Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

February 2019 Security Update #5936

Merged
merged 13 commits into from
Feb 12, 2019

Commits on Feb 7, 2019

  1. Configuration menu
    Copy the full SHA
    beba75a View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    b778ca8 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    bdd22d1 View commit details
    Browse the repository at this point in the history
  4. [CVE-2019-0651] Chakracore Tianfucup IRBuilder::BuildAuxiliary Type C…

    …onfusion - 360Vulcan
    Meghana Gupta authored and MikeHolman committed Feb 7, 2019
    Configuration menu
    Copy the full SHA
    fc9892c View commit details
    Browse the repository at this point in the history
  5. [CVE-2019-0644] Chakra - AV due to type confusion - Individual - Give…

    …n a split scope (a function has both a param and body scope), then it is required that the body and param scope are marked as both requiring either a scope object or a scope slot. This was not being enforced in Scope::SetIsObject(). This led to an AV in the interpreter when accessing a property because StLocalSlot was used instead of StLocalObjSlot.
    wyrichte authored and MikeHolman committed Feb 7, 2019
    Configuration menu
    Copy the full SHA
    5f6dea1 View commit details
    Browse the repository at this point in the history
  6. [CVE-2019-0640] Bug report for Edge/Chakra: Missing marshalling for P…

    …romise result
    
        I also added mitigations for bad things that can happen when calling into a closed script context.
        1. We delete xdata before unregistering it, which can lead to UAF if we call address of a closed function. Windows Exception code unconditionally jumps to handler address (i.e. without CFG check), so this can bypass CFG. I changed to delete after unregistering.
        2. We zero code pages when we close script context, which could be exploitable on x86. I changed to fill with debugbreak.
    MikeHolman committed Feb 7, 2019
    Configuration menu
    Copy the full SHA
    15df2a6 View commit details
    Browse the repository at this point in the history
  7. [CVE-2019-0655] [CVE-2019-0642]

    pleath authored and MikeHolman committed Feb 7, 2019
    Configuration menu
    Copy the full SHA
    65f1bfe View commit details
    Browse the repository at this point in the history
  8. [CVE-2019-0590]

    pleath authored and MikeHolman committed Feb 7, 2019
    Configuration menu
    Copy the full SHA
    9c4772f View commit details
    Browse the repository at this point in the history
  9. [CVE-2019-0593]

    pleath authored and MikeHolman committed Feb 7, 2019
    Configuration menu
    Copy the full SHA
    53204ee View commit details
    Browse the repository at this point in the history
  10. [CVE-2019-0605] [CVE-2019-0591]

    pleath authored and MikeHolman committed Feb 7, 2019
    Configuration menu
    Copy the full SHA
    33c0b97 View commit details
    Browse the repository at this point in the history
  11. Configuration menu
    Copy the full SHA
    1a7790f View commit details
    Browse the repository at this point in the history
  12. Configuration menu
    Copy the full SHA
    61e13a6 View commit details
    Browse the repository at this point in the history

Commits on Feb 12, 2019

  1. update version number

    MikeHolman committed Feb 12, 2019
    Configuration menu
    Copy the full SHA
    a54c9cb View commit details
    Browse the repository at this point in the history