.html>"] pub struct VideoDecodeH264CreateFlagsEXT(pub(crate) Flags);-vk_bitflags_wrapped!(VideoDecodeH264CreateFlagsEXT, 0b0, Flags);+vk_bitflags_wrapped!(VideoDecodeH264CreateFlagsEXT, Flags); #[repr(transparent)] #[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkVideoDecodeH265CreateFlagsEXT.html>"] pub struct VideoDecodeH265CreateFlagsEXT(pub(crate) Flags);-vk_bitflags_wrapped!(VideoDecodeH265CreateFlagsEXT, 0b0, Flags);+vk_bitflags_wrapped!(VideoDecodeH265CreateFlagsEXT, Flags);+#[repr(transparent)]+#[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)]+#[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkVideoEncodeH265CapabilityFlagsEXT.html>"]+pub struct VideoEncodeH265CapabilityFlagsEXT(pub(crate) Flags);+vk_bitflags_wrapped!(VideoEncodeH265CapabilityFlagsEXT, Flags);+#[repr(transparent)]+#[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)]+#[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkVideoEncodeH265CreateFlagsEXT.html>"]+pub struct VideoEncodeH265CreateFlagsEXT(pub(crate) Flags);+vk_bitflags_wrapped!(VideoEncodeH265CreateFlagsEXT, Flags); define_handle!(     Instance,     INSTANCE,@@ -424,6 +417,7 @@ handle_nondispatchable ! (AccelerationStructureKHR , ACCELERATION_STRUCTURE_KHR , doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkAccelerationStructureKHR.html>") ; handle_nondispatchable ! (AccelerationStructureNV , ACCELERATION_STRUCTURE_NV , doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkAccelerationStructureNV.html>") ; handle_nondispatchable ! (PerformanceConfigurationINTEL , PERFORMANCE_CONFIGURATION_INTEL , doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPerformanceConfigurationINTEL.html>") ;+handle_nondispatchable ! (BufferCollectionFUCHSIA , BUFFER_COLLECTION_FUCHSIA , doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkBufferCollectionFUCHSIA.html>") ; handle_nondispatchable ! (DeferredOperationKHR , DEFERRED_OPERATION_KHR , doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkDeferredOperationKHR.html>") ; handle_nondispatchable ! (PrivateDataSlotEXT , PRIVATE_DATA_SLOT_EXT , doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPrivateDataSlotEXT.html>") ; handle_nondispatchable ! (CuModuleNVX , CU_MODULE_NVX , doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkCuModuleNVX.html>") ;@@ -527,37 +521,40 @@     ), >; #[repr(C)]-#[derive(Copy, Clone, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkBaseOutStructure.html>"] pub struct BaseOutStructure {     pub s_type: StructureType,-    pub p_next: *mut BaseOutStructure,+    pub p_next: *mut Self, } impl ::std::default::Default for BaseOutStructure {-    fn default() -> BaseOutStructure {-        BaseOutStructure {+    fn default() -> Self {+        Self {             s_type: unsafe { ::std::mem::zeroed() },             p_next: ::std::ptr::null_mut(),         }     } } #[repr(C)]-#[derive(Copy, Clone, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkBaseInStructure.html>"] pub struct BaseInStructure {     pub s_type: StructureType,-    pub p_next: *const BaseInStructure,+    pub p_next: *const Self, } impl ::std::default::Default for BaseInStructure {-    fn default() -> BaseInStructure {-        BaseInStructure {+    fn default() -> Self {+        Self {             s_type: unsafe { ::std::mem::zeroed() },             p_next: ::std::ptr::null(),         }     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug, PartialEq, Eq, Hash)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default, PartialEq, Eq, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkOffset2D.html>"] pub struct Offset2D {     pub x: i32,@@ -566,7 +563,7 @@ impl Offset2D {     pub fn builder<'a>() -> Offset2DBuilder<'a> {         Offset2DBuilder {-            inner: Offset2D::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -604,7 +601,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug, PartialEq, Eq, Hash)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default, PartialEq, Eq, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkOffset3D.html>"] pub struct Offset3D {     pub x: i32,@@ -614,7 +612,7 @@ impl Offset3D {     pub fn builder<'a>() -> Offset3DBuilder<'a> {         Offset3DBuilder {-            inner: Offset3D::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -656,7 +654,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug, PartialEq, Eq, Hash)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default, PartialEq, Eq, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkExtent2D.html>"] pub struct Extent2D {     pub width: u32,@@ -665,7 +664,7 @@ impl Extent2D {     pub fn builder<'a>() -> Extent2DBuilder<'a> {         Extent2DBuilder {-            inner: Extent2D::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -703,7 +702,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug, PartialEq, Eq, Hash)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default, PartialEq, Eq, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkExtent3D.html>"] pub struct Extent3D {     pub width: u32,@@ -713,7 +713,7 @@ impl Extent3D {     pub fn builder<'a>() -> Extent3DBuilder<'a> {         Extent3DBuilder {-            inner: Extent3D::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -755,7 +755,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkViewport.html>"] pub struct Viewport {     pub x: f32,@@ -768,7 +769,7 @@ impl Viewport {     pub fn builder<'a>() -> ViewportBuilder<'a> {         ViewportBuilder {-            inner: Viewport::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -822,7 +823,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug, PartialEq, Eq, Hash)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default, PartialEq, Eq, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkRect2D.html>"] pub struct Rect2D {     pub offset: Offset2D,@@ -831,7 +833,7 @@ impl Rect2D {     pub fn builder<'a>() -> Rect2DBuilder<'a> {         Rect2DBuilder {-            inner: Rect2D::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -869,7 +871,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug, PartialEq, Eq, Hash)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default, PartialEq, Eq, Hash)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkClearRect.html>"] pub struct ClearRect {     pub rect: Rect2D,@@ -879,7 +882,7 @@ impl ClearRect {     pub fn builder<'a>() -> ClearRectBuilder<'a> {         ClearRectBuilder {-            inner: ClearRect::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -921,7 +924,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkComponentMapping.html>"] pub struct ComponentMapping {     pub r: ComponentSwizzle,@@ -932,7 +936,7 @@ impl ComponentMapping {     pub fn builder<'a>() -> ComponentMappingBuilder<'a> {         ComponentMappingBuilder {-            inner: ComponentMapping::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -991,6 +995,7 @@     pub limits: PhysicalDeviceLimits,     pub sparse_properties: PhysicalDeviceSparseProperties, }+#[cfg(feature = "debug")] impl fmt::Debug for PhysicalDeviceProperties {     fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result {         fmt.debug_struct("PhysicalDeviceProperties")@@ -1009,8 +1014,8 @@     } } impl ::std::default::Default for PhysicalDeviceProperties {-    fn default() -> PhysicalDeviceProperties {-        PhysicalDeviceProperties {+    fn default() -> Self {+        Self {             api_version: u32::default(),             driver_version: u32::default(),             vendor_id: u32::default(),@@ -1026,7 +1031,7 @@ impl PhysicalDeviceProperties {     pub fn builder<'a>() -> PhysicalDevicePropertiesBuilder<'a> {         PhysicalDevicePropertiesBuilder {-            inner: PhysicalDeviceProperties::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -1098,6 +1103,7 @@     pub extension_name: [c_char; MAX_EXTENSION_NAME_SIZE],     pub spec_version: u32, }+#[cfg(feature = "debug")] impl fmt::Debug for ExtensionProperties {     fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result {         fmt.debug_struct("ExtensionProperties")@@ -1109,8 +1115,8 @@     } } impl ::std::default::Default for ExtensionProperties {-    fn default() -> ExtensionProperties {-        ExtensionProperties {+    fn default() -> Self {+        Self {             extension_name: unsafe { ::std::mem::zeroed() },             spec_version: u32::default(),         }@@ -1119,7 +1125,7 @@ impl ExtensionProperties {     pub fn builder<'a>() -> ExtensionPropertiesBuilder<'a> {         ExtensionPropertiesBuilder {-            inner: ExtensionProperties::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -1165,6 +1171,7 @@     pub implementation_version: u32,     pub description: [c_char; MAX_DESCRIPTION_SIZE], }+#[cfg(feature = "debug")] impl fmt::Debug for LayerProperties {     fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result {         fmt.debug_struct("LayerProperties")@@ -1180,8 +1187,8 @@     } } impl ::std::default::Default for LayerProperties {-    fn default() -> LayerProperties {-        LayerProperties {+    fn default() -> Self {+        Self {             layer_name: unsafe { ::std::mem::zeroed() },             spec_version: u32::default(),             implementation_version: u32::default(),@@ -1192,7 +1199,7 @@ impl LayerProperties {     pub fn builder<'a>() -> LayerPropertiesBuilder<'a> {         LayerPropertiesBuilder {-            inner: LayerProperties::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -1238,7 +1245,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkApplicationInfo.html>"] pub struct ApplicationInfo {     pub s_type: StructureType,@@ -1250,8 +1258,8 @@     pub api_version: u32, } impl ::std::default::Default for ApplicationInfo {-    fn default() -> ApplicationInfo {-        ApplicationInfo {+    fn default() -> Self {+        Self {             s_type: StructureType::APPLICATION_INFO,             p_next: ::std::ptr::null(),             p_application_name: ::std::ptr::null(),@@ -1265,7 +1273,7 @@ impl ApplicationInfo {     pub fn builder<'a>() -> ApplicationInfoBuilder<'a> {         ApplicationInfoBuilder {-            inner: ApplicationInfo::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -1325,6 +1333,7 @@     pub pfn_internal_allocation: PFN_vkInternalAllocationNotification,     pub pfn_internal_free: PFN_vkInternalFreeNotification, }+#[cfg(feature = "debug")] impl fmt::Debug for AllocationCallbacks {     fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result {         fmt.debug_struct("AllocationCallbacks")@@ -1350,8 +1359,8 @@     } } impl ::std::default::Default for AllocationCallbacks {-    fn default() -> AllocationCallbacks {-        AllocationCallbacks {+    fn default() -> Self {+        Self {             p_user_data: ::std::ptr::null_mut(),             pfn_allocation: PFN_vkAllocationFunction::default(),             pfn_reallocation: PFN_vkReallocationFunction::default(),@@ -1364,7 +1373,7 @@ impl AllocationCallbacks {     pub fn builder<'a>() -> AllocationCallbacksBuilder<'a> {         AllocationCallbacksBuilder {-            inner: AllocationCallbacks::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -1421,7 +1430,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkDeviceQueueCreateInfo.html>"] pub struct DeviceQueueCreateInfo {     pub s_type: StructureType,@@ -1432,8 +1442,8 @@     pub p_queue_priorities: *const f32, } impl ::std::default::Default for DeviceQueueCreateInfo {-    fn default() -> DeviceQueueCreateInfo {-        DeviceQueueCreateInfo {+    fn default() -> Self {+        Self {             s_type: StructureType::DEVICE_QUEUE_CREATE_INFO,             p_next: ::std::ptr::null(),             flags: DeviceQueueCreateFlags::default(),@@ -1446,7 +1456,7 @@ impl DeviceQueueCreateInfo {     pub fn builder<'a>() -> DeviceQueueCreateInfoBuilder<'a> {         DeviceQueueCreateInfoBuilder {-            inner: DeviceQueueCreateInfo::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -1504,7 +1514,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkDeviceCreateInfo.html>"] pub struct DeviceCreateInfo {     pub s_type: StructureType,@@ -1519,8 +1530,8 @@     pub p_enabled_features: *const PhysicalDeviceFeatures, } impl ::std::default::Default for DeviceCreateInfo {-    fn default() -> DeviceCreateInfo {-        DeviceCreateInfo {+    fn default() -> Self {+        Self {             s_type: StructureType::DEVICE_CREATE_INFO,             p_next: ::std::ptr::null(),             flags: DeviceCreateFlags::default(),@@ -1537,7 +1548,7 @@ impl DeviceCreateInfo {     pub fn builder<'a>() -> DeviceCreateInfoBuilder<'a> {         DeviceCreateInfoBuilder {-            inner: DeviceCreateInfo::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -1605,7 +1616,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkInstanceCreateInfo.html>"] pub struct InstanceCreateInfo {     pub s_type: StructureType,@@ -1618,8 +1630,8 @@     pub pp_enabled_extension_names: *const *const c_char, } impl ::std::default::Default for InstanceCreateInfo {-    fn default() -> InstanceCreateInfo {-        InstanceCreateInfo {+    fn default() -> Self {+        Self {             s_type: StructureType::INSTANCE_CREATE_INFO,             p_next: ::std::ptr::null(),             flags: InstanceCreateFlags::default(),@@ -1634,7 +1646,7 @@ impl InstanceCreateInfo {     pub fn builder<'a>() -> InstanceCreateInfoBuilder<'a> {         InstanceCreateInfoBuilder {-            inner: InstanceCreateInfo::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -1697,7 +1709,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkQueueFamilyProperties.html>"] pub struct QueueFamilyProperties {     pub queue_flags: QueueFlags,@@ -1708,7 +1721,7 @@ impl QueueFamilyProperties {     pub fn builder<'a>() -> QueueFamilyPropertiesBuilder<'a> {         QueueFamilyPropertiesBuilder {-            inner: QueueFamilyProperties::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -1757,7 +1770,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkPhysicalDeviceMemoryProperties.html>"] pub struct PhysicalDeviceMemoryProperties {     pub memory_type_count: u32,@@ -1766,8 +1780,8 @@     pub memory_heaps: [MemoryHeap; MAX_MEMORY_HEAPS], } impl ::std::default::Default for PhysicalDeviceMemoryProperties {-    fn default() -> PhysicalDeviceMemoryProperties {-        PhysicalDeviceMemoryProperties {+    fn default() -> Self {+        Self {             memory_type_count: u32::default(),             memory_types: unsafe { ::std::mem::zeroed() },             memory_heap_count: u32::default(),@@ -1778,7 +1792,7 @@ impl PhysicalDeviceMemoryProperties {     pub fn builder<'a>() -> PhysicalDeviceMemoryPropertiesBuilder<'a> {         PhysicalDeviceMemoryPropertiesBuilder {-            inner: PhysicalDeviceMemoryProperties::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -1824,7 +1838,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkMemoryAllocateInfo.html>"] pub struct MemoryAllocateInfo {     pub s_type: StructureType,@@ -1833,8 +1848,8 @@     pub memory_type_index: u32, } impl ::std::default::Default for MemoryAllocateInfo {-    fn default() -> MemoryAllocateInfo {-        MemoryAllocateInfo {+    fn default() -> Self {+        Self {             s_type: StructureType::MEMORY_ALLOCATE_INFO,             p_next: ::std::ptr::null(),             allocation_size: DeviceSize::default(),@@ -1845,7 +1860,7 @@ impl MemoryAllocateInfo {     pub fn builder<'a>() -> MemoryAllocateInfoBuilder<'a> {         MemoryAllocateInfoBuilder {-            inner: MemoryAllocateInfo::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -1898,7 +1913,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkMemoryRequirements.html>"] pub struct MemoryRequirements {     pub size: DeviceSize,@@ -1908,7 +1924,7 @@ impl MemoryRequirements {     pub fn builder<'a>() -> MemoryRequirementsBuilder<'a> {         MemoryRequirementsBuilder {-            inner: MemoryRequirements::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -1950,7 +1966,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkSparseImageFormatProperties.html>"] pub struct SparseImageFormatProperties {     pub aspect_mask: ImageAspectFlags,@@ -1960,7 +1977,7 @@ impl SparseImageFormatProperties {     pub fn builder<'a>() -> SparseImageFormatPropertiesBuilder<'a> {         SparseImageFormatPropertiesBuilder {-            inner: SparseImageFormatProperties::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -2002,7 +2019,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkSparseImageMemoryRequirements.html>"] pub struct SparseImageMemoryRequirements {     pub format_properties: SparseImageFormatProperties,@@ -2014,7 +2032,7 @@ impl SparseImageMemoryRequirements {     pub fn builder<'a>() -> SparseImageMemoryRequirementsBuilder<'a> {         SparseImageMemoryRequirementsBuilder {-            inner: SparseImageMemoryRequirements::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -2064,7 +2082,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkMemoryType.html>"] pub struct MemoryType {     pub property_flags: MemoryPropertyFlags,@@ -2073,7 +2092,7 @@ impl MemoryType {     pub fn builder<'a>() -> MemoryTypeBuilder<'a> {         MemoryTypeBuilder {-            inner: MemoryType::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -2111,7 +2130,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkMemoryHeap.html>"] pub struct MemoryHeap {     pub size: DeviceSize,@@ -2120,7 +2140,7 @@ impl MemoryHeap {     pub fn builder<'a>() -> MemoryHeapBuilder<'a> {         MemoryHeapBuilder {-            inner: MemoryHeap::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -2158,7 +2178,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkMappedMemoryRange.html>"] pub struct MappedMemoryRange {     pub s_type: StructureType,@@ -2168,8 +2189,8 @@     pub size: DeviceSize, } impl ::std::default::Default for MappedMemoryRange {-    fn default() -> MappedMemoryRange {-        MappedMemoryRange {+    fn default() -> Self {+        Self {             s_type: StructureType::MAPPED_MEMORY_RANGE,             p_next: ::std::ptr::null(),             memory: DeviceMemory::default(),@@ -2181,7 +2202,7 @@ impl MappedMemoryRange {     pub fn builder<'a>() -> MappedMemoryRangeBuilder<'a> {         MappedMemoryRangeBuilder {-            inner: MappedMemoryRange::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -2223,7 +2244,8 @@     } } #[repr(C)]-#[derive(Copy, Clone, Default, Debug)]+#[cfg_attr(feature = "debug", derive(Debug))]+#[derive(Copy, Clone, Default)] #[doc = "<https://www.khronos.org/registry/vulkan/specs/1.2-extensions/man/html/VkFormatProperties.html>"] pub struct FormatProperties {     pub linear_tiling_features: FormatFeatureFlags,@@ -2233,7 +2255,7 @@ impl FormatProperties {     pub fn builder<'a>() -> FormatPropertiesBuilder<'a> {         FormatPropertiesBuilder {-            inner: FormatProperties::default(),+            inner: Self::default(),             marker: ::std::marker::PhantomData,         }     }@@ -2275,7 +2297,8 @@
AI Analysis
Error: {"error":{"message":"This model's maximum context length is 65536 tokens. However, you requested 115607 tokens (107415 in the messages, 8192 in the completion). Please reduce the length of the messages or completion.","type":"invalid_request_error","param":null,"code":"invalid_request_error"}}
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
js/src/devtools/rootAnalysis/annotations.js AI: 1 vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/js/src/devtools/rootAnalysis/annotations.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/js/src/devtools/rootAnalysis/annotations.js@@ -17,7 +17,7 @@ }; // Types that when constructed with no arguments, are "safe" values (they do-// not contain GC pointers).+// not contain GC pointers, or values with nontrivial destructors.) var typesWithSafeConstructors = new Set([     "mozilla::Maybe",     "mozilla::dom::Nullable",@@ -32,7 +32,13 @@     'js::UniquePtr': new Set(["reset"]),     'mozilla::dom::Nullable': new Set(["SetNull"]),     'mozilla::dom::TypedArray_base': new Set(["Reset"]),+    'RefPtr': new Set(["forget"]),+    'nsCOMPtr': new Set(["forget"]), };++function isRefcountedDtor(name) {+    return name.includes("::~RefPtr(") || name.includes("::~nsCOMPtr(");+} function indirectCallCannotGC(fullCaller, fullVariable) {
AI Analysis
Analyzing the provided code diff, here are the potential security vulnerabilities:

1. Vulnerability Existed: not sure
    [Potential Missing Destructor Handling] [js/src/devtools/rootAnalysis/annotations.js] [Lines 17-32]
    [Old Code]
    // not contain GC pointers.
    var typesWithSafeConstructors = new Set([
        "mozilla::Maybe",
        "mozilla::dom::Nullable",
        "mozilla::dom::TypedArray_base",
        "js::UniquePtr"
    ]);
    [Fixed Code]
    // not contain GC pointers, or values with nontrivial destructors.)
    var typesWithSafeConstructors = new Set([
        "mozilla::Maybe",
        "mozilla::dom::Nullable",
        "mozilla::dom::TypedArray_base",
        "js::UniquePtr"
    ]);

2. Vulnerability Existed: yes
    [Memory Management Vulnerability] [js/src/devtools/rootAnalysis/annotations.js] [Lines 32-38]
    [Old Code]
    'mozilla::dom::TypedArray_base': new Set(["Reset"]),
    };
    [Fixed Code]
    'mozilla::dom::TypedArray_base': new Set(["Reset"]),
    'RefPtr': new Set(["forget"]),
    'nsCOMPtr': new Set(["forget"]),
    };

    function isRefcountedDtor(name) {
        return name.includes("::~RefPtr(") || name.includes("::~nsCOMPtr(");
    }

The changes indicate:
1. The comment was updated to clarify that typesWithSafeConstructors should not contain values with nontrivial destructors, suggesting potential memory management concerns in the previous version.

2. The addition of 'RefPtr' and 'nsCOMPtr' to the methods list along with the new isRefcountedDtor function suggests these smart pointer types were previously not properly handled, which could lead to memory leaks or unsafe memory management if these pointers weren't properly released. The "forget" method addition indicates explicit handling of ownership transfer cases.

The changes appear to be addressing potential memory safety issues related to smart pointer management and destructor handling.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/drawing-rectangles-to-the-canvas/2d.clearRect.zero.worker.js AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/drawing-rectangles-to-the-canvas/2d.clearRect.zero.worker.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/drawing-rectangles-to-the-canvas/2d.clearRect.zero.worker.js@@ -13,15 +13,15 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.fillStyle = '#0f0'; ctx.fillRect(0, 0, 100, 50); ctx.clearRect(0, 0, 100, 0); ctx.clearRect(0, 0, 0, 50); ctx.clearRect(0, 0, 0, 0);-_assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");+_assertPixel(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255"); t.done(); });
AI Analysis
Here's the analysis of the provided code diff:

1. Vulnerability Existed: no
   Variable Renaming [File] [Lines 13-21]
   [Old Code]
   var offscreenCanvas = new OffscreenCanvas(100, 50);
   var ctx = offscreenCanvas.getContext('2d');
   ...
   _assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");
   
   [Fixed Code]
   var canvas = new OffscreenCanvas(100, 50);
   var ctx = canvas.getContext('2d');
   ...
   _assertPixel(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");

Additional Details:
- This appears to be a simple variable renaming from `offscreenCanvas` to `canvas` for consistency or readability.
- No security vulnerability is being fixed here, just a code style/consistency change.
- The functionality remains exactly the same, just with a different variable name.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
Showing 3941-3960 of 6017 files
Per page: