Unnamed: 0
int64 0
832k
| id
float64 2.49B
32.1B
| type
stringclasses 1
value | created_at
stringlengths 19
19
| repo
stringlengths 5
112
| repo_url
stringlengths 34
141
| action
stringclasses 3
values | title
stringlengths 1
757
| labels
stringlengths 4
664
| body
stringlengths 3
261k
| index
stringclasses 10
values | text_combine
stringlengths 96
261k
| label
stringclasses 2
values | text
stringlengths 96
232k
| binary_label
int64 0
1
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
600,323
| 18,293,520,306
|
IssuesEvent
|
2021-10-05 17:51:13
|
phetsims/geometric-optics
|
https://api.github.com/repos/phetsims/geometric-optics
|
closed
|
Second light source can be dragged to the right of the lens.
|
type:bug priority:2-high
|
similar to the object, the movable source of light should have dragbounds.
|
1.0
|
Second light source can be dragged to the right of the lens. - similar to the object, the movable source of light should have dragbounds.
|
non_defect
|
second light source can be dragged to the right of the lens similar to the object the movable source of light should have dragbounds
| 0
|
56,950
| 3,081,221,689
|
IssuesEvent
|
2015-08-22 14:07:06
|
bitfighter/bitfighter
|
https://api.github.com/repos/bitfighter/bitfighter
|
closed
|
/nextmap command
|
019 enhancement imported Priority-Medium
|
_From [watusim...@bitfighter.org](https://code.google.com/u/105427273526970468779/) on November 26, 2012 03:07:25_
A /nextmap feature to determine what the next map will be would be quite helpful
_Original issue: http://code.google.com/p/bitfighter/issues/detail?id=178_
|
1.0
|
/nextmap command - _From [watusim...@bitfighter.org](https://code.google.com/u/105427273526970468779/) on November 26, 2012 03:07:25_
A /nextmap feature to determine what the next map will be would be quite helpful
_Original issue: http://code.google.com/p/bitfighter/issues/detail?id=178_
|
non_defect
|
nextmap command from on november a nextmap feature to determine what the next map will be would be quite helpful original issue
| 0
|
26,388
| 4,690,897,794
|
IssuesEvent
|
2016-10-11 08:39:17
|
primefaces/primeng
|
https://api.github.com/repos/primefaces/primeng
|
closed
|
On click of accordion icon Nothing happening
|
defect
|
Here http://www.primefaces.org/primeng/#/accordion when i click on triangle button no event occurs
|
1.0
|
On click of accordion icon Nothing happening - Here http://www.primefaces.org/primeng/#/accordion when i click on triangle button no event occurs
|
defect
|
on click of accordion icon nothing happening here when i click on triangle button no event occurs
| 1
|
32,437
| 6,792,937,790
|
IssuesEvent
|
2017-11-01 03:54:05
|
FoldingAtHome/fah-issues
|
https://api.github.com/repos/FoldingAtHome/fah-issues
|
closed
|
0xa7 adds multiple ``-nt #`` arguments when reducing thread count
|
defect Gromacs Core
|
I was successfully running with CPU:6. I wanted to reduce it so I updated the slot and here's what happened: (edited for brevity)
I happened to choose 5 threads which turned out to be something the client prohibits. I would have been willing to accept CPU:4 instead of CPU:5, but the current software creates an unnecessary error.
When the client adjusts the number of threads specified, DO NOT insert -nt a second time. That' crashes a perfectly good WU.
21:26:58:WU03:FS00:0xa7:Caught signal SIGINT(2) on PID 20329
21:26:58:WU03:FS00:0xa7:Exiting, please wait. . .
21:27:00:WU03:FS00:0xa7:Folding@home Core Shutdown: INTERRUPTED
21:27:00:WU03:FS00:FahCore returned: INTERRUPTED (102 = 0x66)
21:27:01:WU03:FS00:Starting
21:27:01:WARNING:WU03:FS00:Changed SMP threads from 6 to 5 this can cause some work units to fail
21:27:01:WU03:FS00:Running FahCore: /usr/bin/FAHCoreWrapper /var/lib/fahclient/cores/fahwebx.stanford.edu/cores/Linux/AMD64/beta/Core_a7.fah/FahCore_a7 -dir 03 -suffix 01 -version 704 -lifeline 2516 -checkpoint 15 -np 5
21:27:01:WU03:FS00:FahCore 0xa7 started
21:27:01:WU03:FS00:0xa7:************************** Gromacs Folding@home Core ***************************
21:27:01:WU03:FS00:0xa7: Type: 0xa7
21:27:01:WU03:FS00:0xa7: Args: -dir 03 -suffix 01 -version 704 -lifeline 21098 -checkpoint 15 -np
21:27:01:WU03:FS00:0xa7: 5
21:27:01:WU03:FS00:0xa7: Config: <none>
21:27:01:WU03:FS00:0xa7:************************************ Build *************************************
21:27:01:WU03:FS00:0xa7: Version: 0.0.11
21:27:01:WU03:FS00:0xa7: Repository: Git
21:27:01:WU03:FS00:0xa7: Revision: 957bd90e68d95ddcf1594dc15ff6c64cc4555146
21:27:01:WU03:FS00:0xa7: Branch: master
21:27:01:WU03:FS00:0xa7: Bits: 64
21:27:01:WU03:FS00:0xa7: Mode: Release
21:27:01:WU03:FS00:0xa7: SIMD: sse2
21:27:01:WU03:FS00:0xa7:************************************ System ************************************
21:27:01:WU03:FS00:0xa7: CPU: Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
21:27:01:WU03:FS00:0xa7: CPU ID: GenuineIntel Family 6 Model 26 Stepping 4
21:27:01:WU03:FS00:0xa7: CPUs: 8
21:27:01:WU03:FS00:0xa7: Memory: 5.82GiB
21:27:01:WU03:FS00:0xa7:Free Memory: 2.79GiB
21:27:01:WU03:FS00:0xa7: Threads: POSIX_THREADS
21:27:01:WU03:FS00:0xa7: OS Version: 3.13
21:27:01:WU03:FS00:0xa7: CWD: /var/lib/fahclient/work
21:27:01:WU03:FS00:0xa7: OS: Linux 3.13.0-107-generic x86_64
21:27:01:WU03:FS00:0xa7: OS Arch: AMD64
21:27:01:WU03:FS00:0xa7:********************************************************************************
21:27:01:WU03:FS00:0xa7:Project: 13800 (Run 0, Clone 95, Gen 17)
21:27:01:WU03:FS00:0xa7:Reducing thread count from 5 to 4 to avoid domain decomposition by a prime number > 3
21:27:01:WU03:FS00:0xa7:Calling: mdrun -s frame17.tpr -o frame17.trr -x frame17.xtc -cpi state.cpt -cpt 15 -nt 4 -nt 4
21:27:01:WU03:FS00:0xa7:ERROR:-------------------------------------------------------
21:27:01:WU03:FS00:0xa7:ERROR:Program GROMACS, VERSION 5.0.4-20160919-669094a-unknown
21:27:01:WU03:FS00:0xa7:ERROR:Source code file: /host/debian-testing-64bit-core-a7-sse-release/gromacs-core/build/gromacs/src/gromacs/commandline/pargs.cpp, line: 680
21:27:01:WU03:FS00:0xa7:ERROR:
21:27:01:WU03:FS00:0xa7:ERROR:Fatal error:
21:27:01:WU03:FS00:0xa7:ERROR:Double command line argument -nt
21:27:01:WU03:FS00:0xa7:ERROR:
21:27:10:WU03:FS00:0xa7:Completed 164470 out of 250000 steps (65%)
21:27:12:WU03:FS00:0xa7:Folding@home Core Shutdown: BAD_WORK_UNIT
21:27:12:WARNING:WU03:FS00:FahCore returned: BAD_WORK_UNIT (114 = 0x72)
|
1.0
|
0xa7 adds multiple ``-nt #`` arguments when reducing thread count - I was successfully running with CPU:6. I wanted to reduce it so I updated the slot and here's what happened: (edited for brevity)
I happened to choose 5 threads which turned out to be something the client prohibits. I would have been willing to accept CPU:4 instead of CPU:5, but the current software creates an unnecessary error.
When the client adjusts the number of threads specified, DO NOT insert -nt a second time. That' crashes a perfectly good WU.
21:26:58:WU03:FS00:0xa7:Caught signal SIGINT(2) on PID 20329
21:26:58:WU03:FS00:0xa7:Exiting, please wait. . .
21:27:00:WU03:FS00:0xa7:Folding@home Core Shutdown: INTERRUPTED
21:27:00:WU03:FS00:FahCore returned: INTERRUPTED (102 = 0x66)
21:27:01:WU03:FS00:Starting
21:27:01:WARNING:WU03:FS00:Changed SMP threads from 6 to 5 this can cause some work units to fail
21:27:01:WU03:FS00:Running FahCore: /usr/bin/FAHCoreWrapper /var/lib/fahclient/cores/fahwebx.stanford.edu/cores/Linux/AMD64/beta/Core_a7.fah/FahCore_a7 -dir 03 -suffix 01 -version 704 -lifeline 2516 -checkpoint 15 -np 5
21:27:01:WU03:FS00:FahCore 0xa7 started
21:27:01:WU03:FS00:0xa7:************************** Gromacs Folding@home Core ***************************
21:27:01:WU03:FS00:0xa7: Type: 0xa7
21:27:01:WU03:FS00:0xa7: Args: -dir 03 -suffix 01 -version 704 -lifeline 21098 -checkpoint 15 -np
21:27:01:WU03:FS00:0xa7: 5
21:27:01:WU03:FS00:0xa7: Config: <none>
21:27:01:WU03:FS00:0xa7:************************************ Build *************************************
21:27:01:WU03:FS00:0xa7: Version: 0.0.11
21:27:01:WU03:FS00:0xa7: Repository: Git
21:27:01:WU03:FS00:0xa7: Revision: 957bd90e68d95ddcf1594dc15ff6c64cc4555146
21:27:01:WU03:FS00:0xa7: Branch: master
21:27:01:WU03:FS00:0xa7: Bits: 64
21:27:01:WU03:FS00:0xa7: Mode: Release
21:27:01:WU03:FS00:0xa7: SIMD: sse2
21:27:01:WU03:FS00:0xa7:************************************ System ************************************
21:27:01:WU03:FS00:0xa7: CPU: Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
21:27:01:WU03:FS00:0xa7: CPU ID: GenuineIntel Family 6 Model 26 Stepping 4
21:27:01:WU03:FS00:0xa7: CPUs: 8
21:27:01:WU03:FS00:0xa7: Memory: 5.82GiB
21:27:01:WU03:FS00:0xa7:Free Memory: 2.79GiB
21:27:01:WU03:FS00:0xa7: Threads: POSIX_THREADS
21:27:01:WU03:FS00:0xa7: OS Version: 3.13
21:27:01:WU03:FS00:0xa7: CWD: /var/lib/fahclient/work
21:27:01:WU03:FS00:0xa7: OS: Linux 3.13.0-107-generic x86_64
21:27:01:WU03:FS00:0xa7: OS Arch: AMD64
21:27:01:WU03:FS00:0xa7:********************************************************************************
21:27:01:WU03:FS00:0xa7:Project: 13800 (Run 0, Clone 95, Gen 17)
21:27:01:WU03:FS00:0xa7:Reducing thread count from 5 to 4 to avoid domain decomposition by a prime number > 3
21:27:01:WU03:FS00:0xa7:Calling: mdrun -s frame17.tpr -o frame17.trr -x frame17.xtc -cpi state.cpt -cpt 15 -nt 4 -nt 4
21:27:01:WU03:FS00:0xa7:ERROR:-------------------------------------------------------
21:27:01:WU03:FS00:0xa7:ERROR:Program GROMACS, VERSION 5.0.4-20160919-669094a-unknown
21:27:01:WU03:FS00:0xa7:ERROR:Source code file: /host/debian-testing-64bit-core-a7-sse-release/gromacs-core/build/gromacs/src/gromacs/commandline/pargs.cpp, line: 680
21:27:01:WU03:FS00:0xa7:ERROR:
21:27:01:WU03:FS00:0xa7:ERROR:Fatal error:
21:27:01:WU03:FS00:0xa7:ERROR:Double command line argument -nt
21:27:01:WU03:FS00:0xa7:ERROR:
21:27:10:WU03:FS00:0xa7:Completed 164470 out of 250000 steps (65%)
21:27:12:WU03:FS00:0xa7:Folding@home Core Shutdown: BAD_WORK_UNIT
21:27:12:WARNING:WU03:FS00:FahCore returned: BAD_WORK_UNIT (114 = 0x72)
|
defect
|
adds multiple nt arguments when reducing thread count i was successfully running with cpu i wanted to reduce it so i updated the slot and here s what happened edited for brevity i happened to choose threads which turned out to be something the client prohibits i would have been willing to accept cpu instead of cpu but the current software creates an unnecessary error when the client adjusts the number of threads specified do not insert nt a second time that crashes a perfectly good wu caught signal sigint on pid exiting please wait folding home core shutdown interrupted fahcore returned interrupted starting warning changed smp threads from to this can cause some work units to fail running fahcore usr bin fahcorewrapper var lib fahclient cores fahwebx stanford edu cores linux beta core fah fahcore dir suffix version lifeline checkpoint np fahcore started gromacs folding home core type args dir suffix version lifeline checkpoint np config build version repository git revision branch master bits mode release simd system cpu intel r core tm cpu cpu id genuineintel family model stepping cpus memory free memory threads posix threads os version cwd var lib fahclient work os linux generic os arch project run clone gen reducing thread count from to to avoid domain decomposition by a prime number calling mdrun s tpr o trr x xtc cpi state cpt cpt nt nt error error program gromacs version unknown error source code file host debian testing core sse release gromacs core build gromacs src gromacs commandline pargs cpp line error error fatal error error double command line argument nt error completed out of steps folding home core shutdown bad work unit warning fahcore returned bad work unit
| 1
|
52,447
| 13,224,732,260
|
IssuesEvent
|
2020-08-17 19:44:02
|
icecube-trac/tix4
|
https://api.github.com/repos/icecube-trac/tix4
|
opened
|
Docs-build Segmentation Fault (Trac #2224)
|
Incomplete Migration Migrated from Trac combo reconstruction defect
|
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/2224">https://code.icecube.wisc.edu/projects/icecube/ticket/2224</a>, reported by amedina</summary>
<p>
```json
{
"status": "closed",
"changetime": "2018-12-11T21:20:15",
"_ts": "1544563215822180",
"description": "While trying to run docs-build an error was reported saying that there was a segmentation fault. Not entirely sure why. \nThis was using python 2.7 and running on my personal computer. ",
"reporter": "amedina",
"cc": "",
"resolution": "wontfix",
"time": "2018-12-11T16:17:04",
"component": "combo reconstruction",
"summary": "Docs-build Segmentation Fault",
"priority": "normal",
"keywords": "",
"milestone": "",
"owner": "",
"type": "defect"
}
```
</p>
</details>
|
1.0
|
Docs-build Segmentation Fault (Trac #2224) - <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/2224">https://code.icecube.wisc.edu/projects/icecube/ticket/2224</a>, reported by amedina</summary>
<p>
```json
{
"status": "closed",
"changetime": "2018-12-11T21:20:15",
"_ts": "1544563215822180",
"description": "While trying to run docs-build an error was reported saying that there was a segmentation fault. Not entirely sure why. \nThis was using python 2.7 and running on my personal computer. ",
"reporter": "amedina",
"cc": "",
"resolution": "wontfix",
"time": "2018-12-11T16:17:04",
"component": "combo reconstruction",
"summary": "Docs-build Segmentation Fault",
"priority": "normal",
"keywords": "",
"milestone": "",
"owner": "",
"type": "defect"
}
```
</p>
</details>
|
defect
|
docs build segmentation fault trac migrated from json status closed changetime ts description while trying to run docs build an error was reported saying that there was a segmentation fault not entirely sure why nthis was using python and running on my personal computer reporter amedina cc resolution wontfix time component combo reconstruction summary docs build segmentation fault priority normal keywords milestone owner type defect
| 1
|
8,487
| 2,611,514,520
|
IssuesEvent
|
2015-02-27 05:50:14
|
chrsmith/hedgewars
|
https://api.github.com/repos/chrsmith/hedgewars
|
closed
|
Associate .hws/.hwd w/ engine fails in 0.9.19-dev
|
auto-migrated Priority-Medium Type-Defect
|
```
Only tested under linux so far.
Go to config, Click on Advanced, Click on Associate file extension
Should succeed, succeeds in 0.9.18, fails in 0.9.19-dev probably related to
commandline rework.
```
Original issue reported on code.google.com by `kyberneticist@gmail.com` on 10 Feb 2013 at 9:37
|
1.0
|
Associate .hws/.hwd w/ engine fails in 0.9.19-dev - ```
Only tested under linux so far.
Go to config, Click on Advanced, Click on Associate file extension
Should succeed, succeeds in 0.9.18, fails in 0.9.19-dev probably related to
commandline rework.
```
Original issue reported on code.google.com by `kyberneticist@gmail.com` on 10 Feb 2013 at 9:37
|
defect
|
associate hws hwd w engine fails in dev only tested under linux so far go to config click on advanced click on associate file extension should succeed succeeds in fails in dev probably related to commandline rework original issue reported on code google com by kyberneticist gmail com on feb at
| 1
|
47,099
| 10,027,602,462
|
IssuesEvent
|
2019-07-17 09:35:28
|
EdenServer/community
|
https://api.github.com/repos/EdenServer/community
|
closed
|
Crafts Don't Get Deleveled After Exceeding 40 Point Limit
|
in-code-review
|
### Checklist
<!--
Don't edit or delete this section, but tick the boxes after you have submitted your issue.
If there are unticked boxes a developer may not address the issue.
Make sure you comply with the checklist and then start writing in the details section below.
-->
- [X] I have searched for existing issues for issues like this one. The issue has not been posted. (Duplicate reports slow down development.)
- [X] I have provided reproducable steps. (No "as the title says" posts please. Provide reproducable steps even if it seems like a waste of time.)
- [X] I have provided my client version in the details. (type /ver into your game window)
### Details
My friend decided that they no longer wanted to pursue alchemy and wanted to level woodworking. However while starting to level woodworking to a point that exceeds their 40 point limit no alchemy levels were lost.

Here are the crafting levels for my friend's character, Ahkosi. You can see that the total levels from alchemy and woodworking exceed 40. I made this bug report at their behest. They talked to a dev and they said to make a report here about it.
version 30181205_0
|
1.0
|
Crafts Don't Get Deleveled After Exceeding 40 Point Limit - ### Checklist
<!--
Don't edit or delete this section, but tick the boxes after you have submitted your issue.
If there are unticked boxes a developer may not address the issue.
Make sure you comply with the checklist and then start writing in the details section below.
-->
- [X] I have searched for existing issues for issues like this one. The issue has not been posted. (Duplicate reports slow down development.)
- [X] I have provided reproducable steps. (No "as the title says" posts please. Provide reproducable steps even if it seems like a waste of time.)
- [X] I have provided my client version in the details. (type /ver into your game window)
### Details
My friend decided that they no longer wanted to pursue alchemy and wanted to level woodworking. However while starting to level woodworking to a point that exceeds their 40 point limit no alchemy levels were lost.

Here are the crafting levels for my friend's character, Ahkosi. You can see that the total levels from alchemy and woodworking exceed 40. I made this bug report at their behest. They talked to a dev and they said to make a report here about it.
version 30181205_0
|
non_defect
|
crafts don t get deleveled after exceeding point limit checklist don t edit or delete this section but tick the boxes after you have submitted your issue if there are unticked boxes a developer may not address the issue make sure you comply with the checklist and then start writing in the details section below i have searched for existing issues for issues like this one the issue has not been posted duplicate reports slow down development i have provided reproducable steps no as the title says posts please provide reproducable steps even if it seems like a waste of time i have provided my client version in the details type ver into your game window details my friend decided that they no longer wanted to pursue alchemy and wanted to level woodworking however while starting to level woodworking to a point that exceeds their point limit no alchemy levels were lost here are the crafting levels for my friend s character ahkosi you can see that the total levels from alchemy and woodworking exceed i made this bug report at their behest they talked to a dev and they said to make a report here about it version
| 0
|
93,845
| 19,346,141,234
|
IssuesEvent
|
2021-12-15 11:00:39
|
SuperTux/supertux
|
https://api.github.com/repos/SuperTux/supertux
|
closed
|
Coins being able to bind into non-existing paths.
|
type:bug priority:medium category:code
|
SuperTux version: 0.6.3 - 1
You can bind a coin's node into a non-existing node, resulting in a continuous crashes, when trying to delete or open the level.
https://user-images.githubusercontent.com/69918580/146048949-2b10173f-eb25-42f6-aee9-0c8c307533cb.mp4
|
1.0
|
Coins being able to bind into non-existing paths. - SuperTux version: 0.6.3 - 1
You can bind a coin's node into a non-existing node, resulting in a continuous crashes, when trying to delete or open the level.
https://user-images.githubusercontent.com/69918580/146048949-2b10173f-eb25-42f6-aee9-0c8c307533cb.mp4
|
non_defect
|
coins being able to bind into non existing paths supertux version you can bind a coin s node into a non existing node resulting in a continuous crashes when trying to delete or open the level
| 0
|
159,387
| 12,474,852,950
|
IssuesEvent
|
2020-05-29 10:25:11
|
aliasrobotics/RVD
|
https://api.github.com/repos/aliasrobotics/RVD
|
closed
|
RVD#2009: Probable insecure usage of temp file/directory., /opt/ros_noetic_ws/src/catkin/test/unit_tests/test_order_packages_cmake_em.py:22
|
bandit bug static analysis testing triage
|
```yaml
{
"id": 2009,
"title": "RVD#2009: Probable insecure usage of temp file/directory., /opt/ros_noetic_ws/src/catkin/test/unit_tests/test_order_packages_cmake_em.py:22",
"type": "bug",
"description": "MEDIUM confidence of MEDIUM severity bug. Probable insecure usage of temp file/directory. at /opt/ros_noetic_ws/src/catkin/test/unit_tests/test_order_packages_cmake_em.py:22 See links for more info on the bug.",
"cwe": "None",
"cve": "None",
"keywords": [
"bandit",
"bug",
"static analysis",
"testing",
"triage",
"bug"
],
"system": "",
"vendor": null,
"severity": {
"rvss-score": 0,
"rvss-vector": "",
"severity-description": "",
"cvss-score": 0,
"cvss-vector": ""
},
"links": [
"https://github.com/aliasrobotics/RVD/issues/2009",
"https://bandit.readthedocs.io/en/latest/plugins/b108_hardcoded_tmp_directory.html"
],
"flaw": {
"phase": "testing",
"specificity": "subject-specific",
"architectural-location": "application-specific",
"application": "N/A",
"subsystem": "N/A",
"package": "N/A",
"languages": "None",
"date-detected": "2020-05-29 (09:11)",
"detected-by": "Alias Robotics",
"detected-by-method": "testing static",
"date-reported": "2020-05-29 (09:11)",
"reported-by": "Alias Robotics",
"reported-by-relationship": "automatic",
"issue": "https://github.com/aliasrobotics/RVD/issues/2009",
"reproducibility": "always",
"trace": "/opt/ros_noetic_ws/src/catkin/test/unit_tests/test_order_packages_cmake_em.py:22",
"reproduction": "See artifacts below (if available)",
"reproduction-image": ""
},
"exploitation": {
"description": "",
"exploitation-image": "",
"exploitation-vector": ""
},
"mitigation": {
"description": "",
"pull-request": "",
"date-mitigation": ""
}
}
```
|
1.0
|
RVD#2009: Probable insecure usage of temp file/directory., /opt/ros_noetic_ws/src/catkin/test/unit_tests/test_order_packages_cmake_em.py:22 - ```yaml
{
"id": 2009,
"title": "RVD#2009: Probable insecure usage of temp file/directory., /opt/ros_noetic_ws/src/catkin/test/unit_tests/test_order_packages_cmake_em.py:22",
"type": "bug",
"description": "MEDIUM confidence of MEDIUM severity bug. Probable insecure usage of temp file/directory. at /opt/ros_noetic_ws/src/catkin/test/unit_tests/test_order_packages_cmake_em.py:22 See links for more info on the bug.",
"cwe": "None",
"cve": "None",
"keywords": [
"bandit",
"bug",
"static analysis",
"testing",
"triage",
"bug"
],
"system": "",
"vendor": null,
"severity": {
"rvss-score": 0,
"rvss-vector": "",
"severity-description": "",
"cvss-score": 0,
"cvss-vector": ""
},
"links": [
"https://github.com/aliasrobotics/RVD/issues/2009",
"https://bandit.readthedocs.io/en/latest/plugins/b108_hardcoded_tmp_directory.html"
],
"flaw": {
"phase": "testing",
"specificity": "subject-specific",
"architectural-location": "application-specific",
"application": "N/A",
"subsystem": "N/A",
"package": "N/A",
"languages": "None",
"date-detected": "2020-05-29 (09:11)",
"detected-by": "Alias Robotics",
"detected-by-method": "testing static",
"date-reported": "2020-05-29 (09:11)",
"reported-by": "Alias Robotics",
"reported-by-relationship": "automatic",
"issue": "https://github.com/aliasrobotics/RVD/issues/2009",
"reproducibility": "always",
"trace": "/opt/ros_noetic_ws/src/catkin/test/unit_tests/test_order_packages_cmake_em.py:22",
"reproduction": "See artifacts below (if available)",
"reproduction-image": ""
},
"exploitation": {
"description": "",
"exploitation-image": "",
"exploitation-vector": ""
},
"mitigation": {
"description": "",
"pull-request": "",
"date-mitigation": ""
}
}
```
|
non_defect
|
rvd probable insecure usage of temp file directory opt ros noetic ws src catkin test unit tests test order packages cmake em py yaml id title rvd probable insecure usage of temp file directory opt ros noetic ws src catkin test unit tests test order packages cmake em py type bug description medium confidence of medium severity bug probable insecure usage of temp file directory at opt ros noetic ws src catkin test unit tests test order packages cmake em py see links for more info on the bug cwe none cve none keywords bandit bug static analysis testing triage bug system vendor null severity rvss score rvss vector severity description cvss score cvss vector links flaw phase testing specificity subject specific architectural location application specific application n a subsystem n a package n a languages none date detected detected by alias robotics detected by method testing static date reported reported by alias robotics reported by relationship automatic issue reproducibility always trace opt ros noetic ws src catkin test unit tests test order packages cmake em py reproduction see artifacts below if available reproduction image exploitation description exploitation image exploitation vector mitigation description pull request date mitigation
| 0
|
613,236
| 19,084,429,165
|
IssuesEvent
|
2021-11-29 02:47:05
|
innohack2021/HotSource
|
https://api.github.com/repos/innohack2021/HotSource
|
closed
|
Enhancement: Object -> JSONObject 로 변환하는 기능 추가
|
Enhancement Priority: high
|
# ISSUE
Object -> JSONObject 로 변환하는 기능 추가
## 종류
- [x] New Feature
## 내용
핵심기능 중 하나인 Object -> JSONObject 로 변환하는 기능 추가
|
1.0
|
Enhancement: Object -> JSONObject 로 변환하는 기능 추가 - # ISSUE
Object -> JSONObject 로 변환하는 기능 추가
## 종류
- [x] New Feature
## 내용
핵심기능 중 하나인 Object -> JSONObject 로 변환하는 기능 추가
|
non_defect
|
enhancement object jsonobject 로 변환하는 기능 추가 issue object jsonobject 로 변환하는 기능 추가 종류 new feature 내용 핵심기능 중 하나인 object jsonobject 로 변환하는 기능 추가
| 0
|
13,805
| 2,784,102,559
|
IssuesEvent
|
2015-05-07 07:14:32
|
sylingd/phpsocks5
|
https://api.github.com/repos/sylingd/phpsocks5
|
closed
|
问题:set_time_limit()函数不可用,
|
auto-migrated Priority-Medium Type-Defect
|
```
Warning: set_time_limit() has been disabled for security reasons in
/home/u566215725/public_html/index.php on line 98 Create tables successfully.
用的是1freehosting的虚拟主机,PHP是应该运行在Apache(真的不��
�懂),,
```
Original issue reported on code.google.com by `litterin...@gmail.com` on 10 Jun 2013 at 6:11
|
1.0
|
问题:set_time_limit()函数不可用, - ```
Warning: set_time_limit() has been disabled for security reasons in
/home/u566215725/public_html/index.php on line 98 Create tables successfully.
用的是1freehosting的虚拟主机,PHP是应该运行在Apache(真的不��
�懂),,
```
Original issue reported on code.google.com by `litterin...@gmail.com` on 10 Jun 2013 at 6:11
|
defect
|
问题:set time limit 函数不可用, warning set time limit has been disabled for security reasons in home public html index php on line create tables successfully ,php是应该运行在apache(真的不�� �懂),, original issue reported on code google com by litterin gmail com on jun at
| 1
|
71,886
| 3,369,164,169
|
IssuesEvent
|
2015-11-23 08:29:55
|
molgenis/molgenis
|
https://api.github.com/repos/molgenis/molgenis
|
closed
|
Tree in model registry contains all entities twice
|
1.13.0-RC bug molgenis-model-registry priority-first
|
- Upload model mage-tab
- Goto Model registry
- Select mage tab
- Tree shows entities twice›

|
1.0
|
Tree in model registry contains all entities twice - - Upload model mage-tab
- Goto Model registry
- Select mage tab
- Tree shows entities twice›

|
non_defect
|
tree in model registry contains all entities twice upload model mage tab goto model registry select mage tab tree shows entities twice›
| 0
|
254,578
| 8,075,419,936
|
IssuesEvent
|
2018-08-07 05:35:23
|
webcompat/web-bugs
|
https://api.github.com/repos/webcompat/web-bugs
|
closed
|
www.google.com - site is not usable
|
browser-firefox-mobile priority-critical
|
<!-- @browser: Firefox Mobile 63.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 8.1.0; Mobile; rv:63.0) Gecko/63.0 Firefox/63.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: https://www.google.com/search?q=firefox+search
**Browser / Version**: Firefox Mobile 63.0
**Operating System**: Android 8.1.0
**Tested Another Browser**: Yes
**Problem type**: Site is not usable
**Description**: google search reports offline, but i can get to any website. duckduckgo does work.
**Steps to Reproduce**:
[](https://webcompat.com/uploads/2018/8/b9b0ac54-34db-4392-91ed-e4b2e598c7ed.jpg)
_From [webcompat.com](https://webcompat.com/) with ❤️_
|
1.0
|
www.google.com - site is not usable - <!-- @browser: Firefox Mobile 63.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 8.1.0; Mobile; rv:63.0) Gecko/63.0 Firefox/63.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: https://www.google.com/search?q=firefox+search
**Browser / Version**: Firefox Mobile 63.0
**Operating System**: Android 8.1.0
**Tested Another Browser**: Yes
**Problem type**: Site is not usable
**Description**: google search reports offline, but i can get to any website. duckduckgo does work.
**Steps to Reproduce**:
[](https://webcompat.com/uploads/2018/8/b9b0ac54-34db-4392-91ed-e4b2e598c7ed.jpg)
_From [webcompat.com](https://webcompat.com/) with ❤️_
|
non_defect
|
site is not usable url browser version firefox mobile operating system android tested another browser yes problem type site is not usable description google search reports offline but i can get to any website duckduckgo does work steps to reproduce from with ❤️
| 0
|
20,969
| 14,265,338,310
|
IssuesEvent
|
2020-11-20 16:59:07
|
LSSTDESC/SprintWeek2020
|
https://api.github.com/repos/LSSTDESC/SprintWeek2020
|
opened
|
[SPRINT] Building TXPipe documentation
|
Infrastructure Sprint New Contributor Friendly TXPipe
|
# Building TXPipe documentation
TXPipe is a great tool, but can be a bit daunting at first, this sprint will aim at setting up a documentation basis that we can build upon progressively.
Contacts: @EiffL @empEvil @joezuntz
Day/Time: TBD, probably getting started early in the week
Main communication channel: @desc-3x2pt
GitHub repo: https://github.com/LSSTDESC/TXPipe
## Goals and deliverable
- [ ] Setup automated doc building on Read The Docs
- [ ] Define strategy for pulling the documentation from individual modules
- [ ] Adding tutorial information in the documentation (e.g. getting started, how to add a new module, how to run the DC2 3x2pt analysis)
## Resources and skills needed
- Skills with python documentation/sphinx.
- Enthusiasm about the documentation :-)
- But more importantly, we are **looking for people who might be interested in learning more about TXPipe, and helping build its documentation is a great way to do that.**
## Detailed description
We will be adding documentation based on Sphinx/ReadTheDocs and make sure all of the information is there for new users to get started simply by following the online information.
|
1.0
|
[SPRINT] Building TXPipe documentation - # Building TXPipe documentation
TXPipe is a great tool, but can be a bit daunting at first, this sprint will aim at setting up a documentation basis that we can build upon progressively.
Contacts: @EiffL @empEvil @joezuntz
Day/Time: TBD, probably getting started early in the week
Main communication channel: @desc-3x2pt
GitHub repo: https://github.com/LSSTDESC/TXPipe
## Goals and deliverable
- [ ] Setup automated doc building on Read The Docs
- [ ] Define strategy for pulling the documentation from individual modules
- [ ] Adding tutorial information in the documentation (e.g. getting started, how to add a new module, how to run the DC2 3x2pt analysis)
## Resources and skills needed
- Skills with python documentation/sphinx.
- Enthusiasm about the documentation :-)
- But more importantly, we are **looking for people who might be interested in learning more about TXPipe, and helping build its documentation is a great way to do that.**
## Detailed description
We will be adding documentation based on Sphinx/ReadTheDocs and make sure all of the information is there for new users to get started simply by following the online information.
|
non_defect
|
building txpipe documentation building txpipe documentation txpipe is a great tool but can be a bit daunting at first this sprint will aim at setting up a documentation basis that we can build upon progressively contacts eiffl empevil joezuntz day time tbd probably getting started early in the week main communication channel desc github repo goals and deliverable setup automated doc building on read the docs define strategy for pulling the documentation from individual modules adding tutorial information in the documentation e g getting started how to add a new module how to run the analysis resources and skills needed skills with python documentation sphinx enthusiasm about the documentation but more importantly we are looking for people who might be interested in learning more about txpipe and helping build its documentation is a great way to do that detailed description we will be adding documentation based on sphinx readthedocs and make sure all of the information is there for new users to get started simply by following the online information
| 0
|
14,582
| 2,829,609,739
|
IssuesEvent
|
2015-05-23 02:06:02
|
awesomebing1/fuzzdb
|
https://api.github.com/repos/awesomebing1/fuzzdb
|
closed
|
http://www.hidesertstar.com/calendar/event_37277644-72fc-11e4-9116-2765dec4afa3.html
|
auto-migrated Priority-Medium Type-Defect
|
```
What steps will reproduce the problem?
1.
2.
3.
http://www.hidesertstar.com/calendar/event_37277644-72fc-11e4-9116-2765dec4afa3.
html
What is the expected output? What do you see instead?
What version of the product are you using? On what operating system?
Please provide any additional information below.
```
Original issue reported on code.google.com by `sabujhos...@gmail.com` on 23 Nov 2014 at 12:49
|
1.0
|
http://www.hidesertstar.com/calendar/event_37277644-72fc-11e4-9116-2765dec4afa3.html - ```
What steps will reproduce the problem?
1.
2.
3.
http://www.hidesertstar.com/calendar/event_37277644-72fc-11e4-9116-2765dec4afa3.
html
What is the expected output? What do you see instead?
What version of the product are you using? On what operating system?
Please provide any additional information below.
```
Original issue reported on code.google.com by `sabujhos...@gmail.com` on 23 Nov 2014 at 12:49
|
defect
|
what steps will reproduce the problem html what is the expected output what do you see instead what version of the product are you using on what operating system please provide any additional information below original issue reported on code google com by sabujhos gmail com on nov at
| 1
|
68,407
| 21,664,144,738
|
IssuesEvent
|
2022-05-07 00:27:42
|
vector-im/element-web
|
https://api.github.com/repos/vector-im/element-web
|
closed
|
[UX][labs] with feature_custom_status some of our users are confused as to if they are setting the status for a room, or global
|
T-Defect P4 A-Custom-Status
|
<!-- A picture's worth a thousand words: PLEASE INCLUDE A SCREENSHOT :P -->
<!-- Please report security issues by email to security@matrix.org -->
<!-- This is a bug report template. By following the instructions below and
filling out the sections with your information, you will help the us to get all
the necessary data to fix your issue.
You can also preview your report before submitting it. You may remove sections
that aren't relevant to your particular case.
Text between <!-- and --> marks will be invisible in the report.
-->
### Description
When setting a custom status, one has to click on the icon that is next to "Send message"

This has led to users asking "am I setting the status for the room I'm in at that point, or for all rooms and users?"
For context, these users come from a jabber/xmpp culture (for example in pidgin client, you had some custom status to choose from).
### Suggestion
Not a UX designer but maybe if the status setting with on the left user icon this confusion would not appear.
### Version information
<!-- IMPORTANT: please answer the following questions, to help us narrow down the problem -->
- **Platform**: web
For the web app:
- **Browser**: Firefox
- **OS**: Ubuntu
- **URL**: private server Element version: 1.7.4
|
1.0
|
[UX][labs] with feature_custom_status some of our users are confused as to if they are setting the status for a room, or global - <!-- A picture's worth a thousand words: PLEASE INCLUDE A SCREENSHOT :P -->
<!-- Please report security issues by email to security@matrix.org -->
<!-- This is a bug report template. By following the instructions below and
filling out the sections with your information, you will help the us to get all
the necessary data to fix your issue.
You can also preview your report before submitting it. You may remove sections
that aren't relevant to your particular case.
Text between <!-- and --> marks will be invisible in the report.
-->
### Description
When setting a custom status, one has to click on the icon that is next to "Send message"

This has led to users asking "am I setting the status for the room I'm in at that point, or for all rooms and users?"
For context, these users come from a jabber/xmpp culture (for example in pidgin client, you had some custom status to choose from).
### Suggestion
Not a UX designer but maybe if the status setting with on the left user icon this confusion would not appear.
### Version information
<!-- IMPORTANT: please answer the following questions, to help us narrow down the problem -->
- **Platform**: web
For the web app:
- **Browser**: Firefox
- **OS**: Ubuntu
- **URL**: private server Element version: 1.7.4
|
defect
|
with feature custom status some of our users are confused as to if they are setting the status for a room or global this is a bug report template by following the instructions below and filling out the sections with your information you will help the us to get all the necessary data to fix your issue you can also preview your report before submitting it you may remove sections that aren t relevant to your particular case text between marks will be invisible in the report description when setting a custom status one has to click on the icon that is next to send message this has led to users asking am i setting the status for the room i m in at that point or for all rooms and users for context these users come from a jabber xmpp culture for example in pidgin client you had some custom status to choose from suggestion not a ux designer but maybe if the status setting with on the left user icon this confusion would not appear version information platform web for the web app browser firefox os ubuntu url private server element version
| 1
|
61,572
| 17,023,728,863
|
IssuesEvent
|
2021-07-03 03:31:36
|
tomhughes/trac-tickets
|
https://api.github.com/repos/tomhughes/trac-tickets
|
closed
|
Multipolygons tagged with name only render yellow
|
Component: osm2pgsql Priority: minor Resolution: fixed Type: defect
|
**[Submitted to the original trac issue database at 1.49pm, Saturday, 2nd July 2011]**
I tried to name parts of a forest and found that Mapnik renders the named parts with a solid yellow background instead of the green forest texture.
The situation is as follows:
* There is a big forest (multipolygon 556678 version 7, name="Buchenberger Wald", landuse=forest)
* There is a named part of it (multipolygon 1630390 version 2, name="Hochbergstelle)
* There is another named part of it (multipolygon 1630391 version 1, name="Schwnde")
* There is a named area (way 12002714752 version 1, name="Schnbuchen", area=yes)
The big forest *Buchenberger Wald'' renders correctly where it does not intersect one of its named parts. Where it intersects with the shown named part ''Hochbergstelle'' its background renders yellowish. The yellow color only appears if the name of the part is tagged using a multipolygon AND Mapnik decides to show the name of the part. The part ''Schwnde* does not cause the yellowish color because Mapnik decides not to show the label.[[BR]]
The named part *Schnbuchen* that does not use a multipolygon for its definition but overlapping ways instead, renders as expected.
**Necessary change to rendering:**[[BR]]
Multipolygons that don't have a style (for example only specify names but no landuse), should be rendered with a transparent background instead of a yellowish background.
Example: http://www.openstreetmap.org/?lat=47.6968&lon=10.1797&zoom=14&layers=M
|
1.0
|
Multipolygons tagged with name only render yellow - **[Submitted to the original trac issue database at 1.49pm, Saturday, 2nd July 2011]**
I tried to name parts of a forest and found that Mapnik renders the named parts with a solid yellow background instead of the green forest texture.
The situation is as follows:
* There is a big forest (multipolygon 556678 version 7, name="Buchenberger Wald", landuse=forest)
* There is a named part of it (multipolygon 1630390 version 2, name="Hochbergstelle)
* There is another named part of it (multipolygon 1630391 version 1, name="Schwnde")
* There is a named area (way 12002714752 version 1, name="Schnbuchen", area=yes)
The big forest *Buchenberger Wald'' renders correctly where it does not intersect one of its named parts. Where it intersects with the shown named part ''Hochbergstelle'' its background renders yellowish. The yellow color only appears if the name of the part is tagged using a multipolygon AND Mapnik decides to show the name of the part. The part ''Schwnde* does not cause the yellowish color because Mapnik decides not to show the label.[[BR]]
The named part *Schnbuchen* that does not use a multipolygon for its definition but overlapping ways instead, renders as expected.
**Necessary change to rendering:**[[BR]]
Multipolygons that don't have a style (for example only specify names but no landuse), should be rendered with a transparent background instead of a yellowish background.
Example: http://www.openstreetmap.org/?lat=47.6968&lon=10.1797&zoom=14&layers=M
|
defect
|
multipolygons tagged with name only render yellow i tried to name parts of a forest and found that mapnik renders the named parts with a solid yellow background instead of the green forest texture the situation is as follows there is a big forest multipolygon version name buchenberger wald landuse forest there is a named part of it multipolygon version name hochbergstelle there is another named part of it multipolygon version name schwnde there is a named area way version name schnbuchen area yes the big forest buchenberger wald renders correctly where it does not intersect one of its named parts where it intersects with the shown named part hochbergstelle its background renders yellowish the yellow color only appears if the name of the part is tagged using a multipolygon and mapnik decides to show the name of the part the part schwnde does not cause the yellowish color because mapnik decides not to show the label the named part schnbuchen that does not use a multipolygon for its definition but overlapping ways instead renders as expected necessary change to rendering multipolygons that don t have a style for example only specify names but no landuse should be rendered with a transparent background instead of a yellowish background example
| 1
|
56,390
| 31,931,237,793
|
IssuesEvent
|
2023-09-19 07:34:44
|
statamic/eloquent-driver
|
https://api.github.com/repos/statamic/eloquent-driver
|
closed
|
Fetching 'Relationships' means fetching 25k+ models?
|
performance
|
So I have a `Product` collection which contains, you guessed it, products. These products can have a `Product Category` which is a taxonomy.
I get these products querying the EntryFacade, and then returning them to a view as `$products`.
Now comes the real kicker, the moment I call a foreach (in the blade) on `$product->product_categories` (the Taxonomy Term field within my Product blueprint), the debugbar tells 71 TermModels are fetched, and about 25302 EntryModels are fetched. Seems a bit excessive to me.
Products will also have tags which it can have a lot more of, so if 1 taxonomy term is a problem, I can't image what about 5 of them will do..
**So I'm left wondering, what am I doing wrong here? Why, when I call the product_categories on the product, are 25k+ records fetched?**
The Statamic install is multisite and supports 5 languages.
I'm very new to Statamic and to the eloquent-driver package as well so if any advice could be as fool-proof as possible that would be great.
Mind you that this query is currently not cached, but caching the query makes such a minimal difference that it does not matter for the question.
Some screenshots and a snippet for clarification:
(cache_ttl is 1 for now)
```
$queryBuilder = Cache::remember('products', ENV('CACHE_TTL', 600), function () use ($collectionHandle) {
return EntryFacade::query()
->where('collection', $collectionHandle) // $collectionHandle == 'products'
->where('published', true)
->where('site', app()->getLocale())
->get();
});
return $queryBuilder;
```
**Database snip (will blur some things):**

**Product blueprint:**


**View debugbar without querying `product_categories` :**

**View debugbar with querying:**

|
True
|
Fetching 'Relationships' means fetching 25k+ models? - So I have a `Product` collection which contains, you guessed it, products. These products can have a `Product Category` which is a taxonomy.
I get these products querying the EntryFacade, and then returning them to a view as `$products`.
Now comes the real kicker, the moment I call a foreach (in the blade) on `$product->product_categories` (the Taxonomy Term field within my Product blueprint), the debugbar tells 71 TermModels are fetched, and about 25302 EntryModels are fetched. Seems a bit excessive to me.
Products will also have tags which it can have a lot more of, so if 1 taxonomy term is a problem, I can't image what about 5 of them will do..
**So I'm left wondering, what am I doing wrong here? Why, when I call the product_categories on the product, are 25k+ records fetched?**
The Statamic install is multisite and supports 5 languages.
I'm very new to Statamic and to the eloquent-driver package as well so if any advice could be as fool-proof as possible that would be great.
Mind you that this query is currently not cached, but caching the query makes such a minimal difference that it does not matter for the question.
Some screenshots and a snippet for clarification:
(cache_ttl is 1 for now)
```
$queryBuilder = Cache::remember('products', ENV('CACHE_TTL', 600), function () use ($collectionHandle) {
return EntryFacade::query()
->where('collection', $collectionHandle) // $collectionHandle == 'products'
->where('published', true)
->where('site', app()->getLocale())
->get();
});
return $queryBuilder;
```
**Database snip (will blur some things):**

**Product blueprint:**


**View debugbar without querying `product_categories` :**

**View debugbar with querying:**

|
non_defect
|
fetching relationships means fetching models so i have a product collection which contains you guessed it products these products can have a product category which is a taxonomy i get these products querying the entryfacade and then returning them to a view as products now comes the real kicker the moment i call a foreach in the blade on product product categories the taxonomy term field within my product blueprint the debugbar tells termmodels are fetched and about entrymodels are fetched seems a bit excessive to me products will also have tags which it can have a lot more of so if taxonomy term is a problem i can t image what about of them will do so i m left wondering what am i doing wrong here why when i call the product categories on the product are records fetched the statamic install is multisite and supports languages i m very new to statamic and to the eloquent driver package as well so if any advice could be as fool proof as possible that would be great mind you that this query is currently not cached but caching the query makes such a minimal difference that it does not matter for the question some screenshots and a snippet for clarification cache ttl is for now querybuilder cache remember products env cache ttl function use collectionhandle return entryfacade query where collection collectionhandle collectionhandle products where published true where site app getlocale get return querybuilder database snip will blur some things product blueprint view debugbar without querying product categories view debugbar with querying
| 0
|
64,390
| 18,537,916,376
|
IssuesEvent
|
2021-10-21 13:26:17
|
vector-im/element-android
|
https://api.github.com/repos/vector-im/element-android
|
opened
|
Room filter does not match on fuzzy strings
|
T-Defect A-Room-List S-Major O-Frequent Z-Community-Testing
|
### Steps to reproduce
1. Join room dialog
2. Search for "Element testing"
3. See only one result, which is not "Element community testing"
### Intended result and actual result
#### What did you expect?
Seeing results for close matches (ranked below exact matches)
#### What happened instead?
Only exact matches are shown
### Your phone model
_No response_
### Operating system version
Android 11
### Application version and app store
Element 1.3.4 (RC)
### Homeserver
_No response_
### Will you send logs?
No
|
1.0
|
Room filter does not match on fuzzy strings - ### Steps to reproduce
1. Join room dialog
2. Search for "Element testing"
3. See only one result, which is not "Element community testing"
### Intended result and actual result
#### What did you expect?
Seeing results for close matches (ranked below exact matches)
#### What happened instead?
Only exact matches are shown
### Your phone model
_No response_
### Operating system version
Android 11
### Application version and app store
Element 1.3.4 (RC)
### Homeserver
_No response_
### Will you send logs?
No
|
defect
|
room filter does not match on fuzzy strings steps to reproduce join room dialog search for element testing see only one result which is not element community testing intended result and actual result what did you expect seeing results for close matches ranked below exact matches what happened instead only exact matches are shown your phone model no response operating system version android application version and app store element rc homeserver no response will you send logs no
| 1
|
37,307
| 15,238,621,849
|
IssuesEvent
|
2021-02-19 02:22:35
|
airavata-courses/scrapbook
|
https://api.github.com/repos/airavata-courses/scrapbook
|
closed
|
Implement REDIS for storing sessions for faster access
|
enhancement session-service
|
Use redis to store `usrid: token`
No change in the routes/behavior of the session service
|
1.0
|
Implement REDIS for storing sessions for faster access - Use redis to store `usrid: token`
No change in the routes/behavior of the session service
|
non_defect
|
implement redis for storing sessions for faster access use redis to store usrid token no change in the routes behavior of the session service
| 0
|
57,314
| 15,730,074,738
|
IssuesEvent
|
2021-03-29 15:31:08
|
danmar/testissues
|
https://api.github.com/repos/danmar/testissues
|
opened
|
False positive: Possible null pointer dereference (fstream pointer) (Trac #295)
|
False positive Incomplete Migration Migrated from Trac defect noone
|
Migrated from https://trac.cppcheck.net/ticket/295
```json
{
"status": "closed",
"changetime": "2009-05-10T06:44:52",
"description": "The code below generates a false positive error message:\n{{{\n[./foo.cxx:14]: (error) Possible null pointer dereference\n}}}\n\ngcc's bits/basic_ios.h defines \"The quick-and-easy status check.\"\n('This allows you to write constructs such as \"if (!a_stream) ...\" and \"while (a_stream) ...\"')\n\n{{{\n#include <string>\n#include <iostream>\n#include <fstream>\nusing namespace std;\n\nint main()\n{\n string line;\n ifstream file(\"foo\");\n\n while (file)\n getline(file, line);\n\n file.close();\n return 0;\n}\n}}}",
"reporter": "mfranz",
"cc": "",
"resolution": "fixed",
"_ts": "1241937892000000",
"component": "False positive",
"summary": "False positive: Possible null pointer dereference (fstream pointer)",
"priority": "",
"keywords": "",
"time": "2009-05-09T09:23:55",
"milestone": "1.32",
"owner": "noone",
"type": "defect"
}
```
|
1.0
|
False positive: Possible null pointer dereference (fstream pointer) (Trac #295) - Migrated from https://trac.cppcheck.net/ticket/295
```json
{
"status": "closed",
"changetime": "2009-05-10T06:44:52",
"description": "The code below generates a false positive error message:\n{{{\n[./foo.cxx:14]: (error) Possible null pointer dereference\n}}}\n\ngcc's bits/basic_ios.h defines \"The quick-and-easy status check.\"\n('This allows you to write constructs such as \"if (!a_stream) ...\" and \"while (a_stream) ...\"')\n\n{{{\n#include <string>\n#include <iostream>\n#include <fstream>\nusing namespace std;\n\nint main()\n{\n string line;\n ifstream file(\"foo\");\n\n while (file)\n getline(file, line);\n\n file.close();\n return 0;\n}\n}}}",
"reporter": "mfranz",
"cc": "",
"resolution": "fixed",
"_ts": "1241937892000000",
"component": "False positive",
"summary": "False positive: Possible null pointer dereference (fstream pointer)",
"priority": "",
"keywords": "",
"time": "2009-05-09T09:23:55",
"milestone": "1.32",
"owner": "noone",
"type": "defect"
}
```
|
defect
|
false positive possible null pointer dereference fstream pointer trac migrated from json status closed changetime description the code below generates a false positive error message n n error possible null pointer dereference n n ngcc s bits basic ios h defines the quick and easy status check n this allows you to write constructs such as if a stream and while a stream n n n include n include n include nusing namespace std n nint main n n string line n ifstream file foo n n while file n getline file line n n file close n return n n reporter mfranz cc resolution fixed ts component false positive summary false positive possible null pointer dereference fstream pointer priority keywords time milestone owner noone type defect
| 1
|
3,333
| 2,610,060,774
|
IssuesEvent
|
2015-02-26 18:17:53
|
chrsmith/jsjsj122
|
https://api.github.com/repos/chrsmith/jsjsj122
|
opened
|
路桥治不育哪里好
|
auto-migrated Priority-Medium Type-Defect
|
```
路桥治不育哪里好【台州五洲生殖医院】24小时健康咨询热线
:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:台州市椒江
区枫南路229号(枫南大转盘旁)乘车线路:乘坐104、108、118、1
98及椒江一金清公交车直达枫南小区,乘坐107、105、109、112、
901、 902公交车到星星广场下车,步行即可到院。
诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,��
�精,无精。包皮包茎,精索静脉曲张,淋病等。
台州五洲生殖医院是台州最大的男科医院,权威专家在线免��
�咨询,拥有专业完善的男科检查治疗设备,严格按照国家标�
��收费。尖端医疗设备,与世界同步。权威专家,成就专业典
范。人性化服务,一切以患者为中心。
看男科就选台州五洲生殖医院,专业男科为男人。
```
-----
Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 7:14
|
1.0
|
路桥治不育哪里好 - ```
路桥治不育哪里好【台州五洲生殖医院】24小时健康咨询热线
:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:台州市椒江
区枫南路229号(枫南大转盘旁)乘车线路:乘坐104、108、118、1
98及椒江一金清公交车直达枫南小区,乘坐107、105、109、112、
901、 902公交车到星星广场下车,步行即可到院。
诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,��
�精,无精。包皮包茎,精索静脉曲张,淋病等。
台州五洲生殖医院是台州最大的男科医院,权威专家在线免��
�咨询,拥有专业完善的男科检查治疗设备,严格按照国家标�
��收费。尖端医疗设备,与世界同步。权威专家,成就专业典
范。人性化服务,一切以患者为中心。
看男科就选台州五洲生殖医院,专业男科为男人。
```
-----
Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 7:14
|
defect
|
路桥治不育哪里好 路桥治不育哪里好【台州五洲生殖医院】 微信号tzwzszyy 医院地址 台州市椒江 (枫南大转盘旁)乘车线路 、 、 、 , 、 、 、 、 、 ,步行即可到院。 诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,�� �精,无精。包皮包茎,精索静脉曲张,淋病等。 台州五洲生殖医院是台州最大的男科医院,权威专家在线免�� �咨询,拥有专业完善的男科检查治疗设备,严格按照国家标� ��收费。尖端医疗设备,与世界同步。权威专家,成就专业典 范。人性化服务,一切以患者为中心。 看男科就选台州五洲生殖医院,专业男科为男人。 original issue reported on code google com by poweragr gmail com on may at
| 1
|
221,858
| 24,661,099,168
|
IssuesEvent
|
2022-10-18 06:44:12
|
xmidt-org/carousel
|
https://api.github.com/repos/xmidt-org/carousel
|
opened
|
CVE-2022-32149 (Medium) detected in golang.org/x/text-v0.3.7
|
security vulnerability
|
## CVE-2022-32149 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>golang.org/x/text-v0.3.7</b></p></summary>
<p></p>
<p>Library home page: <a href="https://proxy.golang.org/golang.org/x/text/@v/v0.3.7.zip">https://proxy.golang.org/golang.org/x/text/@v/v0.3.7.zip</a></p>
<p>
Dependency Hierarchy:
- github.com/spf13/viper-v1.13.0 (Root Library)
- github.com/spf13/afero-v1.8.2
- :x: **golang.org/x/text-v0.3.7** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/xmidt-org/carousel/commit/d4791867bb6dbb4f643366ba3c2a902e5597d8b6">d4791867bb6dbb4f643366ba3c2a902e5597d8b6</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.
<p>Publish Date: 2022-10-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-32149>CVE-2022-32149</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-32149">https://www.cve.org/CVERecord?id=CVE-2022-32149</a></p>
<p>Release Date: 2022-10-14</p>
<p>Fix Resolution: v0.3.8</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2022-32149 (Medium) detected in golang.org/x/text-v0.3.7 - ## CVE-2022-32149 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>golang.org/x/text-v0.3.7</b></p></summary>
<p></p>
<p>Library home page: <a href="https://proxy.golang.org/golang.org/x/text/@v/v0.3.7.zip">https://proxy.golang.org/golang.org/x/text/@v/v0.3.7.zip</a></p>
<p>
Dependency Hierarchy:
- github.com/spf13/viper-v1.13.0 (Root Library)
- github.com/spf13/afero-v1.8.2
- :x: **golang.org/x/text-v0.3.7** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/xmidt-org/carousel/commit/d4791867bb6dbb4f643366ba3c2a902e5597d8b6">d4791867bb6dbb4f643366ba3c2a902e5597d8b6</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.
<p>Publish Date: 2022-10-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-32149>CVE-2022-32149</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-32149">https://www.cve.org/CVERecord?id=CVE-2022-32149</a></p>
<p>Release Date: 2022-10-14</p>
<p>Fix Resolution: v0.3.8</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve medium detected in golang org x text cve medium severity vulnerability vulnerable library golang org x text library home page a href dependency hierarchy github com viper root library github com afero x golang org x text vulnerable library found in head commit a href found in base branch main vulnerability details an attacker may cause a denial of service by crafting an accept language header which parseacceptlanguage will take significant time to parse publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
| 0
|
80,243
| 7,743,038,059
|
IssuesEvent
|
2018-05-29 11:31:43
|
cockroachdb/cockroach
|
https://api.github.com/repos/cockroachdb/cockroach
|
closed
|
teamcity: failed tests on master: test/TestTransferRaftLeadership, testrace/TestTransferRaftLeadership
|
A-core-replication C-test-failure O-robot
|
The following tests appear to have failed:
[#682088](https://teamcity.cockroachdb.com/viewLog.html?buildId=682088):
```
--- FAIL: testrace/TestTransferRaftLeadership (45.990s)
soon.go:37: condition failed to evaluate within 45s: expected raft leader be 2; got 1
goroutine 88640 [running]:
runtime/debug.Stack(0xa7a358200, 0xc421b93c68, 0x390e980)
/usr/local/go/src/runtime/debug/stack.go:24 +0xb5
github.com/cockroachdb/cockroach/pkg/testutils.SucceedsSoon(0x39646e0, 0xc421b981e0, 0xc421b93c68)
/go/src/github.com/cockroachdb/cockroach/pkg/testutils/soon.go:38 +0x93
github.com/cockroachdb/cockroach/pkg/storage_test.TestTransferRaftLeadership(0xc421b981e0)
/go/src/github.com/cockroachdb/cockroach/pkg/storage/client_raft_test.go:3430 +0x111a
testing.tRunner(0xc421b981e0, 0x34550a0)
/usr/local/go/src/testing/testing.go:777 +0x16e
created by testing.(*T).Run
/usr/local/go/src/testing/testing.go:824 +0x565
------- Stdout: -------
I180526 14:40:03.086218 88640 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership221946076"
I180526 14:40:03.202345 88640 storage/store.go:1450 [s1] [n1,s1]: failed initial metrics computation: [n1,s1]: system config not yet available
I180526 14:40:03.203715 88640 gossip/gossip.go:333 [n1] NodeDescriptor set to node_id:1 address:<network_field:"tcp" address_field:"127.0.0.1:40451" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:40:03.253206 88640 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership194092683"
W180526 14:40:03.305690 88640 gossip/gossip.go:1293 [n2] no incoming or outgoing connections
I180526 14:40:03.309448 89092 gossip/client.go:129 [n2] started gossip client to 127.0.0.1:40451
I180526 14:40:03.359100 88640 gossip/gossip.go:333 [n2] NodeDescriptor set to node_id:2 address:<network_field:"tcp" address_field:"127.0.0.1:41429" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:40:03.402080 88640 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership150170222"
W180526 14:40:03.444775 88640 gossip/gossip.go:1293 [n3] no incoming or outgoing connections
I180526 14:40:03.453346 89232 gossip/client.go:129 [n3] started gossip client to 127.0.0.1:40451
I180526 14:40:03.493359 88640 gossip/gossip.go:333 [n3] NodeDescriptor set to node_id:3 address:<network_field:"tcp" address_field:"127.0.0.1:43391" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:40:03.547123 89327 storage/replica_command.go:863 [s1,r1/1:/M{in-ax}] initiating a split of this range at key "a" [r2]
I180526 14:40:03.605879 89349 storage/replica_raftstorage.go:520 [s1,r2/1:{a-/Max}] generated preemptive snapshot 865aeaa2 at index 11
I180526 14:40:03.614706 89349 storage/store_snapshot.go:605 [s1,r2/1:{a-/Max}] streamed snapshot to (n2,s2):?: kv pairs: 40, log entries: 1, rate-limit: 2.0 MiB/sec, 7ms
I180526 14:40:03.617774 89147 storage/replica_raftstorage.go:730 [s2,r2/?:{-}] applying preemptive snapshot at index 11 (id=865aeaa2, encoded size=7281, 1 rocksdb batches, 1 log entries)
I180526 14:40:03.623003 89147 storage/replica_raftstorage.go:736 [s2,r2/?:{a-/Max}] applied preemptive snapshot in 5ms [clear=0ms batch=0ms entries=1ms commit=3ms]
I180526 14:40:03.627843 89349 storage/replica_command.go:1777 [s1,r2/1:{a-/Max}] change replicas (ADD_REPLICA (n2,s2):2): read existing descriptor r2:{a-/Max} [(n1,s1):1, next=2]
I180526 14:40:03.648584 89351 storage/replica.go:3320 [txn=9f87ac98,s1,r2/1:{a-/Max}] proposing ADD_REPLICA((n2,s2):2): updated=[(n1,s1):1 (n2,s2):2] next=3
I180526 14:40:03.666960 89366 storage/replica_raftstorage.go:520 [s1,r2/1:{a-/Max}] generated preemptive snapshot 4b0b993c at index 14
I180526 14:40:03.672738 89366 storage/store_snapshot.go:605 [s1,r2/1:{a-/Max}] streamed snapshot to (n3,s3):?: kv pairs: 42, log entries: 4, rate-limit: 2.0 MiB/sec, 4ms
I180526 14:40:03.676226 89193 storage/replica_raftstorage.go:730 [s3,r2/?:{-}] applying preemptive snapshot at index 14 (id=4b0b993c, encoded size=8176, 1 rocksdb batches, 4 log entries)
I180526 14:40:03.677169 89289 storage/raft_transport.go:459 raft transport stream to node 1 established
I180526 14:40:03.681370 89193 storage/replica_raftstorage.go:736 [s3,r2/?:{a-/Max}] applied preemptive snapshot in 5ms [clear=0ms batch=0ms entries=1ms commit=3ms]
I180526 14:40:03.687115 89366 storage/replica_command.go:1777 [s1,r2/1:{a-/Max}] change replicas (ADD_REPLICA (n3,s3):3): read existing descriptor r2:{a-/Max} [(n1,s1):1, (n2,s2):2, next=3]
I180526 14:40:03.716309 89150 storage/replica.go:3320 [txn=3f3e5825,s1,r2/1:{a-/Max}] proposing ADD_REPLICA((n3,s3):3): updated=[(n1,s1):1 (n2,s2):2 (n3,s3):3] next=4
I180526 14:40:03.777484 88640 storage/client_test.go:1237 test clock advanced to: 60000.000000125,0
I180526 14:40:03.794182 89105 storage/replica_proposal.go:202 [s2,r2/2:{a-/Max}] new range lease repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,5 following repl=(n1,s1):1 seq=1 start=0.000000000,0 exp=30000.000000123,5 pro=0.000000123,6
I180526 14:40:03.890133 89113 storage/replica_proposal.go:202 [s2,r2/2:{a-/Max}] new range lease repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,13 following repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,5
I180526 14:40:33.915344 89091 gossip/gossip.go:1307 [n2] node has connected to cluster via gossip
I180526 14:40:36.408133 89231 gossip/gossip.go:1307 [n3] node has connected to cluster via gossip
I180526 14:40:38.042139 88982 gossip/gossip.go:1307 [n1] node has connected to cluster via gossip
W180526 14:40:49.055619 89367 storage/raft_transport.go:465 raft transport stream to node 2 failed: EOF
I180526 14:40:49.059254 89416 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership221946076"
I180526 14:40:49.060399 89416 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership194092683"
I180526 14:40:49.061371 89416 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership150170222"
--- FAIL: test/TestTransferRaftLeadership (46.290s)
------- Stdout: -------
I180526 14:25:43.323045 84016 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership765491343"
I180526 14:25:43.350128 84016 storage/store.go:1450 [s1] [n1,s1]: failed initial metrics computation: [n1,s1]: system config not yet available
I180526 14:25:43.350212 84016 gossip/gossip.go:333 [n1] NodeDescriptor set to node_id:1 address:<network_field:"tcp" address_field:"127.0.0.1:36161" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:25:43.362122 84016 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership342376098"
W180526 14:25:43.382835 84016 gossip/gossip.go:1293 [n2] no incoming or outgoing connections
I180526 14:25:43.383197 84278 gossip/client.go:129 [n2] started gossip client to 127.0.0.1:36161
I180526 14:25:43.386318 84016 gossip/gossip.go:333 [n2] NodeDescriptor set to node_id:2 address:<network_field:"tcp" address_field:"127.0.0.1:32981" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:25:43.394793 84016 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership341889945"
W180526 14:25:43.416305 84016 gossip/gossip.go:1293 [n3] no incoming or outgoing connections
I180526 14:25:43.416573 84525 gossip/client.go:129 [n3] started gossip client to 127.0.0.1:36161
I180526 14:25:43.420048 84016 gossip/gossip.go:333 [n3] NodeDescriptor set to node_id:3 address:<network_field:"tcp" address_field:"127.0.0.1:42407" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:25:43.434567 84665 storage/replica_command.go:863 [s1,r1/1:/M{in-ax}] initiating a split of this range at key "a" [r2]
I180526 14:25:43.444063 84574 storage/replica_raftstorage.go:520 [s1,r2/1:{a-/Max}] generated preemptive snapshot 3e63255b at index 11
I180526 14:25:43.444806 84574 storage/store_snapshot.go:605 [s1,r2/1:{a-/Max}] streamed snapshot to (n2,s2):?: kv pairs: 40, log entries: 1, rate-limit: 2.0 MiB/sec, 1ms
I180526 14:25:43.445096 84646 storage/replica_raftstorage.go:730 [s2,r2/?:{-}] applying preemptive snapshot at index 11 (id=3e63255b, encoded size=7281, 1 rocksdb batches, 1 log entries)
I180526 14:25:43.448112 84646 storage/replica_raftstorage.go:736 [s2,r2/?:{a-/Max}] applied preemptive snapshot in 3ms [clear=0ms batch=0ms entries=0ms commit=3ms]
I180526 14:25:43.448687 84574 storage/replica_command.go:1777 [s1,r2/1:{a-/Max}] change replicas (ADD_REPLICA (n2,s2):2): read existing descriptor r2:{a-/Max} [(n1,s1):1, next=2]
I180526 14:25:43.454285 84539 storage/replica.go:3320 [txn=d0c3006f,s1,r2/1:{a-/Max}] proposing ADD_REPLICA((n2,s2):2): updated=[(n1,s1):1 (n2,s2):2] next=3
I180526 14:25:43.457538 84542 storage/replica_raftstorage.go:520 [s1,r2/1:{a-/Max}] generated preemptive snapshot 34529db9 at index 13
I180526 14:25:43.458284 84542 storage/store_snapshot.go:605 [s1,r2/1:{a-/Max}] streamed snapshot to (n3,s3):?: kv pairs: 42, log entries: 3, rate-limit: 2.0 MiB/sec, 1ms
I180526 14:25:43.458678 84410 storage/replica_raftstorage.go:730 [s3,r2/?:{-}] applying preemptive snapshot at index 13 (id=34529db9, encoded size=8159, 1 rocksdb batches, 3 log entries)
I180526 14:25:43.461001 84413 storage/raft_transport.go:459 raft transport stream to node 1 established
I180526 14:25:43.462661 84410 storage/replica_raftstorage.go:736 [s3,r2/?:{a-/Max}] applied preemptive snapshot in 4ms [clear=0ms batch=0ms entries=0ms commit=4ms]
I180526 14:25:43.463047 84542 storage/replica_command.go:1777 [s1,r2/1:{a-/Max}] change replicas (ADD_REPLICA (n3,s3):3): read existing descriptor r2:{a-/Max} [(n1,s1):1, (n2,s2):2, next=3]
I180526 14:25:43.471399 84676 storage/replica.go:3320 [txn=9a68b0d8,s1,r2/1:{a-/Max}] proposing ADD_REPLICA((n3,s3):3): updated=[(n1,s1):1 (n2,s2):2 (n3,s3):3] next=4
I180526 14:25:43.489561 84016 storage/client_test.go:1237 test clock advanced to: 60000.000000125,0
I180526 14:25:43.493453 84430 storage/replica_proposal.go:202 [s2,r2/2:{a-/Max}] new range lease repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,5 following repl=(n1,s1):1 seq=1 start=0.000000000,0 exp=30000.000000123,5 pro=0.000000123,6
I180526 14:25:43.507690 84434 storage/replica_proposal.go:202 [s2,r2/2:{a-/Max}] new range lease repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,14 following repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,5
W180526 14:25:43.559431 84417 storage/raft_transport.go:285 unable to accept Raft message from (n2,s2):2: no handler registered for (n1,s1):1
W180526 14:25:43.559648 84415 storage/store.go:3530 [s2,r2/2:{a-/Max}] raft error: node 1 claims to not contain store 1 for replica (n1,s1):1: store 1 was not found
W180526 14:25:43.559673 84413 storage/raft_transport.go:465 raft transport stream to node 1 failed: store 1 was not found
W180526 14:25:43.560420 84693 storage/raft_transport.go:465 raft transport stream to node 3 failed: rpc error: code = Unavailable desc = transport is closing
I180526 14:25:43.561122 84189 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership765491343"
I180526 14:25:43.561417 84189 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership342376098"
I180526 14:25:43.561613 84189 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership341889945"soon.go:37: condition failed to evaluate within 45s: expected raft leader be 2; got 1
goroutine 88640 [running]:
runtime/debug.Stack(0xa7a358200, 0xc421b93c68, 0x390e980)
/usr/local/go/src/runtime/debug/stack.go:24 +0xb5
github.com/cockroachdb/cockroach/pkg/testutils.SucceedsSoon(0x39646e0, 0xc421b981e0, 0xc421b93c68)
/go/src/github.com/cockroachdb/cockroach/pkg/testutils/soon.go:38 +0x93
github.com/cockroachdb/cockroach/pkg/storage_test.TestTransferRaftLeadership(0xc421b981e0)
/go/src/github.com/cockroachdb/cockroach/pkg/storage/client_raft_test.go:3430 +0x111a
testing.tRunner(0xc421b981e0, 0x34550a0)
/usr/local/go/src/testing/testing.go:777 +0x16e
created by testing.(*T).Run
/usr/local/go/src/testing/testing.go:824 +0x565
------- Stdout: -------
I180526 14:40:03.086218 88640 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership221946076"
I180526 14:40:03.202345 88640 storage/store.go:1450 [s1] [n1,s1]: failed initial metrics computation: [n1,s1]: system config not yet available
I180526 14:40:03.203715 88640 gossip/gossip.go:333 [n1] NodeDescriptor set to node_id:1 address:<network_field:"tcp" address_field:"127.0.0.1:40451" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:40:03.253206 88640 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership194092683"
W180526 14:40:03.305690 88640 gossip/gossip.go:1293 [n2] no incoming or outgoing connections
I180526 14:40:03.309448 89092 gossip/client.go:129 [n2] started gossip client to 127.0.0.1:40451
I180526 14:40:03.359100 88640 gossip/gossip.go:333 [n2] NodeDescriptor set to node_id:2 address:<network_field:"tcp" address_field:"127.0.0.1:41429" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:40:03.402080 88640 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership150170222"
W180526 14:40:03.444775 88640 gossip/gossip.go:1293 [n3] no incoming or outgoing connections
I180526 14:40:03.453346 89232 gossip/client.go:129 [n3] started gossip client to 127.0.0.1:40451
I180526 14:40:03.493359 88640 gossip/gossip.go:333 [n3] NodeDescriptor set to node_id:3 address:<network_field:"tcp" address_field:"127.0.0.1:43391" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:40:03.547123 89327 storage/replica_command.go:863 [s1,r1/1:/M{in-ax}] initiating a split of this range at key "a" [r2]
I180526 14:40:03.605879 89349 storage/replica_raftstorage.go:520 [s1,r2/1:{a-/Max}] generated preemptive snapshot 865aeaa2 at index 11
I180526 14:40:03.614706 89349 storage/store_snapshot.go:605 [s1,r2/1:{a-/Max}] streamed snapshot to (n2,s2):?: kv pairs: 40, log entries: 1, rate-limit: 2.0 MiB/sec, 7ms
I180526 14:40:03.617774 89147 storage/replica_raftstorage.go:730 [s2,r2/?:{-}] applying preemptive snapshot at index 11 (id=865aeaa2, encoded size=7281, 1 rocksdb batches, 1 log entries)
I180526 14:40:03.623003 89147 storage/replica_raftstorage.go:736 [s2,r2/?:{a-/Max}] applied preemptive snapshot in 5ms [clear=0ms batch=0ms entries=1ms commit=3ms]
I180526 14:40:03.627843 89349 storage/replica_command.go:1777 [s1,r2/1:{a-/Max}] change replicas (ADD_REPLICA (n2,s2):2): read existing descriptor r2:{a-/Max} [(n1,s1):1, next=2]
I180526 14:40:03.648584 89351 storage/replica.go:3320 [txn=9f87ac98,s1,r2/1:{a-/Max}] proposing ADD_REPLICA((n2,s2):2): updated=[(n1,s1):1 (n2,s2):2] next=3
I180526 14:40:03.666960 89366 storage/replica_raftstorage.go:520 [s1,r2/1:{a-/Max}] generated preemptive snapshot 4b0b993c at index 14
I180526 14:40:03.672738 89366 storage/store_snapshot.go:605 [s1,r2/1:{a-/Max}] streamed snapshot to (n3,s3):?: kv pairs: 42, log entries: 4, rate-limit: 2.0 MiB/sec, 4ms
I180526 14:40:03.676226 89193 storage/replica_raftstorage.go:730 [s3,r2/?:{-}] applying preemptive snapshot at index 14 (id=4b0b993c, encoded size=8176, 1 rocksdb batches, 4 log entries)
I180526 14:40:03.677169 89289 storage/raft_transport.go:459 raft transport stream to node 1 established
I180526 14:40:03.681370 89193 storage/replica_raftstorage.go:736 [s3,r2/?:{a-/Max}] applied preemptive snapshot in 5ms [clear=0ms batch=0ms entries=1ms commit=3ms]
I180526 14:40:03.687115 89366 storage/replica_command.go:1777 [s1,r2/1:{a-/Max}] change replicas (ADD_REPLICA (n3,s3):3): read existing descriptor r2:{a-/Max} [(n1,s1):1, (n2,s2):2, next=3]
I180526 14:40:03.716309 89150 storage/replica.go:3320 [txn=3f3e5825,s1,r2/1:{a-/Max}] proposing ADD_REPLICA((n3,s3):3): updated=[(n1,s1):1 (n2,s2):2 (n3,s3):3] next=4
I180526 14:40:03.777484 88640 storage/client_test.go:1237 test clock advanced to: 60000.000000125,0
I180526 14:40:03.794182 89105 storage/replica_proposal.go:202 [s2,r2/2:{a-/Max}] new range lease repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,5 following repl=(n1,s1):1 seq=1 start=0.000000000,0 exp=30000.000000123,5 pro=0.000000123,6
I180526 14:40:03.890133 89113 storage/replica_proposal.go:202 [s2,r2/2:{a-/Max}] new range lease repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,13 following repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,5
I180526 14:40:33.915344 89091 gossip/gossip.go:1307 [n2] node has connected to cluster via gossip
I180526 14:40:36.408133 89231 gossip/gossip.go:1307 [n3] node has connected to cluster via gossip
I180526 14:40:38.042139 88982 gossip/gossip.go:1307 [n1] node has connected to cluster via gossip
W180526 14:40:49.055619 89367 storage/raft_transport.go:465 raft transport stream to node 2 failed: EOF
I180526 14:40:49.059254 89416 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership221946076"
I180526 14:40:49.060399 89416 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership194092683"
I180526 14:40:49.061371 89416 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership150170222"
```
Please assign, take a look and update the issue accordingly.
|
1.0
|
teamcity: failed tests on master: test/TestTransferRaftLeadership, testrace/TestTransferRaftLeadership - The following tests appear to have failed:
[#682088](https://teamcity.cockroachdb.com/viewLog.html?buildId=682088):
```
--- FAIL: testrace/TestTransferRaftLeadership (45.990s)
soon.go:37: condition failed to evaluate within 45s: expected raft leader be 2; got 1
goroutine 88640 [running]:
runtime/debug.Stack(0xa7a358200, 0xc421b93c68, 0x390e980)
/usr/local/go/src/runtime/debug/stack.go:24 +0xb5
github.com/cockroachdb/cockroach/pkg/testutils.SucceedsSoon(0x39646e0, 0xc421b981e0, 0xc421b93c68)
/go/src/github.com/cockroachdb/cockroach/pkg/testutils/soon.go:38 +0x93
github.com/cockroachdb/cockroach/pkg/storage_test.TestTransferRaftLeadership(0xc421b981e0)
/go/src/github.com/cockroachdb/cockroach/pkg/storage/client_raft_test.go:3430 +0x111a
testing.tRunner(0xc421b981e0, 0x34550a0)
/usr/local/go/src/testing/testing.go:777 +0x16e
created by testing.(*T).Run
/usr/local/go/src/testing/testing.go:824 +0x565
------- Stdout: -------
I180526 14:40:03.086218 88640 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership221946076"
I180526 14:40:03.202345 88640 storage/store.go:1450 [s1] [n1,s1]: failed initial metrics computation: [n1,s1]: system config not yet available
I180526 14:40:03.203715 88640 gossip/gossip.go:333 [n1] NodeDescriptor set to node_id:1 address:<network_field:"tcp" address_field:"127.0.0.1:40451" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:40:03.253206 88640 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership194092683"
W180526 14:40:03.305690 88640 gossip/gossip.go:1293 [n2] no incoming or outgoing connections
I180526 14:40:03.309448 89092 gossip/client.go:129 [n2] started gossip client to 127.0.0.1:40451
I180526 14:40:03.359100 88640 gossip/gossip.go:333 [n2] NodeDescriptor set to node_id:2 address:<network_field:"tcp" address_field:"127.0.0.1:41429" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:40:03.402080 88640 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership150170222"
W180526 14:40:03.444775 88640 gossip/gossip.go:1293 [n3] no incoming or outgoing connections
I180526 14:40:03.453346 89232 gossip/client.go:129 [n3] started gossip client to 127.0.0.1:40451
I180526 14:40:03.493359 88640 gossip/gossip.go:333 [n3] NodeDescriptor set to node_id:3 address:<network_field:"tcp" address_field:"127.0.0.1:43391" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:40:03.547123 89327 storage/replica_command.go:863 [s1,r1/1:/M{in-ax}] initiating a split of this range at key "a" [r2]
I180526 14:40:03.605879 89349 storage/replica_raftstorage.go:520 [s1,r2/1:{a-/Max}] generated preemptive snapshot 865aeaa2 at index 11
I180526 14:40:03.614706 89349 storage/store_snapshot.go:605 [s1,r2/1:{a-/Max}] streamed snapshot to (n2,s2):?: kv pairs: 40, log entries: 1, rate-limit: 2.0 MiB/sec, 7ms
I180526 14:40:03.617774 89147 storage/replica_raftstorage.go:730 [s2,r2/?:{-}] applying preemptive snapshot at index 11 (id=865aeaa2, encoded size=7281, 1 rocksdb batches, 1 log entries)
I180526 14:40:03.623003 89147 storage/replica_raftstorage.go:736 [s2,r2/?:{a-/Max}] applied preemptive snapshot in 5ms [clear=0ms batch=0ms entries=1ms commit=3ms]
I180526 14:40:03.627843 89349 storage/replica_command.go:1777 [s1,r2/1:{a-/Max}] change replicas (ADD_REPLICA (n2,s2):2): read existing descriptor r2:{a-/Max} [(n1,s1):1, next=2]
I180526 14:40:03.648584 89351 storage/replica.go:3320 [txn=9f87ac98,s1,r2/1:{a-/Max}] proposing ADD_REPLICA((n2,s2):2): updated=[(n1,s1):1 (n2,s2):2] next=3
I180526 14:40:03.666960 89366 storage/replica_raftstorage.go:520 [s1,r2/1:{a-/Max}] generated preemptive snapshot 4b0b993c at index 14
I180526 14:40:03.672738 89366 storage/store_snapshot.go:605 [s1,r2/1:{a-/Max}] streamed snapshot to (n3,s3):?: kv pairs: 42, log entries: 4, rate-limit: 2.0 MiB/sec, 4ms
I180526 14:40:03.676226 89193 storage/replica_raftstorage.go:730 [s3,r2/?:{-}] applying preemptive snapshot at index 14 (id=4b0b993c, encoded size=8176, 1 rocksdb batches, 4 log entries)
I180526 14:40:03.677169 89289 storage/raft_transport.go:459 raft transport stream to node 1 established
I180526 14:40:03.681370 89193 storage/replica_raftstorage.go:736 [s3,r2/?:{a-/Max}] applied preemptive snapshot in 5ms [clear=0ms batch=0ms entries=1ms commit=3ms]
I180526 14:40:03.687115 89366 storage/replica_command.go:1777 [s1,r2/1:{a-/Max}] change replicas (ADD_REPLICA (n3,s3):3): read existing descriptor r2:{a-/Max} [(n1,s1):1, (n2,s2):2, next=3]
I180526 14:40:03.716309 89150 storage/replica.go:3320 [txn=3f3e5825,s1,r2/1:{a-/Max}] proposing ADD_REPLICA((n3,s3):3): updated=[(n1,s1):1 (n2,s2):2 (n3,s3):3] next=4
I180526 14:40:03.777484 88640 storage/client_test.go:1237 test clock advanced to: 60000.000000125,0
I180526 14:40:03.794182 89105 storage/replica_proposal.go:202 [s2,r2/2:{a-/Max}] new range lease repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,5 following repl=(n1,s1):1 seq=1 start=0.000000000,0 exp=30000.000000123,5 pro=0.000000123,6
I180526 14:40:03.890133 89113 storage/replica_proposal.go:202 [s2,r2/2:{a-/Max}] new range lease repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,13 following repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,5
I180526 14:40:33.915344 89091 gossip/gossip.go:1307 [n2] node has connected to cluster via gossip
I180526 14:40:36.408133 89231 gossip/gossip.go:1307 [n3] node has connected to cluster via gossip
I180526 14:40:38.042139 88982 gossip/gossip.go:1307 [n1] node has connected to cluster via gossip
W180526 14:40:49.055619 89367 storage/raft_transport.go:465 raft transport stream to node 2 failed: EOF
I180526 14:40:49.059254 89416 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership221946076"
I180526 14:40:49.060399 89416 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership194092683"
I180526 14:40:49.061371 89416 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership150170222"
--- FAIL: test/TestTransferRaftLeadership (46.290s)
------- Stdout: -------
I180526 14:25:43.323045 84016 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership765491343"
I180526 14:25:43.350128 84016 storage/store.go:1450 [s1] [n1,s1]: failed initial metrics computation: [n1,s1]: system config not yet available
I180526 14:25:43.350212 84016 gossip/gossip.go:333 [n1] NodeDescriptor set to node_id:1 address:<network_field:"tcp" address_field:"127.0.0.1:36161" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:25:43.362122 84016 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership342376098"
W180526 14:25:43.382835 84016 gossip/gossip.go:1293 [n2] no incoming or outgoing connections
I180526 14:25:43.383197 84278 gossip/client.go:129 [n2] started gossip client to 127.0.0.1:36161
I180526 14:25:43.386318 84016 gossip/gossip.go:333 [n2] NodeDescriptor set to node_id:2 address:<network_field:"tcp" address_field:"127.0.0.1:32981" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:25:43.394793 84016 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership341889945"
W180526 14:25:43.416305 84016 gossip/gossip.go:1293 [n3] no incoming or outgoing connections
I180526 14:25:43.416573 84525 gossip/client.go:129 [n3] started gossip client to 127.0.0.1:36161
I180526 14:25:43.420048 84016 gossip/gossip.go:333 [n3] NodeDescriptor set to node_id:3 address:<network_field:"tcp" address_field:"127.0.0.1:42407" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:25:43.434567 84665 storage/replica_command.go:863 [s1,r1/1:/M{in-ax}] initiating a split of this range at key "a" [r2]
I180526 14:25:43.444063 84574 storage/replica_raftstorage.go:520 [s1,r2/1:{a-/Max}] generated preemptive snapshot 3e63255b at index 11
I180526 14:25:43.444806 84574 storage/store_snapshot.go:605 [s1,r2/1:{a-/Max}] streamed snapshot to (n2,s2):?: kv pairs: 40, log entries: 1, rate-limit: 2.0 MiB/sec, 1ms
I180526 14:25:43.445096 84646 storage/replica_raftstorage.go:730 [s2,r2/?:{-}] applying preemptive snapshot at index 11 (id=3e63255b, encoded size=7281, 1 rocksdb batches, 1 log entries)
I180526 14:25:43.448112 84646 storage/replica_raftstorage.go:736 [s2,r2/?:{a-/Max}] applied preemptive snapshot in 3ms [clear=0ms batch=0ms entries=0ms commit=3ms]
I180526 14:25:43.448687 84574 storage/replica_command.go:1777 [s1,r2/1:{a-/Max}] change replicas (ADD_REPLICA (n2,s2):2): read existing descriptor r2:{a-/Max} [(n1,s1):1, next=2]
I180526 14:25:43.454285 84539 storage/replica.go:3320 [txn=d0c3006f,s1,r2/1:{a-/Max}] proposing ADD_REPLICA((n2,s2):2): updated=[(n1,s1):1 (n2,s2):2] next=3
I180526 14:25:43.457538 84542 storage/replica_raftstorage.go:520 [s1,r2/1:{a-/Max}] generated preemptive snapshot 34529db9 at index 13
I180526 14:25:43.458284 84542 storage/store_snapshot.go:605 [s1,r2/1:{a-/Max}] streamed snapshot to (n3,s3):?: kv pairs: 42, log entries: 3, rate-limit: 2.0 MiB/sec, 1ms
I180526 14:25:43.458678 84410 storage/replica_raftstorage.go:730 [s3,r2/?:{-}] applying preemptive snapshot at index 13 (id=34529db9, encoded size=8159, 1 rocksdb batches, 3 log entries)
I180526 14:25:43.461001 84413 storage/raft_transport.go:459 raft transport stream to node 1 established
I180526 14:25:43.462661 84410 storage/replica_raftstorage.go:736 [s3,r2/?:{a-/Max}] applied preemptive snapshot in 4ms [clear=0ms batch=0ms entries=0ms commit=4ms]
I180526 14:25:43.463047 84542 storage/replica_command.go:1777 [s1,r2/1:{a-/Max}] change replicas (ADD_REPLICA (n3,s3):3): read existing descriptor r2:{a-/Max} [(n1,s1):1, (n2,s2):2, next=3]
I180526 14:25:43.471399 84676 storage/replica.go:3320 [txn=9a68b0d8,s1,r2/1:{a-/Max}] proposing ADD_REPLICA((n3,s3):3): updated=[(n1,s1):1 (n2,s2):2 (n3,s3):3] next=4
I180526 14:25:43.489561 84016 storage/client_test.go:1237 test clock advanced to: 60000.000000125,0
I180526 14:25:43.493453 84430 storage/replica_proposal.go:202 [s2,r2/2:{a-/Max}] new range lease repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,5 following repl=(n1,s1):1 seq=1 start=0.000000000,0 exp=30000.000000123,5 pro=0.000000123,6
I180526 14:25:43.507690 84434 storage/replica_proposal.go:202 [s2,r2/2:{a-/Max}] new range lease repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,14 following repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,5
W180526 14:25:43.559431 84417 storage/raft_transport.go:285 unable to accept Raft message from (n2,s2):2: no handler registered for (n1,s1):1
W180526 14:25:43.559648 84415 storage/store.go:3530 [s2,r2/2:{a-/Max}] raft error: node 1 claims to not contain store 1 for replica (n1,s1):1: store 1 was not found
W180526 14:25:43.559673 84413 storage/raft_transport.go:465 raft transport stream to node 1 failed: store 1 was not found
W180526 14:25:43.560420 84693 storage/raft_transport.go:465 raft transport stream to node 3 failed: rpc error: code = Unavailable desc = transport is closing
I180526 14:25:43.561122 84189 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership765491343"
I180526 14:25:43.561417 84189 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership342376098"
I180526 14:25:43.561613 84189 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership341889945"soon.go:37: condition failed to evaluate within 45s: expected raft leader be 2; got 1
goroutine 88640 [running]:
runtime/debug.Stack(0xa7a358200, 0xc421b93c68, 0x390e980)
/usr/local/go/src/runtime/debug/stack.go:24 +0xb5
github.com/cockroachdb/cockroach/pkg/testutils.SucceedsSoon(0x39646e0, 0xc421b981e0, 0xc421b93c68)
/go/src/github.com/cockroachdb/cockroach/pkg/testutils/soon.go:38 +0x93
github.com/cockroachdb/cockroach/pkg/storage_test.TestTransferRaftLeadership(0xc421b981e0)
/go/src/github.com/cockroachdb/cockroach/pkg/storage/client_raft_test.go:3430 +0x111a
testing.tRunner(0xc421b981e0, 0x34550a0)
/usr/local/go/src/testing/testing.go:777 +0x16e
created by testing.(*T).Run
/usr/local/go/src/testing/testing.go:824 +0x565
------- Stdout: -------
I180526 14:40:03.086218 88640 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership221946076"
I180526 14:40:03.202345 88640 storage/store.go:1450 [s1] [n1,s1]: failed initial metrics computation: [n1,s1]: system config not yet available
I180526 14:40:03.203715 88640 gossip/gossip.go:333 [n1] NodeDescriptor set to node_id:1 address:<network_field:"tcp" address_field:"127.0.0.1:40451" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:40:03.253206 88640 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership194092683"
W180526 14:40:03.305690 88640 gossip/gossip.go:1293 [n2] no incoming or outgoing connections
I180526 14:40:03.309448 89092 gossip/client.go:129 [n2] started gossip client to 127.0.0.1:40451
I180526 14:40:03.359100 88640 gossip/gossip.go:333 [n2] NodeDescriptor set to node_id:2 address:<network_field:"tcp" address_field:"127.0.0.1:41429" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:40:03.402080 88640 storage/engine/rocksdb.go:566 opening rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership150170222"
W180526 14:40:03.444775 88640 gossip/gossip.go:1293 [n3] no incoming or outgoing connections
I180526 14:40:03.453346 89232 gossip/client.go:129 [n3] started gossip client to 127.0.0.1:40451
I180526 14:40:03.493359 88640 gossip/gossip.go:333 [n3] NodeDescriptor set to node_id:3 address:<network_field:"tcp" address_field:"127.0.0.1:43391" > attrs:<> locality:<> ServerVersion:<major_val:0 minor_val:0 patch:0 unstable:0 >
I180526 14:40:03.547123 89327 storage/replica_command.go:863 [s1,r1/1:/M{in-ax}] initiating a split of this range at key "a" [r2]
I180526 14:40:03.605879 89349 storage/replica_raftstorage.go:520 [s1,r2/1:{a-/Max}] generated preemptive snapshot 865aeaa2 at index 11
I180526 14:40:03.614706 89349 storage/store_snapshot.go:605 [s1,r2/1:{a-/Max}] streamed snapshot to (n2,s2):?: kv pairs: 40, log entries: 1, rate-limit: 2.0 MiB/sec, 7ms
I180526 14:40:03.617774 89147 storage/replica_raftstorage.go:730 [s2,r2/?:{-}] applying preemptive snapshot at index 11 (id=865aeaa2, encoded size=7281, 1 rocksdb batches, 1 log entries)
I180526 14:40:03.623003 89147 storage/replica_raftstorage.go:736 [s2,r2/?:{a-/Max}] applied preemptive snapshot in 5ms [clear=0ms batch=0ms entries=1ms commit=3ms]
I180526 14:40:03.627843 89349 storage/replica_command.go:1777 [s1,r2/1:{a-/Max}] change replicas (ADD_REPLICA (n2,s2):2): read existing descriptor r2:{a-/Max} [(n1,s1):1, next=2]
I180526 14:40:03.648584 89351 storage/replica.go:3320 [txn=9f87ac98,s1,r2/1:{a-/Max}] proposing ADD_REPLICA((n2,s2):2): updated=[(n1,s1):1 (n2,s2):2] next=3
I180526 14:40:03.666960 89366 storage/replica_raftstorage.go:520 [s1,r2/1:{a-/Max}] generated preemptive snapshot 4b0b993c at index 14
I180526 14:40:03.672738 89366 storage/store_snapshot.go:605 [s1,r2/1:{a-/Max}] streamed snapshot to (n3,s3):?: kv pairs: 42, log entries: 4, rate-limit: 2.0 MiB/sec, 4ms
I180526 14:40:03.676226 89193 storage/replica_raftstorage.go:730 [s3,r2/?:{-}] applying preemptive snapshot at index 14 (id=4b0b993c, encoded size=8176, 1 rocksdb batches, 4 log entries)
I180526 14:40:03.677169 89289 storage/raft_transport.go:459 raft transport stream to node 1 established
I180526 14:40:03.681370 89193 storage/replica_raftstorage.go:736 [s3,r2/?:{a-/Max}] applied preemptive snapshot in 5ms [clear=0ms batch=0ms entries=1ms commit=3ms]
I180526 14:40:03.687115 89366 storage/replica_command.go:1777 [s1,r2/1:{a-/Max}] change replicas (ADD_REPLICA (n3,s3):3): read existing descriptor r2:{a-/Max} [(n1,s1):1, (n2,s2):2, next=3]
I180526 14:40:03.716309 89150 storage/replica.go:3320 [txn=3f3e5825,s1,r2/1:{a-/Max}] proposing ADD_REPLICA((n3,s3):3): updated=[(n1,s1):1 (n2,s2):2 (n3,s3):3] next=4
I180526 14:40:03.777484 88640 storage/client_test.go:1237 test clock advanced to: 60000.000000125,0
I180526 14:40:03.794182 89105 storage/replica_proposal.go:202 [s2,r2/2:{a-/Max}] new range lease repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,5 following repl=(n1,s1):1 seq=1 start=0.000000000,0 exp=30000.000000123,5 pro=0.000000123,6
I180526 14:40:03.890133 89113 storage/replica_proposal.go:202 [s2,r2/2:{a-/Max}] new range lease repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,13 following repl=(n2,s2):2 seq=2 start=30000.000000123,6 epo=1 pro=60000.000000125,5
I180526 14:40:33.915344 89091 gossip/gossip.go:1307 [n2] node has connected to cluster via gossip
I180526 14:40:36.408133 89231 gossip/gossip.go:1307 [n3] node has connected to cluster via gossip
I180526 14:40:38.042139 88982 gossip/gossip.go:1307 [n1] node has connected to cluster via gossip
W180526 14:40:49.055619 89367 storage/raft_transport.go:465 raft transport stream to node 2 failed: EOF
I180526 14:40:49.059254 89416 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership221946076"
I180526 14:40:49.060399 89416 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership194092683"
I180526 14:40:49.061371 89416 storage/engine/rocksdb.go:699 closing rocksdb instance at "/go/src/github.com/cockroachdb/cockroach/artifacts/TestTransferRaftLeadership150170222"
```
Please assign, take a look and update the issue accordingly.
|
non_defect
|
teamcity failed tests on master test testtransferraftleadership testrace testtransferraftleadership the following tests appear to have failed fail testrace testtransferraftleadership soon go condition failed to evaluate within expected raft leader be got goroutine runtime debug stack usr local go src runtime debug stack go github com cockroachdb cockroach pkg testutils succeedssoon go src github com cockroachdb cockroach pkg testutils soon go github com cockroachdb cockroach pkg storage test testtransferraftleadership go src github com cockroachdb cockroach pkg storage client raft test go testing trunner usr local go src testing testing go created by testing t run usr local go src testing testing go stdout storage engine rocksdb go opening rocksdb instance at go src github com cockroachdb cockroach artifacts storage store go failed initial metrics computation system config not yet available gossip gossip go nodedescriptor set to node id address attrs locality serverversion storage engine rocksdb go opening rocksdb instance at go src github com cockroachdb cockroach artifacts gossip gossip go no incoming or outgoing connections gossip client go started gossip client to gossip gossip go nodedescriptor set to node id address attrs locality serverversion storage engine rocksdb go opening rocksdb instance at go src github com cockroachdb cockroach artifacts gossip gossip go no incoming or outgoing connections gossip client go started gossip client to gossip gossip go nodedescriptor set to node id address attrs locality serverversion storage replica command go initiating a split of this range at key a storage replica raftstorage go generated preemptive snapshot at index storage store snapshot go streamed snapshot to kv pairs log entries rate limit mib sec storage replica raftstorage go applying preemptive snapshot at index id encoded size rocksdb batches log entries storage replica raftstorage go applied preemptive snapshot in storage replica command go change replicas add replica read existing descriptor a max storage replica go proposing add replica updated next storage replica raftstorage go generated preemptive snapshot at index storage store snapshot go streamed snapshot to kv pairs log entries rate limit mib sec storage replica raftstorage go applying preemptive snapshot at index id encoded size rocksdb batches log entries storage raft transport go raft transport stream to node established storage replica raftstorage go applied preemptive snapshot in storage replica command go change replicas add replica read existing descriptor a max storage replica go proposing add replica updated next storage client test go test clock advanced to storage replica proposal go new range lease repl seq start epo pro following repl seq start exp pro storage replica proposal go new range lease repl seq start epo pro following repl seq start epo pro gossip gossip go node has connected to cluster via gossip gossip gossip go node has connected to cluster via gossip gossip gossip go node has connected to cluster via gossip storage raft transport go raft transport stream to node failed eof storage engine rocksdb go closing rocksdb instance at go src github com cockroachdb cockroach artifacts storage engine rocksdb go closing rocksdb instance at go src github com cockroachdb cockroach artifacts storage engine rocksdb go closing rocksdb instance at go src github com cockroachdb cockroach artifacts fail test testtransferraftleadership stdout storage engine rocksdb go opening rocksdb instance at go src github com cockroachdb cockroach artifacts storage store go failed initial metrics computation system config not yet available gossip gossip go nodedescriptor set to node id address attrs locality serverversion storage engine rocksdb go opening rocksdb instance at go src github com cockroachdb cockroach artifacts gossip gossip go no incoming or outgoing connections gossip client go started gossip client to gossip gossip go nodedescriptor set to node id address attrs locality serverversion storage engine rocksdb go opening rocksdb instance at go src github com cockroachdb cockroach artifacts gossip gossip go no incoming or outgoing connections gossip client go started gossip client to gossip gossip go nodedescriptor set to node id address attrs locality serverversion storage replica command go initiating a split of this range at key a storage replica raftstorage go generated preemptive snapshot at index storage store snapshot go streamed snapshot to kv pairs log entries rate limit mib sec storage replica raftstorage go applying preemptive snapshot at index id encoded size rocksdb batches log entries storage replica raftstorage go applied preemptive snapshot in storage replica command go change replicas add replica read existing descriptor a max storage replica go proposing add replica updated next storage replica raftstorage go generated preemptive snapshot at index storage store snapshot go streamed snapshot to kv pairs log entries rate limit mib sec storage replica raftstorage go applying preemptive snapshot at index id encoded size rocksdb batches log entries storage raft transport go raft transport stream to node established storage replica raftstorage go applied preemptive snapshot in storage replica command go change replicas add replica read existing descriptor a max storage replica go proposing add replica updated next storage client test go test clock advanced to storage replica proposal go new range lease repl seq start epo pro following repl seq start exp pro storage replica proposal go new range lease repl seq start epo pro following repl seq start epo pro storage raft transport go unable to accept raft message from no handler registered for storage store go raft error node claims to not contain store for replica store was not found storage raft transport go raft transport stream to node failed store was not found storage raft transport go raft transport stream to node failed rpc error code unavailable desc transport is closing storage engine rocksdb go closing rocksdb instance at go src github com cockroachdb cockroach artifacts storage engine rocksdb go closing rocksdb instance at go src github com cockroachdb cockroach artifacts storage engine rocksdb go closing rocksdb instance at go src github com cockroachdb cockroach artifacts soon go condition failed to evaluate within expected raft leader be got goroutine runtime debug stack usr local go src runtime debug stack go github com cockroachdb cockroach pkg testutils succeedssoon go src github com cockroachdb cockroach pkg testutils soon go github com cockroachdb cockroach pkg storage test testtransferraftleadership go src github com cockroachdb cockroach pkg storage client raft test go testing trunner usr local go src testing testing go created by testing t run usr local go src testing testing go stdout storage engine rocksdb go opening rocksdb instance at go src github com cockroachdb cockroach artifacts storage store go failed initial metrics computation system config not yet available gossip gossip go nodedescriptor set to node id address attrs locality serverversion storage engine rocksdb go opening rocksdb instance at go src github com cockroachdb cockroach artifacts gossip gossip go no incoming or outgoing connections gossip client go started gossip client to gossip gossip go nodedescriptor set to node id address attrs locality serverversion storage engine rocksdb go opening rocksdb instance at go src github com cockroachdb cockroach artifacts gossip gossip go no incoming or outgoing connections gossip client go started gossip client to gossip gossip go nodedescriptor set to node id address attrs locality serverversion storage replica command go initiating a split of this range at key a storage replica raftstorage go generated preemptive snapshot at index storage store snapshot go streamed snapshot to kv pairs log entries rate limit mib sec storage replica raftstorage go applying preemptive snapshot at index id encoded size rocksdb batches log entries storage replica raftstorage go applied preemptive snapshot in storage replica command go change replicas add replica read existing descriptor a max storage replica go proposing add replica updated next storage replica raftstorage go generated preemptive snapshot at index storage store snapshot go streamed snapshot to kv pairs log entries rate limit mib sec storage replica raftstorage go applying preemptive snapshot at index id encoded size rocksdb batches log entries storage raft transport go raft transport stream to node established storage replica raftstorage go applied preemptive snapshot in storage replica command go change replicas add replica read existing descriptor a max storage replica go proposing add replica updated next storage client test go test clock advanced to storage replica proposal go new range lease repl seq start epo pro following repl seq start exp pro storage replica proposal go new range lease repl seq start epo pro following repl seq start epo pro gossip gossip go node has connected to cluster via gossip gossip gossip go node has connected to cluster via gossip gossip gossip go node has connected to cluster via gossip storage raft transport go raft transport stream to node failed eof storage engine rocksdb go closing rocksdb instance at go src github com cockroachdb cockroach artifacts storage engine rocksdb go closing rocksdb instance at go src github com cockroachdb cockroach artifacts storage engine rocksdb go closing rocksdb instance at go src github com cockroachdb cockroach artifacts please assign take a look and update the issue accordingly
| 0
|
327,509
| 24,140,178,555
|
IssuesEvent
|
2022-09-21 14:18:57
|
jrsteensen/OpenHornet
|
https://api.github.com/repos/jrsteensen/OpenHornet
|
closed
|
v1.0.0-beta1 Drawing Package
|
Type: Documentation Category: MCAD Status: Blocked Priority: Critical
|
## UIP
- [ ] Mechanical Drawings
- [ ] OH1A1 - ASSY, UPPER INSTRUMENT PANEL
- [ ] OH1A2 - ASSY, PANEL, MASTER ARM
- [ ] OH1A3 - ASSY, DDI
- [ ] OH1A4 - ASSY, EYEBROW WARNING INDICATOR, LEFT
- [ ] OH1A5 - ASSY, EYEBROW WARNING INDICATOR, RIGHT
- [ ] OH1A6 - ASSY, PANEL, SPIN RECOVERY
- [ ] OH1A8 - ASSY, UPFRONT CONTROL PANEL
- [ ] OH1A8A1 - ASSY, UPFRONT CONTROL PANEL PRIMARY MODULE
- [ ] OH1A8A2 - ASSY, PANEL, HUD
- [ ] OH1A8A3 - ASSY, AP SWITCH MODULE
- [ ] OH1A8A4 - ASSY, HUD BIT BOX
## LIP
- [ ] Mechanical Drawings
- [ ] OH2A1 - ASSY, LOWER INSTRUMENT PANEL
- [ ] OH2A1A1 - ASSY, LIP STRUCTURE
- [ ] OH2A2A1 - ASSY, LEFT LIP MODULE
- [ ] OH2A2A1A1 - ASSY, PANEL, JETT SLEECT
- [ ] OH2A2A1A2 - ASSY, PANEL, IFEI
- [ ] OH2A2A1A3 - ASSY, PANEL, VIDEO RECORD
- [ ] OH2A3A1 - ASSY, AMPCD MODULE
- [ ] OH2A4A1 - ASSY, PANEL, RWR CONTROL
- [ ] OH2A5A1 - ASSY, PANEL, ECM/DISP
- [ ] OH2A6A1 - ASSY, CABIN PRESSURE GAUGE
- [ ] OH2A7A1 - ASSY, STANDBY INSTRUMENT MODULE
## L CONSOLE
- [ ] Mechanical Drawings
- [ ] OH4A1 - ASSY, LEFT CONSOLE
- [ ] OH4A1A1 - ASSY, LEFT CONSOLE STRUCTURE
- [ ] OH4A2A1 - ASSY, LANDING GEAR PANEL
- [ ] OH4A3A1 - ASSY, SELECT JETT PANEL
- [ ] OH4A3A2 - ASSY, PARK BRAKE HANDLE
- [ ] OH4A3A3 - ASSY, BRAKE PRESS GAUGE
- [ ] OH4A4A1 - ASSY, FIRE TEST PANEL
- [ ] OH4A4A2 - ASSY, EXTERNAL LT PANEL
- [ ] OH4A4A3 - ASSY, GEN TIE PANEL
- [ ] OH4A5A1 - ASSY, FUEL PANEL
- [ ] OH4A5A2 - ASSY, APU/ENG CRANK PANEL
- [ ] OH4A6A1 - ASSY, FCS PANEL
- [ ] OH4A7A1 - ASSY, COMM PANEL
- [ ] OH4A7A2 - ASSY, OBOGS PANEL
- [ ] OH4A7A3 - ASSY, MC/HYD PANEL
- [ ] OH4A7A4 - ASSY, ANT SEL PANEL
- [ ] OH4A8A1 - ASSY, LEFT CIRCUIT BREAKERS
- [ ] OH4A8A2 - ASSY, DISPENSE BUTTON
- [ ] OH4A8A3 - ASSY, NUC ENABLE SWITCH
- [ ] OH10A1A1 - ASSY, SIM PWR PANEL
## R CONSOLE
- [ ] Mechanical Drawings
- [ ] OH5A1 - ASSY, RIGHT CONSOLE
- [ ] OH5A1A1 - ASSY, RIGHT CONSOLE STRUCTURE
- [ ] OH5A2A1 - ASSY, HOOK LEVER & INDICATOR
- [ ] OH5A2A2 - ASSY, WING FOLD HANDLE
- [ ] OH5A2A3 - ASSY, AV COOL SWITCH
- [ ] OH5A2A4 - ASSY, RADAR ALTIMETER GAUGE
- [ ] OH5A2A5 - ASSY, HYD PRESS GAUGE
- [ ] OH5A2A6 - ASSY, BUNO PLACARD
- [ ] OH5A2A7 - ASSY, LDG CHKLST PANEL
- [ ] OH5A3A1 - ASSY, CAUTION LIGHT PANEL
- [ ] OH5A4A1 - ASSY, ELEC PANEL
- [ ] OH5A5A1 - ASSY, ECS PANEL
- [ ] OH5A5A2 - ASSY, DEFOG/WINDSHIELD PANEL
- [ ] OH5A6A1 - ASSY, INTR LT PANEL
- [ ] OH5A7A1 - ASSY, SNSR PANEL
- [ ] OH5A8A1 - ASSY, SIM CNTL PANEL
- [ ] OH5A9A1 - ASSY, KY58 PANEL
- [ ] OH5A10A1 - ASSY, RIGHT CIRCUIT BREAKERS
- [ ] OH5A10A2 - ASSY, CANOPY SWITCH
- [ ] OH5A11A1 - ASSY, BULKHEAD INTERCONNECT PANEL
## CENTER TUB
- [ ] Mechanical Drawings
- [ ] OHXXX - ASSY, CENTER TUB
## SEAT v1.5
- [ ] Mechanical Drawings
- [ ] TBD
## THROTTLE
- [ ] Mechanical Drawings
- [ ] OH4A9A1 - ASSY, THROTTLE QUADRANT
- [ ] OH4A9A2 - ASSY, OUTBOARD THROTTLE GRIP
- [ ] OH4A9A3 - ASSY, INBOARD THROTTLE GRIP
## STICK
- [ ] Mechanical Drawings
- [ ] TBD
## TOP LEVEL ASSY
- [ ] Mechanical Drawings
- [ ] OH000-01 - ASSY, OPENHORNET HOME FLIGHT SIMULATOR
- [ ] #255
|
1.0
|
v1.0.0-beta1 Drawing Package - ## UIP
- [ ] Mechanical Drawings
- [ ] OH1A1 - ASSY, UPPER INSTRUMENT PANEL
- [ ] OH1A2 - ASSY, PANEL, MASTER ARM
- [ ] OH1A3 - ASSY, DDI
- [ ] OH1A4 - ASSY, EYEBROW WARNING INDICATOR, LEFT
- [ ] OH1A5 - ASSY, EYEBROW WARNING INDICATOR, RIGHT
- [ ] OH1A6 - ASSY, PANEL, SPIN RECOVERY
- [ ] OH1A8 - ASSY, UPFRONT CONTROL PANEL
- [ ] OH1A8A1 - ASSY, UPFRONT CONTROL PANEL PRIMARY MODULE
- [ ] OH1A8A2 - ASSY, PANEL, HUD
- [ ] OH1A8A3 - ASSY, AP SWITCH MODULE
- [ ] OH1A8A4 - ASSY, HUD BIT BOX
## LIP
- [ ] Mechanical Drawings
- [ ] OH2A1 - ASSY, LOWER INSTRUMENT PANEL
- [ ] OH2A1A1 - ASSY, LIP STRUCTURE
- [ ] OH2A2A1 - ASSY, LEFT LIP MODULE
- [ ] OH2A2A1A1 - ASSY, PANEL, JETT SLEECT
- [ ] OH2A2A1A2 - ASSY, PANEL, IFEI
- [ ] OH2A2A1A3 - ASSY, PANEL, VIDEO RECORD
- [ ] OH2A3A1 - ASSY, AMPCD MODULE
- [ ] OH2A4A1 - ASSY, PANEL, RWR CONTROL
- [ ] OH2A5A1 - ASSY, PANEL, ECM/DISP
- [ ] OH2A6A1 - ASSY, CABIN PRESSURE GAUGE
- [ ] OH2A7A1 - ASSY, STANDBY INSTRUMENT MODULE
## L CONSOLE
- [ ] Mechanical Drawings
- [ ] OH4A1 - ASSY, LEFT CONSOLE
- [ ] OH4A1A1 - ASSY, LEFT CONSOLE STRUCTURE
- [ ] OH4A2A1 - ASSY, LANDING GEAR PANEL
- [ ] OH4A3A1 - ASSY, SELECT JETT PANEL
- [ ] OH4A3A2 - ASSY, PARK BRAKE HANDLE
- [ ] OH4A3A3 - ASSY, BRAKE PRESS GAUGE
- [ ] OH4A4A1 - ASSY, FIRE TEST PANEL
- [ ] OH4A4A2 - ASSY, EXTERNAL LT PANEL
- [ ] OH4A4A3 - ASSY, GEN TIE PANEL
- [ ] OH4A5A1 - ASSY, FUEL PANEL
- [ ] OH4A5A2 - ASSY, APU/ENG CRANK PANEL
- [ ] OH4A6A1 - ASSY, FCS PANEL
- [ ] OH4A7A1 - ASSY, COMM PANEL
- [ ] OH4A7A2 - ASSY, OBOGS PANEL
- [ ] OH4A7A3 - ASSY, MC/HYD PANEL
- [ ] OH4A7A4 - ASSY, ANT SEL PANEL
- [ ] OH4A8A1 - ASSY, LEFT CIRCUIT BREAKERS
- [ ] OH4A8A2 - ASSY, DISPENSE BUTTON
- [ ] OH4A8A3 - ASSY, NUC ENABLE SWITCH
- [ ] OH10A1A1 - ASSY, SIM PWR PANEL
## R CONSOLE
- [ ] Mechanical Drawings
- [ ] OH5A1 - ASSY, RIGHT CONSOLE
- [ ] OH5A1A1 - ASSY, RIGHT CONSOLE STRUCTURE
- [ ] OH5A2A1 - ASSY, HOOK LEVER & INDICATOR
- [ ] OH5A2A2 - ASSY, WING FOLD HANDLE
- [ ] OH5A2A3 - ASSY, AV COOL SWITCH
- [ ] OH5A2A4 - ASSY, RADAR ALTIMETER GAUGE
- [ ] OH5A2A5 - ASSY, HYD PRESS GAUGE
- [ ] OH5A2A6 - ASSY, BUNO PLACARD
- [ ] OH5A2A7 - ASSY, LDG CHKLST PANEL
- [ ] OH5A3A1 - ASSY, CAUTION LIGHT PANEL
- [ ] OH5A4A1 - ASSY, ELEC PANEL
- [ ] OH5A5A1 - ASSY, ECS PANEL
- [ ] OH5A5A2 - ASSY, DEFOG/WINDSHIELD PANEL
- [ ] OH5A6A1 - ASSY, INTR LT PANEL
- [ ] OH5A7A1 - ASSY, SNSR PANEL
- [ ] OH5A8A1 - ASSY, SIM CNTL PANEL
- [ ] OH5A9A1 - ASSY, KY58 PANEL
- [ ] OH5A10A1 - ASSY, RIGHT CIRCUIT BREAKERS
- [ ] OH5A10A2 - ASSY, CANOPY SWITCH
- [ ] OH5A11A1 - ASSY, BULKHEAD INTERCONNECT PANEL
## CENTER TUB
- [ ] Mechanical Drawings
- [ ] OHXXX - ASSY, CENTER TUB
## SEAT v1.5
- [ ] Mechanical Drawings
- [ ] TBD
## THROTTLE
- [ ] Mechanical Drawings
- [ ] OH4A9A1 - ASSY, THROTTLE QUADRANT
- [ ] OH4A9A2 - ASSY, OUTBOARD THROTTLE GRIP
- [ ] OH4A9A3 - ASSY, INBOARD THROTTLE GRIP
## STICK
- [ ] Mechanical Drawings
- [ ] TBD
## TOP LEVEL ASSY
- [ ] Mechanical Drawings
- [ ] OH000-01 - ASSY, OPENHORNET HOME FLIGHT SIMULATOR
- [ ] #255
|
non_defect
|
drawing package uip mechanical drawings assy upper instrument panel assy panel master arm assy ddi assy eyebrow warning indicator left assy eyebrow warning indicator right assy panel spin recovery assy upfront control panel assy upfront control panel primary module assy panel hud assy ap switch module assy hud bit box lip mechanical drawings assy lower instrument panel assy lip structure assy left lip module assy panel jett sleect assy panel ifei assy panel video record assy ampcd module assy panel rwr control assy panel ecm disp assy cabin pressure gauge assy standby instrument module l console mechanical drawings assy left console assy left console structure assy landing gear panel assy select jett panel assy park brake handle assy brake press gauge assy fire test panel assy external lt panel assy gen tie panel assy fuel panel assy apu eng crank panel assy fcs panel assy comm panel assy obogs panel assy mc hyd panel assy ant sel panel assy left circuit breakers assy dispense button assy nuc enable switch assy sim pwr panel r console mechanical drawings assy right console assy right console structure assy hook lever indicator assy wing fold handle assy av cool switch assy radar altimeter gauge assy hyd press gauge assy buno placard assy ldg chklst panel assy caution light panel assy elec panel assy ecs panel assy defog windshield panel assy intr lt panel assy snsr panel assy sim cntl panel assy panel assy right circuit breakers assy canopy switch assy bulkhead interconnect panel center tub mechanical drawings ohxxx assy center tub seat mechanical drawings tbd throttle mechanical drawings assy throttle quadrant assy outboard throttle grip assy inboard throttle grip stick mechanical drawings tbd top level assy mechanical drawings assy openhornet home flight simulator
| 0
|
63,894
| 18,047,936,969
|
IssuesEvent
|
2021-09-19 08:08:54
|
Ogeon/palette
|
https://api.github.com/repos/Ogeon/palette
|
closed
|
Gradient example not working
|
defect
|
<!-- Describe the problem you are experiencing. -->
The gradient example is not working out of the box.
## How To Reproduce
I set up a new cargo binary app and copy-pasted the gradient example. It displays a compilation error.
<!-- How can the problem be reproduced? Minimal example programs that demonstrate the problem are preferred! -->
## Expected Outcome
The example should work.
<!-- How should the example(s) above behave? What is the expected outcome? -->
## Actual Outcome
The example displays a compilation error.
<!-- What happens with the current version? How is it incorrect? Include error messages if there are any. -->
## Additional Details
```toml
# Cargo.toml
[package]
name = "test"
version = "0.1.0"
edition = "2021"
[dependencies]
palette = "0.6.0"
image = "0.23.14"
```
Both stable and nightly rust versions (1.55.0 and 1.57.0).
I use Ubuntu 18.04.
* Cargo.toml entry: <!-- Include any changes to the features -->
* Rust version(s): <!-- Run `rustc -V` if you are not sure -->
* Target platform: <!-- Either your own OS or the `--target some-platform` argument when cross compiling -->
|
1.0
|
Gradient example not working - <!-- Describe the problem you are experiencing. -->
The gradient example is not working out of the box.
## How To Reproduce
I set up a new cargo binary app and copy-pasted the gradient example. It displays a compilation error.
<!-- How can the problem be reproduced? Minimal example programs that demonstrate the problem are preferred! -->
## Expected Outcome
The example should work.
<!-- How should the example(s) above behave? What is the expected outcome? -->
## Actual Outcome
The example displays a compilation error.
<!-- What happens with the current version? How is it incorrect? Include error messages if there are any. -->
## Additional Details
```toml
# Cargo.toml
[package]
name = "test"
version = "0.1.0"
edition = "2021"
[dependencies]
palette = "0.6.0"
image = "0.23.14"
```
Both stable and nightly rust versions (1.55.0 and 1.57.0).
I use Ubuntu 18.04.
* Cargo.toml entry: <!-- Include any changes to the features -->
* Rust version(s): <!-- Run `rustc -V` if you are not sure -->
* Target platform: <!-- Either your own OS or the `--target some-platform` argument when cross compiling -->
|
defect
|
gradient example not working the gradient example is not working out of the box how to reproduce i set up a new cargo binary app and copy pasted the gradient example it displays a compilation error expected outcome the example should work actual outcome the example displays a compilation error additional details toml cargo toml name test version edition palette image both stable and nightly rust versions and i use ubuntu cargo toml entry rust version s target platform
| 1
|
2,673
| 2,607,935,435
|
IssuesEvent
|
2015-02-26 00:28:36
|
chrsmithdemos/minify
|
https://api.github.com/repos/chrsmithdemos/minify
|
closed
|
Not working properly with Https and firefox version2
|
auto-migrated Priority-Medium Type-Defect
|
```
Minify version:
PHP version:
What steps will reproduce the problem?
1. website should be in https
2. Use firefox veresion 2.0.3
3. Looking for future data like 2011 or more
Expected output: It should come with proper manner and style
Actual output: It is not coming properly the style and css not looking good.
Did any unit tests FAIL? (Please do not post the full list)
Please provide any additional information below. If this has to do with URI
rewriting, please include your DOCUMENT_ROOT, the
```
-----
Original issue reported on code.google.com by `manojtiw...@gmail.com` on 9 Dec 2010 at 3:00
|
1.0
|
Not working properly with Https and firefox version2 - ```
Minify version:
PHP version:
What steps will reproduce the problem?
1. website should be in https
2. Use firefox veresion 2.0.3
3. Looking for future data like 2011 or more
Expected output: It should come with proper manner and style
Actual output: It is not coming properly the style and css not looking good.
Did any unit tests FAIL? (Please do not post the full list)
Please provide any additional information below. If this has to do with URI
rewriting, please include your DOCUMENT_ROOT, the
```
-----
Original issue reported on code.google.com by `manojtiw...@gmail.com` on 9 Dec 2010 at 3:00
|
defect
|
not working properly with https and firefox minify version php version what steps will reproduce the problem website should be in https use firefox veresion looking for future data like or more expected output it should come with proper manner and style actual output it is not coming properly the style and css not looking good did any unit tests fail please do not post the full list please provide any additional information below if this has to do with uri rewriting please include your document root the original issue reported on code google com by manojtiw gmail com on dec at
| 1
|
295,752
| 25,502,383,777
|
IssuesEvent
|
2022-11-28 06:06:52
|
microsoft/vscode
|
https://api.github.com/repos/microsoft/vscode
|
opened
|
Test: random branch generation in web
|
testplan-item
|
Refs https://github.com/microsoft/vscode-remote-repositories-github/issues/256
- [ ] Windows
- [ ] macOS
- [ ] Linux
Authors: @joyceerhl
Complexity: 2
---
1. Go to https://insiders.vscode.dev/github/microsoft/vscode
2. Ensure random branch name generation is enabled (by default it's already enabled in workspace settings for the VS Code repo), and ensure you've configured a branch name prefix with `git.branchPrefix`
3. Make a change and commit directly to the main branch
4. Verify you are prompted to create a new branch with a random branch name populated like in desktop
|
1.0
|
Test: random branch generation in web - Refs https://github.com/microsoft/vscode-remote-repositories-github/issues/256
- [ ] Windows
- [ ] macOS
- [ ] Linux
Authors: @joyceerhl
Complexity: 2
---
1. Go to https://insiders.vscode.dev/github/microsoft/vscode
2. Ensure random branch name generation is enabled (by default it's already enabled in workspace settings for the VS Code repo), and ensure you've configured a branch name prefix with `git.branchPrefix`
3. Make a change and commit directly to the main branch
4. Verify you are prompted to create a new branch with a random branch name populated like in desktop
|
non_defect
|
test random branch generation in web refs windows macos linux authors joyceerhl complexity go to ensure random branch name generation is enabled by default it s already enabled in workspace settings for the vs code repo and ensure you ve configured a branch name prefix with git branchprefix make a change and commit directly to the main branch verify you are prompted to create a new branch with a random branch name populated like in desktop
| 0
|
221,434
| 24,630,320,651
|
IssuesEvent
|
2022-10-17 01:01:58
|
Gal-Doron/Django-3.2.10
|
https://api.github.com/repos/Gal-Doron/Django-3.2.10
|
closed
|
CVE-2022-23833 (High) detected in Django-3.2.10-py3-none-any.whl - autoclosed
|
security vulnerability
|
## CVE-2022-23833 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Django-3.2.10-py3-none-any.whl</b></p></summary>
<p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/8f/9c/1ba2005b24cdb443eee5a43ebfa427f7915d6ed68f41484244ae21cd558f/Django-3.2.10-py3-none-any.whl">https://files.pythonhosted.org/packages/8f/9c/1ba2005b24cdb443eee5a43ebfa427f7915d6ed68f41484244ae21cd558f/Django-3.2.10-py3-none-any.whl</a></p>
<p>Path to dependency file: /requirements.txt</p>
<p>Path to vulnerable library: /requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **Django-3.2.10-py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Django-3.2.10/commit/bddf48053283b9cc7308b1b5c97382069e3da0a8">bddf48053283b9cc7308b1b5c97382069e3da0a8</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.
<p>Publish Date: 2022-02-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23833>CVE-2022-23833</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.djangoproject.com/weblog/2022/feb/01/security-releases/">https://www.djangoproject.com/weblog/2022/feb/01/security-releases/</a></p>
<p>Release Date: 2022-02-03</p>
<p>Fix Resolution: Django - 2.2.27,3.2.12,4.0.2</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
|
True
|
CVE-2022-23833 (High) detected in Django-3.2.10-py3-none-any.whl - autoclosed - ## CVE-2022-23833 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Django-3.2.10-py3-none-any.whl</b></p></summary>
<p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/8f/9c/1ba2005b24cdb443eee5a43ebfa427f7915d6ed68f41484244ae21cd558f/Django-3.2.10-py3-none-any.whl">https://files.pythonhosted.org/packages/8f/9c/1ba2005b24cdb443eee5a43ebfa427f7915d6ed68f41484244ae21cd558f/Django-3.2.10-py3-none-any.whl</a></p>
<p>Path to dependency file: /requirements.txt</p>
<p>Path to vulnerable library: /requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **Django-3.2.10-py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Gal-Doron/Django-3.2.10/commit/bddf48053283b9cc7308b1b5c97382069e3da0a8">bddf48053283b9cc7308b1b5c97382069e3da0a8</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.
<p>Publish Date: 2022-02-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23833>CVE-2022-23833</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.djangoproject.com/weblog/2022/feb/01/security-releases/">https://www.djangoproject.com/weblog/2022/feb/01/security-releases/</a></p>
<p>Release Date: 2022-02-03</p>
<p>Fix Resolution: Django - 2.2.27,3.2.12,4.0.2</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
|
non_defect
|
cve high detected in django none any whl autoclosed cve high severity vulnerability vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch main vulnerability details an issue was discovered in multipartparser in django before before and before passing certain inputs to multipart forms could result in an infinite loop when parsing files publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution django rescue worker helmet automatic remediation is available for this issue
| 0
|
51,775
| 13,211,304,856
|
IssuesEvent
|
2020-08-15 22:10:47
|
icecube-trac/tix4
|
https://api.github.com/repos/icecube-trac/tix4
|
opened
|
sandbox - Gen2_Simple_Recos.py syntax error (Trac #1023)
|
Incomplete Migration Migrated from Trac defect other
|
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1023">https://code.icecube.wisc.edu/projects/icecube/ticket/1023</a>, reported by jdiercksand owned by chaack</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2015-06-18T21:00:17",
"_ts": "1434661217957580",
"description": "Located an issue when trying to run on Gen2_Simple_Recos.py on appropriate files.\n\nreceiving the following error:\nAttributeError: 'I3MCTree' object has no attribute 'most_energetic_muon'\n\nWe fixed locally for our purposes by changing this line:\nframe[\"MostEnergeticMuon\"] = frame[\"I3MCTree\"].most_energetic_muon\nto:\nframe[\"MostEnergeticMuon\u201d] = dataclasses.get_most_energetic_muon(frame[\u201cI3MCTree\u201d])\n\nThis appears to be working well with no abnormal behavior and it may be worth fixing in the sandbox as well (or if a more appropriate syntax exists, superb!)",
"reporter": "jdiercks",
"cc": "",
"resolution": "fixed",
"time": "2015-06-18T18:14:43",
"component": "other",
"summary": "sandbox - Gen2_Simple_Recos.py syntax error",
"priority": "minor",
"keywords": "Gen2-Scripts",
"milestone": "",
"owner": "chaack",
"type": "defect"
}
```
</p>
</details>
|
1.0
|
sandbox - Gen2_Simple_Recos.py syntax error (Trac #1023) - <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1023">https://code.icecube.wisc.edu/projects/icecube/ticket/1023</a>, reported by jdiercksand owned by chaack</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2015-06-18T21:00:17",
"_ts": "1434661217957580",
"description": "Located an issue when trying to run on Gen2_Simple_Recos.py on appropriate files.\n\nreceiving the following error:\nAttributeError: 'I3MCTree' object has no attribute 'most_energetic_muon'\n\nWe fixed locally for our purposes by changing this line:\nframe[\"MostEnergeticMuon\"] = frame[\"I3MCTree\"].most_energetic_muon\nto:\nframe[\"MostEnergeticMuon\u201d] = dataclasses.get_most_energetic_muon(frame[\u201cI3MCTree\u201d])\n\nThis appears to be working well with no abnormal behavior and it may be worth fixing in the sandbox as well (or if a more appropriate syntax exists, superb!)",
"reporter": "jdiercks",
"cc": "",
"resolution": "fixed",
"time": "2015-06-18T18:14:43",
"component": "other",
"summary": "sandbox - Gen2_Simple_Recos.py syntax error",
"priority": "minor",
"keywords": "Gen2-Scripts",
"milestone": "",
"owner": "chaack",
"type": "defect"
}
```
</p>
</details>
|
defect
|
sandbox simple recos py syntax error trac migrated from json status closed changetime ts description located an issue when trying to run on simple recos py on appropriate files n nreceiving the following error nattributeerror object has no attribute most energetic muon n nwe fixed locally for our purposes by changing this line nframe frame most energetic muon nto nframe dataclasses get most energetic muon frame n nthis appears to be working well with no abnormal behavior and it may be worth fixing in the sandbox as well or if a more appropriate syntax exists superb reporter jdiercks cc resolution fixed time component other summary sandbox simple recos py syntax error priority minor keywords scripts milestone owner chaack type defect
| 1
|
80,633
| 30,452,120,509
|
IssuesEvent
|
2023-07-16 12:36:24
|
vector-im/element-android
|
https://api.github.com/repos/vector-im/element-android
|
opened
|
There are unverified devices in this room, for all rooms
|
T-Defect
|
### Steps to reproduce
1. Have an encrypted room
2. Enable "Never send encrypted messages to unverified sessions in this room" in Element Android
### Outcome
#### What did you expect?
No warning
#### What happened instead?
"There are unverified devices in this room, they won’t be able to decrypt messages you send". But looking in "people", all users and devices in the room are shown as verified. This happens for all my rooms.
### Your phone model
Oneplus 8T
### Operating system version
Android 13
### Application version and app store
Eelement 1.6.3 [40106032] (G-f5f4d4a3) from Play Store
### Homeserver
Synapse 1.87.0
### Will you send logs?
Yes
### Are you willing to provide a PR?
No
|
1.0
|
There are unverified devices in this room, for all rooms - ### Steps to reproduce
1. Have an encrypted room
2. Enable "Never send encrypted messages to unverified sessions in this room" in Element Android
### Outcome
#### What did you expect?
No warning
#### What happened instead?
"There are unverified devices in this room, they won’t be able to decrypt messages you send". But looking in "people", all users and devices in the room are shown as verified. This happens for all my rooms.
### Your phone model
Oneplus 8T
### Operating system version
Android 13
### Application version and app store
Eelement 1.6.3 [40106032] (G-f5f4d4a3) from Play Store
### Homeserver
Synapse 1.87.0
### Will you send logs?
Yes
### Are you willing to provide a PR?
No
|
defect
|
there are unverified devices in this room for all rooms steps to reproduce have an encrypted room enable never send encrypted messages to unverified sessions in this room in element android outcome what did you expect no warning what happened instead there are unverified devices in this room they won’t be able to decrypt messages you send but looking in people all users and devices in the room are shown as verified this happens for all my rooms your phone model oneplus operating system version android application version and app store eelement g from play store homeserver synapse will you send logs yes are you willing to provide a pr no
| 1
|
65,518
| 19,559,936,960
|
IssuesEvent
|
2022-01-03 14:56:52
|
vector-im/element-android
|
https://api.github.com/repos/vector-im/element-android
|
opened
|
element freezes on A12 when you have joined large amount of rooms
|
T-Defect
|
### Steps to reproduce
+ be on A12
+ have a long list of rooms (for example log in to your telegram account with a bridge)
+ keep using your phone and apps will start freezing, for me it was my third party launcher and firefox, for another person it was google messages
### Outcome
#### What did you expect?
+ work like it does on <A12
#### What happened instead?
+ my other apps keep freezing and I have to reboot each time
### Your phone model
Poco F1
### Operating system version
Android 12
### Application version and app store
latest element from play store, element nightly
### Homeserver
matrix.tokhmi.xyz
### Will you send logs?
No
|
1.0
|
element freezes on A12 when you have joined large amount of rooms - ### Steps to reproduce
+ be on A12
+ have a long list of rooms (for example log in to your telegram account with a bridge)
+ keep using your phone and apps will start freezing, for me it was my third party launcher and firefox, for another person it was google messages
### Outcome
#### What did you expect?
+ work like it does on <A12
#### What happened instead?
+ my other apps keep freezing and I have to reboot each time
### Your phone model
Poco F1
### Operating system version
Android 12
### Application version and app store
latest element from play store, element nightly
### Homeserver
matrix.tokhmi.xyz
### Will you send logs?
No
|
defect
|
element freezes on when you have joined large amount of rooms steps to reproduce be on have a long list of rooms for example log in to your telegram account with a bridge keep using your phone and apps will start freezing for me it was my third party launcher and firefox for another person it was google messages outcome what did you expect work like it does on what happened instead my other apps keep freezing and i have to reboot each time your phone model poco operating system version android application version and app store latest element from play store element nightly homeserver matrix tokhmi xyz will you send logs no
| 1
|
12,221
| 2,685,514,818
|
IssuesEvent
|
2015-03-30 02:01:41
|
IssueMigrationTest/Test5
|
https://api.github.com/repos/IssueMigrationTest/Test5
|
closed
|
cmp() fallback to rich comparison operators
|
auto-migrated milestone-0.9 Priority-Medium Type-Defect
|
**Issue by jason.mi...@gmail.com**
_16 Jul 2011 at 8:26 GMT_
_Originally opened on Google Code_
----
```
implement the sort semantics of class obj through the __lt__ method.
It's quite common to sort complex obj list
test case:
class inst(object):
def __init__(self, num, opcode='add', pc='1'):
self.opcode = opcode
self.pc = pc
self.num = num
def __lt__( self, other):
return self.num < other.num
def __repr__(self):
return "%d" % self.num
Seq = [inst(3),inst(1),inst(4),inst(2)]
print Seq
print sorted(Seq)
Python output:
[3, 1, 4, 2]
[1, 2, 3, 4]
```
|
1.0
|
cmp() fallback to rich comparison operators - **Issue by jason.mi...@gmail.com**
_16 Jul 2011 at 8:26 GMT_
_Originally opened on Google Code_
----
```
implement the sort semantics of class obj through the __lt__ method.
It's quite common to sort complex obj list
test case:
class inst(object):
def __init__(self, num, opcode='add', pc='1'):
self.opcode = opcode
self.pc = pc
self.num = num
def __lt__( self, other):
return self.num < other.num
def __repr__(self):
return "%d" % self.num
Seq = [inst(3),inst(1),inst(4),inst(2)]
print Seq
print sorted(Seq)
Python output:
[3, 1, 4, 2]
[1, 2, 3, 4]
```
|
defect
|
cmp fallback to rich comparison operators issue by jason mi gmail com jul at gmt originally opened on google code implement the sort semantics of class obj through the lt method it s quite common to sort complex obj list test case class inst object def init self num opcode add pc self opcode opcode self pc pc self num num def lt self other return self num other num def repr self return d self num seq print seq print sorted seq python output
| 1
|
26,487
| 4,729,145,132
|
IssuesEvent
|
2016-10-18 17:52:59
|
Hippocampome-Org/php
|
https://api.github.com/repos/Hippocampome-Org/php
|
opened
|
DWW: The Neuron Name/Synonym search is not returning values as expected
|
defect
|
When I search for the phrase "CA1 chandelier cell," I expect hits on all examples of CA1 (i)2232 Axo-axonic cells (UniqueID 4036) that used that phrase as a synonym. Right now nothing is returned from the search.
|
1.0
|
DWW: The Neuron Name/Synonym search is not returning values as expected - When I search for the phrase "CA1 chandelier cell," I expect hits on all examples of CA1 (i)2232 Axo-axonic cells (UniqueID 4036) that used that phrase as a synonym. Right now nothing is returned from the search.
|
defect
|
dww the neuron name synonym search is not returning values as expected when i search for the phrase chandelier cell i expect hits on all examples of i axo axonic cells uniqueid that used that phrase as a synonym right now nothing is returned from the search
| 1
|
363,686
| 25,461,674,291
|
IssuesEvent
|
2022-11-24 20:07:40
|
proxidize/proxidize-android
|
https://api.github.com/repos/proxidize/proxidize-android
|
closed
|
Using Proxidize Proxy On Crawlee Puppeteer URL
|
documentation question
|
Can I use this proxy in my proxy url when setting up Crawlee Puppeteer?
If Yes, Please Guide.
|
1.0
|
Using Proxidize Proxy On Crawlee Puppeteer URL - Can I use this proxy in my proxy url when setting up Crawlee Puppeteer?
If Yes, Please Guide.
|
non_defect
|
using proxidize proxy on crawlee puppeteer url can i use this proxy in my proxy url when setting up crawlee puppeteer if yes please guide
| 0
|
18,934
| 3,103,940,266
|
IssuesEvent
|
2015-08-31 13:23:37
|
spin6lock/pydnsproxy
|
https://api.github.com/repos/spin6lock/pydnsproxy
|
closed
|
這玩意已經過不了DNS污染了。
|
auto-migrated Priority-Medium Type-Defect
|
```
訪問FB 推 youtue 這些站全部返回假IP
```
Original issue reported on code.google.com by `hack520....@gmail.com` on 31 Aug 2014 at 12:08
|
1.0
|
這玩意已經過不了DNS污染了。 - ```
訪問FB 推 youtue 這些站全部返回假IP
```
Original issue reported on code.google.com by `hack520....@gmail.com` on 31 Aug 2014 at 12:08
|
defect
|
這玩意已經過不了dns污染了。 訪問fb 推 youtue 這些站全部返回假ip original issue reported on code google com by gmail com on aug at
| 1
|
29,075
| 5,523,244,487
|
IssuesEvent
|
2017-03-20 05:25:37
|
night-ghost/open-headtracker
|
https://api.github.com/repos/night-ghost/open-headtracker
|
closed
|
Support other sensros
|
auto-migrated Priority-Medium Type-Defect
|
```
What steps will reproduce the problem?
1. Iron AllInOne (itg3205,bma180,hmcxxxx,bmp085)
2. Uncomment DEBUG, set new addresses for sensors and upload sketch
What is the expected output? What do you see instead?
Expect some working sensors.
------ Debug info------
tiltBeta: 0.75
panBeta: 0.75
gyroWeight: 0.98
GyroWeightPan: 0.98
servoPanCenter: 2100
servoTiltCenter: 2100
servoRollCenter: 2100
tiltFactor: 17.00
panFactor: 17.00
Gyro offset saved 0.00,0.00,0.00
Mag offset saved 0.00,0.00,0.00
Acc offset saved 0,0,0
Mag cal:0,0,0,0.00,0.00,0.00
ADXL345 ID: 0
ITG3205 ID: 0
HMC ID: 0
ITG3205: 0 ADXL: 0 HMC: 0
Mag cal:0,0,0,-0.00,-0.00,-0.00
Mag offset:0.00,0.00,0.00
Timer interrupt initialised
```
Original issue reported on code.google.com by `Sov...@gmail.com` on 28 Nov 2012 at 11:38
|
1.0
|
Support other sensros - ```
What steps will reproduce the problem?
1. Iron AllInOne (itg3205,bma180,hmcxxxx,bmp085)
2. Uncomment DEBUG, set new addresses for sensors and upload sketch
What is the expected output? What do you see instead?
Expect some working sensors.
------ Debug info------
tiltBeta: 0.75
panBeta: 0.75
gyroWeight: 0.98
GyroWeightPan: 0.98
servoPanCenter: 2100
servoTiltCenter: 2100
servoRollCenter: 2100
tiltFactor: 17.00
panFactor: 17.00
Gyro offset saved 0.00,0.00,0.00
Mag offset saved 0.00,0.00,0.00
Acc offset saved 0,0,0
Mag cal:0,0,0,0.00,0.00,0.00
ADXL345 ID: 0
ITG3205 ID: 0
HMC ID: 0
ITG3205: 0 ADXL: 0 HMC: 0
Mag cal:0,0,0,-0.00,-0.00,-0.00
Mag offset:0.00,0.00,0.00
Timer interrupt initialised
```
Original issue reported on code.google.com by `Sov...@gmail.com` on 28 Nov 2012 at 11:38
|
defect
|
support other sensros what steps will reproduce the problem iron allinone hmcxxxx uncomment debug set new addresses for sensors and upload sketch what is the expected output what do you see instead expect some working sensors debug info tiltbeta panbeta gyroweight gyroweightpan servopancenter servotiltcenter servorollcenter tiltfactor panfactor gyro offset saved mag offset saved acc offset saved mag cal id id hmc id adxl hmc mag cal mag offset timer interrupt initialised original issue reported on code google com by sov gmail com on nov at
| 1
|
60,505
| 17,023,443,652
|
IssuesEvent
|
2021-07-03 02:03:41
|
tomhughes/trac-tickets
|
https://api.github.com/repos/tomhughes/trac-tickets
|
closed
|
Emit non-ascii characters in export.start_rjs.view_larger_map as HTML entities
|
Component: website Priority: major Resolution: fixed Type: defect
|
**[Submitted to the original trac issue database at 4.19pm, Friday, 17th July 2009]**
When someone uses the export function to embed OSM data to another website that'll only work properly if the website in question is also using UTF-8, otherwise it'll break if *export.start_rjs.view_larger_map* contains non-ascii characters.
It should be escaped with HTML entities instead so it'll work everywhere.
|
1.0
|
Emit non-ascii characters in export.start_rjs.view_larger_map as HTML entities - **[Submitted to the original trac issue database at 4.19pm, Friday, 17th July 2009]**
When someone uses the export function to embed OSM data to another website that'll only work properly if the website in question is also using UTF-8, otherwise it'll break if *export.start_rjs.view_larger_map* contains non-ascii characters.
It should be escaped with HTML entities instead so it'll work everywhere.
|
defect
|
emit non ascii characters in export start rjs view larger map as html entities when someone uses the export function to embed osm data to another website that ll only work properly if the website in question is also using utf otherwise it ll break if export start rjs view larger map contains non ascii characters it should be escaped with html entities instead so it ll work everywhere
| 1
|
578,886
| 17,156,547,735
|
IssuesEvent
|
2021-07-14 07:41:21
|
googleapis/java-bigtable-hbase
|
https://api.github.com/repos/googleapis/java-bigtable-hbase
|
closed
|
bigtable.hbase.TestPut: testPutWithNullValues failed
|
api: bigtable flakybot: issue priority: p1 type: bug
|
This test failed!
To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/master/packages/flakybot).
If I'm commenting on this issue too often, add the `flakybot: quiet` label and
I will stop commenting.
---
commit: a891335ce3179c45fade4f3683b7e09d38d0107a
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/86567854-d16c-4059-85bb-945b50d115e2), [Sponge](http://sponge2/86567854-d16c-4059-85bb-945b50d115e2)
status: failed
<details><summary>Test output</summary><br><pre>java.lang.AssertionError: expected null, but was:<org.apache.hadoop.hbase.client.RetriesExhaustedWithDetailsException: Failed 1 action: UnauthenticatedException: 1 time, servers with issues: bigtable.googleapis.com>
at org.junit.Assert.fail(Assert.java:89)
at org.junit.Assert.failNotNull(Assert.java:756)
at org.junit.Assert.assertNull(Assert.java:738)
at org.junit.Assert.assertNull(Assert.java:748)
at com.google.cloud.bigtable.hbase.AbstractTestPut.testPutWithNullValues(AbstractTestPut.java:397)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
at org.apache.maven.surefire.junitcore.pc.Scheduler$1.run(Scheduler.java:410)
at org.apache.maven.surefire.junitcore.pc.InvokerStrategy.schedule(InvokerStrategy.java:54)
at org.apache.maven.surefire.junitcore.pc.Scheduler.schedule(Scheduler.java:367)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
at org.junit.runners.Suite.runChild(Suite.java:128)
at org.junit.runners.Suite.runChild(Suite.java:27)
at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
at org.apache.maven.surefire.junitcore.pc.Scheduler$1.run(Scheduler.java:410)
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)
at java.util.concurrent.FutureTask.run(FutureTask.java:266)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
at java.lang.Thread.run(Thread.java:748)
</pre></details>
|
1.0
|
bigtable.hbase.TestPut: testPutWithNullValues failed - This test failed!
To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/master/packages/flakybot).
If I'm commenting on this issue too often, add the `flakybot: quiet` label and
I will stop commenting.
---
commit: a891335ce3179c45fade4f3683b7e09d38d0107a
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/86567854-d16c-4059-85bb-945b50d115e2), [Sponge](http://sponge2/86567854-d16c-4059-85bb-945b50d115e2)
status: failed
<details><summary>Test output</summary><br><pre>java.lang.AssertionError: expected null, but was:<org.apache.hadoop.hbase.client.RetriesExhaustedWithDetailsException: Failed 1 action: UnauthenticatedException: 1 time, servers with issues: bigtable.googleapis.com>
at org.junit.Assert.fail(Assert.java:89)
at org.junit.Assert.failNotNull(Assert.java:756)
at org.junit.Assert.assertNull(Assert.java:738)
at org.junit.Assert.assertNull(Assert.java:748)
at com.google.cloud.bigtable.hbase.AbstractTestPut.testPutWithNullValues(AbstractTestPut.java:397)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
at org.apache.maven.surefire.junitcore.pc.Scheduler$1.run(Scheduler.java:410)
at org.apache.maven.surefire.junitcore.pc.InvokerStrategy.schedule(InvokerStrategy.java:54)
at org.apache.maven.surefire.junitcore.pc.Scheduler.schedule(Scheduler.java:367)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
at org.junit.runners.Suite.runChild(Suite.java:128)
at org.junit.runners.Suite.runChild(Suite.java:27)
at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
at org.apache.maven.surefire.junitcore.pc.Scheduler$1.run(Scheduler.java:410)
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)
at java.util.concurrent.FutureTask.run(FutureTask.java:266)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
at java.lang.Thread.run(Thread.java:748)
</pre></details>
|
non_defect
|
bigtable hbase testput testputwithnullvalues failed this test failed to configure my behavior see if i m commenting on this issue too often add the flakybot quiet label and i will stop commenting commit buildurl status failed test output java lang assertionerror expected null but was at org junit assert fail assert java at org junit assert failnotnull assert java at org junit assert assertnull assert java at org junit assert assertnull assert java at com google cloud bigtable hbase abstracttestput testputwithnullvalues abstracttestput java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at org junit runners parentrunner evaluate parentrunner java at org junit runners evaluate java at org junit runners parentrunner runleaf parentrunner java at org junit runners runchild java at org junit runners runchild java at org junit runners parentrunner run parentrunner java at org apache maven surefire junitcore pc scheduler run scheduler java at org apache maven surefire junitcore pc invokerstrategy schedule invokerstrategy java at org apache maven surefire junitcore pc scheduler schedule scheduler java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org junit runners suite runchild suite java at org junit runners suite runchild suite java at org junit runners parentrunner run parentrunner java at org apache maven surefire junitcore pc scheduler run scheduler java at java util concurrent executors runnableadapter call executors java at java util concurrent futuretask run futuretask java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java lang thread run thread java
| 0
|
7,499
| 6,973,062,406
|
IssuesEvent
|
2017-12-11 19:10:39
|
dotnet/corefx
|
https://api.github.com/repos/dotnet/corefx
|
closed
|
Add support for OpenSuse 42.2 in .NET CoreFx 1.1.0
|
area-Infrastructure enhancement
|
This issue tracks ensuring that your team has considered how to handle OpenSuse 42.2 builds in your .NET Core 1.1.0 repositories.
Since .NET Core 1.1 is an LTS release, per @leecow we need to support OpenSUSE 42.2 with it. Unfortunately, when 1.1 release branches were snapped, 42.1 was the used version. It turns out there was not even a RID (runtime identifier) that matches this build (In the 1.1 time frame, ‘opensuse.42.1-x64’ was used)
Please use this issue to track addressing the issue for your specific repository. In some cases, little-to-no change will be required but lacking a previously-used RID we need to figure something out.
@weshaggard FYI.
|
1.0
|
Add support for OpenSuse 42.2 in .NET CoreFx 1.1.0 - This issue tracks ensuring that your team has considered how to handle OpenSuse 42.2 builds in your .NET Core 1.1.0 repositories.
Since .NET Core 1.1 is an LTS release, per @leecow we need to support OpenSUSE 42.2 with it. Unfortunately, when 1.1 release branches were snapped, 42.1 was the used version. It turns out there was not even a RID (runtime identifier) that matches this build (In the 1.1 time frame, ‘opensuse.42.1-x64’ was used)
Please use this issue to track addressing the issue for your specific repository. In some cases, little-to-no change will be required but lacking a previously-used RID we need to figure something out.
@weshaggard FYI.
|
non_defect
|
add support for opensuse in net corefx this issue tracks ensuring that your team has considered how to handle opensuse builds in your net core repositories since net core is an lts release per leecow we need to support opensuse with it unfortunately when release branches were snapped was the used version it turns out there was not even a rid runtime identifier that matches this build in the time frame ‘opensuse ’ was used please use this issue to track addressing the issue for your specific repository in some cases little to no change will be required but lacking a previously used rid we need to figure something out weshaggard fyi
| 0
|
55,767
| 14,674,830,207
|
IssuesEvent
|
2020-12-30 16:10:40
|
primefaces/primefaces
|
https://api.github.com/repos/primefaces/primefaces
|
closed
|
DataTable: RowGroup do not work correctly with lazy loading
|
defect documentation
|
## 1) Environment
- PrimeFaces version: 6.1 / 6.2
- Does it work on the newest released PrimeFaces version? Version? No
- Does it work on the newest sources in GitHub? (Build by source -> https://github.com/primefaces/primefaces/wiki/Building-From-Source) No
- Application server + version: jetty / wildfly 11
- Affected browsers: tested in chrome and FF
## 2) Expected behavior
I have a scrollable datatable with lazy loading and RowGroup implemented.
Initial every rows are grouped correctly.
## 3) Actual behavior
After reloading some data, row grouping do not work correctly.
## 4) Steps to reproduce
scroll the datatable and reload some data.
## 5) Sample
I have commited an example to reproduce the issue:
https://github.com/floriandulzky/primefaces-test
http://localhost:8080/primefaces-test/testTableRowGroup.xhtml
|
1.0
|
DataTable: RowGroup do not work correctly with lazy loading - ## 1) Environment
- PrimeFaces version: 6.1 / 6.2
- Does it work on the newest released PrimeFaces version? Version? No
- Does it work on the newest sources in GitHub? (Build by source -> https://github.com/primefaces/primefaces/wiki/Building-From-Source) No
- Application server + version: jetty / wildfly 11
- Affected browsers: tested in chrome and FF
## 2) Expected behavior
I have a scrollable datatable with lazy loading and RowGroup implemented.
Initial every rows are grouped correctly.
## 3) Actual behavior
After reloading some data, row grouping do not work correctly.
## 4) Steps to reproduce
scroll the datatable and reload some data.
## 5) Sample
I have commited an example to reproduce the issue:
https://github.com/floriandulzky/primefaces-test
http://localhost:8080/primefaces-test/testTableRowGroup.xhtml
|
defect
|
datatable rowgroup do not work correctly with lazy loading environment primefaces version does it work on the newest released primefaces version version no does it work on the newest sources in github build by source no application server version jetty wildfly affected browsers tested in chrome and ff expected behavior i have a scrollable datatable with lazy loading and rowgroup implemented initial every rows are grouped correctly actual behavior after reloading some data row grouping do not work correctly steps to reproduce scroll the datatable and reload some data sample i have commited an example to reproduce the issue
| 1
|
71,516
| 23,672,576,328
|
IssuesEvent
|
2022-08-27 15:40:46
|
vector-im/element-web
|
https://api.github.com/repos/vector-im/element-web
|
closed
|
Problem with message display whitespace/international domain, possibly script injection?
|
T-Defect
|
### Steps to reproduce
Write someone a message containing an IDN (international domain name)
for example:
`test köll.net. ` (note the trailing whitespace!)
Shouldnt need anything else
### Outcome
#### What did you expect?
I expect the message to just show up like that in my client and my conversation partners client.
It does seem to show up correctly when i edit and save again without the trailing whitespace, then hit "edit" and "cancel" again. that's not a feasable workaround though xD
#### What happened instead?
This shows up in the chat history:
`test [<span><div tabindex="-1" class="mx_TextWithTooltip_target">köll.net</div></span>](http://xn--kll-sna.net/).`

Note that the HTML shows up in the chat history, i didn't do any "show source" or the likes
### Operating system
Arch
### Application version
Element version: 1.11.2 Olm version: 3.2.12
### How did you install the app?
arch user repository
### Homeserver
docker.io/matrixdotorg/synapse:v1.63.1
### Will you send logs?
Yes
|
1.0
|
Problem with message display whitespace/international domain, possibly script injection? - ### Steps to reproduce
Write someone a message containing an IDN (international domain name)
for example:
`test köll.net. ` (note the trailing whitespace!)
Shouldnt need anything else
### Outcome
#### What did you expect?
I expect the message to just show up like that in my client and my conversation partners client.
It does seem to show up correctly when i edit and save again without the trailing whitespace, then hit "edit" and "cancel" again. that's not a feasable workaround though xD
#### What happened instead?
This shows up in the chat history:
`test [<span><div tabindex="-1" class="mx_TextWithTooltip_target">köll.net</div></span>](http://xn--kll-sna.net/).`

Note that the HTML shows up in the chat history, i didn't do any "show source" or the likes
### Operating system
Arch
### Application version
Element version: 1.11.2 Olm version: 3.2.12
### How did you install the app?
arch user repository
### Homeserver
docker.io/matrixdotorg/synapse:v1.63.1
### Will you send logs?
Yes
|
defect
|
problem with message display whitespace international domain possibly script injection steps to reproduce write someone a message containing an idn international domain name for example test köll net note the trailing whitespace shouldnt need anything else outcome what did you expect i expect the message to just show up like that in my client and my conversation partners client it does seem to show up correctly when i edit and save again without the trailing whitespace then hit edit and cancel again that s not a feasable workaround though xd what happened instead this shows up in the chat history test note that the html shows up in the chat history i didn t do any show source or the likes operating system arch application version element version olm version how did you install the app arch user repository homeserver docker io matrixdotorg synapse will you send logs yes
| 1
|
76,824
| 26,617,463,098
|
IssuesEvent
|
2023-01-24 08:36:10
|
hazelcast/hazelcast
|
https://api.github.com/repos/hazelcast/hazelcast
|
closed
|
Hazelcast 5 members couldn't connect to each other when Istio envoy proxy enabled
|
Type: Defect Source: Community Module: Network I/O Team: Cloud Native
|
<!--
Thanks for reporting your issue. Please share with us the following information, to help us resolve your issue quickly and efficiently.
-->
**Describe the bug**
After upgrading embedded Hazelcast from 4.2.5 to 5.1.3 in Spring Boot application, members couldn't establish connection to each other when deployed in Kubernetes cluster with Istio Envoy Proxy enabled.
**Expected behavior**
Hazelcast members could establish connection to each other.
**To Reproduce**
Steps to reproduce the behavior:
1. Create simple Spring Boot webapp (spring-boot-starter-web + actuator) with embedded Hazelcast
2. Run Kubernetes cluster with Istio installed and Envoy Proxy enabled.
3. Create a namespace for the app with sidecar injection enabled.
4. Configure Hazelcast to use Kubernetes discovery.
5. Deploy the app into the namespace and wait until it's fully started.
6. Scale up app to 2 replicas.
7. The second replica couldn't connect to the first one and is unable to start.
**Additional context**
The same scenario had worked for me without such troubles with Hazelcast 4.2.5. But I struggled with issue #18320 and decided to upgrade. None of app's configurations where changed, just a version of Hazelcast.
If I **disable sidecar** injection, then everything **works** as expected.
Versions:
- Java 11.0.16.1 (custom JRE from alphine 3.14 docker image)
- Spring Boot 2.6.3
- Hazelcast 5.1.3
- Kubernetes 1.22.5
- Istio 1.15 (also tested 1.12)
Logs from the second replica (more at [hazelcast-logs.txt](https://github.com/hazelcast/hazelcast/files/9593956/hazelcast-logs.txt)):
```json
{"timestamp":"2022-09-18T11:33:08.329Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] [10.1.10.161]:5701 is STARTING","logger":"c.h.c.LifecycleService","thread":"main","level":"INFO"}
{"timestamp":"2022-09-18T11:33:08.330Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Adding Member [10.1.10.161]:5701 - 7080f5c8-40ae-4c62-b1d3-232672ed2a39 this","logger":"c.h.i.p.InternalPartitionService","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.388Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Starting TcpServer.","logger":"c.h.i.s.t.TcpServer","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.388Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] TcpIpConnectionManager configured with Non Blocking IO-threading model: 3 input threads and 3 output threads","logger":"c.h.i.n.n.NioNetworking","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.389Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] write through enabled:true","logger":"c.h.i.n.n.NioNetworking","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.389Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] IO threads selector mode is SELECT","logger":"c.h.i.n.n.NioNetworking","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.405Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Optimized Selector: sun.nio.ch.EPollSelectorImpl","logger":"c.h.i.n.n.NioThread","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.407Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Optimized Selector: sun.nio.ch.EPollSelectorImpl","logger":"c.h.i.n.n.NioThread","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.408Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Optimized Selector: sun.nio.ch.EPollSelectorImpl","logger":"c.h.i.n.n.NioThread","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.409Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Optimized Selector: sun.nio.ch.EPollSelectorImpl","logger":"c.h.i.n.n.NioThread","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.411Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Optimized Selector: sun.nio.ch.EPollSelectorImpl","logger":"c.h.i.n.n.NioThread","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.412Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Optimized Selector: sun.nio.ch.EPollSelectorImpl","logger":"c.h.i.n.n.NioThread","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.418Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Using normal IO Balancer Strategy.","logger":"c.h.i.n.n.i.IOBalancer","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.423Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] I/O Balancer is enabled. Scanning every 20 seconds for imbalances.","logger":"c.h.i.n.n.i.IOBalancer","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.424Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Starting IOBalancer thread","logger":"c.h.i.n.n.i.IOBalancer","thread":"hz.hazelcast.IO.BalancerThread","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.426Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Adding ShutdownHook","logger":"c.h.i.impl.Node","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.427Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Starting TcpIpAcceptor on ServerSocketRegistry{{EndpointQualifier{type='MEMBER'}=sun.nio.ch.ServerSocketChannelImpl[/0.0.0.0:5701]}}","logger":"c.h.i.s.t.TcpServerAcceptor","thread":"hz.hazelcast.IO.thread-Acceptor","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.428Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Setting master address to null","logger":"c.h.i.c.ClusterService","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.436Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Found node service with address: dev-hazelcast/10.1.10.158","logger":"c.h.s.d.i.DiscoveryService","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.438Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] NOT sending master question to blacklisted endpoints: {}","logger":"c.h.i.c.i.DiscoveryJoiner","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.439Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Sending master question to [10.1.10.158]:5701","logger":"c.h.i.c.i.DiscoveryJoiner","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.459Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Starting to connect to [10.1.10.158]:5701","logger":"c.h.i.s.t.TcpServerConnector","thread":"hz.hazelcast.cached.thread-2","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.459Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Connection to: [10.1.10.158]:5701 streamId:-1 is not yet in progress","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.478Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Adding pipelines: NioChannel{null->null}.inboundPipeline, NioChannel{null->null}.outboundPipeline","logger":"c.h.i.n.n.i.IOBalancer","thread":"hz.hazelcast.IO.BalancerThread","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.479Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Connecting to /10.1.10.158:5701, timeout: 10000, bind-any: true","logger":"c.h.i.s.t.TcpServerConnector","thread":"hz.hazelcast.cached.thread-2","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.480Z","message":"Successfully connected to: /10.1.10.158:5701 using socket Socket[addr=/10.1.10.158,port=5701,localport=57773]","logger":"c.h.i.n.n.NioChannel","thread":"hz.hazelcast.cached.thread-2","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.485Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Established socket connection between /10.1.10.161:57773 and /10.1.10.158:5701","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"hz.hazelcast.cached.thread-2","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.491Z","message":"Failed to read HotSpot specific configuration: com.sun.management:type=HotSpotDiagnostic","logger":"c.h.i.util.JVMUtil","thread":"hz.hazelcast.cached.thread-2","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.498Z","message":"Failed to read HotSpot specific configuration: com.sun.management:type=HotSpotDiagnostic","logger":"c.h.i.util.JVMUtil","thread":"hz.hazelcast.cached.thread-2","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.503Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Sending memberHandshake packet to [10.1.10.158]:5701","logger":"c.h.i.s.t.TcpServerConnector","thread":"hz.hazelcast.cached.thread-2","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.560Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Retrying[1] packet send operation to: [10.1.10.158]:5701","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"hz.hazelcast.TcpServer.thread-1","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.560Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Connection to: [10.1.10.158]:5701 streamId:-1 is already in progress","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"hz.hazelcast.TcpServer.thread-1","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.760Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Retrying[2] packet send operation to: [10.1.10.158]:5701","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"hz.hazelcast.TcpServer.thread-1","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.760Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Connection to: [10.1.10.158]:5701 streamId:-1 is already in progress","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"hz.hazelcast.TcpServer.thread-1","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:09.061Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Retrying[3] packet send operation to: [10.1.10.158]:5701","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"hz.hazelcast.TcpServer.thread-2","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:09.061Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Connection to: [10.1.10.158]:5701 streamId:-1 is already in progress","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"hz.hazelcast.TcpServer.thread-2","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:09.281Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Scanning all invocations","logger":"c.h.s.i.o.i.InvocationMonitor","thread":"hz.hazelcast.InvocationMonitorThread","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:09.398Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Collected 252 metrics, 3,539 bytes","logger":"c.h.i.m.m.ManagementCenterPublisher","thread":"hz.hazelcast.cached.thread-2","level":"TRACE"}
```
Logs from the first replica (nothing about connection, only repeated monitor statements):
```json
{"timestamp":"2022-09-18T11:33:08.357Z","message":"[10.1.10.158]:5701 [dev] [5.1.3] Collected 315 metrics, 4,163 bytes","logger":"c.h.i.m.m.ManagementCenterPublisher","thread":"hz.hazelcast.cached.thread-3","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.482Z","message":"[10.1.10.158]:5701 [dev] [5.1.3] Scanning all invocations","logger":"c.h.s.i.o.i.InvocationMonitor","thread":"hz.hazelcast.InvocationMonitorThread","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:09.482Z","message":"[10.1.10.158]:5701 [dev] [5.1.3] Scanning all invocations","logger":"c.h.s.i.o.i.InvocationMonitor","thread":"hz.hazelcast.InvocationMonitorThread","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:10.482Z","message":"[10.1.10.158]:5701 [dev] [5.1.3] Scanning all invocations","logger":"c.h.s.i.o.i.InvocationMonitor","thread":"hz.hazelcast.InvocationMonitorThread","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:11.482Z","message":"[10.1.10.158]:5701 [dev] [5.1.3] Scanning all invocations","logger":"c.h.s.i.o.i.InvocationMonitor","thread":"hz.hazelcast.InvocationMonitorThread","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:12.482Z","message":"[10.1.10.158]:5701 [dev] [5.1.3] Scanning all invocations","logger":"c.h.s.i.o.i.InvocationMonitor","thread":"hz.hazelcast.InvocationMonitorThread","level":"TRACE"}
```
In the app I've just added `hazelcast-spring:5.1.3` dependency, put `@EnableCaching` annotation, increased log level of "com.hazelcast" to "trace" and included hazelcast.yaml in my classpath:
```yaml
hazelcast:
cluster-name: dev
instance-name: hazelcast
properties:
hazelcast.logging.type: slf4j
network:
join:
multicast:
enabled: false
kubernetes:
enabled: true
service-dns: my-app-v1-hazelcast
map:
default:
time-to-live-seconds: 3600
```
Also I've created Kubernetes manifest for the Hazelcast discovery (service.yaml):
```yaml
apiVersion: v1
kind: Service
metadata:
name: my-app-v1-hazelcast
namespace: default
labels:
app: my-app-1663498227
app.kubernetes.io/instance: my-app-1663498227
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: my-app-v1
helm.sh/chart: my-app-1.0.0
io.cattle.field/appId: my-app-1663498227
annotations:
helm.sh/hook: pre-install,pre-upgrade,post-delete
helm.sh/hook-delete-policy: before-hook-creation,keep
spec:
ports:
- name: hazelcast
protocol: TCP
port: 5701
targetPort: 5701
selector:
app.kubernetes.io/instance: my-app-1663498227
app.kubernetes.io/name: my-app-v1
clusterIP: None
type: ClusterIP
```
<!--
Add any other context about the problem here.
Common details that we're often interested in:
- Detailed description of the steps to reproduce your issue
- Logs and stack traces, if available
- Hazelcast version that you use (e.g. 3.4, also specify whether it is a minor release or the latest snapshot)
- If available, integration module versions (e.g. Tomcat, Jetty, Spring, Hibernate). Also, include their detailed configuration information such as web.xml, Hibernate configuration and `context.xml` for Spring
- Cluster size, i.e. the number of Hazelcast cluster members
- Number of the clients
- Version of Java. It is also helpful to mention the JVM parameters
- Operating system. If it is Linux, kernel version is helpful
- Unit test with the `hazelcast.xml` file. If you could include a unit test which reproduces your issue, we would be grateful
-->
|
1.0
|
Hazelcast 5 members couldn't connect to each other when Istio envoy proxy enabled - <!--
Thanks for reporting your issue. Please share with us the following information, to help us resolve your issue quickly and efficiently.
-->
**Describe the bug**
After upgrading embedded Hazelcast from 4.2.5 to 5.1.3 in Spring Boot application, members couldn't establish connection to each other when deployed in Kubernetes cluster with Istio Envoy Proxy enabled.
**Expected behavior**
Hazelcast members could establish connection to each other.
**To Reproduce**
Steps to reproduce the behavior:
1. Create simple Spring Boot webapp (spring-boot-starter-web + actuator) with embedded Hazelcast
2. Run Kubernetes cluster with Istio installed and Envoy Proxy enabled.
3. Create a namespace for the app with sidecar injection enabled.
4. Configure Hazelcast to use Kubernetes discovery.
5. Deploy the app into the namespace and wait until it's fully started.
6. Scale up app to 2 replicas.
7. The second replica couldn't connect to the first one and is unable to start.
**Additional context**
The same scenario had worked for me without such troubles with Hazelcast 4.2.5. But I struggled with issue #18320 and decided to upgrade. None of app's configurations where changed, just a version of Hazelcast.
If I **disable sidecar** injection, then everything **works** as expected.
Versions:
- Java 11.0.16.1 (custom JRE from alphine 3.14 docker image)
- Spring Boot 2.6.3
- Hazelcast 5.1.3
- Kubernetes 1.22.5
- Istio 1.15 (also tested 1.12)
Logs from the second replica (more at [hazelcast-logs.txt](https://github.com/hazelcast/hazelcast/files/9593956/hazelcast-logs.txt)):
```json
{"timestamp":"2022-09-18T11:33:08.329Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] [10.1.10.161]:5701 is STARTING","logger":"c.h.c.LifecycleService","thread":"main","level":"INFO"}
{"timestamp":"2022-09-18T11:33:08.330Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Adding Member [10.1.10.161]:5701 - 7080f5c8-40ae-4c62-b1d3-232672ed2a39 this","logger":"c.h.i.p.InternalPartitionService","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.388Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Starting TcpServer.","logger":"c.h.i.s.t.TcpServer","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.388Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] TcpIpConnectionManager configured with Non Blocking IO-threading model: 3 input threads and 3 output threads","logger":"c.h.i.n.n.NioNetworking","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.389Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] write through enabled:true","logger":"c.h.i.n.n.NioNetworking","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.389Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] IO threads selector mode is SELECT","logger":"c.h.i.n.n.NioNetworking","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.405Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Optimized Selector: sun.nio.ch.EPollSelectorImpl","logger":"c.h.i.n.n.NioThread","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.407Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Optimized Selector: sun.nio.ch.EPollSelectorImpl","logger":"c.h.i.n.n.NioThread","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.408Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Optimized Selector: sun.nio.ch.EPollSelectorImpl","logger":"c.h.i.n.n.NioThread","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.409Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Optimized Selector: sun.nio.ch.EPollSelectorImpl","logger":"c.h.i.n.n.NioThread","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.411Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Optimized Selector: sun.nio.ch.EPollSelectorImpl","logger":"c.h.i.n.n.NioThread","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.412Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Optimized Selector: sun.nio.ch.EPollSelectorImpl","logger":"c.h.i.n.n.NioThread","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.418Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Using normal IO Balancer Strategy.","logger":"c.h.i.n.n.i.IOBalancer","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.423Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] I/O Balancer is enabled. Scanning every 20 seconds for imbalances.","logger":"c.h.i.n.n.i.IOBalancer","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.424Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Starting IOBalancer thread","logger":"c.h.i.n.n.i.IOBalancer","thread":"hz.hazelcast.IO.BalancerThread","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.426Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Adding ShutdownHook","logger":"c.h.i.impl.Node","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.427Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Starting TcpIpAcceptor on ServerSocketRegistry{{EndpointQualifier{type='MEMBER'}=sun.nio.ch.ServerSocketChannelImpl[/0.0.0.0:5701]}}","logger":"c.h.i.s.t.TcpServerAcceptor","thread":"hz.hazelcast.IO.thread-Acceptor","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.428Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Setting master address to null","logger":"c.h.i.c.ClusterService","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.436Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Found node service with address: dev-hazelcast/10.1.10.158","logger":"c.h.s.d.i.DiscoveryService","thread":"main","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.438Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] NOT sending master question to blacklisted endpoints: {}","logger":"c.h.i.c.i.DiscoveryJoiner","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.439Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Sending master question to [10.1.10.158]:5701","logger":"c.h.i.c.i.DiscoveryJoiner","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.459Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Starting to connect to [10.1.10.158]:5701","logger":"c.h.i.s.t.TcpServerConnector","thread":"hz.hazelcast.cached.thread-2","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.459Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Connection to: [10.1.10.158]:5701 streamId:-1 is not yet in progress","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"main","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.478Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Adding pipelines: NioChannel{null->null}.inboundPipeline, NioChannel{null->null}.outboundPipeline","logger":"c.h.i.n.n.i.IOBalancer","thread":"hz.hazelcast.IO.BalancerThread","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.479Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Connecting to /10.1.10.158:5701, timeout: 10000, bind-any: true","logger":"c.h.i.s.t.TcpServerConnector","thread":"hz.hazelcast.cached.thread-2","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.480Z","message":"Successfully connected to: /10.1.10.158:5701 using socket Socket[addr=/10.1.10.158,port=5701,localport=57773]","logger":"c.h.i.n.n.NioChannel","thread":"hz.hazelcast.cached.thread-2","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.485Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Established socket connection between /10.1.10.161:57773 and /10.1.10.158:5701","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"hz.hazelcast.cached.thread-2","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.491Z","message":"Failed to read HotSpot specific configuration: com.sun.management:type=HotSpotDiagnostic","logger":"c.h.i.util.JVMUtil","thread":"hz.hazelcast.cached.thread-2","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.498Z","message":"Failed to read HotSpot specific configuration: com.sun.management:type=HotSpotDiagnostic","logger":"c.h.i.util.JVMUtil","thread":"hz.hazelcast.cached.thread-2","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.503Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Sending memberHandshake packet to [10.1.10.158]:5701","logger":"c.h.i.s.t.TcpServerConnector","thread":"hz.hazelcast.cached.thread-2","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.560Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Retrying[1] packet send operation to: [10.1.10.158]:5701","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"hz.hazelcast.TcpServer.thread-1","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.560Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Connection to: [10.1.10.158]:5701 streamId:-1 is already in progress","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"hz.hazelcast.TcpServer.thread-1","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:08.760Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Retrying[2] packet send operation to: [10.1.10.158]:5701","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"hz.hazelcast.TcpServer.thread-1","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.760Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Connection to: [10.1.10.158]:5701 streamId:-1 is already in progress","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"hz.hazelcast.TcpServer.thread-1","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:09.061Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Retrying[3] packet send operation to: [10.1.10.158]:5701","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"hz.hazelcast.TcpServer.thread-2","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:09.061Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Connection to: [10.1.10.158]:5701 streamId:-1 is already in progress","logger":"c.h.i.s.t.TcpServerConnectionManager","thread":"hz.hazelcast.TcpServer.thread-2","level":"DEBUG"}
{"timestamp":"2022-09-18T11:33:09.281Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Scanning all invocations","logger":"c.h.s.i.o.i.InvocationMonitor","thread":"hz.hazelcast.InvocationMonitorThread","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:09.398Z","message":"[10.1.10.161]:5701 [dev] [5.1.3] Collected 252 metrics, 3,539 bytes","logger":"c.h.i.m.m.ManagementCenterPublisher","thread":"hz.hazelcast.cached.thread-2","level":"TRACE"}
```
Logs from the first replica (nothing about connection, only repeated monitor statements):
```json
{"timestamp":"2022-09-18T11:33:08.357Z","message":"[10.1.10.158]:5701 [dev] [5.1.3] Collected 315 metrics, 4,163 bytes","logger":"c.h.i.m.m.ManagementCenterPublisher","thread":"hz.hazelcast.cached.thread-3","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:08.482Z","message":"[10.1.10.158]:5701 [dev] [5.1.3] Scanning all invocations","logger":"c.h.s.i.o.i.InvocationMonitor","thread":"hz.hazelcast.InvocationMonitorThread","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:09.482Z","message":"[10.1.10.158]:5701 [dev] [5.1.3] Scanning all invocations","logger":"c.h.s.i.o.i.InvocationMonitor","thread":"hz.hazelcast.InvocationMonitorThread","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:10.482Z","message":"[10.1.10.158]:5701 [dev] [5.1.3] Scanning all invocations","logger":"c.h.s.i.o.i.InvocationMonitor","thread":"hz.hazelcast.InvocationMonitorThread","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:11.482Z","message":"[10.1.10.158]:5701 [dev] [5.1.3] Scanning all invocations","logger":"c.h.s.i.o.i.InvocationMonitor","thread":"hz.hazelcast.InvocationMonitorThread","level":"TRACE"}
{"timestamp":"2022-09-18T11:33:12.482Z","message":"[10.1.10.158]:5701 [dev] [5.1.3] Scanning all invocations","logger":"c.h.s.i.o.i.InvocationMonitor","thread":"hz.hazelcast.InvocationMonitorThread","level":"TRACE"}
```
In the app I've just added `hazelcast-spring:5.1.3` dependency, put `@EnableCaching` annotation, increased log level of "com.hazelcast" to "trace" and included hazelcast.yaml in my classpath:
```yaml
hazelcast:
cluster-name: dev
instance-name: hazelcast
properties:
hazelcast.logging.type: slf4j
network:
join:
multicast:
enabled: false
kubernetes:
enabled: true
service-dns: my-app-v1-hazelcast
map:
default:
time-to-live-seconds: 3600
```
Also I've created Kubernetes manifest for the Hazelcast discovery (service.yaml):
```yaml
apiVersion: v1
kind: Service
metadata:
name: my-app-v1-hazelcast
namespace: default
labels:
app: my-app-1663498227
app.kubernetes.io/instance: my-app-1663498227
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: my-app-v1
helm.sh/chart: my-app-1.0.0
io.cattle.field/appId: my-app-1663498227
annotations:
helm.sh/hook: pre-install,pre-upgrade,post-delete
helm.sh/hook-delete-policy: before-hook-creation,keep
spec:
ports:
- name: hazelcast
protocol: TCP
port: 5701
targetPort: 5701
selector:
app.kubernetes.io/instance: my-app-1663498227
app.kubernetes.io/name: my-app-v1
clusterIP: None
type: ClusterIP
```
<!--
Add any other context about the problem here.
Common details that we're often interested in:
- Detailed description of the steps to reproduce your issue
- Logs and stack traces, if available
- Hazelcast version that you use (e.g. 3.4, also specify whether it is a minor release or the latest snapshot)
- If available, integration module versions (e.g. Tomcat, Jetty, Spring, Hibernate). Also, include their detailed configuration information such as web.xml, Hibernate configuration and `context.xml` for Spring
- Cluster size, i.e. the number of Hazelcast cluster members
- Number of the clients
- Version of Java. It is also helpful to mention the JVM parameters
- Operating system. If it is Linux, kernel version is helpful
- Unit test with the `hazelcast.xml` file. If you could include a unit test which reproduces your issue, we would be grateful
-->
|
defect
|
hazelcast members couldn t connect to each other when istio envoy proxy enabled thanks for reporting your issue please share with us the following information to help us resolve your issue quickly and efficiently describe the bug after upgrading embedded hazelcast from to in spring boot application members couldn t establish connection to each other when deployed in kubernetes cluster with istio envoy proxy enabled expected behavior hazelcast members could establish connection to each other to reproduce steps to reproduce the behavior create simple spring boot webapp spring boot starter web actuator with embedded hazelcast run kubernetes cluster with istio installed and envoy proxy enabled create a namespace for the app with sidecar injection enabled configure hazelcast to use kubernetes discovery deploy the app into the namespace and wait until it s fully started scale up app to replicas the second replica couldn t connect to the first one and is unable to start additional context the same scenario had worked for me without such troubles with hazelcast but i struggled with issue and decided to upgrade none of app s configurations where changed just a version of hazelcast if i disable sidecar injection then everything works as expected versions java custom jre from alphine docker image spring boot hazelcast kubernetes istio also tested logs from the second replica more at json timestamp message is starting logger c h c lifecycleservice thread main level info timestamp message adding member this logger c h i p internalpartitionservice thread main level debug timestamp message starting tcpserver logger c h i s t tcpserver thread main level trace timestamp message tcpipconnectionmanager configured with non blocking io threading model input threads and output threads logger c h i n n nionetworking thread main level debug timestamp message write through enabled true logger c h i n n nionetworking thread main level debug timestamp message io threads selector mode is select logger c h i n n nionetworking thread main level debug timestamp message optimized selector sun nio ch epollselectorimpl logger c h i n n niothread thread main level trace timestamp message optimized selector sun nio ch epollselectorimpl logger c h i n n niothread thread main level trace timestamp message optimized selector sun nio ch epollselectorimpl logger c h i n n niothread thread main level trace timestamp message optimized selector sun nio ch epollselectorimpl logger c h i n n niothread thread main level trace timestamp message optimized selector sun nio ch epollselectorimpl logger c h i n n niothread thread main level trace timestamp message optimized selector sun nio ch epollselectorimpl logger c h i n n niothread thread main level trace timestamp message using normal io balancer strategy logger c h i n n i iobalancer thread main level trace timestamp message i o balancer is enabled scanning every seconds for imbalances logger c h i n n i iobalancer thread main level trace timestamp message starting iobalancer thread logger c h i n n i iobalancer thread hz hazelcast io balancerthread level trace timestamp message adding shutdownhook logger c h i impl node thread main level trace timestamp message starting tcpipacceptor on serversocketregistry endpointqualifier type member sun nio ch serversocketchannelimpl logger c h i s t tcpserveracceptor thread hz hazelcast io thread acceptor level trace timestamp message setting master address to null logger c h i c clusterservice thread main level debug timestamp message found node service with address dev hazelcast logger c h s d i discoveryservice thread main level trace timestamp message not sending master question to blacklisted endpoints logger c h i c i discoveryjoiner thread main level debug timestamp message sending master question to logger c h i c i discoveryjoiner thread main level debug timestamp message starting to connect to logger c h i s t tcpserverconnector thread hz hazelcast cached thread level trace timestamp message connection to streamid is not yet in progress logger c h i s t tcpserverconnectionmanager thread main level debug timestamp message adding pipelines niochannel null null inboundpipeline niochannel null null outboundpipeline logger c h i n n i iobalancer thread hz hazelcast io balancerthread level trace timestamp message connecting to timeout bind any true logger c h i s t tcpserverconnector thread hz hazelcast cached thread level trace timestamp message successfully connected to using socket socket logger c h i n n niochannel thread hz hazelcast cached thread level trace timestamp message established socket connection between and logger c h i s t tcpserverconnectionmanager thread hz hazelcast cached thread level debug timestamp message failed to read hotspot specific configuration com sun management type hotspotdiagnostic logger c h i util jvmutil thread hz hazelcast cached thread level debug timestamp message failed to read hotspot specific configuration com sun management type hotspotdiagnostic logger c h i util jvmutil thread hz hazelcast cached thread level debug timestamp message sending memberhandshake packet to logger c h i s t tcpserverconnector thread hz hazelcast cached thread level trace timestamp message retrying packet send operation to logger c h i s t tcpserverconnectionmanager thread hz hazelcast tcpserver thread level trace timestamp message connection to streamid is already in progress logger c h i s t tcpserverconnectionmanager thread hz hazelcast tcpserver thread level debug timestamp message retrying packet send operation to logger c h i s t tcpserverconnectionmanager thread hz hazelcast tcpserver thread level trace timestamp message connection to streamid is already in progress logger c h i s t tcpserverconnectionmanager thread hz hazelcast tcpserver thread level debug timestamp message retrying packet send operation to logger c h i s t tcpserverconnectionmanager thread hz hazelcast tcpserver thread level trace timestamp message connection to streamid is already in progress logger c h i s t tcpserverconnectionmanager thread hz hazelcast tcpserver thread level debug timestamp message scanning all invocations logger c h s i o i invocationmonitor thread hz hazelcast invocationmonitorthread level trace timestamp message collected metrics bytes logger c h i m m managementcenterpublisher thread hz hazelcast cached thread level trace logs from the first replica nothing about connection only repeated monitor statements json timestamp message collected metrics bytes logger c h i m m managementcenterpublisher thread hz hazelcast cached thread level trace timestamp message scanning all invocations logger c h s i o i invocationmonitor thread hz hazelcast invocationmonitorthread level trace timestamp message scanning all invocations logger c h s i o i invocationmonitor thread hz hazelcast invocationmonitorthread level trace timestamp message scanning all invocations logger c h s i o i invocationmonitor thread hz hazelcast invocationmonitorthread level trace timestamp message scanning all invocations logger c h s i o i invocationmonitor thread hz hazelcast invocationmonitorthread level trace timestamp message scanning all invocations logger c h s i o i invocationmonitor thread hz hazelcast invocationmonitorthread level trace in the app i ve just added hazelcast spring dependency put enablecaching annotation increased log level of com hazelcast to trace and included hazelcast yaml in my classpath yaml hazelcast cluster name dev instance name hazelcast properties hazelcast logging type network join multicast enabled false kubernetes enabled true service dns my app hazelcast map default time to live seconds also i ve created kubernetes manifest for the hazelcast discovery service yaml yaml apiversion kind service metadata name my app hazelcast namespace default labels app my app app kubernetes io instance my app app kubernetes io managed by helm app kubernetes io name my app helm sh chart my app io cattle field appid my app annotations helm sh hook pre install pre upgrade post delete helm sh hook delete policy before hook creation keep spec ports name hazelcast protocol tcp port targetport selector app kubernetes io instance my app app kubernetes io name my app clusterip none type clusterip add any other context about the problem here common details that we re often interested in detailed description of the steps to reproduce your issue logs and stack traces if available hazelcast version that you use e g also specify whether it is a minor release or the latest snapshot if available integration module versions e g tomcat jetty spring hibernate also include their detailed configuration information such as web xml hibernate configuration and context xml for spring cluster size i e the number of hazelcast cluster members number of the clients version of java it is also helpful to mention the jvm parameters operating system if it is linux kernel version is helpful unit test with the hazelcast xml file if you could include a unit test which reproduces your issue we would be grateful
| 1
|
185,328
| 21,786,159,232
|
IssuesEvent
|
2022-05-14 06:44:56
|
classicvalues/AA-ionic-login
|
https://api.github.com/repos/classicvalues/AA-ionic-login
|
closed
|
CVE-2021-35516 (High) detected in commons-compress-1.12.jar - autoclosed
|
security vulnerability
|
## CVE-2021-35516 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-compress-1.12.jar</b></p></summary>
<p>Apache Commons Compress software defines an API for working with
compression and archive formats. These include: bzip2, gzip, pack200,
lzma, xz, Snappy, traditional Unix Compress, DEFLATE and ar, cpio,
jar, tar, zip, dump, 7z, arj.</p>
<p>Path to dependency file: /node_modules/@capacitor/app/android/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar</p>
<p>
Dependency Hierarchy:
- lint-gradle-27.2.1.jar (Root Library)
- builder-4.2.1.jar
- sdklib-27.2.1.jar
- :x: **commons-compress-1.12.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/classicvalues/AA-ionic-login/commit/d4f4480b7ddd8c520e4b02ea2008621ded4be6ab">d4f4480b7ddd8c520e4b02ea2008621ded4be6ab</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
<p>Publish Date: 2021-07-13
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35516>CVE-2021-35516</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://commons.apache.org/proper/commons-compress/security-reports.html">https://commons.apache.org/proper/commons-compress/security-reports.html</a></p>
<p>Release Date: 2021-07-13</p>
<p>Fix Resolution: org.apache.commons:commons-compress:1.21</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2021-35516 (High) detected in commons-compress-1.12.jar - autoclosed - ## CVE-2021-35516 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-compress-1.12.jar</b></p></summary>
<p>Apache Commons Compress software defines an API for working with
compression and archive formats. These include: bzip2, gzip, pack200,
lzma, xz, Snappy, traditional Unix Compress, DEFLATE and ar, cpio,
jar, tar, zip, dump, 7z, arj.</p>
<p>Path to dependency file: /node_modules/@capacitor/app/android/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar</p>
<p>
Dependency Hierarchy:
- lint-gradle-27.2.1.jar (Root Library)
- builder-4.2.1.jar
- sdklib-27.2.1.jar
- :x: **commons-compress-1.12.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/classicvalues/AA-ionic-login/commit/d4f4480b7ddd8c520e4b02ea2008621ded4be6ab">d4f4480b7ddd8c520e4b02ea2008621ded4be6ab</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
<p>Publish Date: 2021-07-13
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35516>CVE-2021-35516</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://commons.apache.org/proper/commons-compress/security-reports.html">https://commons.apache.org/proper/commons-compress/security-reports.html</a></p>
<p>Release Date: 2021-07-13</p>
<p>Fix Resolution: org.apache.commons:commons-compress:1.21</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve high detected in commons compress jar autoclosed cve high severity vulnerability vulnerable library commons compress jar apache commons compress software defines an api for working with compression and archive formats these include gzip lzma xz snappy traditional unix compress deflate and ar cpio jar tar zip dump arj path to dependency file node modules capacitor app android build gradle path to vulnerable library home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar dependency hierarchy lint gradle jar root library builder jar sdklib jar x commons compress jar vulnerable library found in head commit a href found in base branch master vulnerability details when reading a specially crafted archive compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs this could be used to mount a denial of service attack against services that use compress sevenz package publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache commons commons compress step up your open source security game with whitesource
| 0
|
23,867
| 4,998,206,975
|
IssuesEvent
|
2016-12-09 19:07:36
|
01org/ciao
|
https://api.github.com/repos/01org/ciao
|
closed
|
External IP Support: Controller, CLI and Web UI Requirements
|
ciao-cli ciao-cnci-agent ciao-controller configuration datastore Do First documentation external-ip networking new-feature P1
|
Folks,
Floating IP support is being enabled in the CNCI.
## Quick summary:
- SSNTP supports two commands today
https://github.com/01org/ciao/blob/56930eab39e00665cbdcd9f56bd0748f3129ee67/payloads/assignpublicIP.go
- CommandAssignPublicIP
- CommandReleasePublicIP
- The CNCI will start supporting these two commands
- These two commands allow assignment of a Public IP to a given InstanceUUID
## What is a Public IP:
- A public IP can be any IP that is routable at the Data Center underlay (physical layer)
- Hence it can be an internet routable IP or
- A data center local IP which is only routable within the data center
- The CNCI is sitting on the underlay. Hence as long as the traffic makes it to the physical network segment on which the CNCI resides the CNCI will pick it up
Note: Routing of the data center traffic such that the public IP gets routed to the CNCI is outside the scope of Ciao today. BGP or OSPF can be setup on the NN to advertise the fact that a given NN is hosting a CNCI which is hosting a given public IP.
## Concepts:
- Public IP Pool: The pool of public IP's available to Ciao to assign to instances across tenants. The public IP pool is global to Ciao and _not_ tenant specific.
- The public IP pool can be specified in multiple formats
- CIDR: a.b.c.d/p
- Range: a.b.c.d-a.b.x.y
- Individual IPs: a1.b1.c1.d1,a2.b2.c2.d2
- Ciao can have multiple pools at any given time
- Currently there are no plans to assign a pool to a tenant
- A tenant will not be able to choose an IP for a given instance
- The tenant _may_ in the future get to choose which pool the IP can come from
- Even in this case the pool will be an _abstract_ admin defined context
## Requirements for other components:
## Controller:
External API:
- should support creation of a pool of public IPs
- should support creation of multiple such pools
- should support assignment of public IP from a given pool to a given instance
- should support release of public IP from a given instance
- may support public IP stats
- free/in use per pool
Note: In the first version we can support a single default pool for all tenants
## Internal Implementation
- Should pick a free IP from the pool and generate a CommandAssignPublicIP and send it to the CNCI belonging to that tenant
- The controller decides the IP to assign (not the user)
- Should flag an error if the pool is exhausted
- in the future when we support multiple CNCI's per tenant, it should be sent to the CNCI hosting the instance
- Instance deletion handling
- the controller should first release the public IP before deleting the instance
## WebUI
- should support creation of a pool (admin only)
- should support creation of multiple pools (admin only)
- should support display of available pools
- should support assignment of public IP to a given instance (tenant and admin)
- should support release of public IP from a given instance (tenant and admin)
- may support a admin view that shows Public IP mapping
- IP stats (available, free)
- within tenant (tenant view)
- across tenants (admin view)
## Deletion of a pool
- Currently out of scope. But will involve freeing all instances with that IP and then deleting the pool
## ARP Impacts
- The public IP is mapped to the CNCI mac address (which the mac of the macvtap interface)
- The Public IP's migrate with the CNCI. Hence if a CNCI moves the Public IP moved with it.
- The public IP is held by the CNCI. Hence the CN's and instances do not get impacted and the instances can move around freely.
## Potential CLI
Pool Creation/Deletion
```
ciao-cli floatingip pool create #returns pooluuid
ciao-cli floatingip pool delete -pool <pooluuid>
ciao-cli floatingip pool list
```
Pool Management
```
ciao-cli floatingip ip <add|delete> -pool <pooluuid> -subnet <a.b.c.d/p>
ciao-cli floatingip ip <add|delete> -pool <pooluuid> -ip <a.b.c.d>
ciao-cli floatingip ip <add|delete> -pool <pooluuid> -range <a.b.c.d-a.b.x.y>
ciao-cli floatingip ip list -pool <pooluuid>
```
IP Management
```
ciao-cli floatingip ip <assign|release> -pool <pooluuid> -instance <instanceuuid> #returns IP
ciao-cli floatingip ip release -pool <pooluuid> -all
ciao-cli floatingip ip list -instance <instanceuuid> [-pool <pooluuid>]
```
|
1.0
|
External IP Support: Controller, CLI and Web UI Requirements - Folks,
Floating IP support is being enabled in the CNCI.
## Quick summary:
- SSNTP supports two commands today
https://github.com/01org/ciao/blob/56930eab39e00665cbdcd9f56bd0748f3129ee67/payloads/assignpublicIP.go
- CommandAssignPublicIP
- CommandReleasePublicIP
- The CNCI will start supporting these two commands
- These two commands allow assignment of a Public IP to a given InstanceUUID
## What is a Public IP:
- A public IP can be any IP that is routable at the Data Center underlay (physical layer)
- Hence it can be an internet routable IP or
- A data center local IP which is only routable within the data center
- The CNCI is sitting on the underlay. Hence as long as the traffic makes it to the physical network segment on which the CNCI resides the CNCI will pick it up
Note: Routing of the data center traffic such that the public IP gets routed to the CNCI is outside the scope of Ciao today. BGP or OSPF can be setup on the NN to advertise the fact that a given NN is hosting a CNCI which is hosting a given public IP.
## Concepts:
- Public IP Pool: The pool of public IP's available to Ciao to assign to instances across tenants. The public IP pool is global to Ciao and _not_ tenant specific.
- The public IP pool can be specified in multiple formats
- CIDR: a.b.c.d/p
- Range: a.b.c.d-a.b.x.y
- Individual IPs: a1.b1.c1.d1,a2.b2.c2.d2
- Ciao can have multiple pools at any given time
- Currently there are no plans to assign a pool to a tenant
- A tenant will not be able to choose an IP for a given instance
- The tenant _may_ in the future get to choose which pool the IP can come from
- Even in this case the pool will be an _abstract_ admin defined context
## Requirements for other components:
## Controller:
External API:
- should support creation of a pool of public IPs
- should support creation of multiple such pools
- should support assignment of public IP from a given pool to a given instance
- should support release of public IP from a given instance
- may support public IP stats
- free/in use per pool
Note: In the first version we can support a single default pool for all tenants
## Internal Implementation
- Should pick a free IP from the pool and generate a CommandAssignPublicIP and send it to the CNCI belonging to that tenant
- The controller decides the IP to assign (not the user)
- Should flag an error if the pool is exhausted
- in the future when we support multiple CNCI's per tenant, it should be sent to the CNCI hosting the instance
- Instance deletion handling
- the controller should first release the public IP before deleting the instance
## WebUI
- should support creation of a pool (admin only)
- should support creation of multiple pools (admin only)
- should support display of available pools
- should support assignment of public IP to a given instance (tenant and admin)
- should support release of public IP from a given instance (tenant and admin)
- may support a admin view that shows Public IP mapping
- IP stats (available, free)
- within tenant (tenant view)
- across tenants (admin view)
## Deletion of a pool
- Currently out of scope. But will involve freeing all instances with that IP and then deleting the pool
## ARP Impacts
- The public IP is mapped to the CNCI mac address (which the mac of the macvtap interface)
- The Public IP's migrate with the CNCI. Hence if a CNCI moves the Public IP moved with it.
- The public IP is held by the CNCI. Hence the CN's and instances do not get impacted and the instances can move around freely.
## Potential CLI
Pool Creation/Deletion
```
ciao-cli floatingip pool create #returns pooluuid
ciao-cli floatingip pool delete -pool <pooluuid>
ciao-cli floatingip pool list
```
Pool Management
```
ciao-cli floatingip ip <add|delete> -pool <pooluuid> -subnet <a.b.c.d/p>
ciao-cli floatingip ip <add|delete> -pool <pooluuid> -ip <a.b.c.d>
ciao-cli floatingip ip <add|delete> -pool <pooluuid> -range <a.b.c.d-a.b.x.y>
ciao-cli floatingip ip list -pool <pooluuid>
```
IP Management
```
ciao-cli floatingip ip <assign|release> -pool <pooluuid> -instance <instanceuuid> #returns IP
ciao-cli floatingip ip release -pool <pooluuid> -all
ciao-cli floatingip ip list -instance <instanceuuid> [-pool <pooluuid>]
```
|
non_defect
|
external ip support controller cli and web ui requirements folks floating ip support is being enabled in the cnci quick summary ssntp supports two commands today commandassignpublicip commandreleasepublicip the cnci will start supporting these two commands these two commands allow assignment of a public ip to a given instanceuuid what is a public ip a public ip can be any ip that is routable at the data center underlay physical layer hence it can be an internet routable ip or a data center local ip which is only routable within the data center the cnci is sitting on the underlay hence as long as the traffic makes it to the physical network segment on which the cnci resides the cnci will pick it up note routing of the data center traffic such that the public ip gets routed to the cnci is outside the scope of ciao today bgp or ospf can be setup on the nn to advertise the fact that a given nn is hosting a cnci which is hosting a given public ip concepts public ip pool the pool of public ip s available to ciao to assign to instances across tenants the public ip pool is global to ciao and not tenant specific the public ip pool can be specified in multiple formats cidr a b c d p range a b c d a b x y individual ips ciao can have multiple pools at any given time currently there are no plans to assign a pool to a tenant a tenant will not be able to choose an ip for a given instance the tenant may in the future get to choose which pool the ip can come from even in this case the pool will be an abstract admin defined context requirements for other components controller external api should support creation of a pool of public ips should support creation of multiple such pools should support assignment of public ip from a given pool to a given instance should support release of public ip from a given instance may support public ip stats free in use per pool note in the first version we can support a single default pool for all tenants internal implementation should pick a free ip from the pool and generate a commandassignpublicip and send it to the cnci belonging to that tenant the controller decides the ip to assign not the user should flag an error if the pool is exhausted in the future when we support multiple cnci s per tenant it should be sent to the cnci hosting the instance instance deletion handling the controller should first release the public ip before deleting the instance webui should support creation of a pool admin only should support creation of multiple pools admin only should support display of available pools should support assignment of public ip to a given instance tenant and admin should support release of public ip from a given instance tenant and admin may support a admin view that shows public ip mapping ip stats available free within tenant tenant view across tenants admin view deletion of a pool currently out of scope but will involve freeing all instances with that ip and then deleting the pool arp impacts the public ip is mapped to the cnci mac address which the mac of the macvtap interface the public ip s migrate with the cnci hence if a cnci moves the public ip moved with it the public ip is held by the cnci hence the cn s and instances do not get impacted and the instances can move around freely potential cli pool creation deletion ciao cli floatingip pool create returns pooluuid ciao cli floatingip pool delete pool ciao cli floatingip pool list pool management ciao cli floatingip ip pool subnet ciao cli floatingip ip pool ip ciao cli floatingip ip pool range ciao cli floatingip ip list pool ip management ciao cli floatingip ip pool instance returns ip ciao cli floatingip ip release pool all ciao cli floatingip ip list instance
| 0
|
24,852
| 4,112,780,430
|
IssuesEvent
|
2016-06-07 11:54:44
|
ariya/phantomjs
|
https://api.github.com/repos/ariya/phantomjs
|
closed
|
PhantomJS fails nearly all of my jasmine unit tests
|
old.Priority-Medium old.Status-New old.Type-Defect
|
_**[bla...@gmail.com](http://code.google.com/u/109105014541000086420/) commented:**_
> <b>Which version of PhantomJS are you using? Tip: run 'phantomjs --version'.</b>
1.4.1
>
> <b>What steps will reproduce the problem?</b>
1. Running this test runner here https://github.com/larrymyers/jasmine-reporters/blob/master/test/phantomjs-testrunner.js
> 2. html input includes various jasmine unit tests
> 3. when it produces the junit xml report files, they all state various jasmine failures
>
> <b>What is the expected output? What do you see instead?</b>
I expect none of my tests to fail. They work fine when run in MacOSX command line with same commands. Also works fine in the browser.
>
> <b>Which operating system are you using?</b>
debian squeeze
>
> <b>Did you use binary PhantomJS or did you compile it from source?</b>
compile it from source
>
> <b>Please provide any additional information below.</b>
**Disclaimer:**
This issue was migrated on 2013-03-15 from the project's former issue tracker on Google Code, [Issue #338](http://code.google.com/p/phantomjs/issues/detail?id=338).
:star2: **5** people had starred this issue at the time of migration.
|
1.0
|
PhantomJS fails nearly all of my jasmine unit tests - _**[bla...@gmail.com](http://code.google.com/u/109105014541000086420/) commented:**_
> <b>Which version of PhantomJS are you using? Tip: run 'phantomjs --version'.</b>
1.4.1
>
> <b>What steps will reproduce the problem?</b>
1. Running this test runner here https://github.com/larrymyers/jasmine-reporters/blob/master/test/phantomjs-testrunner.js
> 2. html input includes various jasmine unit tests
> 3. when it produces the junit xml report files, they all state various jasmine failures
>
> <b>What is the expected output? What do you see instead?</b>
I expect none of my tests to fail. They work fine when run in MacOSX command line with same commands. Also works fine in the browser.
>
> <b>Which operating system are you using?</b>
debian squeeze
>
> <b>Did you use binary PhantomJS or did you compile it from source?</b>
compile it from source
>
> <b>Please provide any additional information below.</b>
**Disclaimer:**
This issue was migrated on 2013-03-15 from the project's former issue tracker on Google Code, [Issue #338](http://code.google.com/p/phantomjs/issues/detail?id=338).
:star2: **5** people had starred this issue at the time of migration.
|
defect
|
phantomjs fails nearly all of my jasmine unit tests commented which version of phantomjs are you using tip run phantomjs version what steps will reproduce the problem running this test runner here html input includes various jasmine unit tests when it produces the junit xml report files they all state various jasmine failures what is the expected output what do you see instead i expect none of my tests to fail they work fine when run in macosx command line with same commands also works fine in the browser which operating system are you using debian squeeze did you use binary phantomjs or did you compile it from source compile it from source please provide any additional information below disclaimer this issue was migrated on from the project s former issue tracker on google code nbsp people had starred this issue at the time of migration
| 1
|
796,920
| 28,131,774,191
|
IssuesEvent
|
2023-04-01 00:39:07
|
zulip/zulip-mobile
|
https://api.github.com/repos/zulip/zulip-mobile
|
opened
|
Quote-and-reply should use new `/dm/…` link format (instead of `/pm-with/…`)
|
P1 high-priority blocked on other work server release goal
|
In #5704 (for issue #5692), we started supporting links with the new format: when the user taps such a link, we know how to interpret it.
The old format will probably be supported indefinitely, but it'd be good to switch to generating the new format in realms where the web app and other clients will also be expected to handle it. We'll recognize that condition by looking at the server's feature level.
Once the web app merges support for it and a new server feature level is made, we'll know which feature level to use for that condition, and so this will be ripe to work on.
|
1.0
|
Quote-and-reply should use new `/dm/…` link format (instead of `/pm-with/…`) - In #5704 (for issue #5692), we started supporting links with the new format: when the user taps such a link, we know how to interpret it.
The old format will probably be supported indefinitely, but it'd be good to switch to generating the new format in realms where the web app and other clients will also be expected to handle it. We'll recognize that condition by looking at the server's feature level.
Once the web app merges support for it and a new server feature level is made, we'll know which feature level to use for that condition, and so this will be ripe to work on.
|
non_defect
|
quote and reply should use new dm … link format instead of pm with … in for issue we started supporting links with the new format when the user taps such a link we know how to interpret it the old format will probably be supported indefinitely but it d be good to switch to generating the new format in realms where the web app and other clients will also be expected to handle it we ll recognize that condition by looking at the server s feature level once the web app merges support for it and a new server feature level is made we ll know which feature level to use for that condition and so this will be ripe to work on
| 0
|
34,512
| 30,032,288,707
|
IssuesEvent
|
2023-06-27 10:22:33
|
acterglobal/a3
|
https://api.github.com/repos/acterglobal/a3
|
closed
|
consider using beamer for navigation
|
flutter infrastructure
|
seems pretty powerful and adaptive. maybe we want to use [beamer](https://pub.dev/packages/beamer).
|
1.0
|
consider using beamer for navigation - seems pretty powerful and adaptive. maybe we want to use [beamer](https://pub.dev/packages/beamer).
|
non_defect
|
consider using beamer for navigation seems pretty powerful and adaptive maybe we want to use
| 0
|
28,214
| 5,221,377,921
|
IssuesEvent
|
2017-01-27 01:15:28
|
elTiempoVuela/https-finder
|
https://api.github.com/repos/elTiempoVuela/https-finder
|
closed
|
Automated Restore for Cookies when putting domain on the positive list
|
auto-migrated Priority-Medium Type-Defect
|
```
Problem:
1. Enable both options for Cookies in advanced Tab
2. Go to a page that is broken with https, in this case ubuntuforums.org
3. put this domain on the positive list
4. After reloading the page Cookies are still for encrypted connections and
aren't restored
Cookies of this page should now be restored for an unsecure connection.
Version:
0.89
I had to manually restore the Cookies for an unsecure connection in advanced
Tab. Deletion of Cookies did not help.
```
Original issue reported on code.google.com by `old.man0...@googlemail.com` on 24 Aug 2013 at 3:46
|
1.0
|
Automated Restore for Cookies when putting domain on the positive list - ```
Problem:
1. Enable both options for Cookies in advanced Tab
2. Go to a page that is broken with https, in this case ubuntuforums.org
3. put this domain on the positive list
4. After reloading the page Cookies are still for encrypted connections and
aren't restored
Cookies of this page should now be restored for an unsecure connection.
Version:
0.89
I had to manually restore the Cookies for an unsecure connection in advanced
Tab. Deletion of Cookies did not help.
```
Original issue reported on code.google.com by `old.man0...@googlemail.com` on 24 Aug 2013 at 3:46
|
defect
|
automated restore for cookies when putting domain on the positive list problem enable both options for cookies in advanced tab go to a page that is broken with https in this case ubuntuforums org put this domain on the positive list after reloading the page cookies are still for encrypted connections and aren t restored cookies of this page should now be restored for an unsecure connection version i had to manually restore the cookies for an unsecure connection in advanced tab deletion of cookies did not help original issue reported on code google com by old googlemail com on aug at
| 1
|
252,084
| 18,988,189,709
|
IssuesEvent
|
2021-11-22 01:31:18
|
devjoshi9031/EE217_Final_Project
|
https://api.github.com/repos/devjoshi9031/EE217_Final_Project
|
opened
|
SVD working fine in Python on CPU.
|
documentation
|
This commit implements SVD on a bunch of images and reconstructs all the images in a sequential fashion. At the end of the code, it gives out the total time taken to complete all the operation involved in SVD and reconstruction. This final output metric will be compared with the GPU version of the code, to present the performance speedup with GPU.
commit link: [https://github.com/devjoshi9031/EE217_Final_Project/commit/a61484c4fb4e3e0ecd6cf01dac52d2d3a9bee8bc](url)
|
1.0
|
SVD working fine in Python on CPU. - This commit implements SVD on a bunch of images and reconstructs all the images in a sequential fashion. At the end of the code, it gives out the total time taken to complete all the operation involved in SVD and reconstruction. This final output metric will be compared with the GPU version of the code, to present the performance speedup with GPU.
commit link: [https://github.com/devjoshi9031/EE217_Final_Project/commit/a61484c4fb4e3e0ecd6cf01dac52d2d3a9bee8bc](url)
|
non_defect
|
svd working fine in python on cpu this commit implements svd on a bunch of images and reconstructs all the images in a sequential fashion at the end of the code it gives out the total time taken to complete all the operation involved in svd and reconstruction this final output metric will be compared with the gpu version of the code to present the performance speedup with gpu commit link url
| 0
|
147,354
| 11,783,217,923
|
IssuesEvent
|
2020-03-17 04:47:41
|
ballerina-platform/ballerina-lang
|
https://api.github.com/repos/ballerina-platform/ballerina-lang
|
opened
|
[Testerina] No tests for testerina with services in the tests
|
Area/Tooling Component/Testerina Priority/High
|
**Description:**
We don't seem to have testerina tests with services in the tests folder.
Issue https://github.com/ballerina-platform/ballerina-lang/issues/21840 which fails due to having services should have failed with a simple service in the tests folder.
|
1.0
|
[Testerina] No tests for testerina with services in the tests - **Description:**
We don't seem to have testerina tests with services in the tests folder.
Issue https://github.com/ballerina-platform/ballerina-lang/issues/21840 which fails due to having services should have failed with a simple service in the tests folder.
|
non_defect
|
no tests for testerina with services in the tests description we don t seem to have testerina tests with services in the tests folder issue which fails due to having services should have failed with a simple service in the tests folder
| 0
|
185,281
| 21,785,118,211
|
IssuesEvent
|
2022-05-14 02:33:57
|
alpersonalwebsite/react-state-fetch
|
https://api.github.com/repos/alpersonalwebsite/react-state-fetch
|
closed
|
CVE-2022-0536 (Medium) detected in follow-redirects-1.13.1.tgz - autoclosed
|
security vulnerability
|
## CVE-2022-0536 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>follow-redirects-1.13.1.tgz</b></p></summary>
<p>HTTP and HTTPS modules that follow redirects.</p>
<p>Library home page: <a href="https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.13.1.tgz">https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.13.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/follow-redirects/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-3.3.0.tgz (Root Library)
- webpack-dev-server-3.9.0.tgz
- http-proxy-middleware-0.19.1.tgz
- http-proxy-1.18.1.tgz
- :x: **follow-redirects-1.13.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/alpersonalwebsite/react-state-fetch/commit/b50ebd4668a0d2ff208d87450ba50eff142a47f1">b50ebd4668a0d2ff208d87450ba50eff142a47f1</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.
<p>Publish Date: 2022-02-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0536>CVE-2022-0536</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0536">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0536</a></p>
<p>Release Date: 2022-02-09</p>
<p>Fix Resolution (follow-redirects): 1.14.8</p>
<p>Direct dependency fix Resolution (react-scripts): 3.3.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2022-0536 (Medium) detected in follow-redirects-1.13.1.tgz - autoclosed - ## CVE-2022-0536 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>follow-redirects-1.13.1.tgz</b></p></summary>
<p>HTTP and HTTPS modules that follow redirects.</p>
<p>Library home page: <a href="https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.13.1.tgz">https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.13.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/follow-redirects/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-3.3.0.tgz (Root Library)
- webpack-dev-server-3.9.0.tgz
- http-proxy-middleware-0.19.1.tgz
- http-proxy-1.18.1.tgz
- :x: **follow-redirects-1.13.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/alpersonalwebsite/react-state-fetch/commit/b50ebd4668a0d2ff208d87450ba50eff142a47f1">b50ebd4668a0d2ff208d87450ba50eff142a47f1</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.
<p>Publish Date: 2022-02-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0536>CVE-2022-0536</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0536">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0536</a></p>
<p>Release Date: 2022-02-09</p>
<p>Fix Resolution (follow-redirects): 1.14.8</p>
<p>Direct dependency fix Resolution (react-scripts): 3.3.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve medium detected in follow redirects tgz autoclosed cve medium severity vulnerability vulnerable library follow redirects tgz http and https modules that follow redirects library home page a href path to dependency file package json path to vulnerable library node modules follow redirects package json dependency hierarchy react scripts tgz root library webpack dev server tgz http proxy middleware tgz http proxy tgz x follow redirects tgz vulnerable library found in head commit a href found in base branch master vulnerability details exposure of sensitive information to an unauthorized actor in npm follow redirects prior to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution follow redirects direct dependency fix resolution react scripts step up your open source security game with whitesource
| 0
|
150,299
| 11,955,134,638
|
IssuesEvent
|
2020-04-04 02:55:13
|
RGPosadas/WayFinder
|
https://api.github.com/repos/RGPosadas/WayFinder
|
closed
|
AT-3: Building Location
|
acceptance tests
|
### Issue Tracking
This acceptance test is for #16.
See the test running [here](https://github.com/RGPosadas/WayFinder/wiki/Acceptance-Tests-GIFs#us-3).
### User Flow Acceptance Test
* Press on the crosshair button
* Map centers to the user location
* User is informed if they are in a campus building or not
* If user is in a building, then building info is shown
|
1.0
|
AT-3: Building Location - ### Issue Tracking
This acceptance test is for #16.
See the test running [here](https://github.com/RGPosadas/WayFinder/wiki/Acceptance-Tests-GIFs#us-3).
### User Flow Acceptance Test
* Press on the crosshair button
* Map centers to the user location
* User is informed if they are in a campus building or not
* If user is in a building, then building info is shown
|
non_defect
|
at building location issue tracking this acceptance test is for see the test running user flow acceptance test press on the crosshair button map centers to the user location user is informed if they are in a campus building or not if user is in a building then building info is shown
| 0
|
19,714
| 3,248,229,037
|
IssuesEvent
|
2015-10-17 04:17:43
|
jimradford/superputty
|
https://api.github.com/repos/jimradford/superputty
|
closed
|
Default font change
|
auto-migrated Priority-Medium Type-Defect
|
```
Is it possible to change default font settings for terminal sessions? I use
SuperPuTTY in GNS3 with "-skin 4" option. Color scheme looks nice, but I can
change font settings for one session, but I can't find how to make these
settings default to any another sesseions.
```
Original issue reported on code.google.com by `gnedo...@gmail.com` on 22 Aug 2013 at 5:39
|
1.0
|
Default font change - ```
Is it possible to change default font settings for terminal sessions? I use
SuperPuTTY in GNS3 with "-skin 4" option. Color scheme looks nice, but I can
change font settings for one session, but I can't find how to make these
settings default to any another sesseions.
```
Original issue reported on code.google.com by `gnedo...@gmail.com` on 22 Aug 2013 at 5:39
|
defect
|
default font change is it possible to change default font settings for terminal sessions i use superputty in with skin option color scheme looks nice but i can change font settings for one session but i can t find how to make these settings default to any another sesseions original issue reported on code google com by gnedo gmail com on aug at
| 1
|
11,659
| 9,438,058,218
|
IssuesEvent
|
2019-04-13 20:04:03
|
badges/shields
|
https://api.github.com/repos/badges/shields
|
closed
|
Rewrite GitHub services
|
good first issue service-badge
|
In #2253 I got the ball rolling with rewriting the GitHub services. The changes to the service in that PR are a good model for rewriting any of the remaining services.
You can ignore the changes to the base services and to the GithubAuthService.
~~There have been some small enhancements to BaseService since then which should also be taken into account: #2278 #2279 (and #2308 once it's merged)~~
If folks are comfortable taking any of the remaining `LegacyService`s in `services/github/` and rewriting them along the lines of #2253, please give it a go!
~~At the moment there's also a pull request open (#2309) to move the rest of the GitHub badge examples into `services/github/`, though that hopefully will be merged soon.~~
Ref #1358
|
1.0
|
Rewrite GitHub services - In #2253 I got the ball rolling with rewriting the GitHub services. The changes to the service in that PR are a good model for rewriting any of the remaining services.
You can ignore the changes to the base services and to the GithubAuthService.
~~There have been some small enhancements to BaseService since then which should also be taken into account: #2278 #2279 (and #2308 once it's merged)~~
If folks are comfortable taking any of the remaining `LegacyService`s in `services/github/` and rewriting them along the lines of #2253, please give it a go!
~~At the moment there's also a pull request open (#2309) to move the rest of the GitHub badge examples into `services/github/`, though that hopefully will be merged soon.~~
Ref #1358
|
non_defect
|
rewrite github services in i got the ball rolling with rewriting the github services the changes to the service in that pr are a good model for rewriting any of the remaining services you can ignore the changes to the base services and to the githubauthservice there have been some small enhancements to baseservice since then which should also be taken into account and once it s merged if folks are comfortable taking any of the remaining legacyservice s in services github and rewriting them along the lines of please give it a go at the moment there s also a pull request open to move the rest of the github badge examples into services github though that hopefully will be merged soon ref
| 0
|
20,351
| 3,344,355,726
|
IssuesEvent
|
2015-11-16 03:32:31
|
nbphpcouncil/nb-ci-plugin
|
https://api.github.com/repos/nbphpcouncil/nb-ci-plugin
|
closed
|
CI_DB_active_record was renamed CI_DB_query_builder
|
defect
|
Class `CI_DB_active_record` was renamed `CI_DB_query_builder` in CodeIgniter 3.0.
So if I use 3.0, `$db` can't be auto completed.
|
1.0
|
CI_DB_active_record was renamed CI_DB_query_builder - Class `CI_DB_active_record` was renamed `CI_DB_query_builder` in CodeIgniter 3.0.
So if I use 3.0, `$db` can't be auto completed.
|
defect
|
ci db active record was renamed ci db query builder class ci db active record was renamed ci db query builder in codeigniter so if i use db can t be auto completed
| 1
|
97,815
| 16,246,225,131
|
IssuesEvent
|
2021-05-07 14:54:23
|
DavidSpek/kubeflow
|
https://api.github.com/repos/DavidSpek/kubeflow
|
closed
|
CVE-2020-26215 (Medium) detected in notebook-5.7.10-py2.py3-none-any.whl - autoclosed
|
security vulnerability
|
## CVE-2020-26215 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>notebook-5.7.10-py2.py3-none-any.whl</b></p></summary>
<p>A web-based notebook environment for interactive computing</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/7a/fb/6b1735e8ff43f68e867928526134cd6ba22554d596862a7fe71092ba8fc8/notebook-5.7.10-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/7a/fb/6b1735e8ff43f68e867928526134cd6ba22554d596862a7fe71092ba8fc8/notebook-5.7.10-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: kubeflow/components/example-notebook-servers/jupyter-pytorch-full/requirements.txt</p>
<p>Path to vulnerable library: kubeflow/components/example-notebook-servers/jupyter-pytorch-full/requirements.txt,kubeflow/components/example-notebook-servers/jupyter-scipy/requirements.txt,kubeflow/components/crud-web-apps/common/backend,kubeflow/components/example-notebook-servers/jupyter-tensorflow-full/requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **notebook-5.7.10-py2.py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/DavidSpek/kubeflow/commit/00cbc9d11a3306fed1e979d79dff6ae36749d4bd">00cbc9d11a3306fed1e979d79dff6ae36749d4bd</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Jupyter Notebook before version 6.1.5 has an Open redirect vulnerability. A maliciously crafted link to a notebook server could redirect the browser to a different website. All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may appear safe, but ultimately redirect to a spoofed server on the public internet. The issue is patched in version 6.1.5.
<p>Publish Date: 2020-11-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26215>CVE-2020-26215</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh">https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh</a></p>
<p>Release Date: 2020-11-18</p>
<p>Fix Resolution: 6.1.5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2020-26215 (Medium) detected in notebook-5.7.10-py2.py3-none-any.whl - autoclosed - ## CVE-2020-26215 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>notebook-5.7.10-py2.py3-none-any.whl</b></p></summary>
<p>A web-based notebook environment for interactive computing</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/7a/fb/6b1735e8ff43f68e867928526134cd6ba22554d596862a7fe71092ba8fc8/notebook-5.7.10-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/7a/fb/6b1735e8ff43f68e867928526134cd6ba22554d596862a7fe71092ba8fc8/notebook-5.7.10-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: kubeflow/components/example-notebook-servers/jupyter-pytorch-full/requirements.txt</p>
<p>Path to vulnerable library: kubeflow/components/example-notebook-servers/jupyter-pytorch-full/requirements.txt,kubeflow/components/example-notebook-servers/jupyter-scipy/requirements.txt,kubeflow/components/crud-web-apps/common/backend,kubeflow/components/example-notebook-servers/jupyter-tensorflow-full/requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **notebook-5.7.10-py2.py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/DavidSpek/kubeflow/commit/00cbc9d11a3306fed1e979d79dff6ae36749d4bd">00cbc9d11a3306fed1e979d79dff6ae36749d4bd</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Jupyter Notebook before version 6.1.5 has an Open redirect vulnerability. A maliciously crafted link to a notebook server could redirect the browser to a different website. All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may appear safe, but ultimately redirect to a spoofed server on the public internet. The issue is patched in version 6.1.5.
<p>Publish Date: 2020-11-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26215>CVE-2020-26215</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh">https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh</a></p>
<p>Release Date: 2020-11-18</p>
<p>Fix Resolution: 6.1.5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve medium detected in notebook none any whl autoclosed cve medium severity vulnerability vulnerable library notebook none any whl a web based notebook environment for interactive computing library home page a href path to dependency file kubeflow components example notebook servers jupyter pytorch full requirements txt path to vulnerable library kubeflow components example notebook servers jupyter pytorch full requirements txt kubeflow components example notebook servers jupyter scipy requirements txt kubeflow components crud web apps common backend kubeflow components example notebook servers jupyter tensorflow full requirements txt dependency hierarchy x notebook none any whl vulnerable library found in head commit a href found in base branch master vulnerability details jupyter notebook before version has an open redirect vulnerability a maliciously crafted link to a notebook server could redirect the browser to a different website all notebook servers are technically affected however these maliciously crafted links can only be reasonably made for known notebook server hosts a link to your notebook server may appear safe but ultimately redirect to a spoofed server on the public internet the issue is patched in version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
| 0
|
35,278
| 7,675,448,190
|
IssuesEvent
|
2018-05-15 08:43:34
|
jOOQ/jOOQ
|
https://api.github.com/repos/jOOQ/jOOQ
|
opened
|
Datetime arithmetic generates bind values when input uses inline values
|
C: Functionality P: Low T: Defect
|
This can be reproduced on the translator (https://www.jooq.org/translate) when parsing:
```sql
SELECT timestamp '2018-01-01 00:00:00' + interval '+1 10:00:00'
```
For SQL Server, this will produce
```sql
select dateadd(ss, ?, cast('2018-01-01 00:00:00.0' as datetime));
-- problem here ^
```
|
1.0
|
Datetime arithmetic generates bind values when input uses inline values - This can be reproduced on the translator (https://www.jooq.org/translate) when parsing:
```sql
SELECT timestamp '2018-01-01 00:00:00' + interval '+1 10:00:00'
```
For SQL Server, this will produce
```sql
select dateadd(ss, ?, cast('2018-01-01 00:00:00.0' as datetime));
-- problem here ^
```
|
defect
|
datetime arithmetic generates bind values when input uses inline values this can be reproduced on the translator when parsing sql select timestamp interval for sql server this will produce sql select dateadd ss cast as datetime problem here
| 1
|
63,365
| 6,844,507,468
|
IssuesEvent
|
2017-11-13 01:58:16
|
brave/browser-laptop
|
https://api.github.com/repos/brave/browser-laptop
|
opened
|
Manual test run on Linux for 0.19.x Hotfix 5 (Release channel)
|
OS/unix-like/linux release-notes/exclude tests
|
## Per release specialty tests
## Installer
- [ ] Check that installer is close to the size of last release.
- [ ] Check signature: If OS Run `spctl --assess --verbose /Applications/Brave.app/` and make sure it returns `accepted`. If Windows right click on the installer exe and go to Properties, go to the Digital Signatures tab and double click on the signature. Make sure it says "The digital signature is OK" in the popup window.
- [ ] Check Brave, muon, and libchromiumcontent version in `about:brave` and make sure it is EXACTLY as expected.
## Data
- [ ] Make sure that data from the last version appears in the new version OK.
- [ ] With data from the last version, test that
- [ ] cookies are preserved
- [ ] pinned tabs can be opened
- [ ] pinned tabs can be unpinned
- [ ] unpinned tabs can be re-pinned
- [ ] opened tabs can be reloaded
- [ ] bookmarks on the bookmark toolbar can be opened
- [ ] bookmarks in the bookmark folder toolbar can be opened
## Last changeset test
- [ ] Test what is covered by the last changeset (you can find this by clicking on the SHA in about:brave).
## Widevine/Netflix test
- [ ] Test that you can log into Netflix and start a show.
## Ledger
- [ ] Verify wallet is auto created after enabling payments
- [ ] Verify monthly budget and account balance shows correct BAT and USD value
- [ ] Click on `add funds` and click on each currency and verify it shows wallet address and QR Code
- [ ] Verify that Brave BAT wallet address can be copied
- [ ] Verify adding funds via any of the currencies flows into BAT Wallet after specified amount of time
- [ ] Verify adding funds to an existing wallet with amount, adjusts the BAT value appropriately
- [ ] Change min visit and min time in advance setting and verify if the publisher list gets updated based on new setting
- [ ] Visit nytimes.com for a few seconds and make sure it shows up in the Payments table.
- [ ] Check that disabling payments and enabling them again does not lose state.
- [ ] Upgrade from older version
- [ ] Verify the wallet overlay is shown when wallet transition is happening upon upgrade
- [ ] Verify transition overlay is shown post upgrade even if the payment is disabled before upgrade
- [ ] Verify publishers list is not lost after upgrade when payment is disabled in the older version
## Sync
- [ ] Verify you are able to sync two devices using the secret code
- [ ] Visit a site on device 1 and change shield setting, ensure that the saved site preference is synced to device 2
- [ ] Enable Browsing history sync on device 1, ensure the history is shown on device 2
- [ ] Import/Add bookmarks on device 1, ensure it is synced on device 2
- [ ] Ensure imported bookmark folder structure is maintained on device 2
- [ ] Ensure bookmark favicons are shown after sync
## About pages
- [ ] Test that about:adblock loads
- [ ] Test that about:autofill loads
- [ ] Test that about:bookmarks loads bookmarks
- [ ] Test that about:downloads loads downloads
- [ ] Test that about:extensions loads
- [ ] Test that about:history loads history
- [ ] Test that about:passwords loads
- [ ] Test that about:styles loads
- [ ] Test that about:welcome loads
- [ ] Test that about:preferences changing a preference takes effect right away
- [ ] Test that about:preferences language change takes effect on re-start
## Bookmarks
- [ ] Test that creating a bookmark on the bookmarks toolbar with the star button works
- [ ] Test that creating a bookmark on the bookmarks toolbar by dragging the un/lock icon works
- [ ] Test that creating a bookmark folder on the bookmarks toolbar works
- [ ] Test that moving a bookmark into a folder by drag and drop on the bookmarks folder works
- [ ] Test that clicking a bookmark in the toolbar loads the bookmark.
- [ ] Test that clicking a bookmark in a bookmark toolbar folder loads the bookmark.
- [ ] Test that a bookmark on the bookmark toolbar can be removed via context menu
- [ ] Test that a bookmark in a bookmark folder on the bookmark toolbar can be removed via context menu
- [ ] Test that a bookmark subfolder can be removed via context menu
- [ ] Test that a bookmark folder on the bookmark toolbar can be removed via context menu
## Context menus
- [ ] Make sure context menu items in the URL bar work
- [ ] Make sure context menu items on content work with no selected text.
- [ ] Make sure context menu items on content work with selected text.
- [ ] Make sure context menu items on content work inside an editable control on `about:styles` (input, textarea, or contenteditable).
## Find on page
- [ ] Ensure search box is shown with shortcut
- [ ] Test successful find
- [ ] Test forward and backward find navigation
- [ ] Test failed find shows 0 results
- [ ] Test match case find
## Geolocation
- [ ] Check that https://developer.mozilla.org/en-US/docs/Web/API/Geolocation/Using_geolocation works
## Site hacks
- [ ] Test https://www.twitch.tv/adobe sub-page loads a video and you can play it
## Downloads
- [ ] Test downloading a file works and that all actions on the download item works.
## Fullscreen
- [ ] Test that entering full screen window works View -> Toggle Full Screen. And exit back (Not Esc).
- [ ] Test that entering HTML5 full screen works. And Esc to go back. (youtube.com)
## Tabs, Pinning and Tear off tabs
- [ ] Test that tabs are pinnable
- [ ] Test that tabs are unpinnable
- [ ] Test that tabs are draggable to same tabset
- [ ] Test that tabs are draggable to alternate tabset
- [ ] Test that tabs can be teared off into a new window
- [ ] Test that you are able to reattach a tab that is teared off into a new window
- [ ] Test that tab pages can be closed
- [ ] Test that tab pages can be muted
## Zoom
- [ ] Test zoom in / out shortcut works
- [ ] Test hamburger menu zooms.
- [ ] Test zoom saved when you close the browser and restore on a single site.
- [ ] Test zoom saved when you navigate within a single origin site.
- [ ] Test that navigating to a different origin resets the zoom
## Bravery settings
- [ ] Check that HTTPS Everywhere works by loading https://https-everywhere.badssl.com/
- [ ] Turning HTTPS Everywhere off and shields off both disable the redirect to https://https-everywhere.badssl.com/
- [ ] Check that ad replacement works on http://slashdot.org
- [ ] Check that toggling to blocking and allow ads works as expected.
- [ ] Test that clicking through a cert error in https://badssl.com/ works.
- [ ] Test that Safe Browsing works (https://www.raisegame.com/)
- [ ] Turning Safe Browsing off and shields off both disable safe browsing for https://www.raisegame.com/.
- [ ] Visit https://brianbondy.com/ and then turn on script blocking, nothing should load. Allow it from the script blocking UI in the URL bar and it should work.
- [ ] Test that about:preferences default Bravery settings take effect on pages with no site settings.
- [ ] Test that turning on fingerprinting protection in about:preferences shows 3 fingerprints blocked at https://jsfiddle.net/bkf50r8v/13/. Test that turning it off in the Bravery menu shows 0 fingerprints blocked.
- [ ] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/9/ when 3rd party cookies are blocked and not blank when 3rd party cookies are unblocked.
- [ ] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ when fingerprinting protection is on.
- [ ] Test that browser is not detected on https://extensions.inrialpes.fr/brave/
## Content tests
- [ ] Go to https://brianbondy.com/ and click on the twitter icon on the top right. Test that context menus work in the new twitter tab.
- [ ] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows.
- [ ] Go to https://www.bennish.net/web-notifications.html and test that clicking on 'Show' pops up a notification asking for permission. Make sure that clicking 'Deny' leads to no notifications being shown.
- [ ] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password shows up in `about:passwords`. Then reload https://trac.torproject.org/projects/tor/login and make sure the password is autofilled.
- [ ] Open `about:styles` and type some misspellings on a textbox, make sure they are underlined.
- [ ] Make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text.
- [ ] Make sure that Command + Click (Control + Click on Windows, Control + Click on Ubuntu) on a link opens a new tab but does NOT switch to it. Click on it and make sure it is already loaded.
- [ ] Open an email on http://mail.google.com/ or inbox.google.com and click on a link. Make sure it works.
- [ ] Test that PDF is loaded at http://www.orimi.com/pdf-test.pdf
- [ ] Test that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run).
## Flash tests
- [ ] Test that flash placeholder appears on http://www.homestarrunner.com
- [ ] Test with flash enabled in preferences, auto play option is shown when visiting http://www.homestarrunner.com
## Autofill tests
- [ ] Test that autofill works on http://www.roboform.com/filling-test-all-fields
## Session storage
Do not forget to make a backup of your entire `~/Library/Application\ Support/Brave` folder.
- [ ] Temporarily move away your `~/Library/Application\ Support/Brave/session-store-1` and test that clean session storage works. (`%appdata%\Brave` in Windows, `./config/brave` in Ubuntu)
- [ ] Test that windows and tabs restore when closed, including active tab.
- [ ] Move away your entire `~/Library/Application\ Support/Brave` folder (`%appdata%\Brave` in Windows, `./config/brave` in Ubuntu)
## Cookie and Cache
- [ ] Make a backup of your profile, turn on all clearing in preferences and shut down. Make sure when you bring the browser back up everything is gone that is specified.
- [ ] Go to http://samy.pl/evercookie/ and set an evercookie. Check that going to prefs, clearing site data and cache, and going back to the Evercookie site does not remember the old evercookie value.
## Update tests
- [ ] Test that updating using `BRAVE_UPDATE_VERSION=0.8.3` env variable works correctly.
- [ ] Test that using `BRAVE_ENABLE_PREVIEW_UPDATES=TRUE` env variable works and prompts for preview build updates.
|
1.0
|
Manual test run on Linux for 0.19.x Hotfix 5 (Release channel) - ## Per release specialty tests
## Installer
- [ ] Check that installer is close to the size of last release.
- [ ] Check signature: If OS Run `spctl --assess --verbose /Applications/Brave.app/` and make sure it returns `accepted`. If Windows right click on the installer exe and go to Properties, go to the Digital Signatures tab and double click on the signature. Make sure it says "The digital signature is OK" in the popup window.
- [ ] Check Brave, muon, and libchromiumcontent version in `about:brave` and make sure it is EXACTLY as expected.
## Data
- [ ] Make sure that data from the last version appears in the new version OK.
- [ ] With data from the last version, test that
- [ ] cookies are preserved
- [ ] pinned tabs can be opened
- [ ] pinned tabs can be unpinned
- [ ] unpinned tabs can be re-pinned
- [ ] opened tabs can be reloaded
- [ ] bookmarks on the bookmark toolbar can be opened
- [ ] bookmarks in the bookmark folder toolbar can be opened
## Last changeset test
- [ ] Test what is covered by the last changeset (you can find this by clicking on the SHA in about:brave).
## Widevine/Netflix test
- [ ] Test that you can log into Netflix and start a show.
## Ledger
- [ ] Verify wallet is auto created after enabling payments
- [ ] Verify monthly budget and account balance shows correct BAT and USD value
- [ ] Click on `add funds` and click on each currency and verify it shows wallet address and QR Code
- [ ] Verify that Brave BAT wallet address can be copied
- [ ] Verify adding funds via any of the currencies flows into BAT Wallet after specified amount of time
- [ ] Verify adding funds to an existing wallet with amount, adjusts the BAT value appropriately
- [ ] Change min visit and min time in advance setting and verify if the publisher list gets updated based on new setting
- [ ] Visit nytimes.com for a few seconds and make sure it shows up in the Payments table.
- [ ] Check that disabling payments and enabling them again does not lose state.
- [ ] Upgrade from older version
- [ ] Verify the wallet overlay is shown when wallet transition is happening upon upgrade
- [ ] Verify transition overlay is shown post upgrade even if the payment is disabled before upgrade
- [ ] Verify publishers list is not lost after upgrade when payment is disabled in the older version
## Sync
- [ ] Verify you are able to sync two devices using the secret code
- [ ] Visit a site on device 1 and change shield setting, ensure that the saved site preference is synced to device 2
- [ ] Enable Browsing history sync on device 1, ensure the history is shown on device 2
- [ ] Import/Add bookmarks on device 1, ensure it is synced on device 2
- [ ] Ensure imported bookmark folder structure is maintained on device 2
- [ ] Ensure bookmark favicons are shown after sync
## About pages
- [ ] Test that about:adblock loads
- [ ] Test that about:autofill loads
- [ ] Test that about:bookmarks loads bookmarks
- [ ] Test that about:downloads loads downloads
- [ ] Test that about:extensions loads
- [ ] Test that about:history loads history
- [ ] Test that about:passwords loads
- [ ] Test that about:styles loads
- [ ] Test that about:welcome loads
- [ ] Test that about:preferences changing a preference takes effect right away
- [ ] Test that about:preferences language change takes effect on re-start
## Bookmarks
- [ ] Test that creating a bookmark on the bookmarks toolbar with the star button works
- [ ] Test that creating a bookmark on the bookmarks toolbar by dragging the un/lock icon works
- [ ] Test that creating a bookmark folder on the bookmarks toolbar works
- [ ] Test that moving a bookmark into a folder by drag and drop on the bookmarks folder works
- [ ] Test that clicking a bookmark in the toolbar loads the bookmark.
- [ ] Test that clicking a bookmark in a bookmark toolbar folder loads the bookmark.
- [ ] Test that a bookmark on the bookmark toolbar can be removed via context menu
- [ ] Test that a bookmark in a bookmark folder on the bookmark toolbar can be removed via context menu
- [ ] Test that a bookmark subfolder can be removed via context menu
- [ ] Test that a bookmark folder on the bookmark toolbar can be removed via context menu
## Context menus
- [ ] Make sure context menu items in the URL bar work
- [ ] Make sure context menu items on content work with no selected text.
- [ ] Make sure context menu items on content work with selected text.
- [ ] Make sure context menu items on content work inside an editable control on `about:styles` (input, textarea, or contenteditable).
## Find on page
- [ ] Ensure search box is shown with shortcut
- [ ] Test successful find
- [ ] Test forward and backward find navigation
- [ ] Test failed find shows 0 results
- [ ] Test match case find
## Geolocation
- [ ] Check that https://developer.mozilla.org/en-US/docs/Web/API/Geolocation/Using_geolocation works
## Site hacks
- [ ] Test https://www.twitch.tv/adobe sub-page loads a video and you can play it
## Downloads
- [ ] Test downloading a file works and that all actions on the download item works.
## Fullscreen
- [ ] Test that entering full screen window works View -> Toggle Full Screen. And exit back (Not Esc).
- [ ] Test that entering HTML5 full screen works. And Esc to go back. (youtube.com)
## Tabs, Pinning and Tear off tabs
- [ ] Test that tabs are pinnable
- [ ] Test that tabs are unpinnable
- [ ] Test that tabs are draggable to same tabset
- [ ] Test that tabs are draggable to alternate tabset
- [ ] Test that tabs can be teared off into a new window
- [ ] Test that you are able to reattach a tab that is teared off into a new window
- [ ] Test that tab pages can be closed
- [ ] Test that tab pages can be muted
## Zoom
- [ ] Test zoom in / out shortcut works
- [ ] Test hamburger menu zooms.
- [ ] Test zoom saved when you close the browser and restore on a single site.
- [ ] Test zoom saved when you navigate within a single origin site.
- [ ] Test that navigating to a different origin resets the zoom
## Bravery settings
- [ ] Check that HTTPS Everywhere works by loading https://https-everywhere.badssl.com/
- [ ] Turning HTTPS Everywhere off and shields off both disable the redirect to https://https-everywhere.badssl.com/
- [ ] Check that ad replacement works on http://slashdot.org
- [ ] Check that toggling to blocking and allow ads works as expected.
- [ ] Test that clicking through a cert error in https://badssl.com/ works.
- [ ] Test that Safe Browsing works (https://www.raisegame.com/)
- [ ] Turning Safe Browsing off and shields off both disable safe browsing for https://www.raisegame.com/.
- [ ] Visit https://brianbondy.com/ and then turn on script blocking, nothing should load. Allow it from the script blocking UI in the URL bar and it should work.
- [ ] Test that about:preferences default Bravery settings take effect on pages with no site settings.
- [ ] Test that turning on fingerprinting protection in about:preferences shows 3 fingerprints blocked at https://jsfiddle.net/bkf50r8v/13/. Test that turning it off in the Bravery menu shows 0 fingerprints blocked.
- [ ] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/9/ when 3rd party cookies are blocked and not blank when 3rd party cookies are unblocked.
- [ ] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ when fingerprinting protection is on.
- [ ] Test that browser is not detected on https://extensions.inrialpes.fr/brave/
## Content tests
- [ ] Go to https://brianbondy.com/ and click on the twitter icon on the top right. Test that context menus work in the new twitter tab.
- [ ] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows.
- [ ] Go to https://www.bennish.net/web-notifications.html and test that clicking on 'Show' pops up a notification asking for permission. Make sure that clicking 'Deny' leads to no notifications being shown.
- [ ] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password shows up in `about:passwords`. Then reload https://trac.torproject.org/projects/tor/login and make sure the password is autofilled.
- [ ] Open `about:styles` and type some misspellings on a textbox, make sure they are underlined.
- [ ] Make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text.
- [ ] Make sure that Command + Click (Control + Click on Windows, Control + Click on Ubuntu) on a link opens a new tab but does NOT switch to it. Click on it and make sure it is already loaded.
- [ ] Open an email on http://mail.google.com/ or inbox.google.com and click on a link. Make sure it works.
- [ ] Test that PDF is loaded at http://www.orimi.com/pdf-test.pdf
- [ ] Test that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run).
## Flash tests
- [ ] Test that flash placeholder appears on http://www.homestarrunner.com
- [ ] Test with flash enabled in preferences, auto play option is shown when visiting http://www.homestarrunner.com
## Autofill tests
- [ ] Test that autofill works on http://www.roboform.com/filling-test-all-fields
## Session storage
Do not forget to make a backup of your entire `~/Library/Application\ Support/Brave` folder.
- [ ] Temporarily move away your `~/Library/Application\ Support/Brave/session-store-1` and test that clean session storage works. (`%appdata%\Brave` in Windows, `./config/brave` in Ubuntu)
- [ ] Test that windows and tabs restore when closed, including active tab.
- [ ] Move away your entire `~/Library/Application\ Support/Brave` folder (`%appdata%\Brave` in Windows, `./config/brave` in Ubuntu)
## Cookie and Cache
- [ ] Make a backup of your profile, turn on all clearing in preferences and shut down. Make sure when you bring the browser back up everything is gone that is specified.
- [ ] Go to http://samy.pl/evercookie/ and set an evercookie. Check that going to prefs, clearing site data and cache, and going back to the Evercookie site does not remember the old evercookie value.
## Update tests
- [ ] Test that updating using `BRAVE_UPDATE_VERSION=0.8.3` env variable works correctly.
- [ ] Test that using `BRAVE_ENABLE_PREVIEW_UPDATES=TRUE` env variable works and prompts for preview build updates.
|
non_defect
|
manual test run on linux for x hotfix release channel per release specialty tests installer check that installer is close to the size of last release check signature if os run spctl assess verbose applications brave app and make sure it returns accepted if windows right click on the installer exe and go to properties go to the digital signatures tab and double click on the signature make sure it says the digital signature is ok in the popup window check brave muon and libchromiumcontent version in about brave and make sure it is exactly as expected data make sure that data from the last version appears in the new version ok with data from the last version test that cookies are preserved pinned tabs can be opened pinned tabs can be unpinned unpinned tabs can be re pinned opened tabs can be reloaded bookmarks on the bookmark toolbar can be opened bookmarks in the bookmark folder toolbar can be opened last changeset test test what is covered by the last changeset you can find this by clicking on the sha in about brave widevine netflix test test that you can log into netflix and start a show ledger verify wallet is auto created after enabling payments verify monthly budget and account balance shows correct bat and usd value click on add funds and click on each currency and verify it shows wallet address and qr code verify that brave bat wallet address can be copied verify adding funds via any of the currencies flows into bat wallet after specified amount of time verify adding funds to an existing wallet with amount adjusts the bat value appropriately change min visit and min time in advance setting and verify if the publisher list gets updated based on new setting visit nytimes com for a few seconds and make sure it shows up in the payments table check that disabling payments and enabling them again does not lose state upgrade from older version verify the wallet overlay is shown when wallet transition is happening upon upgrade verify transition overlay is shown post upgrade even if the payment is disabled before upgrade verify publishers list is not lost after upgrade when payment is disabled in the older version sync verify you are able to sync two devices using the secret code visit a site on device and change shield setting ensure that the saved site preference is synced to device enable browsing history sync on device ensure the history is shown on device import add bookmarks on device ensure it is synced on device ensure imported bookmark folder structure is maintained on device ensure bookmark favicons are shown after sync about pages test that about adblock loads test that about autofill loads test that about bookmarks loads bookmarks test that about downloads loads downloads test that about extensions loads test that about history loads history test that about passwords loads test that about styles loads test that about welcome loads test that about preferences changing a preference takes effect right away test that about preferences language change takes effect on re start bookmarks test that creating a bookmark on the bookmarks toolbar with the star button works test that creating a bookmark on the bookmarks toolbar by dragging the un lock icon works test that creating a bookmark folder on the bookmarks toolbar works test that moving a bookmark into a folder by drag and drop on the bookmarks folder works test that clicking a bookmark in the toolbar loads the bookmark test that clicking a bookmark in a bookmark toolbar folder loads the bookmark test that a bookmark on the bookmark toolbar can be removed via context menu test that a bookmark in a bookmark folder on the bookmark toolbar can be removed via context menu test that a bookmark subfolder can be removed via context menu test that a bookmark folder on the bookmark toolbar can be removed via context menu context menus make sure context menu items in the url bar work make sure context menu items on content work with no selected text make sure context menu items on content work with selected text make sure context menu items on content work inside an editable control on about styles input textarea or contenteditable find on page ensure search box is shown with shortcut test successful find test forward and backward find navigation test failed find shows results test match case find geolocation check that works site hacks test sub page loads a video and you can play it downloads test downloading a file works and that all actions on the download item works fullscreen test that entering full screen window works view toggle full screen and exit back not esc test that entering full screen works and esc to go back youtube com tabs pinning and tear off tabs test that tabs are pinnable test that tabs are unpinnable test that tabs are draggable to same tabset test that tabs are draggable to alternate tabset test that tabs can be teared off into a new window test that you are able to reattach a tab that is teared off into a new window test that tab pages can be closed test that tab pages can be muted zoom test zoom in out shortcut works test hamburger menu zooms test zoom saved when you close the browser and restore on a single site test zoom saved when you navigate within a single origin site test that navigating to a different origin resets the zoom bravery settings check that https everywhere works by loading turning https everywhere off and shields off both disable the redirect to check that ad replacement works on check that toggling to blocking and allow ads works as expected test that clicking through a cert error in works test that safe browsing works turning safe browsing off and shields off both disable safe browsing for visit and then turn on script blocking nothing should load allow it from the script blocking ui in the url bar and it should work test that about preferences default bravery settings take effect on pages with no site settings test that turning on fingerprinting protection in about preferences shows fingerprints blocked at test that turning it off in the bravery menu shows fingerprints blocked test that party storage results are blank at when party cookies are blocked and not blank when party cookies are unblocked test that audio fingerprint is blocked at when fingerprinting protection is on test that browser is not detected on content tests go to and click on the twitter icon on the top right test that context menus work in the new twitter tab load twitter and click on a tweet so the popup div shows click to dismiss and repeat with another div make sure it shows go to and test that clicking on show pops up a notification asking for permission make sure that clicking deny leads to no notifications being shown go to and make sure that the password can be saved make sure the saved password shows up in about passwords then reload and make sure the password is autofilled open about styles and type some misspellings on a textbox make sure they are underlined make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text make sure that command click control click on windows control click on ubuntu on a link opens a new tab but does not switch to it click on it and make sure it is already loaded open an email on or inbox google com and click on a link make sure it works test that pdf is loaded at test that shows up as grey not red no mixed content scripts are run flash tests test that flash placeholder appears on test with flash enabled in preferences auto play option is shown when visiting autofill tests test that autofill works on session storage do not forget to make a backup of your entire library application support brave folder temporarily move away your library application support brave session store and test that clean session storage works appdata brave in windows config brave in ubuntu test that windows and tabs restore when closed including active tab move away your entire library application support brave folder appdata brave in windows config brave in ubuntu cookie and cache make a backup of your profile turn on all clearing in preferences and shut down make sure when you bring the browser back up everything is gone that is specified go to and set an evercookie check that going to prefs clearing site data and cache and going back to the evercookie site does not remember the old evercookie value update tests test that updating using brave update version env variable works correctly test that using brave enable preview updates true env variable works and prompts for preview build updates
| 0
|
550,243
| 16,107,867,504
|
IssuesEvent
|
2021-04-27 17:03:00
|
googleapis/google-auth-library-nodejs
|
https://api.github.com/repos/googleapis/google-auth-library-nodejs
|
closed
|
IAP rejects requests from other GAE
|
external priority: p2 type: bug
|
I've been trying for way too long to get this to work, so I apologize if any rudeness or mistakes come from this:
I'm trying to send a PUT request from one App Engine instance to another App Engine instance. I am getting a client like so:
```ts
const client = await auth.getClient();
```
Correct me if I'm wrong, but that should give me a client with the default GAE service account when run in GAE.
I then send a request like so:
```ts
await client.request({
method: 'PUT',
url:
'https://myservice-dot-my-project.appspot.com/api/cool-endpoint?myvar=value',
data: { some, body, once, told, me },
});
```
I also tried setting target_audience before the request (although it gives a type error):
```ts
client.additionalClaims = {
target_audience:
'133742036069-s0m3numb3rs4nd13773rz.apps.googleusercontent.com',
};
```
With or without the audience claim, I get this thrown in my head:
`GaxiosError: Invalid IAP credentials: Base64 decode failed on token: ya29.c.<redacted - looks like base64, but weird letters come out when trying to decode>`
Probably the most annoying thing is that I can get it to work with `auth.fromJSON` and providing the json with keys locally. But this is not an option, as the team doesn't want to manage json files for all our apps in all environments.
I have gone through tons of documentation, SO questions, GitHub issues... There's no signs that anyone has seen this issue before - or even tried to use the default service account given by app engine when going through IAP.
Please help, I'm getting desperate.
---
#### Environment details
- App Engine Flex
- Node.js version: latest
- npm version: latest
- `google-auth-library` version: latest
#### Steps to reproduce
1. Make an endpoint of some sort with IAP protection
2. Copy paste code snippets above and insert said endpoint in url
3. Deploy on GAE flex
|
1.0
|
IAP rejects requests from other GAE - I've been trying for way too long to get this to work, so I apologize if any rudeness or mistakes come from this:
I'm trying to send a PUT request from one App Engine instance to another App Engine instance. I am getting a client like so:
```ts
const client = await auth.getClient();
```
Correct me if I'm wrong, but that should give me a client with the default GAE service account when run in GAE.
I then send a request like so:
```ts
await client.request({
method: 'PUT',
url:
'https://myservice-dot-my-project.appspot.com/api/cool-endpoint?myvar=value',
data: { some, body, once, told, me },
});
```
I also tried setting target_audience before the request (although it gives a type error):
```ts
client.additionalClaims = {
target_audience:
'133742036069-s0m3numb3rs4nd13773rz.apps.googleusercontent.com',
};
```
With or without the audience claim, I get this thrown in my head:
`GaxiosError: Invalid IAP credentials: Base64 decode failed on token: ya29.c.<redacted - looks like base64, but weird letters come out when trying to decode>`
Probably the most annoying thing is that I can get it to work with `auth.fromJSON` and providing the json with keys locally. But this is not an option, as the team doesn't want to manage json files for all our apps in all environments.
I have gone through tons of documentation, SO questions, GitHub issues... There's no signs that anyone has seen this issue before - or even tried to use the default service account given by app engine when going through IAP.
Please help, I'm getting desperate.
---
#### Environment details
- App Engine Flex
- Node.js version: latest
- npm version: latest
- `google-auth-library` version: latest
#### Steps to reproduce
1. Make an endpoint of some sort with IAP protection
2. Copy paste code snippets above and insert said endpoint in url
3. Deploy on GAE flex
|
non_defect
|
iap rejects requests from other gae i ve been trying for way too long to get this to work so i apologize if any rudeness or mistakes come from this i m trying to send a put request from one app engine instance to another app engine instance i am getting a client like so ts const client await auth getclient correct me if i m wrong but that should give me a client with the default gae service account when run in gae i then send a request like so ts await client request method put url data some body once told me i also tried setting target audience before the request although it gives a type error ts client additionalclaims target audience apps googleusercontent com with or without the audience claim i get this thrown in my head gaxioserror invalid iap credentials decode failed on token c probably the most annoying thing is that i can get it to work with auth fromjson and providing the json with keys locally but this is not an option as the team doesn t want to manage json files for all our apps in all environments i have gone through tons of documentation so questions github issues there s no signs that anyone has seen this issue before or even tried to use the default service account given by app engine when going through iap please help i m getting desperate environment details app engine flex node js version latest npm version latest google auth library version latest steps to reproduce make an endpoint of some sort with iap protection copy paste code snippets above and insert said endpoint in url deploy on gae flex
| 0
|
46,952
| 6,034,900,061
|
IssuesEvent
|
2017-06-09 12:32:44
|
CCBlueX/LiquidBounce1.8-Issues
|
https://api.github.com/repos/CCBlueX/LiquidBounce1.8-Issues
|
closed
|
Settings im Panel der Kategorie (ClickGUI)
|
Declined Feature request GUI (Design etc)
|
Packt bitte die Settings in den Kategorie Reiter, und nicht daneben, dann ist es viel übersichtlicher, und wird durch Scrollen auch nicht zu groß.
Und falls das nichts wird, macht bitte die Settings an der Seite scrollbar, dass man auch auf kleineren Bildschirmen alles sehen kann.
|
1.0
|
Settings im Panel der Kategorie (ClickGUI) - Packt bitte die Settings in den Kategorie Reiter, und nicht daneben, dann ist es viel übersichtlicher, und wird durch Scrollen auch nicht zu groß.
Und falls das nichts wird, macht bitte die Settings an der Seite scrollbar, dass man auch auf kleineren Bildschirmen alles sehen kann.
|
non_defect
|
settings im panel der kategorie clickgui packt bitte die settings in den kategorie reiter und nicht daneben dann ist es viel übersichtlicher und wird durch scrollen auch nicht zu groß und falls das nichts wird macht bitte die settings an der seite scrollbar dass man auch auf kleineren bildschirmen alles sehen kann
| 0
|
19,990
| 10,440,580,835
|
IssuesEvent
|
2019-09-18 09:00:48
|
arielorn/goalert
|
https://api.github.com/repos/arielorn/goalert
|
opened
|
CVE-2019-6284 (Medium) detected in opennms-opennms-source-23.0.0-1
|
security vulnerability
|
## CVE-2019-6284 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opennmsopennms-source-23.0.0-1</b></p></summary>
<p>
<p>A Java based fault and performance management system</p>
<p>Library home page: <a href=https://sourceforge.net/projects/opennms/>https://sourceforge.net/projects/opennms/</a></p>
<p>Found in HEAD commit: <a href="https://github.com/arielorn/goalert/commit/d1ee160c4a73efd8a5070ef5ee8355048f0f771d">d1ee160c4a73efd8a5070ef5ee8355048f0f771d</a></p>
</p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Library Source Files (62)</summary>
<p></p>
<p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p>
<p>
- /goalert/web/src/node_modules/node-sass/src/libsass/src/expand.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/expand.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/factory.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/boolean.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/util.hpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/value.h
- /goalert/web/src/node_modules/node-sass/src/libsass/src/emitter.hpp
- /goalert/web/src/node_modules/node-sass/src/callback_bridge.h
- /goalert/web/src/node_modules/node-sass/src/libsass/src/file.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/sass.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/operation.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/operators.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/constants.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/error_handling.hpp
- /goalert/web/src/node_modules/node-sass/src/custom_importer_bridge.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/parser.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/constants.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/list.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/cssize.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/functions.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/util.cpp
- /goalert/web/src/node_modules/node-sass/src/custom_function_bridge.cpp
- /goalert/web/src/node_modules/node-sass/src/custom_importer_bridge.h
- /goalert/web/src/node_modules/node-sass/src/libsass/src/bind.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/eval.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/backtrace.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/extend.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_context_wrapper.h
- /goalert/web/src/node_modules/node-sass/src/sass_types/sass_value_wrapper.h
- /goalert/web/src/node_modules/node-sass/src/libsass/src/error_handling.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/debugger.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/emitter.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/number.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/color.h
- /goalert/web/src/node_modules/node-sass/src/libsass/src/sass_values.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/ast.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/output.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/check_nesting.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/null.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/functions.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/cssize.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/prelexer.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/ast.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/to_c.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/to_value.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/inspect.hpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/color.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/values.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_context_wrapper.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/list.h
- /goalert/web/src/node_modules/node-sass/src/libsass/src/check_nesting.hpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/map.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/to_value.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/context.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/string.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/sass_context.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/prelexer.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/context.hpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/boolean.h
- /goalert/web/src/node_modules/node-sass/src/libsass/src/eval.cpp
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::alternatives in prelexer.hpp.
<p>Publish Date: 2019-01-14
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6284>CVE-2019-6284</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6284">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6284</a></p>
<p>Release Date: 2019-08-06</p>
<p>Fix Resolution: 3.6.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2019-6284 (Medium) detected in opennms-opennms-source-23.0.0-1 - ## CVE-2019-6284 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opennmsopennms-source-23.0.0-1</b></p></summary>
<p>
<p>A Java based fault and performance management system</p>
<p>Library home page: <a href=https://sourceforge.net/projects/opennms/>https://sourceforge.net/projects/opennms/</a></p>
<p>Found in HEAD commit: <a href="https://github.com/arielorn/goalert/commit/d1ee160c4a73efd8a5070ef5ee8355048f0f771d">d1ee160c4a73efd8a5070ef5ee8355048f0f771d</a></p>
</p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Library Source Files (62)</summary>
<p></p>
<p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p>
<p>
- /goalert/web/src/node_modules/node-sass/src/libsass/src/expand.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/expand.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/factory.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/boolean.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/util.hpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/value.h
- /goalert/web/src/node_modules/node-sass/src/libsass/src/emitter.hpp
- /goalert/web/src/node_modules/node-sass/src/callback_bridge.h
- /goalert/web/src/node_modules/node-sass/src/libsass/src/file.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/sass.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/operation.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/operators.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/constants.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/error_handling.hpp
- /goalert/web/src/node_modules/node-sass/src/custom_importer_bridge.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/parser.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/constants.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/list.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/cssize.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/functions.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/util.cpp
- /goalert/web/src/node_modules/node-sass/src/custom_function_bridge.cpp
- /goalert/web/src/node_modules/node-sass/src/custom_importer_bridge.h
- /goalert/web/src/node_modules/node-sass/src/libsass/src/bind.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/eval.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/backtrace.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/extend.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_context_wrapper.h
- /goalert/web/src/node_modules/node-sass/src/sass_types/sass_value_wrapper.h
- /goalert/web/src/node_modules/node-sass/src/libsass/src/error_handling.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/debugger.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/emitter.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/number.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/color.h
- /goalert/web/src/node_modules/node-sass/src/libsass/src/sass_values.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/ast.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/output.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/check_nesting.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/null.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/functions.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/cssize.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/prelexer.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/ast.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/to_c.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/to_value.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/inspect.hpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/color.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/values.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_context_wrapper.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/list.h
- /goalert/web/src/node_modules/node-sass/src/libsass/src/check_nesting.hpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/map.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/to_value.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/context.cpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/string.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/sass_context.cpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/prelexer.hpp
- /goalert/web/src/node_modules/node-sass/src/libsass/src/context.hpp
- /goalert/web/src/node_modules/node-sass/src/sass_types/boolean.h
- /goalert/web/src/node_modules/node-sass/src/libsass/src/eval.cpp
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::alternatives in prelexer.hpp.
<p>Publish Date: 2019-01-14
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6284>CVE-2019-6284</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6284">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6284</a></p>
<p>Release Date: 2019-08-06</p>
<p>Fix Resolution: 3.6.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve medium detected in opennms opennms source cve medium severity vulnerability vulnerable library opennmsopennms source a java based fault and performance management system library home page a href found in head commit a href library source files the source files were matched to this source library based on a best effort match source libraries are selected from a list of probable public libraries goalert web src node modules node sass src libsass src expand hpp goalert web src node modules node sass src libsass src expand cpp goalert web src node modules node sass src sass types factory cpp goalert web src node modules node sass src sass types boolean cpp goalert web src node modules node sass src libsass src util hpp goalert web src node modules node sass src sass types value h goalert web src node modules node sass src libsass src emitter hpp goalert web src node modules node sass src callback bridge h goalert web src node modules node sass src libsass src file cpp goalert web src node modules node sass src libsass src sass cpp goalert web src node modules node sass src libsass src operation hpp goalert web src node modules node sass src libsass src operators hpp goalert web src node modules node sass src libsass src constants hpp goalert web src node modules node sass src libsass src error handling hpp goalert web src node modules node sass src custom importer bridge cpp goalert web src node modules node sass src libsass src parser hpp goalert web src node modules node sass src libsass src constants cpp goalert web src node modules node sass src sass types list cpp goalert web src node modules node sass src libsass src cssize cpp goalert web src node modules node sass src libsass src functions hpp goalert web src node modules node sass src libsass src util cpp goalert web src node modules node sass src custom function bridge cpp goalert web src node modules node sass src custom importer bridge h goalert web src node modules node sass src libsass src bind cpp goalert web src node modules node sass src libsass src eval hpp goalert web src node modules node sass src libsass src backtrace cpp goalert web src node modules node sass src libsass src extend cpp goalert web src node modules node sass src sass context wrapper h goalert web src node modules node sass src sass types sass value wrapper h goalert web src node modules node sass src libsass src error handling cpp goalert web src node modules node sass src libsass src debugger hpp goalert web src node modules node sass src libsass src emitter cpp goalert web src node modules node sass src sass types number cpp goalert web src node modules node sass src sass types color h goalert web src node modules node sass src libsass src sass values cpp goalert web src node modules node sass src libsass src ast hpp goalert web src node modules node sass src libsass src output cpp goalert web src node modules node sass src libsass src check nesting cpp goalert web src node modules node sass src sass types null cpp goalert web src node modules node sass src libsass src ast def macros hpp goalert web src node modules node sass src libsass src functions cpp goalert web src node modules node sass src libsass src cssize hpp goalert web src node modules node sass src libsass src prelexer cpp goalert web src node modules node sass src libsass src ast cpp goalert web src node modules node sass src libsass src to c cpp goalert web src node modules node sass src libsass src to value hpp goalert web src node modules node sass src libsass src ast fwd decl hpp goalert web src node modules node sass src libsass src inspect hpp goalert web src node modules node sass src sass types color cpp goalert web src node modules node sass src libsass src values cpp goalert web src node modules node sass src sass context wrapper cpp goalert web src node modules node sass src sass types list h goalert web src node modules node sass src libsass src check nesting hpp goalert web src node modules node sass src sass types map cpp goalert web src node modules node sass src libsass src to value cpp goalert web src node modules node sass src libsass src context cpp goalert web src node modules node sass src sass types string cpp goalert web src node modules node sass src libsass src sass context cpp goalert web src node modules node sass src libsass src prelexer hpp goalert web src node modules node sass src libsass src context hpp goalert web src node modules node sass src sass types boolean h goalert web src node modules node sass src libsass src eval cpp vulnerability details in libsass a heap based buffer over read exists in sass prelexer alternatives in prelexer hpp publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
| 0
|
199,618
| 22,705,786,397
|
IssuesEvent
|
2022-07-05 14:31:57
|
nexmo-community/uc-extend-vis-java-sdk
|
https://api.github.com/repos/nexmo-community/uc-extend-vis-java-sdk
|
opened
|
spring-web-4.3.9.RELEASE.jar: 11 vulnerabilities (highest severity is: 9.8)
|
security vulnerability
|
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-web-4.3.9.RELEASE.jar</b></p></summary>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /rg/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2022-22965](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22965) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | spring-beans-4.3.9.RELEASE.jar | Transitive | 5.0.0.RELEASE | ✅ |
| [CVE-2016-1000027](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000027) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | spring-web-4.3.9.RELEASE.jar | Direct | 4.3.26.RELEASE | ✅ |
| [CVE-2018-11040](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11040) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | spring-web-4.3.9.RELEASE.jar | Direct | 4.3.18.RELEASE | ✅ |
| [CVE-2018-1272](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1272) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | spring-core-4.3.9.RELEASE.jar | Transitive | 4.3.15.RELEASE | ✅ |
| [CVE-2018-15756](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-15756) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | spring-web-4.3.9.RELEASE.jar | Direct | 4.3.20.RELEASE | ✅ |
| [CVE-2022-22950](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22950) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | spring-expression-4.3.9.RELEASE.jar | Transitive | 5.0.0.RELEASE | ✅ |
| [CVE-2020-5421](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5421) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | spring-web-4.3.9.RELEASE.jar | Direct | 4.3.29.RELEASE | ✅ |
| [CVE-2018-11039](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11039) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | spring-web-4.3.9.RELEASE.jar | Direct | 4.3.18.RELEASE | ✅ |
| [CVE-2018-1199](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1199) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | spring-core-4.3.9.RELEASE.jar | Transitive | 4.3.14.RELEASE | ✅ |
| [CVE-2022-22970](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22970) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | multiple | Transitive | 5.0.0.RELEASE | ✅ |
| [CVE-2021-22096](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22096) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.3 | multiple | Direct | 5.2.18.RELEASE | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-22965</summary>
### Vulnerable Library - <b>spring-beans-4.3.9.RELEASE.jar</b></p>
<p>Spring Beans</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-beans/4.3.9.RELEASE/spring-beans-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-web-4.3.9.RELEASE.jar (Root Library)
- :x: **spring-beans-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
<p>Publish Date: 2022-04-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22965>CVE-2022-22965</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement">https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement</a></p>
<p>Release Date: 2022-04-01</p>
<p>Fix Resolution (org.springframework:spring-beans): 5.2.20.RELEASE</p>
<p>Direct dependency fix Resolution (org.springframework:spring-web): 5.0.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-1000027</summary>
### Vulnerable Library - <b>spring-web-4.3.9.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /rg/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
<p>Publish Date: 2020-01-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000027>CVE-2016-1000027</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000027">https://nvd.nist.gov/vuln/detail/CVE-2016-1000027</a></p>
<p>Release Date: 2020-01-02</p>
<p>Fix Resolution: 4.3.26.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-11040</summary>
### Vulnerable Library - <b>spring-web-4.3.9.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /rg/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests.
<p>Publish Date: 2018-06-25
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11040>CVE-2018-11040</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11040">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11040</a></p>
<p>Release Date: 2018-06-25</p>
<p>Fix Resolution: 4.3.18.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-1272</summary>
### Vulnerable Library - <b>spring-core-4.3.9.RELEASE.jar</b></p>
<p>Spring Core</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/4.3.9.RELEASE/spring-core-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-web-4.3.9.RELEASE.jar (Root Library)
- :x: **spring-core-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.
<p>Publish Date: 2018-04-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1272>CVE-2018-1272</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://tanzu.vmware.com/security/cve-2018-1272">https://tanzu.vmware.com/security/cve-2018-1272</a></p>
<p>Release Date: 2018-04-06</p>
<p>Fix Resolution (org.springframework:spring-core): 4.3.15.RELEASE</p>
<p>Direct dependency fix Resolution (org.springframework:spring-web): 4.3.15.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-15756</summary>
### Vulnerable Library - <b>spring-web-4.3.9.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /rg/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.
<p>Publish Date: 2018-10-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-15756>CVE-2018-15756</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://pivotal.io/security/cve-2018-15756">https://pivotal.io/security/cve-2018-15756</a></p>
<p>Release Date: 2018-10-18</p>
<p>Fix Resolution: 4.3.20.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-22950</summary>
### Vulnerable Library - <b>spring-expression-4.3.9.RELEASE.jar</b></p>
<p>Spring Expression Language (SpEL)</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/4.3.9.RELEASE/spring-expression-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-web-4.3.9.RELEASE.jar (Root Library)
- spring-context-4.3.9.RELEASE.jar
- :x: **spring-expression-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.
<p>Publish Date: 2022-04-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22950>CVE-2022-22950</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://tanzu.vmware.com/security/cve-2022-22950">https://tanzu.vmware.com/security/cve-2022-22950</a></p>
<p>Release Date: 2022-04-01</p>
<p>Fix Resolution (org.springframework:spring-expression): 5.2.20.RELEASE</p>
<p>Direct dependency fix Resolution (org.springframework:spring-web): 5.0.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-5421</summary>
### Vulnerable Library - <b>spring-web-4.3.9.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /rg/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
<p>Publish Date: 2020-09-19
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5421>CVE-2020-5421</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://tanzu.vmware.com/security/cve-2020-5421">https://tanzu.vmware.com/security/cve-2020-5421</a></p>
<p>Release Date: 2020-09-19</p>
<p>Fix Resolution: 4.3.29.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2018-11039</summary>
### Vulnerable Library - <b>spring-web-4.3.9.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /rg/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack.
<p>Publish Date: 2018-06-25
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11039>CVE-2018-11039</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.9</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-11039">https://nvd.nist.gov/vuln/detail/CVE-2018-11039</a></p>
<p>Release Date: 2018-06-25</p>
<p>Fix Resolution: 4.3.18.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2018-1199</summary>
### Vulnerable Library - <b>spring-core-4.3.9.RELEASE.jar</b></p>
<p>Spring Core</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/4.3.9.RELEASE/spring-core-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-web-4.3.9.RELEASE.jar (Root Library)
- :x: **spring-core-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. In this particular attack, different character encodings used in path parameters allows secured Spring MVC static resource URLs to be bypassed.
<p>Publish Date: 2018-03-16
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1199>CVE-2018-1199</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1199">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1199</a></p>
<p>Release Date: 2018-03-16</p>
<p>Fix Resolution (org.springframework:spring-core): 4.3.14.RELEASE</p>
<p>Direct dependency fix Resolution (org.springframework:spring-web): 4.3.14.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-22970</summary>
### Vulnerable Libraries - <b>spring-core-4.3.9.RELEASE.jar</b>, <b>spring-beans-4.3.9.RELEASE.jar</b></p>
<p>
### <b>spring-core-4.3.9.RELEASE.jar</b></p>
<p>Spring Core</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/4.3.9.RELEASE/spring-core-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-web-4.3.9.RELEASE.jar (Root Library)
- :x: **spring-core-4.3.9.RELEASE.jar** (Vulnerable Library)
### <b>spring-beans-4.3.9.RELEASE.jar</b></p>
<p>Spring Beans</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-beans/4.3.9.RELEASE/spring-beans-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-web-4.3.9.RELEASE.jar (Root Library)
- :x: **spring-beans-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.
<p>Publish Date: 2022-05-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22970>CVE-2022-22970</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://tanzu.vmware.com/security/cve-2022-22970">https://tanzu.vmware.com/security/cve-2022-22970</a></p>
<p>Release Date: 2022-05-12</p>
<p>Fix Resolution (org.springframework:spring-core): 5.3.20</p>
<p>Direct dependency fix Resolution (org.springframework:spring-web): 5.0.0.RELEASE</p><p>Fix Resolution (org.springframework:spring-beans): 5.3.20</p>
<p>Direct dependency fix Resolution (org.springframework:spring-web): 5.0.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-22096</summary>
### Vulnerable Libraries - <b>spring-web-4.3.9.RELEASE.jar</b>, <b>spring-core-4.3.9.RELEASE.jar</b></p>
<p>
### <b>spring-web-4.3.9.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /rg/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library)
### <b>spring-core-4.3.9.RELEASE.jar</b></p>
<p>Spring Core</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/4.3.9.RELEASE/spring-core-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-web-4.3.9.RELEASE.jar (Root Library)
- :x: **spring-core-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.
<p>Publish Date: 2021-10-28
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22096>CVE-2021-22096</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>4.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://tanzu.vmware.com/security/cve-2021-22096">https://tanzu.vmware.com/security/cve-2021-22096</a></p>
<p>Release Date: 2021-10-28</p>
<p>Fix Resolution (org.springframework:spring-core): 5.2.18.RELEASE</p>
<p>Direct dependency fix Resolution (org.springframework:spring-web): 5.0.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
|
True
|
spring-web-4.3.9.RELEASE.jar: 11 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-web-4.3.9.RELEASE.jar</b></p></summary>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /rg/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2022-22965](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22965) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | spring-beans-4.3.9.RELEASE.jar | Transitive | 5.0.0.RELEASE | ✅ |
| [CVE-2016-1000027](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000027) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | spring-web-4.3.9.RELEASE.jar | Direct | 4.3.26.RELEASE | ✅ |
| [CVE-2018-11040](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11040) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | spring-web-4.3.9.RELEASE.jar | Direct | 4.3.18.RELEASE | ✅ |
| [CVE-2018-1272](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1272) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | spring-core-4.3.9.RELEASE.jar | Transitive | 4.3.15.RELEASE | ✅ |
| [CVE-2018-15756](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-15756) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | spring-web-4.3.9.RELEASE.jar | Direct | 4.3.20.RELEASE | ✅ |
| [CVE-2022-22950](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22950) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | spring-expression-4.3.9.RELEASE.jar | Transitive | 5.0.0.RELEASE | ✅ |
| [CVE-2020-5421](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5421) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | spring-web-4.3.9.RELEASE.jar | Direct | 4.3.29.RELEASE | ✅ |
| [CVE-2018-11039](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11039) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | spring-web-4.3.9.RELEASE.jar | Direct | 4.3.18.RELEASE | ✅ |
| [CVE-2018-1199](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1199) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | spring-core-4.3.9.RELEASE.jar | Transitive | 4.3.14.RELEASE | ✅ |
| [CVE-2022-22970](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22970) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | multiple | Transitive | 5.0.0.RELEASE | ✅ |
| [CVE-2021-22096](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22096) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.3 | multiple | Direct | 5.2.18.RELEASE | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-22965</summary>
### Vulnerable Library - <b>spring-beans-4.3.9.RELEASE.jar</b></p>
<p>Spring Beans</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-beans/4.3.9.RELEASE/spring-beans-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-web-4.3.9.RELEASE.jar (Root Library)
- :x: **spring-beans-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
<p>Publish Date: 2022-04-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22965>CVE-2022-22965</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement">https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement</a></p>
<p>Release Date: 2022-04-01</p>
<p>Fix Resolution (org.springframework:spring-beans): 5.2.20.RELEASE</p>
<p>Direct dependency fix Resolution (org.springframework:spring-web): 5.0.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-1000027</summary>
### Vulnerable Library - <b>spring-web-4.3.9.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /rg/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrusted data is not an intended use case. The product's behavior will not be changed because some users rely on deserialization of trusted data.
<p>Publish Date: 2020-01-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000027>CVE-2016-1000027</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000027">https://nvd.nist.gov/vuln/detail/CVE-2016-1000027</a></p>
<p>Release Date: 2020-01-02</p>
<p>Fix Resolution: 4.3.26.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-11040</summary>
### Vulnerable Library - <b>spring-web-4.3.9.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /rg/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests.
<p>Publish Date: 2018-06-25
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11040>CVE-2018-11040</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11040">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11040</a></p>
<p>Release Date: 2018-06-25</p>
<p>Fix Resolution: 4.3.18.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-1272</summary>
### Vulnerable Library - <b>spring-core-4.3.9.RELEASE.jar</b></p>
<p>Spring Core</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/4.3.9.RELEASE/spring-core-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-web-4.3.9.RELEASE.jar (Root Library)
- :x: **spring-core-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.
<p>Publish Date: 2018-04-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1272>CVE-2018-1272</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://tanzu.vmware.com/security/cve-2018-1272">https://tanzu.vmware.com/security/cve-2018-1272</a></p>
<p>Release Date: 2018-04-06</p>
<p>Fix Resolution (org.springframework:spring-core): 4.3.15.RELEASE</p>
<p>Direct dependency fix Resolution (org.springframework:spring-web): 4.3.15.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-15756</summary>
### Vulnerable Library - <b>spring-web-4.3.9.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /rg/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.
<p>Publish Date: 2018-10-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-15756>CVE-2018-15756</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://pivotal.io/security/cve-2018-15756">https://pivotal.io/security/cve-2018-15756</a></p>
<p>Release Date: 2018-10-18</p>
<p>Fix Resolution: 4.3.20.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-22950</summary>
### Vulnerable Library - <b>spring-expression-4.3.9.RELEASE.jar</b></p>
<p>Spring Expression Language (SpEL)</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/4.3.9.RELEASE/spring-expression-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-web-4.3.9.RELEASE.jar (Root Library)
- spring-context-4.3.9.RELEASE.jar
- :x: **spring-expression-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.
<p>Publish Date: 2022-04-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22950>CVE-2022-22950</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://tanzu.vmware.com/security/cve-2022-22950">https://tanzu.vmware.com/security/cve-2022-22950</a></p>
<p>Release Date: 2022-04-01</p>
<p>Fix Resolution (org.springframework:spring-expression): 5.2.20.RELEASE</p>
<p>Direct dependency fix Resolution (org.springframework:spring-web): 5.0.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-5421</summary>
### Vulnerable Library - <b>spring-web-4.3.9.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /rg/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
<p>Publish Date: 2020-09-19
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5421>CVE-2020-5421</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://tanzu.vmware.com/security/cve-2020-5421">https://tanzu.vmware.com/security/cve-2020-5421</a></p>
<p>Release Date: 2020-09-19</p>
<p>Fix Resolution: 4.3.29.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2018-11039</summary>
### Vulnerable Library - <b>spring-web-4.3.9.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /rg/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack.
<p>Publish Date: 2018-06-25
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11039>CVE-2018-11039</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.9</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-11039">https://nvd.nist.gov/vuln/detail/CVE-2018-11039</a></p>
<p>Release Date: 2018-06-25</p>
<p>Fix Resolution: 4.3.18.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2018-1199</summary>
### Vulnerable Library - <b>spring-core-4.3.9.RELEASE.jar</b></p>
<p>Spring Core</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/4.3.9.RELEASE/spring-core-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-web-4.3.9.RELEASE.jar (Root Library)
- :x: **spring-core-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. In this particular attack, different character encodings used in path parameters allows secured Spring MVC static resource URLs to be bypassed.
<p>Publish Date: 2018-03-16
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1199>CVE-2018-1199</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1199">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1199</a></p>
<p>Release Date: 2018-03-16</p>
<p>Fix Resolution (org.springframework:spring-core): 4.3.14.RELEASE</p>
<p>Direct dependency fix Resolution (org.springframework:spring-web): 4.3.14.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-22970</summary>
### Vulnerable Libraries - <b>spring-core-4.3.9.RELEASE.jar</b>, <b>spring-beans-4.3.9.RELEASE.jar</b></p>
<p>
### <b>spring-core-4.3.9.RELEASE.jar</b></p>
<p>Spring Core</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/4.3.9.RELEASE/spring-core-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-web-4.3.9.RELEASE.jar (Root Library)
- :x: **spring-core-4.3.9.RELEASE.jar** (Vulnerable Library)
### <b>spring-beans-4.3.9.RELEASE.jar</b></p>
<p>Spring Beans</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-beans/4.3.9.RELEASE/spring-beans-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-web-4.3.9.RELEASE.jar (Root Library)
- :x: **spring-beans-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.
<p>Publish Date: 2022-05-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22970>CVE-2022-22970</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://tanzu.vmware.com/security/cve-2022-22970">https://tanzu.vmware.com/security/cve-2022-22970</a></p>
<p>Release Date: 2022-05-12</p>
<p>Fix Resolution (org.springframework:spring-core): 5.3.20</p>
<p>Direct dependency fix Resolution (org.springframework:spring-web): 5.0.0.RELEASE</p><p>Fix Resolution (org.springframework:spring-beans): 5.3.20</p>
<p>Direct dependency fix Resolution (org.springframework:spring-web): 5.0.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-22096</summary>
### Vulnerable Libraries - <b>spring-web-4.3.9.RELEASE.jar</b>, <b>spring-core-4.3.9.RELEASE.jar</b></p>
<p>
### <b>spring-web-4.3.9.RELEASE.jar</b></p>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /rg/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library)
### <b>spring-core-4.3.9.RELEASE.jar</b></p>
<p>Spring Core</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/4.3.9.RELEASE/spring-core-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-web-4.3.9.RELEASE.jar (Root Library)
- :x: **spring-core-4.3.9.RELEASE.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/nexmo-community/uc-extend-vis-java-sdk/commit/f5f6f5c8b2ee8b989d3e169af46588063945a845">f5f6f5c8b2ee8b989d3e169af46588063945a845</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.
<p>Publish Date: 2021-10-28
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22096>CVE-2021-22096</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>4.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://tanzu.vmware.com/security/cve-2021-22096">https://tanzu.vmware.com/security/cve-2021-22096</a></p>
<p>Release Date: 2021-10-28</p>
<p>Fix Resolution (org.springframework:spring-core): 5.2.18.RELEASE</p>
<p>Direct dependency fix Resolution (org.springframework:spring-web): 5.0.0.RELEASE</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
|
non_defect
|
spring web release jar vulnerabilities highest severity is vulnerable library spring web release jar spring web library home page a href path to dependency file pom xml path to vulnerable library rg springframework spring web release spring web release jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high spring beans release jar transitive release high spring web release jar direct release high spring web release jar direct release high spring core release jar transitive release high spring web release jar direct release medium spring expression release jar transitive release medium spring web release jar direct release medium spring web release jar direct release medium spring core release jar transitive release medium multiple transitive release medium multiple direct release details cve vulnerable library spring beans release jar spring beans library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org springframework spring beans release spring beans release jar dependency hierarchy spring web release jar root library x spring beans release jar vulnerable library found in head commit a href found in base branch main vulnerability details a spring mvc or spring webflux application running on jdk may be vulnerable to remote code execution rce via data binding the specific exploit requires the application to run on tomcat as a war deployment if the application is deployed as a spring boot executable jar i e the default it is not vulnerable to the exploit however the nature of the vulnerability is more general and there may be other ways to exploit it publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring beans release direct dependency fix resolution org springframework spring web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library spring web release jar spring web library home page a href path to dependency file pom xml path to vulnerable library rg springframework spring web release spring web release jar dependency hierarchy x spring web release jar vulnerable library found in head commit a href found in base branch main vulnerability details pivotal spring framework through suffers from a potential remote code execution rce issue if used for java deserialization of untrusted data depending on how the library is implemented within a product this issue may or not occur and authentication may be required note the vendor s position is that untrusted data is not an intended use case the product s behavior will not be changed because some users rely on deserialization of trusted data publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution release rescue worker helmet automatic remediation is available for this issue cve vulnerable library spring web release jar spring web library home page a href path to dependency file pom xml path to vulnerable library rg springframework spring web release spring web release jar dependency hierarchy x spring web release jar vulnerable library found in head commit a href found in base branch main vulnerability details spring framework versions x prior to and x prior to and older unsupported versions allows web applications to enable cross domain requests via jsonp json with padding through abstractjsonpresponsebodyadvice for rest controllers and for browser requests both are not enabled by default in spring framework nor spring boot however when is configured in an application jsonp support is automatically ready to use through the jsonp and callback jsonp parameters enabling cross domain requests publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution release rescue worker helmet automatic remediation is available for this issue cve vulnerable library spring core release jar spring core library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org springframework spring core release spring core release jar dependency hierarchy spring web release jar root library x spring core release jar vulnerable library found in head commit a href found in base branch main vulnerability details spring framework versions prior to and versions prior to and older unsupported versions provide client side support for multipart requests when spring mvc or spring webflux server application server a receives input from a remote client and then uses that input to make a multipart request to another server server b it can be exposed to an attack where an extra multipart is inserted in the content of the request from server a causing server b to use the wrong value for a part it expects this could to lead privilege escalation for example if the part content represents a username or user roles publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring core release direct dependency fix resolution org springframework spring web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library spring web release jar spring web library home page a href path to dependency file pom xml path to vulnerable library rg springframework spring web release spring web release jar dependency hierarchy x spring web release jar vulnerable library found in head commit a href found in base branch main vulnerability details spring framework version versions x prior to versions x prior to and older unsupported versions on the x branch provide support for range requests when serving static resources through the resourcehttprequesthandler or starting in when an annotated controller returns an org springframework core io resource a malicious user or attacker can add a range header with a high number of ranges or with wide ranges that overlap or both for a denial of service attack this vulnerability affects applications that depend on either spring webmvc or spring webflux such applications must also have a registration for serving static resources e g js css images and others or have an annotated controller that returns an org springframework core io resource spring boot applications that depend on spring boot starter web or spring boot starter webflux are ready to serve static resources out of the box and are therefore vulnerable publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution release rescue worker helmet automatic remediation is available for this issue cve vulnerable library spring expression release jar spring expression language spel library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org springframework spring expression release spring expression release jar dependency hierarchy spring web release jar root library spring context release jar x spring expression release jar vulnerable library found in head commit a href found in base branch main vulnerability details n spring framework versions and older unsupported versions it is possible for a user to provide a specially crafted spel expression that may cause a denial of service condition publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring expression release direct dependency fix resolution org springframework spring web release rescue worker helmet automatic remediation is available for this issue cve vulnerable library spring web release jar spring web library home page a href path to dependency file pom xml path to vulnerable library rg springframework spring web release spring web release jar dependency hierarchy x spring web release jar vulnerable library found in head commit a href found in base branch main vulnerability details in spring framework versions and older unsupported versions the protections against rfd attacks from cve may be bypassed depending on the browser used through the use of a jsessionid path parameter publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction required scope changed impact metrics confidentiality impact low integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution release rescue worker helmet automatic remediation is available for this issue cve vulnerable library spring web release jar spring web library home page a href path to dependency file pom xml path to vulnerable library rg springframework spring web release spring web release jar dependency hierarchy x spring web release jar vulnerable library found in head commit a href found in base branch main vulnerability details spring framework versions x prior to versions x prior to and older unsupported versions allow web applications to change the http request method to any http method including trace using the hiddenhttpmethodfilter in spring mvc if an application has a pre existing xss vulnerability a malicious user or attacker can use this filter to escalate to an xst cross site tracing attack publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution release rescue worker helmet automatic remediation is available for this issue cve vulnerable library spring core release jar spring core library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org springframework spring core release spring core release jar dependency hierarchy spring web release jar root library x spring core release jar vulnerable library found in head commit a href found in base branch main vulnerability details spring security spring security x before x before and x before and spring framework x before and x before does not consider url path parameters when processing security constraints by adding a url path parameter with special encodings an attacker may be able to bypass a security constraint the root cause of this issue is a lack of clarity regarding the handling of path parameters in the servlet specification some servlet containers include path parameters in the value returned for getpathinfo and some do not spring security uses the value returned by getpathinfo as part of the process of mapping requests to security constraints in this particular attack different character encodings used in path parameters allows secured spring mvc static resource urls to be bypassed publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring core release direct dependency fix resolution org springframework spring web release rescue worker helmet automatic remediation is available for this issue cve vulnerable libraries spring core release jar spring beans release jar spring core release jar spring core library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org springframework spring core release spring core release jar dependency hierarchy spring web release jar root library x spring core release jar vulnerable library spring beans release jar spring beans library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org springframework spring beans release spring beans release jar dependency hierarchy spring web release jar root library x spring beans release jar vulnerable library found in head commit a href found in base branch main vulnerability details in spring framework versions prior to and old unsupported versions applications that handle file uploads are vulnerable to dos attack if they rely on data binding to set a multipartfile or javax servlet part to a field in a model object publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring core direct dependency fix resolution org springframework spring web release fix resolution org springframework spring beans direct dependency fix resolution org springframework spring web release rescue worker helmet automatic remediation is available for this issue cve vulnerable libraries spring web release jar spring core release jar spring web release jar spring web library home page a href path to dependency file pom xml path to vulnerable library rg springframework spring web release spring web release jar dependency hierarchy x spring web release jar vulnerable library spring core release jar spring core library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org springframework spring core release spring core release jar dependency hierarchy spring web release jar root library x spring core release jar vulnerable library found in head commit a href found in base branch main vulnerability details in spring framework versions and older unsupported versions it is possible for a user to provide malicious input to cause the insertion of additional log entries publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring core release direct dependency fix resolution org springframework spring web release rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
| 0
|
37,565
| 8,440,572,887
|
IssuesEvent
|
2018-10-18 07:44:03
|
scipy/scipy
|
https://api.github.com/repos/scipy/scipy
|
closed
|
Default value for "mode" in "ndimage.shift"
|
Documentation defect good first issue scipy.ndimage
|
In scipy.ndimage.shift the mode's default value is 'constant', but [in the documentation](https://docs.scipy.org/doc/scipy/reference/generated/scipy.ndimage.shift.html#scipy.ndimage.shift) it says Default is 'reflect'.
Which of the two is wrong?
|
1.0
|
Default value for "mode" in "ndimage.shift" - In scipy.ndimage.shift the mode's default value is 'constant', but [in the documentation](https://docs.scipy.org/doc/scipy/reference/generated/scipy.ndimage.shift.html#scipy.ndimage.shift) it says Default is 'reflect'.
Which of the two is wrong?
|
defect
|
default value for mode in ndimage shift in scipy ndimage shift the mode s default value is constant but it says default is reflect which of the two is wrong
| 1
|
9,037
| 3,016,115,288
|
IssuesEvent
|
2015-07-29 23:29:51
|
rancher/rancher
|
https://api.github.com/repos/rancher/rancher
|
closed
|
extends doesn't work with image in the extended file.
|
area/ranchercompose kind/bug status/to-test
|
Use this example for `rancher-compose up` and containers never get started.
## Example 1
common.yml:
```
web:
image: ubuntu:14:04
db:
image: ubuntu:14:04
```
docker-compose.yml:
```
web:
extends:
file: common.yml
service: web
db:
extends:
file: common.yml
service: db
links:
- web:web
```
Containers error and never get started so service is stuck in activating state.
```
0835f712-f62d-41d4-9762-4163c9c58f1d : 'dict' object has no attribute 'dockerImage'
```
|
1.0
|
extends doesn't work with image in the extended file. - Use this example for `rancher-compose up` and containers never get started.
## Example 1
common.yml:
```
web:
image: ubuntu:14:04
db:
image: ubuntu:14:04
```
docker-compose.yml:
```
web:
extends:
file: common.yml
service: web
db:
extends:
file: common.yml
service: db
links:
- web:web
```
Containers error and never get started so service is stuck in activating state.
```
0835f712-f62d-41d4-9762-4163c9c58f1d : 'dict' object has no attribute 'dockerImage'
```
|
non_defect
|
extends doesn t work with image in the extended file use this example for rancher compose up and containers never get started example common yml web image ubuntu db image ubuntu docker compose yml web extends file common yml service web db extends file common yml service db links web web containers error and never get started so service is stuck in activating state dict object has no attribute dockerimage
| 0
|
26,459
| 4,716,415,448
|
IssuesEvent
|
2016-10-16 01:55:51
|
jsr107/jsr107spec
|
https://api.github.com/repos/jsr107/jsr107spec
|
reopened
|
Relicense the Java code of the specification under a standard license
|
Defect
|
Hi,
I understand that the JSR107 specification itself is licensed under these terms:
https://github.com/jsr107/jsr107spec/blob/master/LICENSE.txt
The Java code ("JCache API") and released Java bytecode, namely the "cache-api-<version>.jar" as available from Sonatype or maven.org seem to be licensed under the same license. As this is not a standard open-source license like Apache 2.0, BSD, MIT, CDDL, ... which are usually used for open-source code, we unfortunately cannot use the JCache API in our open-source project, but we'd love to do so.
Would it be possible for the Java code making up the JCache API to be relicensed under a well-known open-source license, preferably Apache 2.0?
Thanks,
philwo
|
1.0
|
Relicense the Java code of the specification under a standard license - Hi,
I understand that the JSR107 specification itself is licensed under these terms:
https://github.com/jsr107/jsr107spec/blob/master/LICENSE.txt
The Java code ("JCache API") and released Java bytecode, namely the "cache-api-<version>.jar" as available from Sonatype or maven.org seem to be licensed under the same license. As this is not a standard open-source license like Apache 2.0, BSD, MIT, CDDL, ... which are usually used for open-source code, we unfortunately cannot use the JCache API in our open-source project, but we'd love to do so.
Would it be possible for the Java code making up the JCache API to be relicensed under a well-known open-source license, preferably Apache 2.0?
Thanks,
philwo
|
defect
|
relicense the java code of the specification under a standard license hi i understand that the specification itself is licensed under these terms the java code jcache api and released java bytecode namely the cache api jar as available from sonatype or maven org seem to be licensed under the same license as this is not a standard open source license like apache bsd mit cddl which are usually used for open source code we unfortunately cannot use the jcache api in our open source project but we d love to do so would it be possible for the java code making up the jcache api to be relicensed under a well known open source license preferably apache thanks philwo
| 1
|
78,458
| 22,282,548,143
|
IssuesEvent
|
2022-06-11 04:56:42
|
AERX-dev/aerx-frontend-near
|
https://api.github.com/repos/AERX-dev/aerx-frontend-near
|
closed
|
Vercel deployment 🚦
|
bug help wanted build
|
Why is the build on vercel breaking?
Steps:
- Figure out why it is breaking
- Fix if possible
- Keep the fixed version on the vercel branch (that was a smart idea :)
- Update the link in the ReadMe
|
1.0
|
Vercel deployment 🚦 - Why is the build on vercel breaking?
Steps:
- Figure out why it is breaking
- Fix if possible
- Keep the fixed version on the vercel branch (that was a smart idea :)
- Update the link in the ReadMe
|
non_defect
|
vercel deployment 🚦 why is the build on vercel breaking steps figure out why it is breaking fix if possible keep the fixed version on the vercel branch that was a smart idea update the link in the readme
| 0
|
18,506
| 10,239,503,055
|
IssuesEvent
|
2019-08-19 18:24:41
|
envoyproxy/envoy
|
https://api.github.com/repos/envoyproxy/envoy
|
closed
|
bootstrap and xDS should have separate support for allow unknown fields
|
enhancement security
|
Currently, --allow-unknown-fields is false by default. Any unknown fields in bootstrap will be caught early and xds response sent by management server with unknown fields will be rejected.
It would be helpful if we can have separate control of allow unknown fields for bootstrap and xds. This way, typos in bootstrap can still be caught early by not allowing unknown fields on bootstrap; while management server can set new fields in the xds and not worry that an Envoy running in an older build will reject the config by allowing unknown fields on xds.
|
True
|
bootstrap and xDS should have separate support for allow unknown fields - Currently, --allow-unknown-fields is false by default. Any unknown fields in bootstrap will be caught early and xds response sent by management server with unknown fields will be rejected.
It would be helpful if we can have separate control of allow unknown fields for bootstrap and xds. This way, typos in bootstrap can still be caught early by not allowing unknown fields on bootstrap; while management server can set new fields in the xds and not worry that an Envoy running in an older build will reject the config by allowing unknown fields on xds.
|
non_defect
|
bootstrap and xds should have separate support for allow unknown fields currently allow unknown fields is false by default any unknown fields in bootstrap will be caught early and xds response sent by management server with unknown fields will be rejected it would be helpful if we can have separate control of allow unknown fields for bootstrap and xds this way typos in bootstrap can still be caught early by not allowing unknown fields on bootstrap while management server can set new fields in the xds and not worry that an envoy running in an older build will reject the config by allowing unknown fields on xds
| 0
|
553,765
| 16,381,672,676
|
IssuesEvent
|
2021-05-17 04:26:32
|
choderalab/perses
|
https://api.github.com/repos/choderalab/perses
|
closed
|
Support ORNL Titan
|
priority: low
|
SiliconTx will apparently have ORNL Titan time available in the ~1 mo timescale, accessible for doing publishable work and validation.
|
1.0
|
Support ORNL Titan - SiliconTx will apparently have ORNL Titan time available in the ~1 mo timescale, accessible for doing publishable work and validation.
|
non_defect
|
support ornl titan silicontx will apparently have ornl titan time available in the mo timescale accessible for doing publishable work and validation
| 0
|
139,316
| 11,257,820,524
|
IssuesEvent
|
2020-01-13 01:22:09
|
ihhub/penguinV
|
https://api.github.com/repos/ihhub/penguinV
|
opened
|
Add unit tests for raw image
|
good first issue unit tests
|
We have **RAW** image support code which locates in `src/file/raw_image.h` file. We want to add unit tests for this code. The tests must be stored in `test/unit_tests/unit_test_file.cpp` file. Please refer to existing structure of tests which means you need to add just 3 template functions and in `addTests_File` function add calls for these 3 new functions based on `float, double, uint8_t, uint16_t, uint32_t` types.
|
1.0
|
Add unit tests for raw image - We have **RAW** image support code which locates in `src/file/raw_image.h` file. We want to add unit tests for this code. The tests must be stored in `test/unit_tests/unit_test_file.cpp` file. Please refer to existing structure of tests which means you need to add just 3 template functions and in `addTests_File` function add calls for these 3 new functions based on `float, double, uint8_t, uint16_t, uint32_t` types.
|
non_defect
|
add unit tests for raw image we have raw image support code which locates in src file raw image h file we want to add unit tests for this code the tests must be stored in test unit tests unit test file cpp file please refer to existing structure of tests which means you need to add just template functions and in addtests file function add calls for these new functions based on float double t t t types
| 0
|
53,557
| 13,261,909,263
|
IssuesEvent
|
2020-08-20 20:45:22
|
icecube-trac/tix4
|
https://api.github.com/repos/icecube-trac/tix4
|
closed
|
[iceprod2] clear iceprod_std* files between tasks on a pilot (Trac #1677)
|
Migrated from Trac defect iceprod
|
When a pilot runs multiple tasks in a row, we should clear the output/error/log files so the new task only sees what it has done, not past history.
While the full pilot history is potentially useful for debugging, it's probably simpler and better to just truncate the files.
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1677">https://code.icecube.wisc.edu/projects/icecube/ticket/1677</a>, reported by david.schultzand owned by david.schultz</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2016-05-09T21:55:16",
"_ts": "1462830916934929",
"description": "When a pilot runs multiple tasks in a row, we should clear the output/error/log files so the new task only sees what it has done, not past history.\n\nWhile the full pilot history is potentially useful for debugging, it's probably simpler and better to just truncate the files.",
"reporter": "david.schultz",
"cc": "",
"resolution": "wontfix",
"time": "2016-04-29T18:29:34",
"component": "iceprod",
"summary": "[iceprod2] clear iceprod_std* files between tasks on a pilot",
"priority": "major",
"keywords": "",
"milestone": "",
"owner": "david.schultz",
"type": "defect"
}
```
</p>
</details>
|
1.0
|
[iceprod2] clear iceprod_std* files between tasks on a pilot (Trac #1677) - When a pilot runs multiple tasks in a row, we should clear the output/error/log files so the new task only sees what it has done, not past history.
While the full pilot history is potentially useful for debugging, it's probably simpler and better to just truncate the files.
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1677">https://code.icecube.wisc.edu/projects/icecube/ticket/1677</a>, reported by david.schultzand owned by david.schultz</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2016-05-09T21:55:16",
"_ts": "1462830916934929",
"description": "When a pilot runs multiple tasks in a row, we should clear the output/error/log files so the new task only sees what it has done, not past history.\n\nWhile the full pilot history is potentially useful for debugging, it's probably simpler and better to just truncate the files.",
"reporter": "david.schultz",
"cc": "",
"resolution": "wontfix",
"time": "2016-04-29T18:29:34",
"component": "iceprod",
"summary": "[iceprod2] clear iceprod_std* files between tasks on a pilot",
"priority": "major",
"keywords": "",
"milestone": "",
"owner": "david.schultz",
"type": "defect"
}
```
</p>
</details>
|
defect
|
clear iceprod std files between tasks on a pilot trac when a pilot runs multiple tasks in a row we should clear the output error log files so the new task only sees what it has done not past history while the full pilot history is potentially useful for debugging it s probably simpler and better to just truncate the files migrated from json status closed changetime ts description when a pilot runs multiple tasks in a row we should clear the output error log files so the new task only sees what it has done not past history n nwhile the full pilot history is potentially useful for debugging it s probably simpler and better to just truncate the files reporter david schultz cc resolution wontfix time component iceprod summary clear iceprod std files between tasks on a pilot priority major keywords milestone owner david schultz type defect
| 1
|
127,973
| 18,024,791,602
|
IssuesEvent
|
2021-09-17 02:04:11
|
criticalstack/ui
|
https://api.github.com/repos/criticalstack/ui
|
closed
|
WS-2018-0594 (High) detected in github.com/docker/distribution-35f1369d377054088c4c2e9079ddbb6c1375105d - autoclosed
|
security vulnerability
|
## WS-2018-0594 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>github.com/docker/distribution-35f1369d377054088c4c2e9079ddbb6c1375105d</b></p></summary>
<p>The toolkit to pack, ship, store, and deliver container content</p>
<p>
Dependency Hierarchy:
- helm.sh/helm/v3/pkg/action-v3.5.2 (Root Library)
- helm.sh/helm/v3/internal/experimental/registry-v3.5.2
- github.com/deislabs/oras/pkg/auth-v0.9.0
- github.com/docker/docker/registry-v20.10.3
- github.com/docker/distribution/registry/client/auth-35f1369d377054088c4c2e9079ddbb6c1375105d
- github.com/docker/distribution/registry/client-35f1369d377054088c4c2e9079ddbb6c1375105d
- github.com/docker/distribution/registry/storage/cache/memory-35f1369d377054088c4c2e9079ddbb6c1375105d
- :x: **github.com/docker/distribution-35f1369d377054088c4c2e9079ddbb6c1375105d** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/criticalstack/ui/commit/3f81d12ed6fb2bfa97132e2cfe0df6d996e1465a">3f81d12ed6fb2bfa97132e2cfe0df6d996e1465a</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability was found in github.com/satori/go.uuid through version v1.2.0. The UUID random generator uses Read() function which has fewer bytes than asked and might cause potential non-random UUIDs.
<p>Publish Date: 2018-03-23
<p>URL: <a href=https://github.com/satori/go.uuid/issues/73>WS-2018-0594</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: N/A
- Attack Complexity: N/A
- Privileges Required: N/A
- User Interaction: N/A
- Scope: N/A
- Impact Metrics:
- Confidentiality Impact: N/A
- Integrity Impact: N/A
- Availability Impact: N/A
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/satori/go.uuid/pull/75">https://github.com/satori/go.uuid/pull/75</a></p>
<p>Release Date: 2018-03-23</p>
<p>Fix Resolution: github.com/satori/go.uuid - 75cca531ea763666bc46e531da3b4c3b95f64557</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
WS-2018-0594 (High) detected in github.com/docker/distribution-35f1369d377054088c4c2e9079ddbb6c1375105d - autoclosed - ## WS-2018-0594 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>github.com/docker/distribution-35f1369d377054088c4c2e9079ddbb6c1375105d</b></p></summary>
<p>The toolkit to pack, ship, store, and deliver container content</p>
<p>
Dependency Hierarchy:
- helm.sh/helm/v3/pkg/action-v3.5.2 (Root Library)
- helm.sh/helm/v3/internal/experimental/registry-v3.5.2
- github.com/deislabs/oras/pkg/auth-v0.9.0
- github.com/docker/docker/registry-v20.10.3
- github.com/docker/distribution/registry/client/auth-35f1369d377054088c4c2e9079ddbb6c1375105d
- github.com/docker/distribution/registry/client-35f1369d377054088c4c2e9079ddbb6c1375105d
- github.com/docker/distribution/registry/storage/cache/memory-35f1369d377054088c4c2e9079ddbb6c1375105d
- :x: **github.com/docker/distribution-35f1369d377054088c4c2e9079ddbb6c1375105d** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/criticalstack/ui/commit/3f81d12ed6fb2bfa97132e2cfe0df6d996e1465a">3f81d12ed6fb2bfa97132e2cfe0df6d996e1465a</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability was found in github.com/satori/go.uuid through version v1.2.0. The UUID random generator uses Read() function which has fewer bytes than asked and might cause potential non-random UUIDs.
<p>Publish Date: 2018-03-23
<p>URL: <a href=https://github.com/satori/go.uuid/issues/73>WS-2018-0594</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: N/A
- Attack Complexity: N/A
- Privileges Required: N/A
- User Interaction: N/A
- Scope: N/A
- Impact Metrics:
- Confidentiality Impact: N/A
- Integrity Impact: N/A
- Availability Impact: N/A
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/satori/go.uuid/pull/75">https://github.com/satori/go.uuid/pull/75</a></p>
<p>Release Date: 2018-03-23</p>
<p>Fix Resolution: github.com/satori/go.uuid - 75cca531ea763666bc46e531da3b4c3b95f64557</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
ws high detected in github com docker distribution autoclosed ws high severity vulnerability vulnerable library github com docker distribution the toolkit to pack ship store and deliver container content dependency hierarchy helm sh helm pkg action root library helm sh helm internal experimental registry github com deislabs oras pkg auth github com docker docker registry github com docker distribution registry client auth github com docker distribution registry client github com docker distribution registry storage cache memory x github com docker distribution vulnerable library found in head commit a href found in base branch main vulnerability details a vulnerability was found in github com satori go uuid through version the uuid random generator uses read function which has fewer bytes than asked and might cause potential non random uuids publish date url a href cvss score details base score metrics exploitability metrics attack vector n a attack complexity n a privileges required n a user interaction n a scope n a impact metrics confidentiality impact n a integrity impact n a availability impact n a for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution github com satori go uuid step up your open source security game with whitesource
| 0
|
490,976
| 14,142,925,283
|
IssuesEvent
|
2020-11-10 14:41:25
|
canonical-web-and-design/ubuntu.com
|
https://api.github.com/repos/canonical-web-and-design/ubuntu.com
|
opened
|
UA maintenance page
|
Priority: High UA shop 🛒
|
In the UA catchup meeting on 10/11/20, it was suggested (and met with approval by the meeting attendees) that it would be useful to have a "maintenance" page we can quickly enable if we should need to disable either the dashboard or the shop for any reason.
|
1.0
|
UA maintenance page - In the UA catchup meeting on 10/11/20, it was suggested (and met with approval by the meeting attendees) that it would be useful to have a "maintenance" page we can quickly enable if we should need to disable either the dashboard or the shop for any reason.
|
non_defect
|
ua maintenance page in the ua catchup meeting on it was suggested and met with approval by the meeting attendees that it would be useful to have a maintenance page we can quickly enable if we should need to disable either the dashboard or the shop for any reason
| 0
|
58,992
| 16,991,910,279
|
IssuesEvent
|
2021-06-30 21:52:26
|
idaholab/moose
|
https://api.github.com/repos/idaholab/moose
|
opened
|
Parsed postprocessor struggles with component:quantity syntax
|
P: normal T: defect
|
## Bug Description
When fixing up VTB inputs, I tried to use a parsed postprocessor on an input file that uses THM, which uses that syntax. This failed at function parsing time.
## Steps to Reproduce
Define a function like "component:quantity_1 + component:quantity_2" for a parsed postprocessor. The quantities dont need even need to exist.
## Impact
Less flexibility for all the apps using this syntax.
There are workarounds for simple cases, where non-parsed postprocessors can be used.
|
1.0
|
Parsed postprocessor struggles with component:quantity syntax - ## Bug Description
When fixing up VTB inputs, I tried to use a parsed postprocessor on an input file that uses THM, which uses that syntax. This failed at function parsing time.
## Steps to Reproduce
Define a function like "component:quantity_1 + component:quantity_2" for a parsed postprocessor. The quantities dont need even need to exist.
## Impact
Less flexibility for all the apps using this syntax.
There are workarounds for simple cases, where non-parsed postprocessors can be used.
|
defect
|
parsed postprocessor struggles with component quantity syntax bug description when fixing up vtb inputs i tried to use a parsed postprocessor on an input file that uses thm which uses that syntax this failed at function parsing time steps to reproduce define a function like component quantity component quantity for a parsed postprocessor the quantities dont need even need to exist impact less flexibility for all the apps using this syntax there are workarounds for simple cases where non parsed postprocessors can be used
| 1
|
69,842
| 22,692,248,063
|
IssuesEvent
|
2022-07-04 22:41:24
|
combatopera/aridity
|
https://api.github.com/repos/combatopera/aridity
|
closed
|
allow bracket eliding of $. and $' with other functions
|
defect
|
currently you have to `$f($.(...))` - it would be enough to allow `$.` and `$'` at the end of the function list only
|
1.0
|
allow bracket eliding of $. and $' with other functions - currently you have to `$f($.(...))` - it would be enough to allow `$.` and `$'` at the end of the function list only
|
defect
|
allow bracket eliding of and with other functions currently you have to f it would be enough to allow and at the end of the function list only
| 1
|
270,173
| 8,453,023,113
|
IssuesEvent
|
2018-10-20 11:20:03
|
jredfox/evilnotchlib
|
https://api.github.com/repos/jredfox/evilnotchlib
|
closed
|
Pick Block Event TE issues
|
bug fixed next release good first issue priority=medium
|
Version: snapshot 76
Issue: the pickblock event data gets it on client side only rather then from the server this is invalid behavior that should have been removed in the integrated mc server update and especially 1.8
Steps to reproduce:
place spawener with multiple indexes go out of chunks far away
go back middle click spawner with silkspawners notice no spawnpotentials
|
1.0
|
Pick Block Event TE issues - Version: snapshot 76
Issue: the pickblock event data gets it on client side only rather then from the server this is invalid behavior that should have been removed in the integrated mc server update and especially 1.8
Steps to reproduce:
place spawener with multiple indexes go out of chunks far away
go back middle click spawner with silkspawners notice no spawnpotentials
|
non_defect
|
pick block event te issues version snapshot issue the pickblock event data gets it on client side only rather then from the server this is invalid behavior that should have been removed in the integrated mc server update and especially steps to reproduce place spawener with multiple indexes go out of chunks far away go back middle click spawner with silkspawners notice no spawnpotentials
| 0
|
49,850
| 13,187,281,006
|
IssuesEvent
|
2020-08-13 02:55:01
|
icecube-trac/tix3
|
https://api.github.com/repos/icecube-trac/tix3
|
opened
|
Wrong datatype in steering file for 20208 -> unable to weight via from_simprod (Trac #2178)
|
Incomplete Migration Migrated from Trac analysis defect
|
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/2178">https://code.icecube.wisc.edu/ticket/2178</a>, reported by flauber and owned by </em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2018-08-27T15:15:55",
"description": "Hi,\n\nanother problem with the steering file of 20208\n(http://simprod.icecube.wisc.edu/cgi-bin/simulation/cgi/cfg?dataset=20208)\n\nCORSIKA::eprimarymax\tstring\t1e6\nshould be either int or float, not string.\nIt being a string leads to this error in simprod:\n\n File \"/data/user/flauber/software/py2-v3.0.1/combo/stable/build/lib/icecube/weighting /weighting.py\", line 834, in from_simprod\n emax=steering['CORSIKA::eprimarymax']*I3Units.GeV,\n TypeError: can't multiply sequence by non-int of type 'float'\n\n",
"reporter": "flauber",
"cc": "",
"resolution": "fixed",
"_ts": "1535382955013988",
"component": "analysis",
"summary": "Wrong datatype in steering file for 20208 -> unable to weight via from_simprod",
"priority": "normal",
"keywords": "",
"time": "2018-07-30T13:16:33",
"milestone": "",
"owner": "",
"type": "defect"
}
```
</p>
</details>
|
1.0
|
Wrong datatype in steering file for 20208 -> unable to weight via from_simprod (Trac #2178) - <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/2178">https://code.icecube.wisc.edu/ticket/2178</a>, reported by flauber and owned by </em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2018-08-27T15:15:55",
"description": "Hi,\n\nanother problem with the steering file of 20208\n(http://simprod.icecube.wisc.edu/cgi-bin/simulation/cgi/cfg?dataset=20208)\n\nCORSIKA::eprimarymax\tstring\t1e6\nshould be either int or float, not string.\nIt being a string leads to this error in simprod:\n\n File \"/data/user/flauber/software/py2-v3.0.1/combo/stable/build/lib/icecube/weighting /weighting.py\", line 834, in from_simprod\n emax=steering['CORSIKA::eprimarymax']*I3Units.GeV,\n TypeError: can't multiply sequence by non-int of type 'float'\n\n",
"reporter": "flauber",
"cc": "",
"resolution": "fixed",
"_ts": "1535382955013988",
"component": "analysis",
"summary": "Wrong datatype in steering file for 20208 -> unable to weight via from_simprod",
"priority": "normal",
"keywords": "",
"time": "2018-07-30T13:16:33",
"milestone": "",
"owner": "",
"type": "defect"
}
```
</p>
</details>
|
defect
|
wrong datatype in steering file for unable to weight via from simprod trac migrated from json status closed changetime description hi n nanother problem with the steering file of n be either int or float not string nit being a string leads to this error in simprod n n file data user flauber software combo stable build lib icecube weighting weighting py line in from simprod n emax steering gev n typeerror can t multiply sequence by non int of type float n n reporter flauber cc resolution fixed ts component analysis summary wrong datatype in steering file for unable to weight via from simprod priority normal keywords time milestone owner type defect
| 1
|
2,159
| 2,603,977,296
|
IssuesEvent
|
2015-02-24 19:01:52
|
chrsmith/nishazi6
|
https://api.github.com/repos/chrsmith/nishazi6
|
opened
|
沈阳人类乳头瘤怎么治疗
|
auto-migrated Priority-Medium Type-Defect
|
```
沈阳人类乳头瘤怎么治疗〓沈陽軍區政治部醫院性病〓TEL:02
4-31023308〓成立于1946年,68年專注于性傳播疾病的研究和治療�
��位于沈陽市沈河區二緯路32號。是一所與新中國同建立共輝�
��的歷史悠久、設備精良、技術權威、專家云集,是預防、保
健、醫療、科研康復為一體的綜合性醫院。是國家首批公立��
�等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學�
��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍
空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集��
�二等功。
```
-----
Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 8:26
|
1.0
|
沈阳人类乳头瘤怎么治疗 - ```
沈阳人类乳头瘤怎么治疗〓沈陽軍區政治部醫院性病〓TEL:02
4-31023308〓成立于1946年,68年專注于性傳播疾病的研究和治療�
��位于沈陽市沈河區二緯路32號。是一所與新中國同建立共輝�
��的歷史悠久、設備精良、技術權威、專家云集,是預防、保
健、醫療、科研康復為一體的綜合性醫院。是國家首批公立��
�等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學�
��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍
空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集��
�二等功。
```
-----
Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 8:26
|
defect
|
沈阳人类乳头瘤怎么治疗 沈阳人类乳头瘤怎么治疗〓沈陽軍區政治部醫院性病〓tel: 〓 , � �� 。是一所與新中國同建立共輝� ��的歷史悠久、設備精良、技術權威、專家云集,是預防、保 健、醫療、科研康復為一體的綜合性醫院。是國家首批公立�� �等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學� ��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍 空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集�� �二等功。 original issue reported on code google com by gmail com on jun at
| 1
|
4,614
| 2,610,134,032
|
IssuesEvent
|
2015-02-26 18:42:13
|
chrsmith/hedgewars
|
https://api.github.com/repos/chrsmith/hedgewars
|
closed
|
Windows Compile Guide Missing?
|
auto-migrated Priority-Medium Type-Defect
|
```
If Hedgewars can be compiled on Windows why is the documentation not public.
Also if not , what are the steps to take to build it specifically for windows
on debian/ubuntu enviroment.
```
-----
Original issue reported on code.google.com by `Acii...@gmail.com` on 17 Aug 2010 at 5:16
|
1.0
|
Windows Compile Guide Missing? - ```
If Hedgewars can be compiled on Windows why is the documentation not public.
Also if not , what are the steps to take to build it specifically for windows
on debian/ubuntu enviroment.
```
-----
Original issue reported on code.google.com by `Acii...@gmail.com` on 17 Aug 2010 at 5:16
|
defect
|
windows compile guide missing if hedgewars can be compiled on windows why is the documentation not public also if not what are the steps to take to build it specifically for windows on debian ubuntu enviroment original issue reported on code google com by acii gmail com on aug at
| 1
|
24,357
| 3,968,652,692
|
IssuesEvent
|
2016-05-03 20:26:09
|
lester88a/snova
|
https://api.github.com/repos/lester88a/snova
|
closed
|
可以部署在京东 JAE 上吗?
|
auto-migrated Priority-Medium Type-Defect
|
```
不用做翻墙,只是偶尔跨下国内站。
```
Original issue reported on code.google.com by `cnch...@gmail.com` on 28 Apr 2014 at 3:54
|
1.0
|
可以部署在京东 JAE 上吗? - ```
不用做翻墙,只是偶尔跨下国内站。
```
Original issue reported on code.google.com by `cnch...@gmail.com` on 28 Apr 2014 at 3:54
|
defect
|
可以部署在京东 jae 上吗? 不用做翻墙,只是偶尔跨下国内站。 original issue reported on code google com by cnch gmail com on apr at
| 1
|
30,778
| 6,282,969,805
|
IssuesEvent
|
2017-07-19 01:19:49
|
oleg-shilo/cs-script
|
https://api.github.com/repos/oleg-shilo/cs-script
|
closed
|
Basic types not available to precompilers on linux
|
defect done question
|
The following code:
test.cs
```
//css_precompiler Precompiler.cs
using System;
class Test
{
static void Main(string [] args)
{
Console.WriteLine("boo");
}
}
```
Precompiler.cs
```
using System;
using System.Collections;
using System.Text.RegularExpressions;
public class Precompiler
{
public static bool Compile(ref string code, string scriptFile, bool isPrimaryScript, Hashtable context)
{
Console.WriteLine("zazz");
return false; //false as the code has not been modified
}
}
```
On linux this yields an error saying it doesn't know about System.Text.RegularExpressions. This should be in System AFAIK so I'm not sure what the issue is.
|
1.0
|
Basic types not available to precompilers on linux - The following code:
test.cs
```
//css_precompiler Precompiler.cs
using System;
class Test
{
static void Main(string [] args)
{
Console.WriteLine("boo");
}
}
```
Precompiler.cs
```
using System;
using System.Collections;
using System.Text.RegularExpressions;
public class Precompiler
{
public static bool Compile(ref string code, string scriptFile, bool isPrimaryScript, Hashtable context)
{
Console.WriteLine("zazz");
return false; //false as the code has not been modified
}
}
```
On linux this yields an error saying it doesn't know about System.Text.RegularExpressions. This should be in System AFAIK so I'm not sure what the issue is.
|
defect
|
basic types not available to precompilers on linux the following code test cs css precompiler precompiler cs using system class test static void main string args console writeline boo precompiler cs using system using system collections using system text regularexpressions public class precompiler public static bool compile ref string code string scriptfile bool isprimaryscript hashtable context console writeline zazz return false false as the code has not been modified on linux this yields an error saying it doesn t know about system text regularexpressions this should be in system afaik so i m not sure what the issue is
| 1
|
78,753
| 27,746,013,625
|
IssuesEvent
|
2023-03-15 17:05:11
|
zed-industries/community
|
https://api.github.com/repos/zed-industries/community
|
opened
|
Blinking cursor prevents battery usage from dropping to 0.0 when window is no longer visible
|
defect triage
|
### Check for existing issues
- [X] Completed
### Describe the bug / provide steps to reproduce it
This is very minor, but if Zed has no visible windows Activity Monitor still reports Zed using a small amount of battery.
If all Zed tabs are closed (to ensure there's no visible blinking cursor) the battery usage drops to 0.0, which indicates rendering the blinking cursor prevents the battery usage from going to 0.
Most other programs with blinking cursors have their battery usage drop to 0.0 when not visible.
### Environment
Zed: v0.77.3 (stable)
OS: macOS 13.2.1
Memory: 16 GiB
Architecture: aarch64
### If applicable, add mockups / screenshots to help explain present your vision of the feature
_No response_
### If applicable, attach your `~/Library/Logs/Zed/Zed.log` file to this issue.
If you only need the most recent lines, you can run the `zed: open log` command palette action to see the last 1000.
_No response_
|
1.0
|
Blinking cursor prevents battery usage from dropping to 0.0 when window is no longer visible - ### Check for existing issues
- [X] Completed
### Describe the bug / provide steps to reproduce it
This is very minor, but if Zed has no visible windows Activity Monitor still reports Zed using a small amount of battery.
If all Zed tabs are closed (to ensure there's no visible blinking cursor) the battery usage drops to 0.0, which indicates rendering the blinking cursor prevents the battery usage from going to 0.
Most other programs with blinking cursors have their battery usage drop to 0.0 when not visible.
### Environment
Zed: v0.77.3 (stable)
OS: macOS 13.2.1
Memory: 16 GiB
Architecture: aarch64
### If applicable, add mockups / screenshots to help explain present your vision of the feature
_No response_
### If applicable, attach your `~/Library/Logs/Zed/Zed.log` file to this issue.
If you only need the most recent lines, you can run the `zed: open log` command palette action to see the last 1000.
_No response_
|
defect
|
blinking cursor prevents battery usage from dropping to when window is no longer visible check for existing issues completed describe the bug provide steps to reproduce it this is very minor but if zed has no visible windows activity monitor still reports zed using a small amount of battery if all zed tabs are closed to ensure there s no visible blinking cursor the battery usage drops to which indicates rendering the blinking cursor prevents the battery usage from going to most other programs with blinking cursors have their battery usage drop to when not visible environment zed stable os macos memory gib architecture if applicable add mockups screenshots to help explain present your vision of the feature no response if applicable attach your library logs zed zed log file to this issue if you only need the most recent lines you can run the zed open log command palette action to see the last no response
| 1
|
68,385
| 21,656,812,429
|
IssuesEvent
|
2022-05-06 14:51:42
|
pymc-devs/pymc
|
https://api.github.com/repos/pymc-devs/pymc
|
closed
|
RV size is not correctly inferred from dims
|
defects aesara-related
|
## Description of your problem
While writing a hierarchical model, I ran into a shape problem. Minimally, what I want to do looks like this:
```python
>>> with pm.Model(coords={"feature": [1], "group": ["A", "B"]}):
... x = pm.Normal("x", 0, 1, dims="feature")
... y = pm.Normal("y", x[..., None], 1, dims=("feature", "group"))
... y.shape.eval()
WARNING (aesara.tensor.basic_opt): Failed to infer_shape from Op normal_rv{0, (0, 0), floatX, True}.
Input shapes: [None, (TensorConstant{0},), (), (<TensorType(int64, scalar)>, TensorConstant{1}), ()]
Exception encountered during infer_shape: <class 'Exception'>
Exception message: sharedvar.value does not exist anymore. Use sharedvar.get_value() or sharedvar.set_value() instead.
Traceback: Traceback (most recent call last):
File "/home/lpaz/repos/aesara/aesara/tensor/basic_opt.py", line 867, in get_node_infer_shape
o_shapes = shape_infer(
File "/home/lpaz/repos/aesara/aesara/tensor/random/op.py", line 299, in infer_shape
shape = self._infer_shape(size, dist_params, param_shapes=param_shapes)
File "/home/lpaz/repos/aesara/aesara/tensor/random/op.py", line 196, in _infer_shape
param_shapes = params_broadcast_shapes(
File "/home/lpaz/repos/aesara/aesara/tensor/random/utils.py", line 47, in params_broadcast_shapes
rev_extra_dims = [
File "/home/lpaz/repos/aesara/aesara/tensor/random/utils.py", line 48, in <listcomp>
max_bcast(a, b)
File "/home/lpaz/repos/aesara/aesara/tensor/random/utils.py", line 41, in max_bcast
if getattr(x, "value", x) == 1:
File "/home/lpaz/repos/aesara/aesara/compile/sharedvalue.py", line 211, in _value_get
raise Exception(
Exception: sharedvar.value does not exist anymore. Use sharedvar.get_value() or sharedvar.set_value() instead.
array([1, 1])
```
So the shape of `y` is inferred incorrectly, and this led to problems downstream in the full model. If instead of using `dims`, I use `size`, everything works fine.
```python
>>> with pm.Model(coords={"feature": [1], "group": ["A", "B"]}):
... x = pm.Normal("x", 0, 1, size=(1,))
... y = pm.Normal("y", x[..., None], 1, size=(1, 2))
... y.shape.eval()
array([1, 2])
```
## Versions and main components
* PyMC/PyMC3 Version: main branch at commit 073e26b9
* Aesara/Theano Version: 2.2.6
* Python Version: 3.8.5
* Operating system: Ubuntu 18.04
* How did you install PyMC/PyMC3: pip
|
1.0
|
RV size is not correctly inferred from dims - ## Description of your problem
While writing a hierarchical model, I ran into a shape problem. Minimally, what I want to do looks like this:
```python
>>> with pm.Model(coords={"feature": [1], "group": ["A", "B"]}):
... x = pm.Normal("x", 0, 1, dims="feature")
... y = pm.Normal("y", x[..., None], 1, dims=("feature", "group"))
... y.shape.eval()
WARNING (aesara.tensor.basic_opt): Failed to infer_shape from Op normal_rv{0, (0, 0), floatX, True}.
Input shapes: [None, (TensorConstant{0},), (), (<TensorType(int64, scalar)>, TensorConstant{1}), ()]
Exception encountered during infer_shape: <class 'Exception'>
Exception message: sharedvar.value does not exist anymore. Use sharedvar.get_value() or sharedvar.set_value() instead.
Traceback: Traceback (most recent call last):
File "/home/lpaz/repos/aesara/aesara/tensor/basic_opt.py", line 867, in get_node_infer_shape
o_shapes = shape_infer(
File "/home/lpaz/repos/aesara/aesara/tensor/random/op.py", line 299, in infer_shape
shape = self._infer_shape(size, dist_params, param_shapes=param_shapes)
File "/home/lpaz/repos/aesara/aesara/tensor/random/op.py", line 196, in _infer_shape
param_shapes = params_broadcast_shapes(
File "/home/lpaz/repos/aesara/aesara/tensor/random/utils.py", line 47, in params_broadcast_shapes
rev_extra_dims = [
File "/home/lpaz/repos/aesara/aesara/tensor/random/utils.py", line 48, in <listcomp>
max_bcast(a, b)
File "/home/lpaz/repos/aesara/aesara/tensor/random/utils.py", line 41, in max_bcast
if getattr(x, "value", x) == 1:
File "/home/lpaz/repos/aesara/aesara/compile/sharedvalue.py", line 211, in _value_get
raise Exception(
Exception: sharedvar.value does not exist anymore. Use sharedvar.get_value() or sharedvar.set_value() instead.
array([1, 1])
```
So the shape of `y` is inferred incorrectly, and this led to problems downstream in the full model. If instead of using `dims`, I use `size`, everything works fine.
```python
>>> with pm.Model(coords={"feature": [1], "group": ["A", "B"]}):
... x = pm.Normal("x", 0, 1, size=(1,))
... y = pm.Normal("y", x[..., None], 1, size=(1, 2))
... y.shape.eval()
array([1, 2])
```
## Versions and main components
* PyMC/PyMC3 Version: main branch at commit 073e26b9
* Aesara/Theano Version: 2.2.6
* Python Version: 3.8.5
* Operating system: Ubuntu 18.04
* How did you install PyMC/PyMC3: pip
|
defect
|
rv size is not correctly inferred from dims description of your problem while writing a hierarchical model i ran into a shape problem minimally what i want to do looks like this python with pm model coords feature group x pm normal x dims feature y pm normal y x dims feature group y shape eval warning aesara tensor basic opt failed to infer shape from op normal rv floatx true input shapes exception encountered during infer shape exception message sharedvar value does not exist anymore use sharedvar get value or sharedvar set value instead traceback traceback most recent call last file home lpaz repos aesara aesara tensor basic opt py line in get node infer shape o shapes shape infer file home lpaz repos aesara aesara tensor random op py line in infer shape shape self infer shape size dist params param shapes param shapes file home lpaz repos aesara aesara tensor random op py line in infer shape param shapes params broadcast shapes file home lpaz repos aesara aesara tensor random utils py line in params broadcast shapes rev extra dims file home lpaz repos aesara aesara tensor random utils py line in max bcast a b file home lpaz repos aesara aesara tensor random utils py line in max bcast if getattr x value x file home lpaz repos aesara aesara compile sharedvalue py line in value get raise exception exception sharedvar value does not exist anymore use sharedvar get value or sharedvar set value instead array so the shape of y is inferred incorrectly and this led to problems downstream in the full model if instead of using dims i use size everything works fine python with pm model coords feature group x pm normal x size y pm normal y x size y shape eval array versions and main components pymc version main branch at commit aesara theano version python version operating system ubuntu how did you install pymc pip
| 1
|
29,096
| 11,706,465,351
|
IssuesEvent
|
2020-03-07 22:21:17
|
HDInnovations/UNIT3D-Community-Edition
|
https://api.github.com/repos/HDInnovations/UNIT3D-Community-Edition
|
opened
|
npm audit found vulnerabilities
|
SecurityVulnerability
|
```
=== npm audit security report ===
# Run npm install --save-dev webpack-obfuscator@0.25.4 to resolve 1 vulnerability
┌───────────────┬──────────────────────────────────────────────────────────────┐
│ Moderate │ Regular Expression Denial of Service │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Package │ acorn │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Dependency of │ webpack-obfuscator [dev] │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Path │ webpack-obfuscator > javascript-obfuscator > acorn │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ More info │ https://npmjs.com/advisories/1488 │
└───────────────┴──────────────────────────────────────────────────────────────┘
┌──────────────────────────────────────────────────────────────────────────────┐
│ Manual Review │
│ Some vulnerabilities require your attention to resolve │
│ │
│ Visit https://go.npm.me/audit-guide for additional guidance │
└──────────────────────────────────────────────────────────────────────────────┘
┌───────────────┬──────────────────────────────────────────────────────────────┐
│ Moderate │ Regular Expression Denial of Service │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Package │ acorn │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Patched in │ >=7.1.1 │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Dependency of │ laravel-mix [dev] │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Path │ laravel-mix > webpack > acorn │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ More info │ https://npmjs.com/advisories/1488 │
└───────────────┴──────────────────────────────────────────────────────────────┘
found 2 moderate severity vulnerabilities in 18240 scanned packages
run `npm audit fix` to fix 1 of them.
1 vulnerability requires manual review. See the full report for details.
```
|
True
|
npm audit found vulnerabilities - ```
=== npm audit security report ===
# Run npm install --save-dev webpack-obfuscator@0.25.4 to resolve 1 vulnerability
┌───────────────┬──────────────────────────────────────────────────────────────┐
│ Moderate │ Regular Expression Denial of Service │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Package │ acorn │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Dependency of │ webpack-obfuscator [dev] │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Path │ webpack-obfuscator > javascript-obfuscator > acorn │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ More info │ https://npmjs.com/advisories/1488 │
└───────────────┴──────────────────────────────────────────────────────────────┘
┌──────────────────────────────────────────────────────────────────────────────┐
│ Manual Review │
│ Some vulnerabilities require your attention to resolve │
│ │
│ Visit https://go.npm.me/audit-guide for additional guidance │
└──────────────────────────────────────────────────────────────────────────────┘
┌───────────────┬──────────────────────────────────────────────────────────────┐
│ Moderate │ Regular Expression Denial of Service │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Package │ acorn │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Patched in │ >=7.1.1 │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Dependency of │ laravel-mix [dev] │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Path │ laravel-mix > webpack > acorn │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ More info │ https://npmjs.com/advisories/1488 │
└───────────────┴──────────────────────────────────────────────────────────────┘
found 2 moderate severity vulnerabilities in 18240 scanned packages
run `npm audit fix` to fix 1 of them.
1 vulnerability requires manual review. See the full report for details.
```
|
non_defect
|
npm audit found vulnerabilities npm audit security report run npm install save dev webpack obfuscator to resolve vulnerability ┌───────────────┬──────────────────────────────────────────────────────────────┐ │ moderate │ regular expression denial of service │ ├───────────────┼──────────────────────────────────────────────────────────────┤ │ package │ acorn │ ├───────────────┼──────────────────────────────────────────────────────────────┤ │ dependency of │ webpack obfuscator │ ├───────────────┼──────────────────────────────────────────────────────────────┤ │ path │ webpack obfuscator javascript obfuscator acorn │ ├───────────────┼──────────────────────────────────────────────────────────────┤ │ more info │ │ └───────────────┴──────────────────────────────────────────────────────────────┘ ┌──────────────────────────────────────────────────────────────────────────────┐ │ manual review │ │ some vulnerabilities require your attention to resolve │ │ │ │ visit for additional guidance │ └──────────────────────────────────────────────────────────────────────────────┘ ┌───────────────┬──────────────────────────────────────────────────────────────┐ │ moderate │ regular expression denial of service │ ├───────────────┼──────────────────────────────────────────────────────────────┤ │ package │ acorn │ ├───────────────┼──────────────────────────────────────────────────────────────┤ │ patched in │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ │ dependency of │ laravel mix │ ├───────────────┼──────────────────────────────────────────────────────────────┤ │ path │ laravel mix webpack acorn │ ├───────────────┼──────────────────────────────────────────────────────────────┤ │ more info │ │ └───────────────┴──────────────────────────────────────────────────────────────┘ found moderate severity vulnerabilities in scanned packages run npm audit fix to fix of them vulnerability requires manual review see the full report for details
| 0
|
100,261
| 12,512,109,841
|
IssuesEvent
|
2020-06-02 21:57:26
|
waliarubal/Jaya
|
https://api.github.com/repos/waliarubal/Jaya
|
closed
|
New Logo Design
|
design change
|
The current logo for the project doesn't align with the motto of a file system manager. Put in some design ideas and create a new logo which better expresses project's meaning at the very first glance.

|
1.0
|
New Logo Design - The current logo for the project doesn't align with the motto of a file system manager. Put in some design ideas and create a new logo which better expresses project's meaning at the very first glance.

|
non_defect
|
new logo design the current logo for the project doesn t align with the motto of a file system manager put in some design ideas and create a new logo which better expresses project s meaning at the very first glance
| 0
|
51,227
| 13,207,397,930
|
IssuesEvent
|
2020-08-14 22:57:09
|
icecube-trac/tix4
|
https://api.github.com/repos/icecube-trac/tix4
|
opened
|
PhysicsBuffer example wrong (Trac #67)
|
IceTray Incomplete Migration Migrated from Trac defect
|
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/67">https://code.icecube.wisc.edu/projects/icecube/ticket/67</a>, reported by troyand owned by troy</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2007-07-19T13:25:53",
"_ts": "1184851553000000",
"description": "Duh.\n\ndeque required.",
"reporter": "troy",
"cc": "",
"resolution": "fixed",
"time": "2007-06-19T21:09:47",
"component": "IceTray",
"summary": "PhysicsBuffer example wrong",
"priority": "normal",
"keywords": "",
"milestone": "",
"owner": "troy",
"type": "defect"
}
```
</p>
</details>
|
1.0
|
PhysicsBuffer example wrong (Trac #67) - <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/67">https://code.icecube.wisc.edu/projects/icecube/ticket/67</a>, reported by troyand owned by troy</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2007-07-19T13:25:53",
"_ts": "1184851553000000",
"description": "Duh.\n\ndeque required.",
"reporter": "troy",
"cc": "",
"resolution": "fixed",
"time": "2007-06-19T21:09:47",
"component": "IceTray",
"summary": "PhysicsBuffer example wrong",
"priority": "normal",
"keywords": "",
"milestone": "",
"owner": "troy",
"type": "defect"
}
```
</p>
</details>
|
defect
|
physicsbuffer example wrong trac migrated from json status closed changetime ts description duh n ndeque required reporter troy cc resolution fixed time component icetray summary physicsbuffer example wrong priority normal keywords milestone owner troy type defect
| 1
|
51,666
| 13,211,278,685
|
IssuesEvent
|
2020-08-15 22:00:32
|
icecube-trac/tix4
|
https://api.github.com/repos/icecube-trac/tix4
|
opened
|
steamshovel - doxygen errors, missing class members (Trac #801)
|
Incomplete Migration Migrated from Trac combo core defect
|
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/801">https://code.icecube.wisc.edu/projects/icecube/ticket/801</a>, reported by negaand owned by olivas</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2015-04-17T00:13:27",
"_ts": "1429229607988708",
"description": "ignore \n{{{\nerror: Fatal error at line 1 column 1: unexpected end of file\nerror: Fatal error at line 1 column 1: error while parsing prolog\n}}}\nin the following text\n\n{{{\n/data/i3home/nega/i3/offline-software/src/steamshovel/private/shovelart/SceneObject.cpp:256: warning: no matching class member found for \n template <>\n vec3d StaticLineObject::get(int idx, int vistime)\n\n[100%] Built target steamshovel-shovelio-doxygen\nerror: Fatal error at line 1 column 1: unexpected end of file\nerror: Fatal error at line 1 column 1: error while parsing prolog\nerror: Fatal error at line 1 column 1: unexpected end of file\nerror: Fatal error at line 1 column 1: error while parsing prolog\nerror: Fatal error at line 1 column 1: unexpected end of file\nerror: Fatal error at line 1 column 1: error while parsing prolog\nerror: Fatal error at line 1 column 1: unexpected end of file\nerror: Fatal error at line 1 column 1: error while parsing prolog\n/data/i3home/nega/i3/offline-software/src/steamshovel/private/shovelart/SceneObject.cpp:256: warning: no matching class member found for \n template <>\n vec3d StaticLineObject::get(int idx, int vistime)\n\n[100%] Built target steamshovel-shovelart-doxygen\n[100%] Built target steamshovel-doxygen\n}}}\n",
"reporter": "nega",
"cc": "",
"resolution": "invalid",
"time": "2014-11-06T19:59:53",
"component": "combo core",
"summary": "steamshovel - doxygen errors, missing class members",
"priority": "normal",
"keywords": "",
"milestone": "",
"owner": "olivas",
"type": "defect"
}
```
</p>
</details>
|
1.0
|
steamshovel - doxygen errors, missing class members (Trac #801) - <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/801">https://code.icecube.wisc.edu/projects/icecube/ticket/801</a>, reported by negaand owned by olivas</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2015-04-17T00:13:27",
"_ts": "1429229607988708",
"description": "ignore \n{{{\nerror: Fatal error at line 1 column 1: unexpected end of file\nerror: Fatal error at line 1 column 1: error while parsing prolog\n}}}\nin the following text\n\n{{{\n/data/i3home/nega/i3/offline-software/src/steamshovel/private/shovelart/SceneObject.cpp:256: warning: no matching class member found for \n template <>\n vec3d StaticLineObject::get(int idx, int vistime)\n\n[100%] Built target steamshovel-shovelio-doxygen\nerror: Fatal error at line 1 column 1: unexpected end of file\nerror: Fatal error at line 1 column 1: error while parsing prolog\nerror: Fatal error at line 1 column 1: unexpected end of file\nerror: Fatal error at line 1 column 1: error while parsing prolog\nerror: Fatal error at line 1 column 1: unexpected end of file\nerror: Fatal error at line 1 column 1: error while parsing prolog\nerror: Fatal error at line 1 column 1: unexpected end of file\nerror: Fatal error at line 1 column 1: error while parsing prolog\n/data/i3home/nega/i3/offline-software/src/steamshovel/private/shovelart/SceneObject.cpp:256: warning: no matching class member found for \n template <>\n vec3d StaticLineObject::get(int idx, int vistime)\n\n[100%] Built target steamshovel-shovelart-doxygen\n[100%] Built target steamshovel-doxygen\n}}}\n",
"reporter": "nega",
"cc": "",
"resolution": "invalid",
"time": "2014-11-06T19:59:53",
"component": "combo core",
"summary": "steamshovel - doxygen errors, missing class members",
"priority": "normal",
"keywords": "",
"milestone": "",
"owner": "olivas",
"type": "defect"
}
```
</p>
</details>
|
defect
|
steamshovel doxygen errors missing class members trac migrated from json status closed changetime ts description ignore n nerror fatal error at line column unexpected end of file nerror fatal error at line column error while parsing prolog n nin the following text n n n data nega offline software src steamshovel private shovelart sceneobject cpp warning no matching class member found for n template n staticlineobject get int idx int vistime n n built target steamshovel shovelio doxygen nerror fatal error at line column unexpected end of file nerror fatal error at line column error while parsing prolog nerror fatal error at line column unexpected end of file nerror fatal error at line column error while parsing prolog nerror fatal error at line column unexpected end of file nerror fatal error at line column error while parsing prolog nerror fatal error at line column unexpected end of file nerror fatal error at line column error while parsing prolog n data nega offline software src steamshovel private shovelart sceneobject cpp warning no matching class member found for n template n staticlineobject get int idx int vistime n n built target steamshovel shovelart doxygen n built target steamshovel doxygen n n reporter nega cc resolution invalid time component combo core summary steamshovel doxygen errors missing class members priority normal keywords milestone owner olivas type defect
| 1
|
347,919
| 10,436,435,215
|
IssuesEvent
|
2019-09-17 19:33:44
|
mothur/mothur
|
https://api.github.com/repos/mothur/mothur
|
closed
|
Make.contigs gz errors
|
Bugs Command:Make.contigs Priority
|
1. Test files to see if they can successfully be read with boost.
2. If failure, decompress individual fastq files, assemble and remove expanded file.
|
1.0
|
Make.contigs gz errors - 1. Test files to see if they can successfully be read with boost.
2. If failure, decompress individual fastq files, assemble and remove expanded file.
|
non_defect
|
make contigs gz errors test files to see if they can successfully be read with boost if failure decompress individual fastq files assemble and remove expanded file
| 0
|
189,506
| 22,047,054,272
|
IssuesEvent
|
2022-05-30 03:47:55
|
nanopathi/linux-4.19.72_CVE-2021-3347
|
https://api.github.com/repos/nanopathi/linux-4.19.72_CVE-2021-3347
|
closed
|
CVE-2019-18675 (High) detected in linuxlinux-4.19.239 - autoclosed
|
security vulnerability
|
## CVE-2019-18675 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.239</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p>
<p>Found in HEAD commit: <a href="https://github.com/nanopathi/linux-4.19.72_CVE-2021-3347/commit/8b7c061438f230c475fd8cd97a0917f6ebb9fbe0">8b7c061438f230c475fd8cd97a0917f6ebb9fbe0</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/media/usb/cpia2/cpia2_core.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/media/usb/cpia2/cpia2_core.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.
<p>Publish Date: 2019-11-25
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-18675>CVE-2019-18675</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18675">https://nvd.nist.gov/vuln/detail/CVE-2019-18675</a></p>
<p>Release Date: 2020-01-03</p>
<p>Fix Resolution: linux-libc-headers - 5.10;linux-yocto - 4.8.26+gitAUTOINC+1c60e003c7_27efc3ba68,5.4.20+gitAUTOINC+c11911d4d1_f4d7dbafb1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2019-18675 (High) detected in linuxlinux-4.19.239 - autoclosed - ## CVE-2019-18675 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.239</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p>
<p>Found in HEAD commit: <a href="https://github.com/nanopathi/linux-4.19.72_CVE-2021-3347/commit/8b7c061438f230c475fd8cd97a0917f6ebb9fbe0">8b7c061438f230c475fd8cd97a0917f6ebb9fbe0</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/media/usb/cpia2/cpia2_core.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/media/usb/cpia2/cpia2_core.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.
<p>Publish Date: 2019-11-25
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-18675>CVE-2019-18675</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18675">https://nvd.nist.gov/vuln/detail/CVE-2019-18675</a></p>
<p>Release Date: 2020-01-03</p>
<p>Fix Resolution: linux-libc-headers - 5.10;linux-yocto - 4.8.26+gitAUTOINC+1c60e003c7_27efc3ba68,5.4.20+gitAUTOINC+c11911d4d1_f4d7dbafb1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_defect
|
cve high detected in linuxlinux autoclosed cve high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in head commit a href found in base branch master vulnerable source files drivers media usb core c drivers media usb core c vulnerability details the linux kernel through has a start offset size integer overflow in remap buffer in drivers media usb core c because has its own mmap implementation this allows local users with dev access to obtain read and write permissions on kernel physical pages which can possibly result in a privilege escalation publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution linux libc headers linux yocto gitautoinc gitautoinc step up your open source security game with whitesource
| 0
|
72,655
| 24,222,521,441
|
IssuesEvent
|
2022-09-26 12:05:17
|
primefaces-extensions/primefaces-extensions
|
https://api.github.com/repos/primefaces-extensions/primefaces-extensions
|
closed
|
Orgchart: potential CSS corruption after css minifying (hosted in maven)
|
defect 11.0.x
|
### Describe the bug
Let's compare the css in line:
https://github.com/primefaces-extensions/primefaces-extensions/blame/master/core/src/main/resources/META-INF/resources/primefaces-extensions/orgchart/orgchart.css#L113
```css
.orgchart>table:first-child{
margin: 20px auto;
}
```
compared to the css in here, https://mvnrepository.com/artifact/org.primefaces.extensions/primefaces-extensions/11.0.5
if we download the jar and open orgchart.css

we can see there's an extra space in between which can cause css corruption
Defect:

Expected:

@melloware Do you know the potential reason of unexpected empty spaces could be added during the resource minifying and broke the style? Thanks:)
|
1.0
|
Orgchart: potential CSS corruption after css minifying (hosted in maven) - ### Describe the bug
Let's compare the css in line:
https://github.com/primefaces-extensions/primefaces-extensions/blame/master/core/src/main/resources/META-INF/resources/primefaces-extensions/orgchart/orgchart.css#L113
```css
.orgchart>table:first-child{
margin: 20px auto;
}
```
compared to the css in here, https://mvnrepository.com/artifact/org.primefaces.extensions/primefaces-extensions/11.0.5
if we download the jar and open orgchart.css

we can see there's an extra space in between which can cause css corruption
Defect:

Expected:

@melloware Do you know the potential reason of unexpected empty spaces could be added during the resource minifying and broke the style? Thanks:)
|
defect
|
orgchart potential css corruption after css minifying hosted in maven describe the bug let s compare the css in line css orgchart table first child margin auto compared to the css in here if we download the jar and open orgchart css we can see there s an extra space in between which can cause css corruption defect expected melloware do you know the potential reason of unexpected empty spaces could be added during the resource minifying and broke the style thanks
| 1
|
32,352
| 6,767,372,950
|
IssuesEvent
|
2017-10-26 02:54:27
|
Shopkeepers/Shopkeepers
|
https://api.github.com/repos/Shopkeepers/Shopkeepers
|
closed
|
Could not pass event InventoryClickEvent to Shopkeepers v1.9
|
Defect fixed migrated
|
**Migrated from:** https://dev.bukkit.org/projects/shopkeepers/issues/52
**Originally posted by BEQOsNtDi6xRDGzqIAT7 (Nov 16, 2012):**
Using the latest 1.9 dev build for 1.4.4, this error pops up when successfully trading with a shopkeeper. Specifically, when removing the sold item.00:31:24 [SEVERE] Could not pass event InventoryClickEvent to Shopkeepers v1.9
org.bukkit.event.EventException
    at org.bukkit.plugin.java.JavaPluginLoader$1.execute(JavaPluginLoader.java:341)
    at org.bukkit.plugin.RegisteredListener.callEvent(RegisteredListener.java:62)
    at org.bukkit.plugin.SimplePluginManager.fireEvent(SimplePluginManager.java:477)
    at org.bukkit.plugin.SimplePluginManager.callEvent(SimplePluginManager.java:462)
    at net.minecraft.server.NetServerHandler.a(NetServerHandler.java:1145)
    at net.minecraft.server.Packet102WindowClick.handle(SourceFile:31)
    at net.minecraft.server.NetworkManager.b(NetworkManager.java:290)
    at net.minecraft.server.NetServerHandler.d(NetServerHandler.java:112)
    at net.minecraft.server.ServerConnection.b(SourceFile:39)
    at net.minecraft.server.DedicatedServerConnection.b(SourceFile:30)
    at net.minecraft.server.MinecraftServer.r(MinecraftServer.java:595)
    at net.minecraft.server.DedicatedServer.r(DedicatedServer.java:222)
    at net.minecraft.server.MinecraftServer.q(MinecraftServer.java:493)
    at net.minecraft.server.MinecraftServer.run(MinecraftServer.java:426)
    at net.minecraft.server.ThreadServerApplication.run(SourceFile:856)
Caused by: java.lang.NullPointerException
    at com.nisovin.shopkeepers.ShopListener.onInventoryClick(ShopListener.java:161)
    at sun.reflect.GeneratedMethodAccessor6.invoke(Unknown Source)
    at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
    at java.lang.reflect.Method.invoke(Method.java:601)
    at org.bukkit.plugin.java.JavaPluginLoader$1.execute(JavaPluginLoader.java:339)
    ... 14 more
|
1.0
|
Could not pass event InventoryClickEvent to Shopkeepers v1.9 - **Migrated from:** https://dev.bukkit.org/projects/shopkeepers/issues/52
**Originally posted by BEQOsNtDi6xRDGzqIAT7 (Nov 16, 2012):**
Using the latest 1.9 dev build for 1.4.4, this error pops up when successfully trading with a shopkeeper. Specifically, when removing the sold item.00:31:24 [SEVERE] Could not pass event InventoryClickEvent to Shopkeepers v1.9
org.bukkit.event.EventException
    at org.bukkit.plugin.java.JavaPluginLoader$1.execute(JavaPluginLoader.java:341)
    at org.bukkit.plugin.RegisteredListener.callEvent(RegisteredListener.java:62)
    at org.bukkit.plugin.SimplePluginManager.fireEvent(SimplePluginManager.java:477)
    at org.bukkit.plugin.SimplePluginManager.callEvent(SimplePluginManager.java:462)
    at net.minecraft.server.NetServerHandler.a(NetServerHandler.java:1145)
    at net.minecraft.server.Packet102WindowClick.handle(SourceFile:31)
    at net.minecraft.server.NetworkManager.b(NetworkManager.java:290)
    at net.minecraft.server.NetServerHandler.d(NetServerHandler.java:112)
    at net.minecraft.server.ServerConnection.b(SourceFile:39)
    at net.minecraft.server.DedicatedServerConnection.b(SourceFile:30)
    at net.minecraft.server.MinecraftServer.r(MinecraftServer.java:595)
    at net.minecraft.server.DedicatedServer.r(DedicatedServer.java:222)
    at net.minecraft.server.MinecraftServer.q(MinecraftServer.java:493)
    at net.minecraft.server.MinecraftServer.run(MinecraftServer.java:426)
    at net.minecraft.server.ThreadServerApplication.run(SourceFile:856)
Caused by: java.lang.NullPointerException
    at com.nisovin.shopkeepers.ShopListener.onInventoryClick(ShopListener.java:161)
    at sun.reflect.GeneratedMethodAccessor6.invoke(Unknown Source)
    at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
    at java.lang.reflect.Method.invoke(Method.java:601)
    at org.bukkit.plugin.java.JavaPluginLoader$1.execute(JavaPluginLoader.java:339)
    ... 14 more
|
defect
|
could not pass event inventoryclickevent to shopkeepers migrated from originally posted by nov using the latest dev build for this error pops up when successfully trading with a shopkeeper specifically when removing the sold item could not pass event inventoryclickevent to shopkeepers org bukkit event eventexception â â â â at org bukkit plugin java javapluginloader execute javapluginloader java â â â â at org bukkit plugin registeredlistener callevent registeredlistener java â â â â at org bukkit plugin simplepluginmanager fireevent simplepluginmanager java â â â â at org bukkit plugin simplepluginmanager callevent simplepluginmanager java â â â â at net minecraft server netserverhandler a netserverhandler java â â â â at net minecraft server handle sourcefile â â â â at net minecraft server networkmanager b networkmanager java â â â â at net minecraft server netserverhandler d netserverhandler java â â â â at net minecraft server serverconnection b sourcefile â â â â at net minecraft server dedicatedserverconnection b sourcefile â â â â at net minecraft server minecraftserver r minecraftserver java â â â â at net minecraft server dedicatedserver r dedicatedserver java â â â â at net minecraft server minecraftserver q minecraftserver java â â â â at net minecraft server minecraftserver run minecraftserver java â â â â at net minecraft server threadserverapplication run sourcefile caused by java lang nullpointerexception â â â â at com nisovin shopkeepers shoplistener oninventoryclick shoplistener java â â â â at sun reflect invoke unknown source â â â â at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java â â â â at java lang reflect method invoke method java â â â â at org bukkit plugin java javapluginloader execute javapluginloader java â â â â more
| 1
|
212,296
| 7,235,458,872
|
IssuesEvent
|
2018-02-13 00:50:01
|
vvp002/campus-mobile
|
https://api.github.com/repos/vvp002/campus-mobile
|
closed
|
Create Finals Schedule Card
|
High Priority
|
Create Finals Schedule Card that appears in the Home view (after the Special Events Card if active).
|
1.0
|
Create Finals Schedule Card - Create Finals Schedule Card that appears in the Home view (after the Special Events Card if active).
|
non_defect
|
create finals schedule card create finals schedule card that appears in the home view after the special events card if active
| 0
|
197,809
| 15,691,183,734
|
IssuesEvent
|
2021-03-25 17:33:35
|
bcgov/cloud-pathfinder
|
https://api.github.com/repos/bcgov/cloud-pathfinder
|
opened
|
Review of Microsoft Annex E - Privacy Terms
|
documentation
|
**Describe the issue**
Begin review of Microsoft's Annex E for the privacy requirements identified during review of AWS's Annex E,. These privacy requirements were not found in the Government of Canada's Framework Agreement.
**Which Sprint Goal is this issue related to?**
> Note: 'Milestone' is a ZenHub term that we use synonymously with 'Sprint'.
The 'Milestone' description (created in ZenHub) should clearly list Sprint Goals. This section should indicate which 'goal' this issue is related to.
**Additional context**
Add any other context, attachments or screenshots
**Definition of done**
-All documents have been read.
-Analysis has begun and will continue into next sprint,
|
1.0
|
Review of Microsoft Annex E - Privacy Terms - **Describe the issue**
Begin review of Microsoft's Annex E for the privacy requirements identified during review of AWS's Annex E,. These privacy requirements were not found in the Government of Canada's Framework Agreement.
**Which Sprint Goal is this issue related to?**
> Note: 'Milestone' is a ZenHub term that we use synonymously with 'Sprint'.
The 'Milestone' description (created in ZenHub) should clearly list Sprint Goals. This section should indicate which 'goal' this issue is related to.
**Additional context**
Add any other context, attachments or screenshots
**Definition of done**
-All documents have been read.
-Analysis has begun and will continue into next sprint,
|
non_defect
|
review of microsoft annex e privacy terms describe the issue begin review of microsoft s annex e for the privacy requirements identified during review of aws s annex e these privacy requirements were not found in the government of canada s framework agreement which sprint goal is this issue related to note milestone is a zenhub term that we use synonymously with sprint the milestone description created in zenhub should clearly list sprint goals this section should indicate which goal this issue is related to additional context add any other context attachments or screenshots definition of done all documents have been read analysis has begun and will continue into next sprint
| 0
|
78,573
| 27,602,571,247
|
IssuesEvent
|
2023-03-09 10:54:23
|
SeleniumHQ/selenium
|
https://api.github.com/repos/SeleniumHQ/selenium
|
opened
|
[🐛 Bug]:
|
I-defect needs-triaging
|
### What happened?
Typescript errors miss source code stack trace and only show the error and traces from selenium library
```
no such element: Unable to locate element: {"method":"css selector","selector":"span > span"}
(Session info: chrome=110.0.5481.177)
NoSuchElementError: no such element: Unable to locate element: {"method":"css selector","selector":"span > span"}
(Session info: chrome=110.0.5481.177)
at Object.throwDecodedError (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/error.js:524:15)
at parseHttpResponse (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/http.js:587:13)
at Executor.execute (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/http.js:515:28)
at runMicrotasks (<anonymous>)
at processTicksAndRejections (node:internal/process/task_queues:96:5)
at async Driver.execute (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:745:17)
at async toWireValue (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:145:15)
at async /Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:195:16
at async forEachKey (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:189:9)
at async convertKeys (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:194:3)
```
### How can we reproduce the issue?
```shell
Try to get one element that does not exist to cause an error, and in the error trace will not be your source code file.
index.ts
await driver.findElement(By.css('span > span'));
```
In the thrown error you will not see mentioned index.ts nor the line the error happend.
```
### Relevant log output
```shell
no such element: Unable to locate element: {"method":"css selector","selector":"span > span"}
(Session info: chrome=110.0.5481.177)
NoSuchElementError: no such element: Unable to locate element: {"method":"css selector","selector":"span > span"}
(Session info: chrome=110.0.5481.177)
at Object.throwDecodedError (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/error.js:524:15)
at parseHttpResponse (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/http.js:587:13)
at Executor.execute (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/http.js:515:28)
at runMicrotasks (<anonymous>)
at processTicksAndRejections (node:internal/process/task_queues:96:5)
at async Driver.execute (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:745:17)
at async toWireValue (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:145:15)
at async /Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:195:16
at async forEachKey (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:189:9)
at async convertKeys (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:194:3)
```
```
### Operating System
macOS
### Selenium version
Typescript Node v16.14.0
### What are the browser(s) and version(s) where you see this issue?
not a browser issue
### What are the browser driver(s) and version(s) where you see this issue?
not a browser issue
### Are you using Selenium Grid?
_No response_
|
1.0
|
[🐛 Bug]: - ### What happened?
Typescript errors miss source code stack trace and only show the error and traces from selenium library
```
no such element: Unable to locate element: {"method":"css selector","selector":"span > span"}
(Session info: chrome=110.0.5481.177)
NoSuchElementError: no such element: Unable to locate element: {"method":"css selector","selector":"span > span"}
(Session info: chrome=110.0.5481.177)
at Object.throwDecodedError (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/error.js:524:15)
at parseHttpResponse (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/http.js:587:13)
at Executor.execute (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/http.js:515:28)
at runMicrotasks (<anonymous>)
at processTicksAndRejections (node:internal/process/task_queues:96:5)
at async Driver.execute (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:745:17)
at async toWireValue (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:145:15)
at async /Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:195:16
at async forEachKey (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:189:9)
at async convertKeys (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:194:3)
```
### How can we reproduce the issue?
```shell
Try to get one element that does not exist to cause an error, and in the error trace will not be your source code file.
index.ts
await driver.findElement(By.css('span > span'));
```
In the thrown error you will not see mentioned index.ts nor the line the error happend.
```
### Relevant log output
```shell
no such element: Unable to locate element: {"method":"css selector","selector":"span > span"}
(Session info: chrome=110.0.5481.177)
NoSuchElementError: no such element: Unable to locate element: {"method":"css selector","selector":"span > span"}
(Session info: chrome=110.0.5481.177)
at Object.throwDecodedError (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/error.js:524:15)
at parseHttpResponse (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/http.js:587:13)
at Executor.execute (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/http.js:515:28)
at runMicrotasks (<anonymous>)
at processTicksAndRejections (node:internal/process/task_queues:96:5)
at async Driver.execute (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:745:17)
at async toWireValue (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:145:15)
at async /Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:195:16
at async forEachKey (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:189:9)
at async convertKeys (/Users/k/Desktop/test/e2e_tests/node_modules/selenium-webdriver/lib/webdriver.js:194:3)
```
```
### Operating System
macOS
### Selenium version
Typescript Node v16.14.0
### What are the browser(s) and version(s) where you see this issue?
not a browser issue
### What are the browser driver(s) and version(s) where you see this issue?
not a browser issue
### Are you using Selenium Grid?
_No response_
|
defect
|
what happened typescript errors miss source code stack trace and only show the error and traces from selenium library no such element unable to locate element method css selector selector span span session info chrome nosuchelementerror no such element unable to locate element method css selector selector span span session info chrome at object throwdecodederror users k desktop test tests node modules selenium webdriver lib error js at parsehttpresponse users k desktop test tests node modules selenium webdriver lib http js at executor execute users k desktop test tests node modules selenium webdriver lib http js at runmicrotasks at processticksandrejections node internal process task queues at async driver execute users k desktop test tests node modules selenium webdriver lib webdriver js at async towirevalue users k desktop test tests node modules selenium webdriver lib webdriver js at async users k desktop test tests node modules selenium webdriver lib webdriver js at async foreachkey users k desktop test tests node modules selenium webdriver lib webdriver js at async convertkeys users k desktop test tests node modules selenium webdriver lib webdriver js how can we reproduce the issue shell try to get one element that does not exist to cause an error and in the error trace will not be your source code file index ts await driver findelement by css span span in the thrown error you will not see mentioned index ts nor the line the error happend relevant log output shell no such element unable to locate element method css selector selector span span session info chrome nosuchelementerror no such element unable to locate element method css selector selector span span session info chrome at object throwdecodederror users k desktop test tests node modules selenium webdriver lib error js at parsehttpresponse users k desktop test tests node modules selenium webdriver lib http js at executor execute users k desktop test tests node modules selenium webdriver lib http js at runmicrotasks at processticksandrejections node internal process task queues at async driver execute users k desktop test tests node modules selenium webdriver lib webdriver js at async towirevalue users k desktop test tests node modules selenium webdriver lib webdriver js at async users k desktop test tests node modules selenium webdriver lib webdriver js at async foreachkey users k desktop test tests node modules selenium webdriver lib webdriver js at async convertkeys users k desktop test tests node modules selenium webdriver lib webdriver js operating system macos selenium version typescript node what are the browser s and version s where you see this issue not a browser issue what are the browser driver s and version s where you see this issue not a browser issue are you using selenium grid no response
| 1
|
77,203
| 26,839,837,069
|
IssuesEvent
|
2023-02-02 23:01:39
|
dotCMS/core
|
https://api.github.com/repos/dotCMS/core
|
closed
|
Changing a page's template removes all content from the page's containers
|
Type : Defect Severity : Support Requested Maintenance Sprint OKR: Customer Support
|
When editing pages that utilize a designer template, making any number of changes (e.g. adding a new container or a row CSS class) to the template that's in use removes all content from the page's containers.
1. Open a page to edit in dotAdmin
2. Switch to the layout editor
3. Make a change (add a container, add CSS class to a row, etc)
4. Switch back to the content editor
5. Click "Publish"
At this point all the content that had been in the containers disappears forcing the user to rebuild the page.
I've noticed in some cases that returning to the layout editor, making an additional change, then publishing the page will restore _some_ of the content to the containers.
This issue occurs on all of the existing designer templates we have (none of which have been edited for 2 years beyond the ones I've created while debugging). It is not reproducible on newly created templates. Even those that replicate existing templates. So creating a new designer template and replicating the number and type of rows and containers of an existing template, and utilizing that on a page, results in not being able to reproduce this issue on that page. Though I can reproduce the issue after making a direct copy of a one of the existing templates (i.e. go to templates portlet, click the actions menu and then "Copy").
I found that I can reproduce this by making any number of changes to the template (adding a new row and new container, adding a new container to an existing row, adding a row CSS class, etc).
Another way to reproduce this is to switch to any other template via the page's "Properties" modal other than a direct copy of whatever the current template is. Even creating a new designer template and replicating the same number and type of rows and containers. Switching to the replica will result in all containers being emptied.
This puts us in a tight spot since I haven't yet found a way to edit a page's template without having to add all the content back afterwords.
Reproducible in 21.06.1
|
1.0
|
Changing a page's template removes all content from the page's containers - When editing pages that utilize a designer template, making any number of changes (e.g. adding a new container or a row CSS class) to the template that's in use removes all content from the page's containers.
1. Open a page to edit in dotAdmin
2. Switch to the layout editor
3. Make a change (add a container, add CSS class to a row, etc)
4. Switch back to the content editor
5. Click "Publish"
At this point all the content that had been in the containers disappears forcing the user to rebuild the page.
I've noticed in some cases that returning to the layout editor, making an additional change, then publishing the page will restore _some_ of the content to the containers.
This issue occurs on all of the existing designer templates we have (none of which have been edited for 2 years beyond the ones I've created while debugging). It is not reproducible on newly created templates. Even those that replicate existing templates. So creating a new designer template and replicating the number and type of rows and containers of an existing template, and utilizing that on a page, results in not being able to reproduce this issue on that page. Though I can reproduce the issue after making a direct copy of a one of the existing templates (i.e. go to templates portlet, click the actions menu and then "Copy").
I found that I can reproduce this by making any number of changes to the template (adding a new row and new container, adding a new container to an existing row, adding a row CSS class, etc).
Another way to reproduce this is to switch to any other template via the page's "Properties" modal other than a direct copy of whatever the current template is. Even creating a new designer template and replicating the same number and type of rows and containers. Switching to the replica will result in all containers being emptied.
This puts us in a tight spot since I haven't yet found a way to edit a page's template without having to add all the content back afterwords.
Reproducible in 21.06.1
|
defect
|
changing a page s template removes all content from the page s containers when editing pages that utilize a designer template making any number of changes e g adding a new container or a row css class to the template that s in use removes all content from the page s containers open a page to edit in dotadmin switch to the layout editor make a change add a container add css class to a row etc switch back to the content editor click publish at this point all the content that had been in the containers disappears forcing the user to rebuild the page i ve noticed in some cases that returning to the layout editor making an additional change then publishing the page will restore some of the content to the containers this issue occurs on all of the existing designer templates we have none of which have been edited for years beyond the ones i ve created while debugging it is not reproducible on newly created templates even those that replicate existing templates so creating a new designer template and replicating the number and type of rows and containers of an existing template and utilizing that on a page results in not being able to reproduce this issue on that page though i can reproduce the issue after making a direct copy of a one of the existing templates i e go to templates portlet click the actions menu and then copy i found that i can reproduce this by making any number of changes to the template adding a new row and new container adding a new container to an existing row adding a row css class etc another way to reproduce this is to switch to any other template via the page s properties modal other than a direct copy of whatever the current template is even creating a new designer template and replicating the same number and type of rows and containers switching to the replica will result in all containers being emptied this puts us in a tight spot since i haven t yet found a way to edit a page s template without having to add all the content back afterwords reproducible in
| 1
|
39,744
| 9,639,847,424
|
IssuesEvent
|
2019-05-16 14:21:31
|
bridgedotnet/Bridge
|
https://api.github.com/repos/bridgedotnet/Bridge
|
closed
|
Wrong Generic generation with modules
|
area-module defect in-progress
|
I tried to do an example in Deck, but it's hard because deck can't run modules...
### Steps To Reproduce
https://deck.net/8e001abad6a8d96dfe59e4f6a4e6e81e
Here is my code:
### Module1 ("TestFramework")
```csharp
using System;
public class ComponentTest<TContext, TController> : TestBase<IComponentTestModel<TContext, TController>>
{
public override TestBuilder<IComponentTestModel<TContext, TController>> InitBuilder()
{
return new ComponentTestBuilder<TContext, TController>();
}
}
public abstract class TestBase<T>
{
protected TestBuilder<T> builder;
public abstract TestBuilder<T> InitBuilder();
public virtual ITestBuilderWhen<T> When(string description, Action<T> action)
{
builder = InitBuilder();
return builder.When(description, action);
}
}
public interface ITestBuilderWhen<T>
{
ITestBuilderWhen<T> When(string description, Action<T> action);
ITestBuilderWhen<T> When(string description, Action action);
}
public interface IComponentTestModel<TContext, TController>
{
TContext Context { get; }
TController Controller { get; }
}
public class TestBuilder<T> : ITestBuilderWhen<T>
{
public T Model { get; set; }
public ITestBuilderWhen<T> When(string description, Action<T> action)
{
return this;
}
public ITestBuilderWhen<T> When(string description, Action action)
{
return this;
}
private Action WrapAction(Action<T> action) => () => action.Invoke(Model);
}
public class ComponentTestBuilder<TContext, TController> : TestBuilder<IComponentTestModel<TContext, TController>>
{
}
```
### Module2 ("MyModule") executor
```csharp
public class App
{
public static void Main()
{
var abc = new ComponentTests();
abc.Test1();
}
}
public class ComponentTests : ComponentTest<Context, Controller>
{
public void Test1()
{
When("111", a => a.Context.Str = "123")
.When("222", b => b.Controller.Click()); // ExceptionHere!
}
}
public class Controller
{
public void Click() { }
}
public class Context
{
public string Str { get; set; }
}
```
I have an exception on 2nd `When`.
### GeneratedCode
```js
this.When("111", $asm.$.MyModule.ComponentTests.f1).TestFramework$ITestBuilderWhen$1$TestFramework$IComponentTestModel$2$MyModule$Context$MyModule$Controller$When$1("222", $asm.$.MyModule.ComponentTests.f2);
```
### In RunTime
```js
this.When("111", $asm.$.MyModule.ComponentTests.f1).TestFramework$ITestBuilderWhen$1$TestFramework$IComponentTestModel$2$Context$Controller$When$1
```
As you can see in Runtime `Context` generated without module `MyModule`
|
1.0
|
Wrong Generic generation with modules - I tried to do an example in Deck, but it's hard because deck can't run modules...
### Steps To Reproduce
https://deck.net/8e001abad6a8d96dfe59e4f6a4e6e81e
Here is my code:
### Module1 ("TestFramework")
```csharp
using System;
public class ComponentTest<TContext, TController> : TestBase<IComponentTestModel<TContext, TController>>
{
public override TestBuilder<IComponentTestModel<TContext, TController>> InitBuilder()
{
return new ComponentTestBuilder<TContext, TController>();
}
}
public abstract class TestBase<T>
{
protected TestBuilder<T> builder;
public abstract TestBuilder<T> InitBuilder();
public virtual ITestBuilderWhen<T> When(string description, Action<T> action)
{
builder = InitBuilder();
return builder.When(description, action);
}
}
public interface ITestBuilderWhen<T>
{
ITestBuilderWhen<T> When(string description, Action<T> action);
ITestBuilderWhen<T> When(string description, Action action);
}
public interface IComponentTestModel<TContext, TController>
{
TContext Context { get; }
TController Controller { get; }
}
public class TestBuilder<T> : ITestBuilderWhen<T>
{
public T Model { get; set; }
public ITestBuilderWhen<T> When(string description, Action<T> action)
{
return this;
}
public ITestBuilderWhen<T> When(string description, Action action)
{
return this;
}
private Action WrapAction(Action<T> action) => () => action.Invoke(Model);
}
public class ComponentTestBuilder<TContext, TController> : TestBuilder<IComponentTestModel<TContext, TController>>
{
}
```
### Module2 ("MyModule") executor
```csharp
public class App
{
public static void Main()
{
var abc = new ComponentTests();
abc.Test1();
}
}
public class ComponentTests : ComponentTest<Context, Controller>
{
public void Test1()
{
When("111", a => a.Context.Str = "123")
.When("222", b => b.Controller.Click()); // ExceptionHere!
}
}
public class Controller
{
public void Click() { }
}
public class Context
{
public string Str { get; set; }
}
```
I have an exception on 2nd `When`.
### GeneratedCode
```js
this.When("111", $asm.$.MyModule.ComponentTests.f1).TestFramework$ITestBuilderWhen$1$TestFramework$IComponentTestModel$2$MyModule$Context$MyModule$Controller$When$1("222", $asm.$.MyModule.ComponentTests.f2);
```
### In RunTime
```js
this.When("111", $asm.$.MyModule.ComponentTests.f1).TestFramework$ITestBuilderWhen$1$TestFramework$IComponentTestModel$2$Context$Controller$When$1
```
As you can see in Runtime `Context` generated without module `MyModule`
|
defect
|
wrong generic generation with modules i tried to do an example in deck but it s hard because deck can t run modules steps to reproduce here is my code testframework csharp using system public class componenttest testbase public override testbuilder initbuilder return new componenttestbuilder public abstract class testbase protected testbuilder builder public abstract testbuilder initbuilder public virtual itestbuilderwhen when string description action action builder initbuilder return builder when description action public interface itestbuilderwhen itestbuilderwhen when string description action action itestbuilderwhen when string description action action public interface icomponenttestmodel tcontext context get tcontroller controller get public class testbuilder itestbuilderwhen public t model get set public itestbuilderwhen when string description action action return this public itestbuilderwhen when string description action action return this private action wrapaction action action action invoke model public class componenttestbuilder testbuilder mymodule executor csharp public class app public static void main var abc new componenttests abc public class componenttests componenttest public void when a a context str when b b controller click exceptionhere public class controller public void click public class context public string str get set i have an exception on when generatedcode js this when asm mymodule componenttests testframework itestbuilderwhen testframework icomponenttestmodel mymodule context mymodule controller when asm mymodule componenttests in runtime js this when asm mymodule componenttests testframework itestbuilderwhen testframework icomponenttestmodel context controller when as you can see in runtime context generated without module mymodule
| 1
|
313,649
| 23,486,805,956
|
IssuesEvent
|
2022-08-17 15:00:51
|
dvorac/elevatorian
|
https://api.github.com/repos/dvorac/elevatorian
|
closed
|
Rename Project
|
documentation
|
I've misnamed this repo with a really dumb typo.
## Acceptance Criteria
- Rename repo and any artifacts / files to `elevatorian`.
|
1.0
|
Rename Project - I've misnamed this repo with a really dumb typo.
## Acceptance Criteria
- Rename repo and any artifacts / files to `elevatorian`.
|
non_defect
|
rename project i ve misnamed this repo with a really dumb typo acceptance criteria rename repo and any artifacts files to elevatorian
| 0
|
35,006
| 30,674,671,189
|
IssuesEvent
|
2023-07-26 03:30:18
|
JonathanLorimer/cfg
|
https://api.github.com/repos/JonathanLorimer/cfg
|
opened
|
Add README.md
|
infrastructure
|
While most of the documentation is intended to live in the haddocks, it would be nice to have a proffesional looking README to greet people and also point them towards the correct docs.
|
1.0
|
Add README.md - While most of the documentation is intended to live in the haddocks, it would be nice to have a proffesional looking README to greet people and also point them towards the correct docs.
|
non_defect
|
add readme md while most of the documentation is intended to live in the haddocks it would be nice to have a proffesional looking readme to greet people and also point them towards the correct docs
| 0
|
88,717
| 17,649,685,142
|
IssuesEvent
|
2021-08-20 11:25:34
|
joomla/joomla-cms
|
https://api.github.com/repos/joomla/joomla-cms
|
closed
|
[4.0] JGLOBAL_INTEGRATION_LABEL language item for en_US
|
No Code Attached Yet
|
### Steps to reproduce the issue
I don't know why **JGLOBAL_INTEGRATION_LABEL** language item for en_US (administrator/language/en-US/lib_joomla.ini) has value **Menu Item Associations** while it has nothing to do with menu item associations. Sound like a translation mistake?

### Expected result
Should be **Integration**
### Actual result
**Menu Item Associations**
### Additional comments
Found that while installing the language to test PR https://github.com/joomla/joomla-cms/pull/35222 .
|
1.0
|
[4.0] JGLOBAL_INTEGRATION_LABEL language item for en_US - ### Steps to reproduce the issue
I don't know why **JGLOBAL_INTEGRATION_LABEL** language item for en_US (administrator/language/en-US/lib_joomla.ini) has value **Menu Item Associations** while it has nothing to do with menu item associations. Sound like a translation mistake?

### Expected result
Should be **Integration**
### Actual result
**Menu Item Associations**
### Additional comments
Found that while installing the language to test PR https://github.com/joomla/joomla-cms/pull/35222 .
|
non_defect
|
jglobal integration label language item for en us steps to reproduce the issue i don t know why jglobal integration label language item for en us administrator language en us lib joomla ini has value menu item associations while it has nothing to do with menu item associations sound like a translation mistake expected result should be integration actual result menu item associations additional comments found that while installing the language to test pr
| 0
|
60,398
| 17,023,415,693
|
IssuesEvent
|
2021-07-03 01:54:53
|
tomhughes/trac-tickets
|
https://api.github.com/repos/tomhughes/trac-tickets
|
closed
|
untranslatable items
|
Component: website Priority: minor Resolution: fixed Type: defect
|
**[Submitted to the original trac issue database at 11.47am, Tuesday, 2nd June 2009]**
I am fairly sure these items cannot be translated yet:
main map tab:
* <a onclick="setPosition(..., ..., 10); return false;" href="#">**home**</a>
export tab:
* $("drag_box").innerHTML=**'Drag a box on the map to select an area'**;
* $("drag_box").innerHTML = "**Manually select a different area**";
Diary comment (eg. http://www.openstreetmap.org/user/stark/diary/6525 ):
* <h4 id="newcomment">**Leave a comment**</h4>
* <input type="submit" value="**Save**" name="commit"/>
|
1.0
|
untranslatable items - **[Submitted to the original trac issue database at 11.47am, Tuesday, 2nd June 2009]**
I am fairly sure these items cannot be translated yet:
main map tab:
* <a onclick="setPosition(..., ..., 10); return false;" href="#">**home**</a>
export tab:
* $("drag_box").innerHTML=**'Drag a box on the map to select an area'**;
* $("drag_box").innerHTML = "**Manually select a different area**";
Diary comment (eg. http://www.openstreetmap.org/user/stark/diary/6525 ):
* <h4 id="newcomment">**Leave a comment**</h4>
* <input type="submit" value="**Save**" name="commit"/>
|
defect
|
untranslatable items i am fairly sure these items cannot be translated yet main map tab home export tab drag box innerhtml drag a box on the map to select an area drag box innerhtml manually select a different area diary comment eg leave a comment
| 1
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.