Analysis Report

Shared security patch analysis results

AI Used: DEEPSEEK deepseek-chat
Share this analysis
6017 filtered / 6017 total files
testing/web-platform/tests/html/canvas/offscreen/text/2d.text.align.invalid.worker.js AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/text/2d.text.align.invalid.worker.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/text/2d.text.align.invalid.worker.js@@ -13,8 +13,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.textAlign = 'start'; ctx.textAlign = 'bogus';
AI Analysis
Let me analyze the code diff for potential security vulnerabilities:

1. Vulnerability Existed: no
   No specific vulnerability found [File] [Lines 13-14]
   [Old Code]
   var offscreenCanvas = new OffscreenCanvas(100, 50);
   var ctx = offscreenCanvas.getContext('2d');
   
   [Fixed Code]
   var canvas = new OffscreenCanvas(100, 50);
   var ctx = canvas.getContext('2d');

Additional details:
- This appears to be a simple variable renaming change from "offscreenCanvas" to "canvas"
- The change doesn't affect any security-related functionality
- No security vulnerability is being fixed here, just a code style/readability improvement
- The rest of the test case (testing invalid textAlign values) remains unchanged

No security vulnerabilities were identified in this diff. The change is purely cosmetic.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
netwerk/protocol/http/DnsAndConnectSocket.h AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/netwerk/protocol/http/DnsAndConnectSocket.h+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/netwerk/protocol/http/DnsAndConnectSocket.h@@ -18,6 +18,8 @@ #include "nsINamed.h" #include "nsITransport.h" #include "nsWeakReference.h"++class nsIHttpActivityObserver; namespace mozilla { namespace net {@@ -175,6 +177,7 @@     void CloseAll();     nsresult SetupConn(nsAHttpTransaction* transaction, ConnectionEntry* ent,                        nsresult status, uint32_t cap,+                       DnsAndConnectSocket* dnsAndSock,                        HttpConnectionBase** connection);     [[nodiscard]] nsresult SetupStreams(DnsAndConnectSocket* dnsAndSock);     nsresult ResolveHost(DnsAndConnectSocket* dnsAndSock);@@ -263,6 +266,7 @@   bool mSkipDnsResolution = false;   bool mProxyNotTransparent = false;   bool mProxyTransparentResolvesHost = false;+  nsCOMPtr<nsIHttpActivityObserver> mActivityDistributor; }; NS_DEFINE_STATIC_IID_ACCESSOR(DnsAndConnectSocket, NS_DNSANDCONNECTSOCKET_IID)
AI Analysis
Let me analyze the code diff for potential security fixes:

1. Vulnerability Existed: not sure
   [Potential Information Leak] [netwerk/protocol/http/DnsAndConnectSocket.h] [Lines 18, 266]
   [Old Code] 
   (No explicit declaration of nsIHttpActivityObserver)
   [Fixed Code]
   +class nsIHttpActivityObserver;
   ...
   +  nsCOMPtr<nsIHttpActivityObserver> mActivityDistributor;

   Additional Details: The addition of an HTTP activity observer could potentially expose sensitive network activity information if not properly secured, but there's not enough context to confirm if this was fixing an actual vulnerability.

2. Vulnerability Existed: not sure
   [Potential Race Condition] [netwerk/protocol/http/DnsAndConnectSocket.h] [Lines 175-177]
   [Old Code]
   nsresult SetupConn(nsAHttpTransaction* transaction, ConnectionEntry* ent,
                      nsresult status, uint32_t cap,
                      HttpConnectionBase** connection);
   [Fixed Code]
   nsresult SetupConn(nsAHttpTransaction* transaction, ConnectionEntry* ent,
                      nsresult status, uint32_t cap,
                      DnsAndConnectSocket* dnsAndSock,
                      HttpConnectionBase** connection);

   Additional Details: The addition of the dnsAndSock parameter might be related to fixing a potential race condition in connection setup, but without more context about how this parameter is used, we can't be certain.

Note: The changes appear to be more about adding functionality (activity observation) and improving connection handling rather than fixing specific, known vulnerabilities. The security implications would depend on how these new features are implemented and used in the rest of the codebase.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
browser/components/downloads/test/browser/browser_library_clearall.js AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/browser/components/downloads/test/browser/browser_library_clearall.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/browser/components/downloads/test/browser/browser_library_clearall.js@@ -42,7 +42,7 @@     httpUrl("file3.txt"),   ];-  let listbox = win.document.getElementById("downloadsRichListBox");+  let listbox = win.document.getElementById("downloadsListBox");   ok(listbox, "download list box present");   let promiseLength = waitForChildrenLength(listbox, DOWNLOAD_DATA.length);
AI Analysis
Analysis of the code diff:

1. Vulnerability Existed: no  
   [Element ID Change] [browser_library_clearall.js] [Lines 42]  
   [Old Code]  
   `let listbox = win.document.getElementById("downloadsRichListBox");`  
   [Fixed Code]  
   `let listbox = win.document.getElementById("downloadsListBox");`  

Additional Details:  
- This appears to be a simple element ID change from "downloadsRichListBox" to "downloadsListBox"  
- No security vulnerability is evident in this change  
- The modification seems related to UI/functionality rather than security  
- The test continues to verify the presence of a download list box  

No other vulnerabilities detected in the provided diff.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/text/2d.text.draw.align.left.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/text/2d.text.draw.align.left.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/text/2d.text.draw.align.left.html@@ -17,8 +17,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); var f = new FontFace("CanvasTest", "url('/fonts/CanvasTest.ttf')"); let fonts = (self.fonts ? self.fonts : document.fonts);@@ -31,12 +31,12 @@     ctx.fillStyle = '#0f0';     ctx.textAlign = 'left';     ctx.fillText('DD', 0, 37.5);-    _assertPixelApprox(offscreenCanvas, 5,5, 0,255,0,255, "5,5", "0,255,0,255", 2);-    _assertPixelApprox(offscreenCanvas, 95,5, 0,255,0,255, "95,5", "0,255,0,255", 2);-    _assertPixelApprox(offscreenCanvas, 25,25, 0,255,0,255, "25,25", "0,255,0,255", 2);-    _assertPixelApprox(offscreenCanvas, 75,25, 0,255,0,255, "75,25", "0,255,0,255", 2);-    _assertPixelApprox(offscreenCanvas, 5,45, 0,255,0,255, "5,45", "0,255,0,255", 2);-    _assertPixelApprox(offscreenCanvas, 95,45, 0,255,0,255, "95,45", "0,255,0,255", 2);+    _assertPixelApprox(canvas, 5,5, 0,255,0,255, "5,5", "0,255,0,255", 2);+    _assertPixelApprox(canvas, 95,5, 0,255,0,255, "95,5", "0,255,0,255", 2);+    _assertPixelApprox(canvas, 25,25, 0,255,0,255, "25,25", "0,255,0,255", 2);+    _assertPixelApprox(canvas, 75,25, 0,255,0,255, "75,25", "0,255,0,255", 2);+    _assertPixelApprox(canvas, 5,45, 0,255,0,255, "5,45", "0,255,0,255", 2);+    _assertPixelApprox(canvas, 95,45, 0,255,0,255, "95,45", "0,255,0,255", 2);   }).then(t_pass, t_fail); });
AI Analysis
After analyzing the provided code diff, I don't find any security vulnerabilities. The changes appear to be purely cosmetic, renaming a variable from `offscreenCanvas` to `canvas` for consistency or readability purposes. Here's the analysis following your requested format:

Vulnerability Existed: no
[No security vulnerability found] [testing/web-platform/tests/html/canvas/offscreen/text/2d.text.draw.align.left.html] [17-31]
[Old Code: var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); ... _assertPixelApprox(offscreenCanvas, ...)]
[Fixed Code: var canvas = new OffscreenCanvas(100, 50); var ctx = canvas.getContext('2d'); ... _assertPixelApprox(canvas, ...)]

The changes don't affect any security-related functionality, input validation, or data handling. The test assertions remain identical in functionality, only changing the variable name they reference.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
accessible/ipc/extension/mac/DocAccessiblePlatformExtChild.cpp AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/accessible/ipc/extension/mac/DocAccessiblePlatformExtChild.cpp+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/accessible/ipc/extension/mac/DocAccessiblePlatformExtChild.cpp@@ -109,12 +109,12 @@ mozilla::ipc::IPCResult DocAccessiblePlatformExtChild::RecvBoundsForRange(     const uint64_t& aID, const int32_t& aStartOffset,     const uint64_t& aEndContainer, const int32_t& aEndOffset,-    nsIntRect* aBounds) {-  HyperTextAccessibleWrap* acc = IdToHyperTextAccessibleWrap(aID);-  HyperTextAccessibleWrap* endContainer =-      IdToHyperTextAccessibleWrap(aEndContainer);-  if (!acc || !endContainer) {-    *aBounds = nsIntRect();+    LayoutDeviceIntRect* aBounds) {+  HyperTextAccessibleWrap* acc = IdToHyperTextAccessibleWrap(aID);+  HyperTextAccessibleWrap* endContainer =+      IdToHyperTextAccessibleWrap(aEndContainer);+  if (!acc || !endContainer) {+    *aBounds = LayoutDeviceIntRect();     return IPC_OK();   }
AI Analysis
Here's the analysis of the provided code diff:

1. Vulnerability Existed: not sure
    [Potential Integer Overflow/Type Safety Issue] [accessible/ipc/extension/mac/DocAccessiblePlatformExtChild.cpp] [Lines 109-116]
    [Old Code]
    ```
    nsIntRect* aBounds
    *aBounds = nsIntRect();
    ```
    [Fixed Code]
    ```
    LayoutDeviceIntRect* aBounds
    *aBounds = LayoutDeviceIntRect();
    ```

Additional Notes:
- The change appears to be switching from `nsIntRect` to `LayoutDeviceIntRect` for bounds representation
- While this could potentially address type safety or precision issues (as LayoutDeviceIntRect is device-pixel based while nsIntRect is CSS-pixel based), I can't definitively say this fixes a specific security vulnerability
- The change might be related to better coordinate system handling rather than a direct security fix
- No obvious memory safety or other common vulnerability patterns are visible in this change
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
build/clang-plugin/MemMoveAnnotation.h AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/build/clang-plugin/MemMoveAnnotation.h+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/build/clang-plugin/MemMoveAnnotation.h@@ -53,7 +53,7 @@ private:   bool isNameExcepted(StringRef Name) const {-    return Name == "pair" || Name == "atomic";+    return Name == "pair" || Name == "atomic" || Name == "tuple";   } };
AI Analysis
Here's the analysis following your requested format:

Vulnerability Existed: not sure
[Potential Incomplete Exception List] [build/clang-plugin/MemMoveAnnotation.h] [Lines 53]
[Old Code]
    return Name == "pair" || Name == "atomic";
[Fixed Code]
    return Name == "pair" || Name == "atomic" || Name == "tuple";

Additional Details:
The change adds "tuple" to the list of excepted names in the MemMoveAnnotation class. While this appears to be a completeness fix rather than a direct security vulnerability, there's a possibility that missing this exception could have led to improper memory handling in certain cases. Without more context about how this exception list is used in the broader security model, we can't be certain if this was actually exploitable. The fix suggests there might have been cases where "tuple" should have been treated similarly to "pair" and "atomic" but wasn't.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/text/2d.text.draw.fill.maxWidth.NaN.worker.js AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/text/2d.text.draw.fill.maxWidth.NaN.worker.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/text/2d.text.draw.fill.maxWidth.NaN.worker.js@@ -13,8 +13,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.fillStyle = '#0f0'; ctx.fillRect(0, 0, 100, 50);
AI Analysis
Analysis of the provided code diff:

1. Vulnerability Existed: no
   No security vulnerability found [File] [Lines 13-14]
   Old Code:
   var offscreenCanvas = new OffscreenCanvas(100, 50);
   var ctx = offscreenCanvas.getContext('2d');

   Fixed Code:
   var canvas = new OffscreenCanvas(100, 50);
   var ctx = canvas.getContext('2d');

Additional Details:
- The changes appear to be purely cosmetic/refactoring, simply renaming a variable from 'offscreenCanvas' to 'canvas'
- No security-related changes or vulnerability fixes were made in this diff
- The functionality remains exactly the same, just with a different variable name
- This is likely part of code standardization or style improvements rather than security fixes
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
ipc/glue/GeckoChildProcessHost.cpp AI: 2 vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/ipc/glue/GeckoChildProcessHost.cpp+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/ipc/glue/GeckoChildProcessHost.cpp@@ -89,6 +89,8 @@ #  include "nsMacUtilsImpl.h" #endif+#include "mozilla/ipc/UtilityProcessHost.h"+ #include "nsClassHashtable.h" #include "nsHashKeys.h" #include "nsNativeCharsetUtils.h"@@ -159,6 +161,7 @@ #if defined(XP_WIN) && defined(MOZ_SANDBOX)         mAllowedFilesRead(aHost->mAllowedFilesRead),         mSandboxLevel(aHost->mSandboxLevel),+        mSandbox(aHost->mSandbox),         mIsFileContent(aHost->mIsFileContent),         mEnableSandboxLogging(aHost->mEnableSandboxLogging), #endif@@ -219,6 +222,7 @@ #if defined(XP_WIN) && defined(MOZ_SANDBOX)   std::vector<std::wstring> mAllowedFilesRead;   int32_t mSandboxLevel;+  SandboxingKind mSandbox;   bool mIsFileContent;   bool mEnableSandboxLogging; #endif@@ -840,18 +844,6 @@   MonitorAutoLock lock(mMonitor);   mProcessState = CHANNEL_INITIALIZED;   lock.Notify();-}--void GeckoChildProcessHost::Join() {-  AssertIOThread();--  if (!mChildProcessHandle) {-    return;-  }--  // If this fails, there's nothing we can do.-  base::KillProcess(mChildProcessHandle, 0, /*wait*/ true);-  SetAlreadyDead(); } void GeckoChildProcessHost::SetAlreadyDead() {@@ -1447,6 +1439,15 @@         mUseSandbox = true;       }       break;+    case GeckoProcessType_Utility:+      if (!PR_GetEnv("MOZ_DISABLE_UTILITY_SANDBOX")) {+        if (!mResults.mSandboxBroker->SetSecurityLevelForUtilityProcess(+                mSandbox)) {+          return false;+        }+        mUseSandbox = true;+      }+      break;     case GeckoProcessType_RemoteSandboxBroker:       // We don't sandbox the sandbox launcher...       break;@@ -1722,9 +1723,13 @@     case GeckoProcessType_GMPlugin:       sandboxType = gmp::GMPProcessParent::GetMacSandboxType();       break;+    case GeckoProcessType_Utility:+      sandboxType = ipc::UtilityProcessHost::GetMacSandboxType();+      break;     default:       return true;   }+   return mozilla::StartMacSandboxIfEnabled(sandboxType, aArgc, aArgv,                                            aErrorMessage); }
AI Analysis
I'll analyze the code diff and provide the security findings following the specified format.

1. Vulnerability Existed: yes
Sandboxing Missing for Utility Process [ipc/glue/GeckoChildProcessHost.cpp] [Lines 1447-1455]
[Old Code]
(None - Utility process sandboxing was not implemented)
[Fixed Code]
case GeckoProcessType_Utility:
  if (!PR_GetEnv("MOZ_DISABLE_UTILITY_SANDBOX")) {
    if (!mResults.mSandboxBroker->SetSecurityLevelForUtilityProcess(
            mSandbox)) {
      return false;
    }
    mUseSandbox = true;
  }
  break;

2. Vulnerability Existed: yes
Incomplete Process Cleanup [ipc/glue/GeckoChildProcessHost.cpp] [Lines 840-852]
[Old Code]
void GeckoChildProcessHost::Join() {
  AssertIOThread();

  if (!mChildProcessHandle) {
    return;
  }

  // If this fails, there's nothing we can do.
  base::KillProcess(mChildProcessHandle, 0, /*wait*/ true);
  SetAlreadyDead();
}
[Fixed Code]
(Removed - The Join() method was completely removed)

3. Vulnerability Existed: not sure
Sandbox Type Addition for MacOS [ipc/glue/GeckoChildProcessHost.cpp] [Lines 1722-1726]
[Old Code]
case GeckoProcessType_GMPlugin:
  sandboxType = gmp::GMPProcessParent::GetMacSandboxType();
  break;
default:
  return true;
[Fixed Code]
case GeckoProcessType_GMPlugin:
  sandboxType = gmp::GMPProcessParent::GetMacSandboxType();
  break;
case GeckoProcessType_Utility:
  sandboxType = ipc::UtilityProcessHost::GetMacSandboxType();
  break;
default:
  return true;

The changes show significant security improvements:
1. Added proper sandboxing for Utility processes
2. Removed potentially unsafe process termination method
3. Extended MacOS sandboxing to cover Utility processes

The removal of the Join() method suggests it might have been unsafe, though without more context I can't be certain of the exact vulnerability it might have caused. The addition of sandboxing for Utility processes clearly addresses a potential security gap where these processes might have run unsandboxed.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/the-offscreen-canvas/initial.reset.gradient.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/the-offscreen-canvas/initial.reset.gradient.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/the-offscreen-canvas/initial.reset.gradient.html@@ -17,19 +17,19 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d');-offscreenCanvas.width = 50;+canvas.width = 50; var g = ctx.createLinearGradient(0, 0, 100, 0); g.addColorStop(0, '#0f0'); g.addColorStop(1, '#0f0');-offscreenCanvas.width = 100;+canvas.width = 100; ctx.fillStyle = '#f00'; ctx.fillRect(0, 0, 100, 50); ctx.fillStyle = g; ctx.fillRect(0, 0, 100, 50);-_assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");+_assertPixel(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255"); t.done(); });
AI Analysis
Based on the provided code diff, I don't see any security vulnerabilities being fixed. The changes appear to be purely variable renaming and don't involve any security-related modifications. Here's the analysis:

    Vulnerability Existed: no
    No security vulnerability found [File] [Lines 17-19, 21, 23, 28]
    [Old Code]
    var offscreenCanvas = new OffscreenCanvas(100, 50);
    var ctx = offscreenCanvas.getContext('2d');
    offscreenCanvas.width = 50;
    offscreenCanvas.width = 100;
    _assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");
    
    [Fixed Code]
    var canvas = new OffscreenCanvas(100, 50);
    var ctx = canvas.getContext('2d');
    canvas.width = 50;
    canvas.width = 100;
    _assertPixel(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");

The changes simply rename the variable `offscreenCanvas` to `canvas` throughout the file, which doesn't affect security. The functionality remains identical. No known vulnerabilities are being addressed in this diff.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/shadows/2d.shadow.pattern.basic.worker.js AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/shadows/2d.shadow.pattern.basic.worker.js+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/shadows/2d.shadow.pattern.basic.worker.js@@ -13,8 +13,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); var promise = new Promise(function(resolve, reject) {     var xhr = new XMLHttpRequest();
AI Analysis
Analyzing the provided code diff for security fixes:

1. Vulnerability Existed: no
   No specific vulnerability found [File] [Lines 13-14]
   [Old Code]
   var offscreenCanvas = new OffscreenCanvas(100, 50);
   var ctx = offscreenCanvas.getContext('2d');
   
   [Fixed Code]
   var canvas = new OffscreenCanvas(100, 50);
   var ctx = canvas.getContext('2d');

Additional Notes:
- The change appears to be purely a variable name change from `offscreenCanvas` to `canvas`
- No security-related changes are evident in this diff
- The modification doesn't affect any security-sensitive operations or introduce/remove any security controls
- This appears to be a code style/readability improvement rather than a security fix
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/scroll-animations/scroll-timelines/setting-timeline.tentative.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/scroll-animations/scroll-timelines/setting-timeline.tentative.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/scroll-animations/scroll-timelines/setting-timeline.tentative.html@@ -201,7 +201,6 @@    'fixes the currentTime of the animation based on the scroll ' +    'position when resumed');- promise_test(async t => {   const animation = createAnimation(t);   const scrollTimeline = createScrollTimeline(t);@@ -296,7 +295,6 @@   assert_percents_equal(animation.currentTime, 20); }, 'Switching from one scroll timeline to another updates currentTime');- promise_test(async t => {   const scrollTimeline = createScrollTimeline(t);   await updateScrollPosition(scrollTimeline, 100);@@ -355,5 +353,40 @@ }, 'Switching from a document timeline to a scroll timeline and updating ' +    'startTime preserves the new value when play is called.');+promise_test(async t => {+  const elem = createDiv(t);+  const animation = elem.animate(null, Infinity);+  await animation.ready;++  animation.timeline = new ScrollTimeline();+  let timing = animation.effect.getComputedTiming();+  assert_percents_equal(timing.endTime, 100);+  assert_percents_equal(timing.activeDuration, 100);+  assert_percents_equal(timing.duration, 100);++  animation.effect.updateTiming({ iterations: 2 });+  timing = animation.effect.getComputedTiming();+  assert_percents_equal(timing.endTime, 100);+  assert_percents_equal(timing.activeDuration, 100);+  assert_percents_equal(timing.duration, 50);++  // Blink implementation does not permit setting an infinite number of+  // iterations on a scroll-linked animation. Workaround by temporarily+  // switching back to a document timeline.+  animation.timeline = document.timeline;+  animation.effect.updateTiming({ iterations: Infinity });+  animation.timeline = new ScrollTimeline();+  timing = animation.effect.getComputedTiming();+  // Having an infinite number of iterations with a finite timeline results in+  // each iteration having zero duration.+  assert_percents_equal(timing.duration, 0);+  // If either the iteration duration or iteration count is zero, the active+  // duration is always zero.+  assert_percents_equal(timing.activeDuration, 0);+  assert_percents_equal(timing.endTime, 0);++}, 'Switching from a document timeline to a scroll timeline on an infinite ' ++   'duration animation.')+ </script> </body>
AI Analysis
After analyzing the provided code diff, I don't find any security vulnerabilities being fixed. The changes appear to be test case additions and minor formatting adjustments rather than security fixes.

Here's the analysis following your requested format:

1. For the removed blank lines:
    Vulnerability Existed: no
    [No vulnerability found] [testing/web-platform/tests/scroll-animations/scroll-timelines/setting-timeline.tentative.html] [Lines 201, 296]
    [Old Code had extra blank lines]
    [Fixed Code removed blank lines]

2. For the new test case addition:
    Vulnerability Existed: no
    [No vulnerability found] [testing/web-platform/tests/scroll-animations/scroll-timelines/setting-timeline.tentative.html] [Lines 353-387]
    [No old code - new test case added]
    [New test case for timeline switching behavior]

The changes are primarily:
1. Removal of some blank lines (cosmetic change)
2. Addition of a new test case for timeline switching behavior (feature testing)

No security-related changes or vulnerabilities were identified in this diff. The modifications appear to be focused on improving test coverage for scroll animation timeline functionality.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
dom/events/EventStateManager.cpp AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/dom/events/EventStateManager.cpp+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/dom/events/EventStateManager.cpp@@ -2815,17 +2815,6 @@       canScroll = true;     }-    // Comboboxes need special care.-    nsComboboxControlFrame* comboBox = do_QueryFrame(scrollFrame);-    if (comboBox) {-      if (comboBox->IsDroppedDown()) {-        // Don't propagate to parent when drop down menu is active.-        return canScroll ? frameToScroll : nullptr;-      }-      // Always propagate when not dropped down (even if focused).-      continue;-    }-     if (canScroll) {       return frameToScroll;     }@@ -2972,7 +2961,7 @@     case WidgetWheelEvent::SCROLL_SYNCHRONOUSLY:       mode = ScrollMode::Instant;       break;-    case WidgetWheelEvent::SCROLL_ASYNCHRONOUSELY:+    case WidgetWheelEvent::SCROLL_ASYNCHRONOUSLY:       mode = ScrollMode::Normal;       break;     case WidgetWheelEvent::SCROLL_SMOOTHLY:
AI Analysis
Here's the analysis of the provided code diff for security fixes:

1. Vulnerability Existed: not sure
   [Potential Logic Change] [dom/events/EventStateManager.cpp] [Lines 2815-2826]
   [Old Code]
   // Comboboxes need special care.
   nsComboboxControlFrame* comboBox = do_QueryFrame(scrollFrame);
   if (comboBox) {
     if (comboBox->IsDroppedDown()) {
       // Don't propagate to parent when drop down menu is active.
       return canScroll ? frameToScroll : nullptr;
     }
     // Always propagate when not dropped down (even if focused).
     continue;
   }
   [Fixed Code]
   [Removed entirely]

2. Vulnerability Existed: no
   [Typo Fix] [dom/events/EventStateManager.cpp] [Lines 2961]
   [Old Code]
   case WidgetWheelEvent::SCROLL_ASYNCHRONOUSELY:
   [Fixed Code]
   case WidgetWheelEvent::SCROLL_ASYNCHRONOUSLY:

Notes:
1. The first change removes special handling for comboboxes, which might affect behavior but doesn't appear to be a direct security fix. The impact is unclear without more context.
2. The second change is clearly just a typo fix (ASYNCHRONOUSELY -> ASYNCHRONOUSLY) with no security implications.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
dom/serviceworkers/ServiceWorkerPrivateImpl.h AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/dom/serviceworkers/ServiceWorkerPrivateImpl.h+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/dom/serviceworkers/ServiceWorkerPrivateImpl.h@@ -53,22 +53,22 @@   RefPtr<GenericPromise> SetSkipWaitingFlag();-  static void ReportRunning();--  static void CheckRunningShutdown() {+  static void RunningShutdown() {+    // Force a final update of the number of running ServiceWorkers+    UpdateRunning(0, 0);     MOZ_ASSERT(sRunningServiceWorkers == 0);     MOZ_ASSERT(sRunningServiceWorkersFetch == 0);   }+  /**+   * Update Telemetry for # of running ServiceWorkers+   */+  static void UpdateRunning(int32_t aDelta, int32_t aFetchDelta);+  private:   class RAIIActorPtrHolder;   ~ServiceWorkerPrivateImpl();--  /**-   * Update Telemetry for # of running ServiceWorkers-   */-  void UpdateRunning(int32_t aDelta, int32_t aFetchDelta);   /**    * ServiceWorkerPrivate::Inner
AI Analysis
Analyzing the provided code diff for security fixes:

1. Vulnerability Existed: not sure
    Potential Information Leak or Incorrect Telemetry Reporting [dom/serviceworkers/ServiceWorkerPrivateImpl.h] [Lines 53-72]
    Old Code:
    static void ReportRunning();
    static void CheckRunningShutdown() {
    MOZ_ASSERT(sRunningServiceWorkers == 0);
    MOZ_ASSERT(sRunningServiceWorkersFetch == 0);
    }
    void UpdateRunning(int32_t aDelta, int32_t aFetchDelta);

    Fixed Code:
    static void RunningShutdown() {
    // Force a final update of the number of running ServiceWorkers
    UpdateRunning(0, 0);
    MOZ_ASSERT(sRunningServiceWorkers == 0);
    MOZ_ASSERT(sRunningServiceWorkersFetch == 0);
    }
    static void UpdateRunning(int32_t aDelta, int32_t aFetchDelta);

    Additional Details:
    The main changes involve:
    1. Removal of ReportRunning() function
    2. Renaming CheckRunningShutdown() to RunningShutdown()
    3. Moving UpdateRunning() from private to public and making it static
    4. Adding forced telemetry update in RunningShutdown()
    While these changes improve telemetry reporting accuracy, it's unclear if this was fixing a specific security vulnerability or just improving code quality.

2. Vulnerability Existed: not sure
    Potential Race Condition in Service Worker Shutdown [dom/serviceworkers/ServiceWorkerPrivateImpl.h] [Lines 53-72]
    Old Code:
    static void CheckRunningShutdown() {
    MOZ_ASSERT(sRunningServiceWorkers == 0);
    MOZ_ASSERT(sRunningServiceWorkersFetch == 0);
    }

    Fixed Code:
    static void RunningShutdown() {
    // Force a final update of the number of running ServiceWorkers
    UpdateRunning(0, 0);
    MOZ_ASSERT(sRunningServiceWorkers == 0);
    MOZ_ASSERT(sRunningServiceWorkersFetch == 0);
    }

    Additional Details:
    The addition of UpdateRunning(0, 0) before assertions might indicate a fix for potential race conditions during service worker shutdown, ensuring accurate telemetry reporting. However, this could also be just a code improvement rather than a security fix.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/fill-and-stroke-styles/2d.fillStyle.parse.invalid.rgba-5.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/fill-and-stroke-styles/2d.fillStyle.parse.invalid.rgba-5.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/fill-and-stroke-styles/2d.fillStyle.parse.invalid.rgba-5.html@@ -17,14 +17,14 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.fillStyle = '#0f0'; try { ctx.fillStyle = 'rgba(255, 0, 0, 1,)'; } catch (e) { } // this shouldn't throw, but it shouldn't matter here if it does ctx.fillRect(0, 0, 100, 50);-_assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");+_assertPixel(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255"); t.done(); });
AI Analysis
Here's the analysis of the provided code diff:

Vulnerability Existed: no
[No specific vulnerability found] [testing/web-platform/tests/html/canvas/offscreen/fill-and-stroke-styles/2d.fillStyle.parse.invalid.rgba-5.html] [Lines 17-27]
[Old Code]
var offscreenCanvas = new OffscreenCanvas(100, 50);
var ctx = offscreenCanvas.getContext('2d');
ctx.fillStyle = '#0f0';
try { ctx.fillStyle = 'rgba(255, 0, 0, 1,)'; } catch (e) { }
ctx.fillRect(0, 0, 100, 50);
_assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");
[Fixed Code]
var canvas = new OffscreenCanvas(100, 50);
var ctx = canvas.getContext('2d');
ctx.fillStyle = '#0f0';
try { ctx.fillStyle = 'rgba(255, 0, 0, 1,)'; } catch (e) { }
ctx.fillRect(0, 0, 100, 50);
_assertPixel(canvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255");

The changes appear to be purely cosmetic, renaming the variable `offscreenCanvas` to `canvas` and updating the corresponding references. There's no indication of any security vulnerability being fixed in this change. The test's functionality remains the same, just with a different variable name.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
devtools/docs/contributor/frontend/telemetry.md AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/devtools/docs/contributor/frontend/telemetry.md+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/devtools/docs/contributor/frontend/telemetry.md@@ -304,7 +304,7 @@ The code for the tabs uses their ids to automatically report telemetry when you switch between panels, so you don't need to explicitly call `toolOpened` and `toolClosed` on top level panels.-You will still need to call those functions on subpanels, or tools such as about:debugging which are not opened as tabs.+You will still need to call those functions on subpanels, or tools such as `about:debugging` which are not opened as tabs. #### Testing@@ -426,7 +426,7 @@ ### Local data-Go to [about:telemetry](about:telemetry) to see stats relating to your local instance.+Go to `about:telemetry` to see stats relating to your local instance. ### Global data
AI Analysis
Based on the provided diff, this appears to be a documentation change rather than a security fix. Here's the analysis following your requested format:

Vulnerability Existed: no
No security vulnerability found [File] devtools/docs/contributor/frontend/telemetry.md [Lines 304, 426]
[Old Code]
You will still need to call those functions on subpanels, or tools such as about:debugging which are not opened as tabs.
...
Go to [about:telemetry](about:telemetry) to see stats relating to your local instance.
[Fixed Code]
You will still need to call those functions on subpanels, or tools such as `about:debugging` which are not opened as tabs.
...
Go to `about:telemetry` to see stats relating to your local instance.

Additional Details:
- The changes only involve formatting (adding backticks around URLs/commands)
- No actual code changes were made that would affect security
- The modifications are purely documentation/markdown formatting improvements
- No security vulnerabilities were addressed or introduced
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/fill-and-stroke-styles/2d.fillStyle.get.transparent.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/fill-and-stroke-styles/2d.fillStyle.get.transparent.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/fill-and-stroke-styles/2d.fillStyle.get.transparent.html@@ -17,8 +17,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.fillStyle = 'rgba(0,0,0,0)'; _assertSame(ctx.fillStyle, 'rgba(0, 0, 0, 0)', "ctx.fillStyle", "'rgba(0, 0, 0, 0)'");
AI Analysis
Based on the provided code diff, here's the analysis:

Vulnerability Existed: no
[No security vulnerability found] [testing/web-platform/tests/html/canvas/offscreen/fill-and-stroke-styles/2d.fillStyle.get.transparent.html] [Lines 17-18]
[Old Code]
var offscreenCanvas = new OffscreenCanvas(100, 50);
var ctx = offscreenCanvas.getContext('2d');
[Fixed Code]
var canvas = new OffscreenCanvas(100, 50);
var ctx = canvas.getContext('2d');

Explanation:
The changes made in this diff appear to be purely cosmetic, renaming a variable from `offscreenCanvas` to `canvas`. There's no indication of any security vulnerability being fixed in this change. The modification doesn't affect any security-related functionality or introduce/remove any security controls. It's simply a variable naming improvement for better code consistency or readability.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
third_party/rust/unicode-normalization/src/tables.rs AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/third_party/rust/unicode-normalization/src/tables.rs+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/third_party/rust/unicode-normalization/src/tables.rs@@ -1,4 +1,4 @@-// Copyright 2012-2015 The Rust Project Developers. See the COPYRIGHT+// Copyright 2012-2018 The Rust Project Developers. See the COPYRIGHT // file at the top-level directory of this distribution and at // http://rust-lang.org/COPYRIGHT. //@@ -10,10919 +10,11119 @@ // NOTE: The following code was generated by "scripts/unicode.py", do not edit directly-#![allow(missing_docs, non_upper_case_globals, non_snake_case)]+#![allow(missing_docs)]+use quick_check::IsNormalized;+use quick_check::IsNormalized::*;-/// The version of [Unicode](http://www.unicode.org/)-/// that this version of unicode-normalization is based on.+#[allow(unused)] pub const UNICODE_VERSION: (u64, u64, u64) = (9, 0, 0);-pub mod normalization {--pub struct Slice {-  pub offset: u16,-  pub length: u16,-}-    // Canonical decompositions-    pub  const canonical_table: &'static [(char, Slice)] = &[-        ('\u{c0}', Slice { offset: 0, length: 2 }),-        ('\u{c1}', Slice { offset: 2, length: 2 }),-        ('\u{c2}', Slice { offset: 4, length: 2 }),-        ('\u{c3}', Slice { offset: 6, length: 2 }),-        ('\u{c4}', Slice { offset: 8, length: 2 }),-        ('\u{c5}', Slice { offset: 10, length: 2 }),-        ('\u{c7}', Slice { offset: 12, length: 2 }),-        ('\u{c8}', Slice { offset: 14, length: 2 }),-        ('\u{c9}', Slice { offset: 16, length: 2 }),-        ('\u{ca}', Slice { offset: 18, length: 2 }),-        ('\u{cb}', Slice { offset: 20, length: 2 }),-        ('\u{cc}', Slice { offset: 22, length: 2 }),-        ('\u{cd}', Slice { offset: 24, length: 2 }),-        ('\u{ce}', Slice { offset: 26, length: 2 }),-        ('\u{cf}', Slice { offset: 28, length: 2 }),-        ('\u{d1}', Slice { offset: 30, length: 2 }),-        ('\u{d2}', Slice { offset: 32, length: 2 }),-        ('\u{d3}', Slice { offset: 34, length: 2 }),-        ('\u{d4}', Slice { offset: 36, length: 2 }),-        ('\u{d5}', Slice { offset: 38, length: 2 }),-        ('\u{d6}', Slice { offset: 40, length: 2 }),-        ('\u{d9}', Slice { offset: 42, length: 2 }),-        ('\u{da}', Slice { offset: 44, length: 2 }),-        ('\u{db}', Slice { offset: 46, length: 2 }),-        ('\u{dc}', Slice { offset: 48, length: 2 }),-        ('\u{dd}', Slice { offset: 50, length: 2 }),-        ('\u{e0}', Slice { offset: 52, length: 2 }),-        ('\u{e1}', Slice { offset: 54, length: 2 }),-        ('\u{e2}', Slice { offset: 56, length: 2 }),-        ('\u{e3}', Slice { offset: 58, length: 2 }),-        ('\u{e4}', Slice { offset: 60, length: 2 }),-        ('\u{e5}', Slice { offset: 62, length: 2 }),-        ('\u{e7}', Slice { offset: 64, length: 2 }),-        ('\u{e8}', Slice { offset: 66, length: 2 }),-        ('\u{e9}', Slice { offset: 68, length: 2 }),-        ('\u{ea}', Slice { offset: 70, length: 2 }),-        ('\u{eb}', Slice { offset: 72, length: 2 }),-        ('\u{ec}', Slice { offset: 74, length: 2 }),-        ('\u{ed}', Slice { offset: 76, length: 2 }),-        ('\u{ee}', Slice { offset: 78, length: 2 }),-        ('\u{ef}', Slice { offset: 80, length: 2 }),-        ('\u{f1}', Slice { offset: 82, length: 2 }),-        ('\u{f2}', Slice { offset: 84, length: 2 }),-        ('\u{f3}', Slice { offset: 86, length: 2 }),-        ('\u{f4}', Slice { offset: 88, length: 2 }),-        ('\u{f5}', Slice { offset: 90, length: 2 }),-        ('\u{f6}', Slice { offset: 92, length: 2 }),-        ('\u{f9}', Slice { offset: 94, length: 2 }),-        ('\u{fa}', Slice { offset: 96, length: 2 }),-        ('\u{fb}', Slice { offset: 98, length: 2 }),-        ('\u{fc}', Slice { offset: 100, length: 2 }),-        ('\u{fd}', Slice { offset: 102, length: 2 }),-        ('\u{ff}', Slice { offset: 104, length: 2 }),-        ('\u{100}', Slice { offset: 106, length: 2 }),-        ('\u{101}', Slice { offset: 108, length: 2 }),-        ('\u{102}', Slice { offset: 110, length: 2 }),-        ('\u{103}', Slice { offset: 112, length: 2 }),-        ('\u{104}', Slice { offset: 114, length: 2 }),-        ('\u{105}', Slice { offset: 116, length: 2 }),-        ('\u{106}', Slice { offset: 118, length: 2 }),-        ('\u{107}', Slice { offset: 120, length: 2 }),-        ('\u{108}', Slice { offset: 122, length: 2 }),-        ('\u{109}', Slice { offset: 124, length: 2 }),-        ('\u{10a}', Slice { offset: 126, length: 2 }),-        ('\u{10b}', Slice { offset: 128, length: 2 }),-        ('\u{10c}', Slice { offset: 130, length: 2 }),-        ('\u{10d}', Slice { offset: 132, length: 2 }),-        ('\u{10e}', Slice { offset: 134, length: 2 }),-        ('\u{10f}', Slice { offset: 136, length: 2 }),-        ('\u{112}', Slice { offset: 138, length: 2 }),-        ('\u{113}', Slice { offset: 140, length: 2 }),-        ('\u{114}', Slice { offset: 142, length: 2 }),-        ('\u{115}', Slice { offset: 144, length: 2 }),-        ('\u{116}', Slice { offset: 146, length: 2 }),-        ('\u{117}', Slice { offset: 148, length: 2 }),-        ('\u{118}', Slice { offset: 150, length: 2 }),-        ('\u{119}', Slice { offset: 152, length: 2 }),-        ('\u{11a}', Slice { offset: 154, length: 2 }),-        ('\u{11b}', Slice { offset: 156, length: 2 }),-        ('\u{11c}', Slice { offset: 158, length: 2 }),-        ('\u{11d}', Slice { offset: 160, length: 2 }),-        ('\u{11e}', Slice { offset: 162, length: 2 }),-        ('\u{11f}', Slice { offset: 164, length: 2 }),-        ('\u{120}', Slice { offset: 166, length: 2 }),-        ('\u{121}', Slice { offset: 168, length: 2 }),-        ('\u{122}', Slice { offset: 170, length: 2 }),-        ('\u{123}', Slice { offset: 172, length: 2 }),-        ('\u{124}', Slice { offset: 174, length: 2 }),-        ('\u{125}', Slice { offset: 176, length: 2 }),-        ('\u{128}', Slice { offset: 178, length: 2 }),-        ('\u{129}', Slice { offset: 180, length: 2 }),-        ('\u{12a}', Slice { offset: 182, length: 2 }),-        ('\u{12b}', Slice { offset: 184, length: 2 }),-        ('\u{12c}', Slice { offset: 186, length: 2 }),-        ('\u{12d}', Slice { offset: 188, length: 2 }),-        ('\u{12e}', Slice { offset: 190, length: 2 }),-        ('\u{12f}', Slice { offset: 192, length: 2 }),-        ('\u{130}', Slice { offset: 194, length: 2 }),-        ('\u{134}', Slice { offset: 196, length: 2 }),-        ('\u{135}', Slice { offset: 198, length: 2 }),-        ('\u{136}', Slice { offset: 200, length: 2 }),-        ('\u{137}', Slice { offset: 202, length: 2 }),-        ('\u{139}', Slice { offset: 204, length: 2 }),-        ('\u{13a}', Slice { offset: 206, length: 2 }),-        ('\u{13b}', Slice { offset: 208, length: 2 }),-        ('\u{13c}', Slice { offset: 210, length: 2 }),-        ('\u{13d}', Slice { offset: 212, length: 2 }),-        ('\u{13e}', Slice { offset: 214, length: 2 }),-        ('\u{143}', Slice { offset: 216, length: 2 }),-        ('\u{144}', Slice { offset: 218, length: 2 }),-        ('\u{145}', Slice { offset: 220, length: 2 }),-        ('\u{146}', Slice { offset: 222, length: 2 }),-        ('\u{147}', Slice { offset: 224, length: 2 }),-        ('\u{148}', Slice { offset: 226, length: 2 }),-        ('\u{14c}', Slice { offset: 228, length: 2 }),-        ('\u{14d}', Slice { offset: 230, length: 2 }),-        ('\u{14e}', Slice { offset: 232, length: 2 }),-        ('\u{14f}', Slice { offset: 234, length: 2 }),-        ('\u{150}', Slice { offset: 236, length: 2 }),-        ('\u{151}', Slice { offset: 238, length: 2 }),-        ('\u{154}', Slice { offset: 240, length: 2 }),-        ('\u{155}', Slice { offset: 242, length: 2 }),-        ('\u{156}', Slice { offset: 244, length: 2 }),-        ('\u{157}', Slice { offset: 246, length: 2 }),-        ('\u{158}', Slice { offset: 248, length: 2 }),-        ('\u{159}', Slice { offset: 250, length: 2 }),-        ('\u{15a}', Slice { offset: 252, length: 2 }),-        ('\u{15b}', Slice { offset: 254, length: 2 }),-        ('\u{15c}', Slice { offset: 256, length: 2 }),-        ('\u{15d}', Slice { offset: 258, length: 2 }),-        ('\u{15e}', Slice { offset: 260, length: 2 }),-        ('\u{15f}', Slice { offset: 262, length: 2 }),-        ('\u{160}', Slice { offset: 264, length: 2 }),-        ('\u{161}', Slice { offset: 266, length: 2 }),-        ('\u{162}', Slice { offset: 268, length: 2 }),-        ('\u{163}', Slice { offset: 270, length: 2 }),-        ('\u{164}', Slice { offset: 272, length: 2 }),-        ('\u{165}', Slice { offset: 274, length: 2 }),-        ('\u{168}', Slice { offset: 276, length: 2 }),-        ('\u{169}', Slice { offset: 278, length: 2 }),-        ('\u{16a}', Slice { offset: 280, length: 2 }),-        ('\u{16b}', Slice { offset: 282, length: 2 }),-        ('\u{16c}', Slice { offset: 284, length: 2 }),-        ('\u{16d}', Slice { offset: 286, length: 2 }),-        ('\u{16e}', Slice { offset: 288, length: 2 }),-        ('\u{16f}', Slice { offset: 290, length: 2 }),-        ('\u{170}', Slice { offset: 292, length: 2 }),-        ('\u{171}', Slice { offset: 294, length: 2 }),-        ('\u{172}', Slice { offset: 296, length: 2 }),-        ('\u{173}', Slice { offset: 298, length: 2 }),-        ('\u{174}', Slice { offset: 300, length: 2 }),-        ('\u{175}', Slice { offset: 302, length: 2 }),-        ('\u{176}', Slice { offset: 304, length: 2 }),-        ('\u{177}', Slice { offset: 306, length: 2 }),-        ('\u{178}', Slice { offset: 308, length: 2 }),-        ('\u{179}', Slice { offset: 310, length: 2 }),-        ('\u{17a}', Slice { offset: 312, length: 2 }),-        ('\u{17b}', Slice { offset: 314, length: 2 }),-        ('\u{17c}', Slice { offset: 316, length: 2 }),-        ('\u{17d}', Slice { offset: 318, length: 2 }),-        ('\u{17e}', Slice { offset: 320, length: 2 }),-        ('\u{1a0}', Slice { offset: 322, length: 2 }),-        ('\u{1a1}', Slice { offset: 324, length: 2 }),-        ('\u{1af}', Slice { offset: 326, length: 2 }),-        ('\u{1b0}', Slice { offset: 328, length: 2 }),-        ('\u{1cd}', Slice { offset: 330, length: 2 }),-        ('\u{1ce}', Slice { offset: 332, length: 2 }),-        ('\u{1cf}', Slice { offset: 334, length: 2 }),-        ('\u{1d0}', Slice { offset: 336, length: 2 }),-        ('\u{1d1}', Slice { offset: 338, length: 2 }),-        ('\u{1d2}', Slice { offset: 340, length: 2 }),-        ('\u{1d3}', Slice { offset: 342, length: 2 }),-        ('\u{1d4}', Slice { offset: 344, length: 2 }),-        ('\u{1d5}', Slice { offset: 346, length: 2 }),-        ('\u{1d6}', Slice { offset: 348, length: 2 }),-        ('\u{1d7}', Slice { offset: 350, length: 2 }),-        ('\u{1d8}', Slice { offset: 352, length: 2 }),-        ('\u{1d9}', Slice { offset: 354, length: 2 }),-        ('\u{1da}', Slice { offset: 356, length: 2 }),-        ('\u{1db}', Slice { offset: 358, length: 2 }),-        ('\u{1dc}', Slice { offset: 360, length: 2 }),-        ('\u{1de}', Slice { offset: 362, length: 2 }),-        ('\u{1df}', Slice { offset: 364, length: 2 }),-        ('\u{1e0}', Slice { offset: 366, length: 2 }),-        ('\u{1e1}', Slice { offset: 368, length: 2 }),-        ('\u{1e2}', Slice { offset: 370, length: 2 }),-        ('\u{1e3}', Slice { offset: 372, length: 2 }),-        ('\u{1e6}', Slice { offset: 374, length: 2 }),-        ('\u{1e7}', Slice { offset: 376, length: 2 }),-        ('\u{1e8}', Slice { offset: 378, length: 2 }),-        ('\u{1e9}', Slice { offset: 380, length: 2 }),-        ('\u{1ea}', Slice { offset: 382, length: 2 }),-        ('\u{1eb}', Slice { offset: 384, length: 2 }),-        ('\u{1ec}', Slice { offset: 386, length: 2 }),-        ('\u{1ed}', Slice { offset: 388, length: 2 }),-        ('\u{1ee}', Slice { offset: 390, length: 2 }),-        ('\u{1ef}', Slice { offset: 392, length: 2 }),-        ('\u{1f0}', Slice { offset: 394, length: 2 }),-        ('\u{1f4}', Slice { offset: 396, length: 2 }),-        ('\u{1f5}', Slice { offset: 398, length: 2 }),-        ('\u{1f8}', Slice { offset: 400, length: 2 }),-        ('\u{1f9}', Slice { offset: 402, length: 2 }),-        ('\u{1fa}', Slice { offset: 404, length: 2 }),-        ('\u{1fb}', Slice { offset: 406, length: 2 }),-        ('\u{1fc}', Slice { offset: 408, length: 2 }),-        ('\u{1fd}', Slice { offset: 410, length: 2 }),-        ('\u{1fe}', Slice { offset: 412, length: 2 }),-        ('\u{1ff}', Slice { offset: 414, length: 2 }),-        ('\u{200}', Slice { offset: 416, length: 2 }),-        ('\u{201}', Slice { offset: 418, length: 2 }),-        ('\u{202}', Slice { offset: 420, length: 2 }),-        ('\u{203}', Slice { offset: 422, length: 2 }),-        ('\u{204}', Slice { offset: 424, length: 2 }),-        ('\u{205}', Slice { offset: 426, length: 2 }),-        ('\u{206}', Slice { offset: 428, length: 2 }),-        ('\u{207}', Slice { offset: 430, length: 2 }),-        ('\u{208}', Slice { offset: 432, length: 2 }),-        ('\u{209}', Slice { offset: 434, length: 2 }),-        ('\u{20a}', Slice { offset: 436, length: 2 }),-        ('\u{20b}', Slice { offset: 438, length: 2 }),-        ('\u{20c}', Slice { offset: 440, length: 2 }),-        ('\u{20d}', Slice { offset: 442, length: 2 }),-        ('\u{20e}', Slice { offset: 444, length: 2 }),-        ('\u{20f}', Slice { offset: 446, length: 2 }),-        ('\u{210}', Slice { offset: 448, length: 2 }),-        ('\u{211}', Slice { offset: 450, length: 2 }),-        ('\u{212}', Slice { offset: 452, length: 2 }),-        ('\u{213}', Slice { offset: 454, length: 2 }),-        ('\u{214}', Slice { offset: 456, length: 2 }),-        ('\u{215}', Slice { offset: 458, length: 2 }),-        ('\u{216}', Slice { offset: 460, length: 2 }),-        ('\u{217}', Slice { offset: 462, length: 2 }),-        ('\u{218}', Slice { offset: 464, length: 2 }),-        ('\u{219}', Slice { offset: 466, length: 2 }),-        ('\u{21a}', Slice { offset: 468, length: 2 }),-        ('\u{21b}', Slice { offset: 470, length: 2 }),-        ('\u{21e}', Slice { offset: 472, length: 2 }),-        ('\u{21f}', Slice { offset: 474, length: 2 }),-        ('\u{226}', Slice { offset: 476, length: 2 }),-        ('\u{227}', Slice { offset: 478, length: 2 }),-        ('\u{228}', Slice { offset: 480, length: 2 }),-        ('\u{229}', Slice { offset: 482, length: 2 }),-        ('\u{22a}', Slice { offset: 484, length: 2 }),-        ('\u{22b}', Slice { offset: 486, length: 2 }),-        ('\u{22c}', Slice { offset: 488, length: 2 }),-        ('\u{22d}', Slice { offset: 490, length: 2 }),-        ('\u{22e}', Slice { offset: 492, length: 2 }),-        ('\u{22f}', Slice { offset: 494, length: 2 }),-        ('\u{230}', Slice { offset: 496, length: 2 }),-        ('\u{231}', Slice { offset: 498, length: 2 }),-        ('\u{232}', Slice { offset: 500, length: 2 }),-        ('\u{233}', Slice { offset: 502, length: 2 }),-        ('\u{340}', Slice { offset: 504, length: 1 }),-        ('\u{341}', Slice { offset: 505, length: 1 }),-        ('\u{343}', Slice { offset: 506, length: 1 }),-        ('\u{344}', Slice { offset: 507, length: 2 }),-        ('\u{374}', Slice { offset: 509, length: 1 }),-        ('\u{37e}', Slice { offset: 510, length: 1 }),-        ('\u{385}', Slice { offset: 511, length: 2 }),-        ('\u{386}', Slice { offset: 513, length: 2 }),-        ('\u{387}', Slice { offset: 515, length: 1 }),-        ('\u{388}', Slice { offset: 516, length: 2 }),-        ('\u{389}', Slice { offset: 518, length: 2 }),-        ('\u{38a}', Slice { offset: 520, length: 2 }),-        ('\u{38c}', Slice { offset: 522, length: 2 }),-        ('\u{38e}', Slice { offset: 524, length: 2 }),-        ('\u{38f}', Slice { offset: 526, length: 2 }),-        ('\u{390}', Slice { offset: 528, length: 2 }),-        ('\u{3aa}', Slice { offset: 530, length: 2 }),-        ('\u{3ab}', Slice { offset: 532, length: 2 }),-        ('\u{3ac}', Slice { offset: 534, length: 2 }),-        ('\u{3ad}', Slice { offset: 536, length: 2 }),-        ('\u{3ae}', Slice { offset: 538, length: 2 }),-        ('\u{3af}', Slice { offset: 540, length: 2 }),-        ('\u{3b0}', Slice { offset: 542, length: 2 }),-        ('\u{3ca}', Slice { offset: 544, length: 2 }),-        ('\u{3cb}', Slice { offset: 546, length: 2 }),-        ('\u{3cc}', Slice { offset: 548, length: 2 }),-        ('\u{3cd}', Slice { offset: 550, length: 2 }),-        ('\u{3ce}', Slice { offset: 552, length: 2 }),-        ('\u{3d3}', Slice { offset: 554, length: 2 }),-        ('\u{3d4}', Slice { offset: 556, length: 2 }),-        ('\u{400}', Slice { offset: 558, length: 2 }),-        ('\u{401}', Slice { offset: 560, length: 2 }),-        ('\u{403}', Slice { offset: 562, length: 2 }),-        ('\u{407}', Slice { offset: 564, length: 2 }),-        ('\u{40c}', Slice { offset: 566, length: 2 }),-        ('\u{40d}', Slice { offset: 568, length: 2 }),-        ('\u{40e}', Slice { offset: 570, length: 2 }),-        ('\u{419}', Slice { offset: 572, length: 2 }),-        ('\u{439}', Slice { offset: 574, length: 2 }),-        ('\u{450}', Slice { offset: 576, length: 2 }),-        ('\u{451}', Slice { offset: 578, length: 2 }),-        ('\u{453}', Slice { offset: 580, length: 2 }),-        ('\u{457}', Slice { offset: 582, length: 2 }),-        ('\u{45c}', Slice { offset: 584, length: 2 }),-        ('\u{45d}', Slice { offset: 586, length: 2 }),-        ('\u{45e}', Slice { offset: 588, length: 2 }),-        ('\u{476}', Slice { offset: 590, length: 2 }),-        ('\u{477}', Slice { offset: 592, length: 2 }),-        ('\u{4c1}', Slice { offset: 594, length: 2 }),-        ('\u{4c2}', Slice { offset: 596, length: 2 }),-        ('\u{4d0}', Slice { offset: 598, length: 2 }),-        ('\u{4d1}', Slice { offset: 600, length: 2 }),-        ('\u{4d2}', Slice { offset: 602, length: 2 }),-        ('\u{4d3}', Slice { offset: 604, length: 2 }),-        ('\u{4d6}', Slice { offset: 606, length: 2 }),-        ('\u{4d7}', Slice { offset: 608, length: 2 }),-        ('\u{4da}', Slice { offset: 610, length: 2 }),-        ('\u{4db}', Slice { offset: 612, length: 2 }),-        ('\u{4dc}', Slice { offset: 614, length: 2 }),-        ('\u{4dd}', Slice { offset: 616, length: 2 }),-        ('\u{4de}', Slice { offset: 618, length: 2 }),-        ('\u{4df}', Slice { offset: 620, length: 2 }),-        ('\u{4e2}', Slice { offset: 622, length: 2 }),-        ('\u{4e3}', Slice { offset: 624, length: 2 }),-        ('\u{4e4}', Slice { offset: 626, length: 2 }),-        ('\u{4e5}', Slice { offset: 628, length: 2 }),-        ('\u{4e6}', Slice { offset: 630, length: 2 }),-        ('\u{4e7}', Slice { offset: 632, length: 2 }),-        ('\u{4ea}', Slice { offset: 634, length: 2 }),-        ('\u{4eb}', Slice { offset: 636, length: 2 }),-        ('\u{4ec}', Slice { offset: 638, length: 2 }),-        ('\u{4ed}', Slice { offset: 640, length: 2 }),-        ('\u{4ee}', Slice { offset: 642, length: 2 }),-        ('\u{4ef}', Slice { offset: 644, length: 2 }),-        ('\u{4f0}', Slice { offset: 646, length: 2 }),-        ('\u{4f1}', Slice { offset: 648, length: 2 }),-        ('\u{4f2}', Slice { offset: 650, length: 2 }),-        ('\u{4f3}', Slice { offset: 652, length: 2 }),-        ('\u{4f4}', Slice { offset: 654, length: 2 }),-        ('\u{4f5}', Slice { offset: 656, length: 2 }),-        ('\u{4f8}', Slice { offset: 658, length: 2 }),-        ('\u{4f9}', Slice { offset: 660, length: 2 }),-        ('\u{622}', Slice { offset: 662, length: 2 }),-        ('\u{623}', Slice { offset: 664, length: 2 }),-        ('\u{624}', Slice { offset: 666, length: 2 }),-        ('\u{625}', Slice { offset: 668, length: 2 }),-        ('\u{626}', Slice { offset: 670, length: 2 }),-        ('\u{6c0}', Slice { offset: 672, length: 2 }),-        ('\u{6c2}', Slice { offset: 674, length: 2 }),-        ('\u{6d3}', Slice { offset: 676, length: 2 }),-        ('\u{929}', Slice { offset: 678, length: 2 }),-        ('\u{931}', Slice { offset: 680, length: 2 }),-        ('\u{934}', Slice { offset: 682, length: 2 }),-        ('\u{958}', Slice { offset: 684, length: 2 }),-        ('\u{959}', Slice { offset: 686, length: 2 }),-        ('\u{95a}', Slice { offset: 688, length: 2 }),-        ('\u{95b}', Slice { offset: 690, length: 2 }),-        ('\u{95c}', Slice { offset: 692, length: 2 }),-        ('\u{95d}', Slice { offset: 694, length: 2 }),-        ('\u{95e}', Slice { offset: 696, length: 2 }),-        ('\u{95f}', Slice { offset: 698, length: 2 }),-        ('\u{9cb}', Slice { offset: 700, length: 2 }),-        ('\u{9cc}', Slice { offset: 702, length: 2 }),-        ('\u{9dc}', Slice { offset: 704, length: 2 }),-        ('\u{9dd}', Slice { offset: 706, length: 2 }),-        ('\u{9df}', Slice { offset: 708, length: 2 }),-        ('\u{a33}', Slice { offset: 710, length: 2 }),-        ('\u{a36}', Slice { offset: 712, length: 2 }),-        ('\u{a59}', Slice { offset: 714, length: 2 }),-        ('\u{a5a}', Slice { offset: 716, length: 2 }),-        ('\u{a5b}', Slice { offset: 718, length: 2 }),-        ('\u{a5e}', Slice { offset: 720, length: 2 }),-        ('\u{b48}', Slice { offset: 722, length: 2 }),-        ('\u{b4b}', Slice { offset: 724, length: 2 }),-        ('\u{b4c}', Slice { offset: 726, length: 2 }),-        ('\u{b5c}', Slice { offset: 728, length: 2 }),-        ('\u{b5d}', Slice { offset: 730, length: 2 }),-        ('\u{b94}', Slice { offset: 732, length: 2 }),-        ('\u{bca}', Slice { offset: 734, length: 2 }),-        ('\u{bcb}', Slice { offset: 736, length: 2 }),-        ('\u{bcc}', Slice { offset: 738, length: 2 }),-        ('\u{c48}', Slice { offset: 740, length: 2 }),-        ('\u{cc0}', Slice { offset: 742, length: 2 }),-        ('\u{cc7}', Slice { offset: 744, length: 2 }),-        ('\u{cc8}', Slice { offset: 746, length: 2 }),-        ('\u{cca}', Slice { offset: 748, length: 2 }),-        ('\u{ccb}', Slice { offset: 750, length: 2 }),-        ('\u{d4a}', Slice { offset: 752, length: 2 }),-        ('\u{d4b}', Slice { offset: 754, length: 2 }),-        ('\u{d4c}', Slice { offset: 756, length: 2 }),-        ('\u{dda}', Slice { offset: 758, length: 2 }),-        ('\u{ddc}', Slice { offset: 760, length: 2 }),-        ('\u{ddd}', Slice { offset: 762, length: 2 }),-        ('\u{dde}', Slice { offset: 764, length: 2 }),-        ('\u{f43}', Slice { offset: 766, length: 2 }),-        ('\u{f4d}', Slice { offset: 768, length: 2 }),-        ('\u{f52}', Slice { offset: 770, length: 2 }),-        ('\u{f57}', Slice { offset: 772, length: 2 }),-        ('\u{f5c}', Slice { offset: 774, length: 2 }),-        ('\u{f69}', Slice { offset: 776, length: 2 }),-        ('\u{f73}', Slice { offset: 778, length: 2 }),-        ('\u{f75}', Slice { offset: 780, length: 2 }),-        ('\u{f76}', Slice { offset: 782, length: 2 }),-        ('\u{f78}', Slice { offset: 784, length: 2 }),-        ('\u{f81}', Slice { offset: 786, length: 2 }),-        ('\u{f93}', Slice { offset: 788, length: 2 }),-        ('\u{f9d}', Slice { offset: 790, length: 2 }),-        ('\u{fa2}', Slice { offset: 792, length: 2 }),-        ('\u{fa7}', Slice { offset: 794, length: 2 }),-        ('\u{fac}', Slice { offset: 796, length: 2 }),-        ('\u{fb9}', Slice { offset: 798, length: 2 }),-        ('\u{1026}', Slice { offset: 800, length: 2 }),-        ('\u{1b06}', Slice { offset: 802, length: 2 }),-        ('\u{1b08}', Slice { offset: 804, length: 2 }),-        ('\u{1b0a}', Slice { offset: 806, length: 2 }),-        ('\u{1b0c}', Slice { offset: 808, length: 2 }),-        ('\u{1b0e}', Slice { offset: 810, length: 2 }),-        ('\u{1b12}', Slice { offset: 812, length: 2 }),-        ('\u{1b3b}', Slice { offset: 814, length: 2 }),-        ('\u{1b3d}', Slice { offset: 816, length: 2 }),-        ('\u{1b40}', Slice { offset: 818, length: 2 }),-        ('\u{1b41}', Slice { offset: 820, length: 2 }),-        ('\u{1b43}', Slice { offset: 822, length: 2 }),-        ('\u{1e00}', Slice { offset: 824, length: 2 }),-        ('\u{1e01}', Slice { offset: 826, length: 2 }),-        ('\u{1e02}', Slice { offset: 828, length: 2 }),-        ('\u{1e03}', Slice { offset: 830, length: 2 }),-        ('\u{1e04}', Slice { offset: 832, length: 2 }),-        ('\u{1e05}', Slice { offset: 834, length: 2 }),-        ('\u{1e06}', Slice { offset: 836, length: 2 }),-        ('\u{1e07}', Slice { offset: 838, length: 2 }),-        ('\u{1e08}', Slice { offset: 840, length: 2 }),-        ('\u{1e09}', Slice { offset: 842, length: 2 }),-        ('\u{1e0a}', Slice { offset: 844, length: 2 }),-        ('\u{1e0b}', Slice { offset: 846, length: 2 }),-        ('\u{1e0c}', Slice { offset: 848, length: 2 }),-        ('\u{1e0d}', Slice { offset: 850, length: 2 }),-        ('\u{1e0e}', Slice { offset: 852, length: 2 }),-        ('\u{1e0f}', Slice { offset: 854, length: 2 }),-        ('\u{1e10}', Slice { offset: 856, length: 2 }),-        ('\u{1e11}', Slice { offset: 858, length: 2 }),-        ('\u{1e12}', Slice { offset: 860, length: 2 }),-        ('\u{1e13}', Slice { offset: 862, length: 2 }),-        ('\u{1e14}', Slice { offset: 864, length: 2 }),-        ('\u{1e15}', Slice { offset: 866, length: 2 }),-        ('\u{1e16}', Slice { offset: 868, length: 2 }),-        ('\u{1e17}', Slice { offset: 870, length: 2 }),-        ('\u{1e18}', Slice { offset: 872, length: 2 }),-        ('\u{1e19}', Slice { offset: 874, length: 2 }),-        ('\u{1e1a}', Slice { offset: 876, length: 2 }),-        ('\u{1e1b}', Slice { offset: 878, length: 2 }),-        ('\u{1e1c}', Slice { offset: 880, length: 2 }),-        ('\u{1e1d}', Slice { offset: 882, length: 2 }),-        ('\u{1e1e}', Slice { offset: 884, length: 2 }),-        ('\u{1e1f}', Slice { offset: 886, length: 2 }),-        ('\u{1e20}', Slice { offset: 888, length: 2 }),-        ('\u{1e21}', Slice { offset: 890, length: 2 }),-        ('\u{1e22}', Slice { offset: 892, length: 2 }),-        ('\u{1e23}', Slice { offset: 894, length: 2 }),-        ('\u{1e24}', Slice { offset: 896, length: 2 }),-        ('\u{1e25}', Slice { offset: 898, length: 2 }),-        ('\u{1e26}', Slice { offset: 900, length: 2 }),-        ('\u{1e27}', Slice { offset: 902, length: 2 }),-        ('\u{1e28}', Slice { offset: 904, length: 2 }),-        ('\u{1e29}', Slice { offset: 906, length: 2 }),-        ('\u{1e2a}', Slice { offset: 908, length: 2 }),-        ('\u{1e2b}', Slice { offset: 910, length: 2 }),-        ('\u{1e2c}', Slice { offset: 912, length: 2 }),-        ('\u{1e2d}', Slice { offset: 914, length: 2 }),-        ('\u{1e2e}', Slice { offset: 916, length: 2 }),-        ('\u{1e2f}', Slice { offset: 918, length: 2 }),-        ('\u{1e30}', Slice { offset: 920, length: 2 }),-        ('\u{1e31}', Slice { offset: 922, length: 2 }),-        ('\u{1e32}', Slice { offset: 924, length: 2 }),-        ('\u{1e33}', Slice { offset: 926, length: 2 }),-        ('\u{1e34}', Slice { offset: 928, length: 2 }),-        ('\u{1e35}', Slice { offset: 930, length: 2 }),-        ('\u{1e36}', Slice { offset: 932, length: 2 }),-        ('\u{1e37}', Slice { offset: 934, length: 2 }),-        ('\u{1e38}', Slice { offset: 936, length: 2 }),-        ('\u{1e39}', Slice { offset: 938, length: 2 }),-        ('\u{1e3a}', Slice { offset: 940, length: 2 }),-        ('\u{1e3b}', Slice { offset: 942, length: 2 }),-        ('\u{1e3c}', Slice { offset: 944, length: 2 }),-        ('\u{1e3d}', Slice { offset: 946, length: 2 }),-        ('\u{1e3e}', Slice { offset: 948, length: 2 }),-        ('\u{1e3f}', Slice { offset: 950, length: 2 }),-        ('\u{1e40}', Slice { offset: 952, length: 2 }),-        ('\u{1e41}', Slice { offset: 954, length: 2 }),-        ('\u{1e42}', Slice { offset: 956, length: 2 }),-        ('\u{1e43}', Slice { offset: 958, length: 2 }),-        ('\u{1e44}', Slice { offset: 960, length: 2 }),-        ('\u{1e45}', Slice { offset: 962, length: 2 }),-        ('\u{1e46}', Slice { offset: 964, length: 2 }),-        ('\u{1e47}', Slice { offset: 966, length: 2 }),-        ('\u{1e48}', Slice { offset: 968, length: 2 }),-        ('\u{1e49}', Slice { offset: 970, length: 2 }),-        ('\u{1e4a}', Slice { offset: 972, length: 2 }),-        ('\u{1e4b}', Slice { offset: 974, length: 2 }),-        ('\u{1e4c}', Slice { offset: 976, length: 2 }),-        ('\u{1e4d}', Slice { offset: 978, length: 2 }),-        ('\u{1e4e}', Slice { offset: 980, length: 2 }),-        ('\u{1e4f}', Slice { offset: 982, length: 2 }),-        ('\u{1e50}', Slice { offset: 984, length: 2 }),-        ('\u{1e51}', Slice { offset: 986, length: 2 }),-        ('\u{1e52}', Slice { offset: 988, length: 2 }),-        ('\u{1e53}', Slice { offset: 990, length: 2 }),-        ('\u{1e54}', Slice { offset: 992, length: 2 }),-        ('\u{1e55}', Slice { offset: 994, length: 2 }),-        ('\u{1e56}', Slice { offset: 996, length: 2 }),-        ('\u{1e57}', Slice { offset: 998, length: 2 }),-        ('\u{1e58}', Slice { offset: 1000, length: 2 }),-        ('\u{1e59}', Slice { offset: 1002, length: 2 }),-        ('\u{1e5a}', Slice { offset: 1004, length: 2 }),-        ('\u{1e5b}', Slice { offset: 1006, length: 2 }),-        ('\u{1e5c}', Slice { offset: 1008, length: 2 }),-        ('\u{1e5d}', Slice { offset: 1010, length: 2 }),-        ('\u{1e5e}', Slice { offset: 1012, length: 2 }),-        ('\u{1e5f}', Slice { offset: 1014, length: 2 }),-        ('\u{1e60}', Slice { offset: 1016, length: 2 }),-        ('\u{1e61}', Slice { offset: 1018, length: 2 }),-        ('\u{1e62}', Slice { offset: 1020, length: 2 }),-        ('\u{1e63}', Slice { offset: 1022, length: 2 }),-        ('\u{1e64}', Slice { offset: 1024, length: 2 }),-        ('\u{1e65}', Slice { offset: 1026, length: 2 }),-        ('\u{1e66}', Slice { offset: 1028, length: 2 }),-        ('\u{1e67}', Slice { offset: 1030, length: 2 }),-        ('\u{1e68}', Slice { offset: 1032, length: 2 }),-        ('\u{1e69}', Slice { offset: 1034, length: 2 }),-        ('\u{1e6a}', Slice { offset: 1036, length: 2 }),-        ('\u{1e6b}', Slice { offset: 1038, length: 2 }),-        ('\u{1e6c}', Slice { offset: 1040, length: 2 }),-        ('\u{1e6d}', Slice { offset: 1042, length: 2 }),-        ('\u{1e6e}', Slice { offset: 1044, length: 2 }),-        ('\u{1e6f}', Slice { offset: 1046, length: 2 }),-        ('\u{1e70}', Slice { offset: 1048, length: 2 }),-        ('\u{1e71}', Slice { offset: 1050, length: 2 }),-        ('\u{1e72}', Slice { offset: 1052, length: 2 }),-        ('\u{1e73}', Slice { offset: 1054, length: 2 }),-        ('\u{1e74}', Slice { offset: 1056, length: 2 }),-        ('\u{1e75}', Slice { offset: 1058, length: 2 }),-        ('\u{1e76}', Slice { offset: 1060, length: 2 }),-        ('\u{1e77}', Slice { offset: 1062, length: 2 }),-        ('\u{1e78}', Slice { offset: 1064, length: 2 }),-        ('\u{1e79}', Slice { offset: 1066, length: 2 }),-        ('\u{1e7a}', Slice { offset: 1068, length: 2 }),-        ('\u{1e7b}', Slice { offset: 1070, length: 2 }),-        ('\u{1e7c}', Slice { offset: 1072, length: 2 }),-        ('\u{1e7d}', Slice { offset: 1074, length: 2 }),-        ('\u{1e7e}', Slice { offset: 1076, length: 2 }),-        ('\u{1e7f}', Slice { offset: 1078, length: 2 }),-        ('\u{1e80}', Slice { offset: 1080, length: 2 }),-        ('\u{1e81}', Slice { offset: 1082, length: 2 }),-        ('\u{1e82}', Slice { offset: 1084, length: 2 }),-        ('\u{1e83}', Slice { offset: 1086, length: 2 }),-        ('\u{1e84}', Slice { offset: 1088, length: 2 }),-        ('\u{1e85}', Slice { offset: 1090, length: 2 }),-        ('\u{1e86}', Slice { offset: 1092, length: 2 }),-        ('\u{1e87}', Slice { offset: 1094, length: 2 }),-        ('\u{1e88}', Slice { offset: 1096, length: 2 }),-        ('\u{1e89}', Slice { offset: 1098, length: 2 }),-        ('\u{1e8a}', Slice { offset: 1100, length: 2 }),-        ('\u{1e8b}', Slice { offset: 1102, length: 2 }),-        ('\u{1e8c}', Slice { offset: 1104, length: 2 }),-        ('\u{1e8d}', Slice { offset: 1106, length: 2 }),-        ('\u{1e8e}', Slice { offset: 1108, length: 2 }),-        ('\u{1e8f}', Slice { offset: 1110, length: 2 }),-        ('\u{1e90}', Slice { offset: 1112, length: 2 }),-        ('\u{1e91}', Slice { offset: 1114, length: 2 }),-        ('\u{1e92}', Slice { offset: 1116, length: 2 }),-        ('\u{1e93}', Slice { offset: 1118, length: 2 }),-        ('\u{1e94}', Slice { offset: 1120, length: 2 }),-        ('\u{1e95}', Slice { offset: 1122, length: 2 }),-        ('\u{1e96}', Slice { offset: 1124, length: 2 }),-        ('\u{1e97}', Slice { offset: 1126, length: 2 }),-        ('\u{1e98}', Slice { offset: 1128, length: 2 }),-        ('\u{1e99}', Slice { offset: 1130, length: 2 }),-        ('\u{1e9b}', Slice { offset: 1132, length: 2 }),-        ('\u{1ea0}', Slice { offset: 1134, length: 2 }),-        ('\u{1ea1}', Slice { offset: 1136, length: 2 }),-        ('\u{1ea2}', Slice { offset: 1138, length: 2 }),-        ('\u{1ea3}', Slice { offset: 1140, length: 2 }),-        ('\u{1ea4}', Slice { offset: 1142, length: 2 }),-        ('\u{1ea5}', Slice { offset: 1144, length: 2 }),-        ('\u{1ea6}', Slice { offset: 1146, length: 2 }),-        ('\u{1ea7}', Slice { offset: 1148, length: 2 }),-        ('\u{1ea8}', Slice { offset: 1150, length: 2 }),-        ('\u{1ea9}', Slice { offset: 1152, length: 2 }),-        ('\u{1eaa}', Slice { offset: 1154, length: 2 }),-        ('\u{1eab}', Slice { offset: 1156, length: 2 }),-        ('\u{1eac}', Slice { offset: 1158, length: 2 }),-        ('\u{1ead}', Slice { offset: 1160, length: 2 }),-        ('\u{1eae}', Slice { offset: 1162, length: 2 }),-        ('\u{1eaf}', Slice { offset: 1164, length: 2 }),-        ('\u{1eb0}', Slice { offset: 1166, length: 2 }),-        ('\u{1eb1}', Slice { offset: 1168, length: 2 }),-        ('\u{1eb2}', Slice { offset: 1170, length: 2 }),-        ('\u{1eb3}', Slice { offset: 1172, length: 2 }),-        ('\u{1eb4}', Slice { offset: 1174, length: 2 }),-        ('\u{1eb5}', Slice { offset: 1176, length: 2 }),-        ('\u{1eb6}', Slice { offset: 1178, length: 2 }),-        ('\u{1eb7}', Slice { offset: 1180, length: 2 }),-        ('\u{1eb8}', Slice { offset: 1182, length: 2 }),-        ('\u{1eb9}', Slice { offset: 1184, length: 2 }),-        ('\u{1eba}', Slice { offset: 1186, length: 2 }),-        ('\u{1ebb}', Slice { offset: 1188, length: 2 }),-        ('\u{1ebc}', Slice { offset: 1190, length: 2 }),-        ('\u{1ebd}', Slice { offset: 1192, length: 2 }),-        ('\u{1ebe}', Slice { offset: 1194, length: 2 }),-        ('\u{1ebf}', Slice { offset: 1196, length: 2 }),-        ('\u{1ec0}', Slice { offset: 1198, length: 2 }),-        ('\u{1ec1}', Slice { offset: 1200, length: 2 }),-        ('\u{1ec2}', Slice { offset: 1202, length: 2 }),-        ('\u{1ec3}', Slice { offset: 1204, length: 2 }),-        ('\u{1ec4}', Slice { offset: 1206, length: 2 }),-        ('\u{1ec5}', Slice { offset: 1208, length: 2 }),-        ('\u{1ec6}', Slice { offset: 1210, length: 2 }),-        ('\u{1ec7}', Slice { offset: 1212, length: 2 }),-        ('\u{1ec8}', Slice { offset: 1214, length: 2 }),-        ('\u{1ec9}', Slice { offset: 1216, length: 2 }),-        ('\u{1eca}', Slice { offset: 1218, length: 2 }),-        ('\u{1ecb}', Slice { offset: 1220, length: 2 }),-        ('\u{1ecc}', Slice { offset: 1222, length: 2 }),-        ('\u{1ecd}', Slice { offset: 1224, length: 2 }),-        ('\u{1ece}', Slice { offset: 1226, length: 2 }),-        ('\u{1ecf}', Slice { offset: 1228, length: 2 }),-        ('\u{1ed0}', Slice { offset: 1230, length: 2 }),-        ('\u{1ed1}', Slice { offset: 1232, length: 2 }),-        ('\u{1ed2}', Slice { offset: 1234, length: 2 }),-        ('\u{1ed3}', Slice { offset: 1236, length: 2 }),-        ('\u{1ed4}', Slice { offset: 1238, length: 2 }),-        ('\u{1ed5}', Slice { offset: 1240, length: 2 }),-        ('\u{1ed6}', Slice { offset: 1242, length: 2 }),-        ('\u{1ed7}', Slice { offset: 1244, length: 2 }),-        ('\u{1ed8}', Slice { offset: 1246, length: 2 }),-        ('\u{1ed9}', Slice { offset: 1248, length: 2 }),-        ('\u{1eda}', Slice { offset: 1250, length: 2 }),-        ('\u{1edb}', Slice { offset: 1252, length: 2 }),-        ('\u{1edc}', Slice { offset: 1254, length: 2 }),-        ('\u{1edd}', Slice { offset: 1256, length: 2 }),-        ('\u{1ede}', Slice { offset: 1258, length: 2 }),-        ('\u{1edf}', Slice { offset: 1260, length: 2 }),-        ('\u{1ee0}', Slice { offset: 1262, length: 2 }),-        ('\u{1ee1}', Slice { offset: 1264, length: 2 }),-        ('\u{1ee2}', Slice { offset: 1266, length: 2 }),-        ('\u{1ee3}', Slice { offset: 1268, length: 2 }),-        ('\u{1ee4}', Slice { offset: 1270, length: 2 }),-        ('\u{1ee5}', Slice { offset: 1272, length: 2 }),-        ('\u{1ee6}', Slice { offset: 1274, length: 2 }),-        ('\u{1ee7}', Slice { offset: 1276, length: 2 }),-        ('\u{1ee8}', Slice { offset: 1278, length: 2 }),-        ('\u{1ee9}', Slice { offset: 1280, length: 2 }),-        ('\u{1eea}', Slice { offset: 1282, length: 2 }),-        ('\u{1eeb}', Slice { offset: 1284, length: 2 }),-        ('\u{1eec}', Slice { offset: 1286, length: 2 }),-        ('\u{1eed}', Slice { offset: 1288, length: 2 }),-        ('\u{1eee}', Slice { offset: 1290, length: 2 }),-        ('\u{1eef}', Slice { offset: 1292, length: 2 }),-        ('\u{1ef0}', Slice { offset: 1294, length: 2 }),-        ('\u{1ef1}', Slice { offset: 1296, length: 2 }),-        ('\u{1ef2}', Slice { offset: 1298, length: 2 }),-        ('\u{1ef3}', Slice { offset: 1300, length: 2 }),-        ('\u{1ef4}', Slice { offset: 1302, length: 2 }),-        ('\u{1ef5}', Slice { offset: 1304, length: 2 }),-        ('\u{1ef6}', Slice { offset: 1306, length: 2 }),-        ('\u{1ef7}', Slice { offset: 1308, length: 2 }),-        ('\u{1ef8}', Slice { offset: 1310, length: 2 }),-        ('\u{1ef9}', Slice { offset: 1312, length: 2 }),-        ('\u{1f00}', Slice { offset: 1314, length: 2 }),-        ('\u{1f01}', Slice { offset: 1316, length: 2 }),-        ('\u{1f02}', Slice { offset: 1318, length: 2 }),-        ('\u{1f03}', Slice { offset: 1320, length: 2 }),-        ('\u{1f04}', Slice { offset: 1322, length: 2 }),-        ('\u{1f05}', Slice { offset: 1324, length: 2 }),-        ('\u{1f06}', Slice { offset: 1326, length: 2 }),-        ('\u{1f07}', Slice { offset: 1328, length: 2 }),-        ('\u{1f08}', Slice { offset: 1330, length: 2 }),-        ('\u{1f09}', Slice { offset: 1332, length: 2 }),-        ('\u{1f0a}', Slice { offset: 1334, length: 2 }),-        ('\u{1f0b}', Slice { offset: 1336, length: 2 }),-        ('\u{1f0c}', Slice { offset: 1338, length: 2 }),-        ('\u{1f0d}', Slice { offset: 1340, length: 2 }),-        ('\u{1f0e}', Slice { offset: 1342, length: 2 }),-        ('\u{1f0f}', Slice { offset: 1344, length: 2 }),-        ('\u{1f10}', Slice { offset: 1346, length: 2 }),-        ('\u{1f11}', Slice { offset: 1348, length: 2 }),-        ('\u{1f12}', Slice { offset: 1350, length: 2 }),-        ('\u{1f13}', Slice { offset: 1352, length: 2 }),-        ('\u{1f14}', Slice { offset: 1354, length: 2 }),-        ('\u{1f15}', Slice { offset: 1356, length: 2 }),-        ('\u{1f18}', Slice { offset: 1358, length: 2 }),-        ('\u{1f19}', Slice { offset: 1360, length: 2 }),-        ('\u{1f1a}', Slice { offset: 1362, length: 2 }),-        ('\u{1f1b}', Slice { offset: 1364, length: 2 }),-        ('\u{1f1c}', Slice { offset: 1366, length: 2 }),-        ('\u{1f1d}', Slice { offset: 1368, length: 2 }),-        ('\u{1f20}', Slice { offset: 1370, length: 2 }),-        ('\u{1f21}', Slice { offset: 1372, length: 2 }),-        ('\u{1f22}', Slice { offset: 1374, length: 2 }),-        ('\u{1f23}', Slice { offset: 1376, length: 2 }),-        ('\u{1f24}', Slice { offset: 1378, length: 2 }),-        ('\u{1f25}', Slice { offset: 1380, length: 2 }),-        ('\u{1f26}', Slice { offset: 1382, length: 2 }),-        ('\u{1f27}', Slice { offset: 1384, length: 2 }),-        ('\u{1f28}', Slice { offset: 1386, length: 2 }),-        ('\u{1f29}', Slice { offset: 1388, length: 2 }),-        ('\u{1f2a}', Slice { offset: 1390, length: 2 }),-        ('\u{1f2b}', Slice { offset: 1392, length: 2 }),-        ('\u{1f2c}', Slice { offset: 1394, length: 2 }),-        ('\u{1f2d}', Slice { offset: 1396, length: 2 }),-        ('\u{1f2e}', Slice { offset: 1398, length: 2 }),-        ('\u{1f2f}', Slice { offset: 1400, length: 2 }),-        ('\u{1f30}', Slice { offset: 1402, length: 2 }),-        ('\u{1f31}', Slice { offset: 1404, length: 2 }),-        ('\u{1f32}', Slice { offset: 1406, length: 2 }),-        ('\u{1f33}', Slice { offset: 1408, length: 2 }),-        ('\u{1f34}', Slice { offset: 1410, length: 2 }),-        ('\u{1f35}', Slice { offset: 1412, length: 2 }),-        ('\u{1f36}', Slice { offset: 1414, length: 2 }),-        ('\u{1f37}', Slice { offset: 1416, length: 2 }),-        ('\u{1f38}', Slice { offset: 1418, length: 2 }),-        ('\u{1f39}', Slice { offset: 1420, length: 2 }),-        ('\u{1f3a}', Slice { offset: 1422, length: 2 }),-        ('\u{1f3b}', Slice { offset: 1424, length: 2 }),-        ('\u{1f3c}', Slice { offset: 1426, length: 2 }),-        ('\u{1f3d}', Slice { offset: 1428, length: 2 }),-        ('\u{1f3e}', Slice { offset: 1430, length: 2 }),-        ('\u{1f3f}', Slice { offset: 1432, length: 2 }),-        ('\u{1f40}', Slice { offset: 1434, length: 2 }),-        ('\u{1f41}', Slice { offset: 1436, length: 2 }),-        ('\u{1f42}', Slice { offset: 1438, length: 2 }),-        ('\u{1f43}', Slice { offset: 1440, length: 2 }),-        ('\u{1f44}', Slice { offset: 1442, length: 2 }),-        ('\u{1f45}', Slice { offset: 1444, length: 2 }),-        ('\u{1f48}', Slice { offset: 1446, length: 2 }),-        ('\u{1f49}', Slice { offset: 1448, length: 2 }),-        ('\u{1f4a}', Slice { offset: 1450, length: 2 }),-        ('\u{1f4b}', Slice { offset: 1452, length: 2 }),-        ('\u{1f4c}', Slice { offset: 1454, length: 2 }),-        ('\u{1f4d}', Slice { offset: 1456, length: 2 }),-        ('\u{1f50}', Slice { offset: 1458, length: 2 }),-        ('\u{1f51}', Slice { offset: 1460, length: 2 }),-        ('\u{1f52}', Slice { offset: 1462, length: 2 }),-        ('\u{1f53}', Slice { offset: 1464, length: 2 }),-        ('\u{1f54}', Slice { offset: 1466, length: 2 }),-        ('\u{1f55}', Slice { offset: 1468, length: 2 }),-        ('\u{1f56}', Slice { offset: 1470, length: 2 }),-        ('\u{1f57}', Slice { offset: 1472, length: 2 }),-        ('\u{1f59}', Slice { offset: 1474, length: 2 }),-        ('\u{1f5b}', Slice { offset: 1476, length: 2 }),-        ('\u{1f5d}', Slice { offset: 1478, length: 2 }),-        ('\u{1f5f}', Slice { offset: 1480, length: 2 }),-        ('\u{1f60}', Slice { offset: 1482, length: 2 }),-        ('\u{1f61}', Slice { offset: 1484, length: 2 }),-        ('\u{1f62}', Slice { offset: 1486, length: 2 }),-        ('\u{1f63}', Slice { offset: 1488, length: 2 }),-        ('\u{1f64}', Slice { offset: 1490, length: 2 }),-        ('\u{1f65}', Slice { offset: 1492, length: 2 }),-        ('\u{1f66}', Slice { offset: 1494, length: 2 }),-        ('\u{1f67}', Slice { offset: 1496, length: 2 }),-        ('\u{1f68}', Slice { offset: 1498, length: 2 }),-        ('\u{1f69}', Slice { offset: 1500, length: 2 }),-        ('\u{1f6a}', Slice { offset: 1502, length: 2 }),-        ('\u{1f6b}', Slice { offset: 1504, length: 2 }),-        ('\u{1f6c}', Slice { offset: 1506, length: 2 }),-        ('\u{1f6d}', Slice { offset: 1508, length: 2 }),-        ('\u{1f6e}', Slice { offset: 1510, length: 2 }),-        ('\u{1f6f}', Slice { offset: 1512, length: 2 }),-        ('\u{1f70}', Slice { offset: 1514, length: 2 }),-        ('\u{1f71}', Slice { offset: 1516, length: 1 }),-        ('\u{1f72}', Slice { offset: 1517, length: 2 }),-        ('\u{1f73}', Slice { offset: 1519, length: 1 }),-        ('\u{1f74}', Slice { offset: 1520, length: 2 }),-        ('\u{1f75}', Slice { offset: 1522, length: 1 }),-        ('\u{1f76}', Slice { offset: 1523, length: 2 }),-        ('\u{1f77}', Slice { offset: 1525, length: 1 }),-        ('\u{1f78}', Slice { offset: 1526, length: 2 }),-        ('\u{1f79}', Slice { offset: 1528, length: 1 }),-        ('\u{1f7a}', Slice { offset: 1529, length: 2 }),-        ('\u{1f7b}', Slice { offset: 1531, length: 1 }),-        ('\u{1f7c}', Slice { offset: 1532, length: 2 }),-        ('\u{1f7d}', Slice { offset: 1534, length: 1 }),-        ('\u{1f80}', Slice { offset: 1535, length: 2 }),-        ('\u{1f81}', Slice { offset: 1537, length: 2 }),-        ('\u{1f82}', Slice { offset: 1539, length: 2 }),-        ('\u{1f83}', Slice { offset: 1541, length: 2 }),-        ('\u{1f84}', Slice { offset: 1543, length: 2 }),-        ('\u{1f85}', Slice { offset: 1545, length: 2 }),-        ('\u{1f86}', Slice { offset: 1547, length: 2 }),-        ('\u{1f87}', Slice { offset: 1549, length: 2 }),-        ('\u{1f88}', Slice { offset: 1551, length: 2 }),-        ('\u{1f89}', Slice { offset: 1553, length: 2 }),-        ('\u{1f8a}', Slice { offset: 1555, length: 2 }),-        ('\u{1f8b}', Slice { offset: 1557, length: 2 }),-        ('\u{1f8c}', Slice { offset: 1559, length: 2 }),-        ('\u{1f8d}', Slice { offset: 1561, length: 2 }),-        ('\u{1f8e}', Slice { offset: 1563, length: 2 }),-        ('\u{1f8f}', Slice { offset: 1565, length: 2 }),-        ('\u{1f90}', Slice { offset: 1567, length: 2 }),-        ('\u{1f91}', Slice { offset: 1569, length: 2 }),-        ('\u{1f92}', Slice { offset: 1571, length: 2 }),-        ('\u{1f93}', Slice { offset: 1573, length: 2 }),-        ('\u{1f94}', Slice { offset: 1575, length: 2 }),-        ('\u{1f95}', Slice { offset: 1577, length: 2 }),-        ('\u{1f96}', Slice { offset: 1579, length: 2 }),-        ('\u{1f97}', Slice { offset: 1581, length: 2 }),-        ('\u{1f98}', Slice { offset: 1583, length: 2 }),-        ('\u{1f99}', Slice { offset: 1585, length: 2 }),-        ('\u{1f9a}', Slice { offset: 1587, length: 2 }),-        ('\u{1f9b}', Slice { offset: 1589, length: 2 }),-        ('\u{1f9c}', Slice { offset: 1591, length: 2 }),-        ('\u{1f9d}', Slice { offset: 1593, length: 2 }),-        ('\u{1f9e}', Slice { offset: 1595, length: 2 }),-        ('\u{1f9f}', Slice { offset: 1597, length: 2 }),-        ('\u{1fa0}', Slice { offset: 1599, length: 2 }),-        ('\u{1fa1}', Slice { offset: 1601, length: 2 }),-        ('\u{1fa2}', Slice { offset: 1603, length: 2 }),-        ('\u{1fa3}', Slice { offset: 1605, length: 2 }),-        ('\u{1fa4}', Slice { offset: 1607, length: 2 }),-        ('\u{1fa5}', Slice { offset: 1609, length: 2 }),-        ('\u{1fa6}', Slice { offset: 1611, length: 2 }),-        ('\u{1fa7}', Slice { offset: 1613, length: 2 }),-        ('\u{1fa8}', Slice { offset: 1615, length: 2 }),-        ('\u{1fa9}', Slice { offset: 1617, length: 2 }),-        ('\u{1faa}', Slice { offset: 1619, length: 2 }),-        ('\u{1fab}', Slice { offset: 1621, length: 2 }),-        ('\u{1fac}', Slice { offset: 1623, length: 2 }),-        ('\u{1fad}', Slice { offset: 1625, length: 2 }),-        ('\u{1fae}', Slice { offset: 1627, length: 2 }),-        ('\u{1faf}', Slice { offset: 1629, length: 2 }),-        ('\u{1fb0}', Slice { offset: 1631, length: 2 }),-        ('\u{1fb1}', Slice { offset: 1633, length: 2 }),-        ('\u{1fb2}', Slice { offset: 1635, length: 2 }),-        ('\u{1fb3}', Slice { offset: 1637, length: 2 }),-        ('\u{1fb4}', Slice { offset: 1639, length: 2 }),-        ('\u{1fb6}', Slice { offset: 1641, length: 2 }),-        ('\u{1fb7}', Slice { offset: 1643, length: 2 }),-        ('\u{1fb8}', Slice { offset: 1645, length: 2 }),-        ('\u{1fb9}', Slice { offset: 1647, length: 2 }),-        ('\u{1fba}', Slice { offset: 1649, length: 2 }),-        ('\u{1fbb}', Slice { offset: 1651, length: 1 }),-        ('\u{1fbc}', Slice { offset: 1652, length: 2 }),-        ('\u{1fbe}', Slice { offset: 1654, length: 1 }),-        ('\u{1fc1}', Slice { offset: 1655, length: 2 }),-        ('\u{1fc2}', Slice { offset: 1657, length: 2 }),-        ('\u{1fc3}', Slice { offset: 1659, length: 2 }),-        ('\u{1fc4}', Slice { offset: 1661, length: 2 }),-        ('\u{1fc6}', Slice { offset: 1663, length: 2 }),-        ('\u{1fc7}', Slice { offset: 1665, length: 2 }),-        ('\u{1fc8}', Slice { offset: 1667, length: 2 }),-        ('\u{1fc9}', Slice { offset: 1669, length: 1 }),-        ('\u{1fca}', Slice { offset: 1670, length: 2 }),-        ('\u{1fcb}', Slice { offset: 1672, length: 1 }),-        ('\u{1fcc}', Slice { offset: 1673, length: 2 }),-        ('\u{1fcd}', Slice { offset: 1675, length: 2 }),-        ('\u{1fce}', Slice { offset: 1677, length: 2 }),-        ('\u{1fcf}', Slice { offset: 1679, length: 2 }),-        ('\u{1fd0}', Slice { offset: 1681, length: 2 }),-        ('\u{1fd1}', Slice { offset: 1683, length: 2 }),-        ('\u{1fd2}', Slice { offset: 1685, length: 2 }),-        ('\u{1fd3}', Slice { offset: 1687, length: 1 }),-        ('\u{1fd6}', Slice { offset: 1688, length: 2 }),-        ('\u{1fd7}', Slice { offset: 1690, length: 2 }),-        ('\u{1fd8}', Slice { offset: 1692, length: 2 }),-        ('\u{1fd9}', Slice { offset: 1694, length: 2 }),-        ('\u{1fda}', Slice { offset: 1696, length: 2 }),-        ('\u{1fdb}', Slice { offset: 1698, length: 1 }),-        ('\u{1fdd}', Slice { offset: 1699, length: 2 }),-        ('\u{1fde}', Slice { offset: 1701, length: 2 }),-        ('\u{1fdf}', Slice { offset: 1703, length: 2 }),-        ('\u{1fe0}', Slice { offset: 1705, length: 2 }),-        ('\u{1fe1}', Slice { offset: 1707, length: 2 }),-        ('\u{1fe2}', Slice { offset: 1709, length: 2 }),-        ('\u{1fe3}', Slice { offset: 1711, length: 1 }),-        ('\u{1fe4}', Slice { offset: 1712, length: 2 }),-        ('\u{1fe5}', Slice { offset: 1714, length: 2 }),-        ('\u{1fe6}', Slice { offset: 1716, length: 2 }),-        ('\u{1fe7}', Slice { offset: 1718, length: 2 }),-        ('\u{1fe8}', Slice { offset: 1720, length: 2 }),-        ('\u{1fe9}', Slice { offset: 1722, length: 2 }),-        ('\u{1fea}', Slice { offset: 1724, length: 2 }),-        ('\u{1feb}', Slice { offset: 1726, length: 1 }),-        ('\u{1fec}', Slice { offset: 1727, length: 2 }),-        ('\u{1fed}', Slice { offset: 1729, length: 2 }),-        ('\u{1fee}', Slice { offset: 1731, length: 1 }),-        ('\u{1fef}', Slice { offset: 1732, length: 1 }),-        ('\u{1ff2}', Slice { offset: 1733, length: 2 }),-        ('\u{1ff3}', Slice { offset: 1735, length: 2 }),-        ('\u{1ff4}', Slice { offset: 1737, length: 2 }),-        ('\u{1ff6}', Slice { offset: 1739, length: 2 }),-        ('\u{1ff7}', Slice { offset: 1741, length: 2 }),-        ('\u{1ff8}', Slice { offset: 1743, length: 2 }),-        ('\u{1ff9}', Slice { offset: 1745, length: 1 }),-        ('\u{1ffa}', Slice { offset: 1746, length: 2 }),-        ('\u{1ffb}', Slice { offset: 1748, length: 1 }),-        ('\u{1ffc}', Slice { offset: 1749, length: 2 }),-        ('\u{1ffd}', Slice { offset: 1751, length: 1 }),-        ('\u{2000}', Slice { offset: 1752, length: 1 }),-        ('\u{2001}', Slice { offset: 1753, length: 1 }),-        ('\u{2126}', Slice { offset: 1754, length: 1 }),-        ('\u{212a}', Slice { offset: 1755, length: 1 }),-        ('\u{212b}', Slice { offset: 1756, length: 1 }),-        ('\u{219a}', Slice { offset: 1757, length: 2 }),-        ('\u{219b}', Slice { offset: 1759, length: 2 }),-        ('\u{21ae}', Slice { offset: 1761, length: 2 }),-        ('\u{21cd}', Slice { offset: 1763, length: 2 }),-        ('\u{21ce}', Slice { offset: 1765, length: 2 }),-        ('\u{21cf}', Slice { offset: 1767, length: 2 }),-        ('\u{2204}', Slice { offset: 1769, length: 2 }),-        ('\u{2209}', Slice { offset: 1771, length: 2 }),-        ('\u{220c}', Slice { offset: 1773, length: 2 }),-        ('\u{2224}', Slice { offset: 1775, length: 2 }),-        ('\u{2226}', Slice { offset: 1777, length: 2 }),-        ('\u{2241}', Slice { offset: 1779, length: 2 }),-        ('\u{2244}', Slice { offset: 1781, length: 2 }),-        ('\u{2247}', Slice { offset: 1783, length: 2 }),-        ('\u{2249}', Slice { offset: 1785, length: 2 }),-        ('\u{2260}', Slice { offset: 1787, length: 2 }),-        ('\u{2262}', Slice { offset: 1789, length: 2 }),-        ('\u{226d}', Slice { offset: 1791, length: 2 }),-        ('\u{226e}', Slice { offset: 1793, length: 2 }),-        ('\u{226f}', Slice { offset: 1795, length: 2 }),-        ('\u{2270}', Slice { offset: 1797, length: 2 }),-        ('\u{2271}', Slice { offset: 1799, length: 2 }),-        ('\u{2274}', Slice { offset: 1801, length: 2 }),-        ('\u{2275}', Slice { offset: 1803, length: 2 }),-        ('\u{2278}', Slice { offset: 1805, length: 2 }),-        ('\u{2279}', Slice { offset: 1807, length: 2 }),-        ('\u{2280}', Slice { offset: 1809, length: 2 }),-        ('\u{2281}', Slice { offset: 1811, length: 2 }),-        ('\u{2284}', Slice { offset: 1813, length: 2 }),-        ('\u{2285}', Slice { offset: 1815, length: 2 }),-        ('\u{2288}', Slice { offset: 1817, length: 2 }),-        ('\u{2289}', Slice { offset: 1819, length: 2 }),-        ('\u{22ac}', Slice { offset: 1821, length: 2 }),-        ('\u{22ad}', Slice { offset: 1823, length: 2 }),-        ('\u{22ae}', Slice { offset: 1825, length: 2 }),-        ('\u{22af}', Slice { offset: 1827, length: 2 }),-        ('\u{22e0}', Slice { offset: 1829, length: 2 }),-        ('\u{22e1}', Slice { offset: 1831, length: 2 }),-        ('\u{22e2}', Slice { offset: 1833, length: 2 }),-        ('\u{22e3}', Slice { offset: 1835, length: 2 }),-        ('\u{22ea}', Slice { offset: 1837, length: 2 }),-        ('\u{22eb}', Slice { offset: 1839, length: 2 }),-        ('\u{22ec}', Slice { offset: 1841, length: 2 }),-        ('\u{22ed}', Slice { offset: 1843, length: 2 }),-        ('\u{2329}', Slice { offset: 1845, length: 1 }),-        ('\u{232a}', Slice { offset: 1846, length: 1 }),-        ('\u{2adc}', Slice { offset: 1847, length: 2 }),-        ('\u{304c}', Slice { offset: 1849, length: 2 }),-        ('\u{304e}', Slice { offset: 1851, length: 2 }),-        ('\u{3050}', Slice { offset: 1853, length: 2 }),-        ('\u{3052}', Slice { offset: 1855, length: 2 }),-        ('\u{3054}', Slice { offset: 1857, length: 2 }),-        ('\u{3056}', Slice { offset: 1859, length: 2 }),-        ('\u{3058}', Slice { offset: 1861, length: 2 }),-        ('\u{305a}', Slice { offset: 1863, length: 2 }),-        ('\u{305c}', Slice { offset: 1865, length: 2 }),-        ('\u{305e}', Slice { offset: 1867, length: 2 }),-        ('\u{3060}', Slice { offset: 1869, length: 2 }),-        ('\u{3062}', Slice { offset: 1871, length: 2 }),-        ('\u{3065}', Slice { offset: 1873, length: 2 }),-        ('\u{3067}', Slice { offset: 1875, length: 2 }),-        ('\u{3069}', Slice { offset: 1877, length: 2 }),-        ('\u{3070}', Slice { offset: 1879, length: 2 }),-        ('\u{3071}', Slice { offset: 1881, length: 2 }),-        ('\u{3073}', Slice { offset: 1883, length: 2 }),-        ('\u{3074}', Slice { offset: 1885, length: 2 }),-        ('\u{3076}', Slice { offset: 1887, length: 2 }),-        ('\u{3077}', Slice { offset: 1889, length: 2 }),-        ('\u{3079}', Slice { offset: 1891, length: 2 }),-        ('\u{307a}', Slice { offset: 1893, length: 2 }),-        ('\u{307c}', Slice { offset: 1895, length: 2 }),-        ('\u{307d}', Slice { offset: 1897, length: 2 }),-        ('\u{3094}', Slice { offset: 1899, length: 2 }),-        ('\u{309e}', Slice { offset: 1901, length: 2 }),-        ('\u{30ac}', Slice { offset: 1903, length: 2 }),-        ('\u{30ae}', Slice { offset: 1905, length: 2 }),-        ('\u{30b0}', Slice { offset: 1907, length: 2 }),-        ('\u{30b2}', Slice { offset: 1909, length: 2 }),-        ('\u{30b4}', Slice { offset: 1911, length: 2 }),-        ('\u{30b6}', Slice { offset: 1913, length: 2 }),
AI Analysis
Error: {"error":{"message":"This model's maximum context length is 65536 tokens. However, you requested 205747 tokens (197555 in the messages, 8192 in the completion). Please reduce the length of the messages or completion.","type":"invalid_request_error","param":null,"code":"invalid_request_error"}}
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
dom/cache/test/mochitest/test_cache_orphaned_body.html AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/dom/cache/test/mochitest/test_cache_orphaned_body.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/dom/cache/test/mochitest/test_cache_orphaned_body.html@@ -91,7 +91,13 @@           ["dom.caches.testing.enabled", true],           ["dom.quotaManager.testing", true],           ["dom.storageManager.enabled", true]],-}, function() {+}, async function() {+  // Bug 1746646: Make mochitests work with TCP enabled (cookieBehavior = 5)+  // Acquire storage access permission here so that the Cache API is avaialable+  SpecialPowers.wrap(document).notifyUserGestureActivation();+  await SpecialPowers.addPermission("storageAccessAPI", true, window.location.href);+  await SpecialPowers.wrap(document).requestStorageAccess();+   var name = "orphanedBodyOwner";   var cache = null;   var response = null;
AI Analysis
Let me analyze the code diff for security fixes:

Vulnerability Existed: not sure
[Potential Cross-Site Request Forgery (CSRF) or Storage Access Issue] [dom/cache/test/mochitest/test_cache_orphaned_body.html] [Lines 91-97]
[Old Code]
}, function() {
[Fixed Code]
}, async function() {
  // Bug 1746646: Make mochitests work with TCP enabled (cookieBehavior = 5)
  // Acquire storage access permission here so that the Cache API is avaialable
  SpecialPowers.wrap(document).notifyUserGestureActivation();
  await SpecialPowers.addPermission("storageAccessAPI", true, window.location.href);
  await SpecialPowers.wrap(document).requestStorageAccess();

The changes appear to address potential issues with storage access and permissions when Total Cookie Protection (TCP) is enabled (cookieBehavior = 5). While not clearly a security vulnerability fix, it's related to security features in Firefox that restrict cross-site storage access. The changes ensure proper storage access permissions are acquired before testing Cache API functionality.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
mfbt/Attributes.h AI: Not sure
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/mfbt/Attributes.h+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/mfbt/Attributes.h@@ -706,8 +706,9 @@ #  if defined(MOZ_CLANG_PLUGIN) || defined(XGILL_PLUGIN) #    define MOZ_CAN_RUN_SCRIPT __attribute__((annotate("moz_can_run_script")))-#    define MOZ_CAN_RUN_SCRIPT_FOR_DEFINITION \-      __attribute__((annotate("moz_can_run_script")))+#    define MOZ_CAN_RUN_SCRIPT_FOR_DEFINITION         \+      __attribute__((annotate("moz_can_run_script"))) \+      __attribute__((annotate("moz_can_run_script_for_definition"))) #    define MOZ_CAN_RUN_SCRIPT_BOUNDARY \       __attribute__((annotate("moz_can_run_script_boundary"))) #    define MOZ_MUST_OVERRIDE __attribute__((annotate("moz_must_override")))
AI Analysis
I'll analyze the provided code diff for security fixes following the specified format.

Vulnerability Existed: not sure
[Potential Annotation Improvement] [mfbt/Attributes.h] [Lines 706-709]
[Old Code]
#    define MOZ_CAN_RUN_SCRIPT_FOR_DEFINITION \
      __attribute__((annotate("moz_can_run_script")))
[Fixed Code]
#    define MOZ_CAN_RUN_SCRIPT_FOR_DEFINITION         \
      __attribute__((annotate("moz_can_run_script"))) \
      __attribute__((annotate("moz_can_run_script_for_definition")))

Additional Details:
- The change adds an additional annotation attribute to MOZ_CAN_RUN_SCRIPT_FOR_DEFINITION
- While this appears to be an improvement in annotation specificity, it's not clear if this was fixing a specific security vulnerability
- The change might be related to better static analysis capabilities rather than fixing an existing security issue
- The "moz_can_run_script" annotations are typically used for static analysis of potentially dangerous script-running capabilities in Firefox

No other vulnerabilities are apparent in this small diff. The change seems focused on improving code annotation rather than fixing a specific security issue.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
testing/web-platform/tests/html/canvas/offscreen/drawing-rectangles-to-the-canvas/2d.strokeRect.negative.html AI: No vulnerabilities
--- /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_97_END/firefox-FIREFOX_RELEASE_97_END/testing/web-platform/tests/html/canvas/offscreen/drawing-rectangles-to-the-canvas/2d.strokeRect.negative.html+++ /root/PatchLeaks-main/products/firefox_downloads/FIREFOX_RELEASE_98_END/firefox-FIREFOX_RELEASE_98_END/testing/web-platform/tests/html/canvas/offscreen/drawing-rectangles-to-the-canvas/2d.strokeRect.negative.html@@ -17,8 +17,8 @@ }); t.step(function() {-var offscreenCanvas = new OffscreenCanvas(100, 50);-var ctx = offscreenCanvas.getContext('2d');+var canvas = new OffscreenCanvas(100, 50);+var ctx = canvas.getContext('2d'); ctx.fillStyle = '#f00'; ctx.fillRect(0, 0, 100, 50);@@ -28,10 +28,10 @@ ctx.strokeRect(88, 12, -26, 1); ctx.strokeRect(12, 38, 26, -1); ctx.strokeRect(88, 38, -26, -1);-_assertPixel(offscreenCanvas, 25,12, 0,255,0,255, "25,12", "0,255,0,255");-_assertPixel(offscreenCanvas, 75,12, 0,255,0,255, "75,12", "0,255,0,255");-_assertPixel(offscreenCanvas, 25,37, 0,255,0,255, "25,37", "0,255,0,255");-_assertPixel(offscreenCanvas, 75,37, 0,255,0,255, "75,37", "0,255,0,255");+_assertPixel(canvas, 25,12, 0,255,0,255, "25,12", "0,255,0,255");+_assertPixel(canvas, 75,12, 0,255,0,255, "75,12", "0,255,0,255");+_assertPixel(canvas, 25,37, 0,255,0,255, "25,37", "0,255,0,255");+_assertPixel(canvas, 75,37, 0,255,0,255, "75,37", "0,255,0,255"); t.done(); });
AI Analysis
After analyzing the provided code diff, I don't see any security vulnerabilities being fixed. The changes appear to be purely variable renaming (from `offscreenCanvas` to `canvas`) and corresponding updates to the assertions. Here's the analysis:

    Vulnerability Existed: no
    No security vulnerability found
    File: testing/web-platform/tests/html/canvas/offscreen/drawing-rectangles-to-the-canvas/2d.strokeRect.negative.html
    Changes are purely variable renaming and don't affect security

The changes are:
1. Renaming `offscreenCanvas` variable to `canvas`
2. Updating all references to this variable in the assertions
3. No changes to the actual logic or security-relevant parts of the code

This appears to be a code style/readability improvement rather than a security fix.
CVE Analysis Results:
CVE-2022-26384: No
View CVE Description
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
Showing 5621-5640 of 6017 files
Per page: