Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1 value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3 values | title stringlengths 1 757 | labels stringlengths 4 664 | body stringlengths 3 261k | index stringclasses 10 values | text_combine stringlengths 96 261k | label stringclasses 2 values | text stringlengths 96 232k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
48,311 | 13,068,437,218 | IssuesEvent | 2020-07-31 03:34:30 | icecube-trac/tix2 | https://api.github.com/repos/icecube-trac/tix2 | closed | [dataclasses] I3Time pybindings segfault on Sierra (Trac #2167) | Migrated from Trac combo core defect | it happens at the `PyDateTime_IMPORT;` line of the pybindings
```text
Process: Python [4592]
Path: /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python
Identifier: Python
Version: 2.7.10 (2.7.10)
Code Type: X86-64 (Native)
Parent Process: bash [872]
Responsible: Python [4592]
User ID: 502
Date/Time: 2018-06-25 10:29:42.575 -0500
OS Version: Mac OS X 10.12.6 (16G1408)
Report Version: 12
Anonymous UUID: C6AB07E7-6F3A-648C-DEDF-1A57F1E27536
Sleep/Wake UUID: FC76580E-32A7-4132-B601-30541F484DDB
Time Awake Since Boot: 10000 seconds
Time Since Wake: 6100 seconds
System Integrity Protection: enabled
Crashed Thread: 0 Dispatch queue: com.apple.main-thread
Exception Type: EXC_BAD_ACCESS (SIGSEGV)
Exception Codes: KERN_INVALID_ADDRESS at 0x0000000000000000
Exception Note: EXC_CORPSE_NOTIFY
Termination Signal: Segmentation fault: 11
Termination Reason: Namespace SIGNAL, Code 0xb
Terminating Process: exc handler [0]
VM Regions Near 0:
-->
__TEXT 0000000108a12000-0000000108a14000 [ 8K] r-x/rwx SM=COW /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python
Thread 0 Crashed:: Dispatch queue: com.apple.main-thread
0 ??? 000000000000000000 0 + 0
1 org.python.python 0x000000010a807668 PyEval_GetGlobals + 23
2 org.python.python 0x000000010a81615e PyImport_Import + 32
3 org.python.python 0x000000010a81477b PyImport_ImportModule + 28
4 org.python.python 0x000000010a7924a9 PyCapsule_Import + 204
5 dataclasses.so 0x000000010c549df2 register_I3Time() + 34
6 dataclasses.so 0x000000010c9c11e9 init_module_dataclasses() + 9
7 libboost_python27-mt.dylib 0x000000010a4b5d78 boost::python::handle_exception_impl(boost::function0<void>) + 72
8 libboost_python27-mt.dylib 0x000000010a4b6dfb bool boost::python::handle_exception<void (*)()>(void (*)()) + 59
9 libboost_python27-mt.dylib 0x000000010a4b6cd4 boost::python::detail::init_module(char const*, void (*)()) + 84
10 org.python.python 0x0000000108ab3130 _PyImport_LoadDynamicModule + 140
11 org.python.python 0x0000000108ab2f6a 0x108a18000 + 634730
12 org.python.python 0x0000000108a9e4d4 PyEval_EvalFrameEx + 14624
13 org.python.python 0x0000000108aa1475 0x108a18000 + 562293
14 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
15 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
16 org.python.python 0x0000000108a9a367 PyEval_EvalCode + 48
17 org.python.python 0x0000000108aaf6bd PyImport_ExecCodeModuleEx + 241
18 org.python.python 0x0000000108ab23c7 0x108a18000 + 631751
19 org.python.python 0x0000000108ab264f 0x108a18000 + 632399
20 org.python.python 0x0000000108ab1e2c 0x108a18000 + 630316
21 org.python.python 0x0000000108ab1c62 0x108a18000 + 629858
22 org.python.python 0x0000000108ab0cac PyImport_ImportModuleLevel + 1341
23 org.python.python 0x0000000108a96006 0x108a18000 + 516102
24 org.python.python 0x0000000108a226fb PyObject_Call + 99
25 org.python.python 0x0000000108aa0dbb PyEval_CallObjectWithKeywords + 165
26 org.python.python 0x0000000108a9cc0f PyEval_EvalFrameEx + 8283
27 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
28 org.python.python 0x0000000108a9f0c0 PyEval_EvalFrameEx + 17676
29 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
30 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
31 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
32 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
33 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
34 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
35 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
36 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
37 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
38 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
39 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
40 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
41 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
42 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
43 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
44 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
45 org.python.python 0x0000000108a404d1 0x108a18000 + 165073
46 org.python.python 0x0000000108a226fb PyObject_Call + 99
47 org.python.python 0x0000000108a9dfe5 PyEval_EvalFrameEx + 13361
48 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
49 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
50 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
51 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
52 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
53 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
54 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
55 org.python.python 0x0000000108a404d1 0x108a18000 + 165073
56 org.python.python 0x0000000108a226fb PyObject_Call + 99
57 org.python.python 0x0000000108a9dfe5 PyEval_EvalFrameEx + 13361
58 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
59 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
60 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
61 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
62 org.python.python 0x0000000108a9a367 PyEval_EvalCode + 48
63 org.python.python 0x0000000108aba5dd 0x108a18000 + 665053
64 org.python.python 0x0000000108aba680 PyRun_FileExFlags + 133
65 org.python.python 0x0000000108aba1d1 PyRun_SimpleFileExFlags + 702
66 org.python.python 0x0000000108acbb6a Py_Main + 3094
67 libdyld.dylib 0x00007fffd46a3235 start + 1
Thread 1:
0 libsystem_kernel.dylib 0x00007fffd47d1bf2 __psynch_cvwait + 10
1 libsystem_pthread.dylib 0x00007fffd48bd7fa _pthread_cond_wait + 712
2 org.python.python 0x0000000108ac9d27 PyThread_acquire_lock + 101
3 org.python.python 0x0000000108acdf02 0x108a18000 + 745218
4 org.python.python 0x0000000108a9e4d4 PyEval_EvalFrameEx + 14624
5 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
6 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
7 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
8 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
9 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
10 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
11 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
12 org.python.python 0x0000000108a404d1 0x108a18000 + 165073
13 org.python.python 0x0000000108a226fb PyObject_Call + 99
14 org.python.python 0x0000000108a9dfe5 PyEval_EvalFrameEx + 13361
15 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
16 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
17 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
18 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
19 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
20 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
21 org.python.python 0x0000000108aa1475 0x108a18000 + 562293
22 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
23 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
24 org.python.python 0x0000000108a404d1 0x108a18000 + 165073
25 org.python.python 0x0000000108a226fb PyObject_Call + 99
26 org.python.python 0x0000000108a2d3ac 0x108a18000 + 86956
27 org.python.python 0x0000000108a226fb PyObject_Call + 99
28 org.python.python 0x0000000108aa0dbb PyEval_CallObjectWithKeywords + 165
29 org.python.python 0x0000000108acdd4e 0x108a18000 + 744782
30 libsystem_pthread.dylib 0x00007fffd48bc93b _pthread_body + 180
31 libsystem_pthread.dylib 0x00007fffd48bc887 _pthread_start + 286
32 libsystem_pthread.dylib 0x00007fffd48bc08d thread_start + 13
Thread 0 crashed with X86 Thread State (64-bit):
rax: 0x000000010a8cb570 rbx: 0x000000010e961030 rcx: 0x6c132e1d26bc00d7 rdx: 0x0000000000000000
rdi: 0x0000000000000000 rsi: 0x000000010a84ae04 rbp: 0x00007fff571ea820 rsp: 0x00007fff571ea818
r8: 0x0000000000000006 r9: 0x00007f99fc422580 r10: 0x0000000000001002 r11: 0x00000000041162e0
r12: 0x00007f99fc44a5c9 r13: 0x0000000000000000 r14: 0x000000010e961030 r15: 0x0000000000000000
rip: 0x0000000000000000 rfl: 0x0000000000010206 cr2: 0x0000000000000000
Logical CPU: 4
Error Code: 0x00000014
Trap Number: 14
Binary Images:
0x108a12000 - 0x108a13fff org.python.python (2.7.10 - 2.7.10) <FDF4A2EF-05B5-37B9-8624-045A152B6DB7> /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python
0x108a18000 - 0x108b09ff7 org.python.python (2.7.10 - 2.7.10) <BDCDC395-7F55-3DF4-819B-7719E69BCBD9> /System/Library/Frameworks/Python.framework/Versions/2.7/Python
0x108cd6000 - 0x108cd7fff _locale.so (97.50.7) <16EECFD3-0814-3B9C-8CF5-D82DB670AE7F> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_locale.so
0x108d5c000 - 0x108d5dffb time.so (97.50.7) <9094E95E-EA50-30DF-A250-6003D2EDEFD5> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/time.so
0x108d64000 - 0x108d65fff cStringIO.so (97.50.7) <FBA2E408-33F8-3506-AD37-1B356A6F787D> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/cStringIO.so
0x108dab000 - 0x108dadff7 _collections.so (97.50.7) <1DDC550E-8ACD-3E34-B9AA-2F2575D5085E> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_collections.so
0x108db4000 - 0x108db7fff operator.so (97.50.7) <CA736B38-65D4-37D9-AAE8-04D697531142> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/operator.so
0x108dbe000 - 0x108dc2fff itertools.so (97.50.7) <3AFFF65F-D249-3EC2-8F6E-ED970FF199D6> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/itertools.so
0x108dcc000 - 0x108dcdfff _heapq.so (97.50.7) <E4FC7F34-E74C-3D8E-9474-BAC1648A7E5C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_heapq.so
0x108dd3000 - 0x108dd3fff grp.so (97.50.7) <7CB7F994-D049-3D83-A295-D1389785A691> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/grp.so
0x108e18000 - 0x108e19fff _functools.so (97.50.7) <4A63F438-0EDC-36E2-963C-C93D38C662A2> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_functools.so
0x108e5e000 - 0x108e61fff strop.so (97.50.7) <F5AAE1C3-EFC0-3991-893C-B4CA54894A6C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/strop.so
0x108fa7000 - 0x108faaffb _struct.so (97.50.7) <EF8EE29B-C0A0-32BF-AA30-ADEBEAD8EEF4> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_struct.so
0x108ff1000 - 0x108ff5ff3 _json.so (97.50.7) <F424F15C-E08B-3DD3-B1FC-623159BC7F7C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_json.so
0x108ffb000 - 0x108ffdff3 binascii.so (97.50.7) <86E49B82-5582-347E-92EB-B107F70BBB49> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/binascii.so
0x109082000 - 0x109085ff7 math.so (97.50.7) <5A58C237-99FB-3CA3-BCB9-E6F150CE96BF> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/math.so
0x10908c000 - 0x10908dfff _hashlib.so (97.50.7) <6B04CCCA-D1B8-32F0-BF9A-C7FE22356617> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_hashlib.so
0x109093000 - 0x109094fff _random.so (97.50.7) <2837E6D6-86F4-3ED6-AA29-F0D11DC73F85> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_random.so
0x109119000 - 0x109128ffb _io.so (97.50.7) <092C0207-64D8-3BAD-BE0F-427C8FC6EE06> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_io.so
0x1091ba000 - 0x1091bcffb select.so (97.50.7) <E5838201-45EA-35C7-AB30-90D7CEFB08A0> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/select.so
0x1091c3000 - 0x1091c4fff fcntl.so (97.50.7) <E1CEBE57-DB25-30FE-9C7C-56DD717D188E> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/fcntl.so
0x1091c9000 - 0x1091cafff termios.so (97.50.7) <51D1C82A-E5E4-3008-B02E-BFCCCB878BE2> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/termios.so
0x1091d0000 - 0x1091d1ffb resource.so (97.50.7) <576E890B-3F89-3847-8E6B-998855EA43A2> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/resource.so
0x109216000 - 0x109224ffb _ctypes.so (97.50.7) <5E1FA7E6-2A2F-304F-9344-3BA03463DA86> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_ctypes.so
0x1092b1000 - 0x1092b8fff _socket.so (97.50.7) <076AA6AE-10D1-3033-9BF9-EC53ACF9B0E8> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_socket.so
0x1092c3000 - 0x1092ccfff _ssl.so (97.50.7) <BA546970-1B58-336A-86CC-C58C34F35668> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_ssl.so
0x109358000 - 0x109358fff _scproxy.so (97.50.7) <F577CB62-2192-39A3-8341-923EEA55DF9D> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_scproxy.so
0x10935d000 - 0x10935eff3 +_scandir.so (0) <5A4A4D1E-9EA8-3B33-B580-770EC7654967> /Users/USER/Library/Python/2.7/lib/python/site-packages/_scandir.so
0x1093a2000 - 0x1093abff3 datetime.so (97.50.7) <EC351EC8-FBC7-33E9-B5D1-DA9D614D1648> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/datetime.so
0x1094b5000 - 0x1094c0ffb cPickle.so (97.50.7) <C1F3E5FC-D920-3896-B393-5B89A265376C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/cPickle.so
0x109547000 - 0x10954fffb _sqlite3.so (97.50.7) <07AEFDDB-86F7-30F7-9D9E-AC0F9EEA9198> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_sqlite3.so
0x10961a000 - 0x10961afff _bisect.so (97.50.7) <C7356EA2-77CF-34A0-8FC8-7F87074E8CF8> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_bisect.so
0x1097df000 - 0x1097e3fff array.so (97.50.7) <8F606B8E-0AA2-3FF9-97F5-57DE3DD63C33> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/array.so
0x1097ea000 - 0x10988eff3 unicodedata.so (97.50.7) <3906B514-5FFD-31E5-9D64-3004EBFA0EC3> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/unicodedata.so
0x109956000 - 0x109957ffb _lsprof.so (97.50.7) <750C5676-166E-376C-905A-351811B326F5> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_lsprof.so
0x109cac000 - 0x109cb3fff +icetray.so (0) <36456467-7620-3952-B70E-15789244F30F> /Users/USER/*/icetray.so
0x109cbd000 - 0x109f88ff7 +libicetray.dylib (0) <515E3C78-73A7-3D30-B3C6-861101C8BFE0> /Users/USER/*/libicetray.dylib
0x10a49e000 - 0x10a4ccfff +libboost_python27-mt.dylib (0) <D74B7B4E-4730-3E9F-9193-D24A1002C6FC> /usr/local/opt/boost-python/lib/libboost_python27-mt.dylib
0x10a508000 - 0x10a50affb +libboost_system-mt.dylib (0) <D62AB9A1-52C7-390F-84B2-9D37E487E86E> /usr/local/opt/boost/lib/libboost_system-mt.dylib
0x10a50f000 - 0x10a51afff +libboost_signals-mt.dylib (0) <9048E894-CB19-3732-9F8C-14F73E566801> /usr/local/opt/boost/lib/libboost_signals-mt.dylib
0x10a52e000 - 0x10a53bfff +libboost_thread-mt.dylib (0) <A9472435-3E86-3669-B6BF-EF8BBF614B71> /usr/local/opt/boost/lib/libboost_thread-mt.dylib
0x10a557000 - 0x10a55bfff +libboost_date_time-mt.dylib (0) <6DC43739-E3E8-3EE4-B3BB-FC04903A0622> /usr/local/opt/boost/lib/libboost_date_time-mt.dylib
0x10a569000 - 0x10a578ff7 +libboost_filesystem-mt.dylib (0) <6F693033-FF11-35E9-90F8-C87B5623A6DD> /usr/local/opt/boost/lib/libboost_filesystem-mt.dylib
0x10a58b000 - 0x10a5bdfff +libboost_program_options-mt.dylib (0) <E7A97BA1-7040-3033-8310-F34A6658311B> /usr/local/opt/boost/lib/libboost_program_options-mt.dylib
0x10a617000 - 0x10a6bdfff +libboost_regex-mt.dylib (0) <9CEE3EFE-F1BA-35D9-A686-49E92EFAEA54> /usr/local/opt/boost/lib/libboost_regex-mt.dylib
0x10a74c000 - 0x10a757ff7 +libboost_iostreams-mt.dylib (0) <3B6518B4-7968-34D4-B93A-EA200E2CB6BB> /usr/local/opt/boost/lib/libboost_iostreams-mt.dylib
0x10a772000 - 0x10a775ff7 +libboost_chrono-mt.dylib (0) <2843F685-E64E-34E8-A1DF-9C0655E9E902> /usr/local/opt/boost/lib/libboost_chrono-mt.dylib
0x10a77c000 - 0x10a77dfff +libboost_atomic-mt.dylib (0) <E8A79FBA-BA08-326F-8C85-1CB888629895> /usr/local/opt/boost/lib/libboost_atomic-mt.dylib
0x10a780000 - 0x10a871fff +org.python.python (2.7.15, [c] 2001-2018 Python Software Foundation. - 2.7.15) <9AF9FD73-6537-3A67-B191-7B75D9BCF980> /usr/local/opt/python@2/Frameworks/Python.framework/Versions/2.7/Python
0x10a905000 - 0x10a980fff +libarchive.13.dylib (0) <2B88C81E-AD82-366F-9CCB-8C88FF42F9AB> /usr/local/opt/libarchive/lib/libarchive.13.dylib
0x10a999000 - 0x10a9c3ff7 +libserialization.dylib (0) <86BB0348-F166-3FA1-A099-7E70AB9BD2CB> /Users/USER/*/libserialization.dylib
0x10aa08000 - 0x10aa73ff3 +libzstd.1.dylib (0) <FF6884E3-F4E4-3B75-B67A-A82831A87F80> /usr/local/opt/zstd/lib/libzstd.1.dylib
0x10aa7f000 - 0x10aa98fff libexpat.1.dylib (15.1) <588CA992-60BB-363B-BEE7-3CC0A26C1AFA> /usr/lib/libexpat.1.dylib
0x10aaa2000 - 0x10aabdfff +liblzma.5.dylib (0) <12A41495-97BA-35A4-97E7-22DBF7CF6D47> /usr/local/opt/xz/lib/liblzma.5.dylib
0x10afc3000 - 0x10afc3fff +_speedups.so (0) <A78A2094-6736-3F77-BD9F-F071383DDBF0> /Users/USER/Library/Python/2.7/lib/python/site-packages/markupsafe/_speedups.so
0x10b0c6000 - 0x10b51cffb +libdataclasses.dylib (0) <854B5114-AF18-3C78-B4F1-487C493E8FEB> /Users/USER/*/libdataclasses.dylib
0x10c1fe000 - 0x10cd0cff7 +dataclasses.so (0) <515727AF-958B-3490-9BDB-7C90DF291361> /Users/USER/*/dataclasses.so
0x117cbd000 - 0x117cfadc7 dyld (433.5) <322C06B7-8878-311D-888C-C8FD2CA96FF3> /usr/lib/dyld
0x7fffbee8e000 - 0x7fffbf327ff7 com.apple.CoreFoundation (6.9 - 1349.92) <6D0D0311-7C61-3313-BC55-22B7E876BEFA> /System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation
0x7fffc0e6d000 - 0x7fffc0f03ff7 com.apple.framework.IOKit (2.0.2 - 1324.60.4) <454036AD-86AA-3ABB-8C53-B5F654A6824D> /System/Library/Frameworks/IOKit.framework/Versions/A/IOKit
0x7fffc519c000 - 0x7fffc549efff com.apple.security (7.0 - 57740.60.23) <9F23DF40-1A2F-3177-8DCE-FBC4F8F43BAF> /System/Library/Frameworks/Security.framework/Versions/A/Security
0x7fffc58c9000 - 0x7fffc5938ff7 com.apple.SystemConfiguration (1.14 - 1.14) <A4A350BA-23F1-3D44-9770-84D549D1D74B> /System/Library/Frameworks/SystemConfiguration.framework/Versions/A/SystemConfiguration
0x7fffd1b68000 - 0x7fffd1b69fff com.apple.TrustEvaluationAgent (2.0 - 28.50.1) <EBE65DD5-1732-3747-8C6C-7BECEBF089A4> /System/Library/PrivateFrameworks/TrustEvaluationAgent.framework/Versions/A/TrustEvaluationAgent
0x7fffd2ebb000 - 0x7fffd2ebcff3 libDiagnosticMessagesClient.dylib (102) <84A04D24-0E60-3810-A8C0-90A65E2DF61A> /usr/lib/libDiagnosticMessagesClient.dylib
0x7fffd30f4000 - 0x7fffd30f4fff libOpenScriptingUtil.dylib (172.1) <0F1BA407-97D1-36F6-882D-A355EAAD5E00> /usr/lib/libOpenScriptingUtil.dylib
0x7fffd30fa000 - 0x7fffd30fbffb libSystem.B.dylib (1238.60.2) <45C5C363-67A0-308C-8D35-A4DF23069A9F> /usr/lib/libSystem.B.dylib
0x7fffd3213000 - 0x7fffd3213ff3 libauto.dylib (187) <34388D0B-C539-3C1B-9408-2BC152162E43> /usr/lib/libauto.dylib
0x7fffd3214000 - 0x7fffd3224ff3 libbsm.0.dylib (34) <20084796-B04D-3B35-A003-EA11459557A9> /usr/lib/libbsm.0.dylib
0x7fffd3225000 - 0x7fffd3233ff7 libbz2.1.0.dylib (38) <ADFA329A-DCE7-356D-8F09-A3168DFC6610> /usr/lib/libbz2.1.0.dylib
0x7fffd3234000 - 0x7fffd328aff7 libc++.1.dylib (307.5) <0B43BB5D-E6EB-3464-8DE9-B41AC8ED9D1C> /usr/lib/libc++.1.dylib
0x7fffd328b000 - 0x7fffd32b4ff7 libc++abi.dylib (307.4) <BC271AD3-831B-362A-9DA7-E8C51F285FE4> /usr/lib/libc++abi.dylib
0x7fffd32dd000 - 0x7fffd32ddff7 libcoretls.dylib (121.50.4) <64B1001E-10F6-3542-A3B2-C4B49F51817F> /usr/lib/libcoretls.dylib
0x7fffd32de000 - 0x7fffd32dfff3 libcoretls_cfhelpers.dylib (121.50.4) <1A10303E-5EB0-3C7C-9165-021FCDFD934D> /usr/lib/libcoretls_cfhelpers.dylib
0x7fffd3399000 - 0x7fffd347dff7 libcrypto.0.9.8.dylib (64.50.7) <B34BC0FA-18ED-37C5-9D46-393803CADEBB> /usr/lib/libcrypto.0.9.8.dylib
0x7fffd36eb000 - 0x7fffd36ebfff libenergytrace.dylib (15) <A1B040A2-7977-3097-9ADF-34FF181EB970> /usr/lib/libenergytrace.dylib
0x7fffd36f9000 - 0x7fffd36fafff libffi.dylib (18.1) <49D03682-E111-351C-8266-4519B3B82BE9> /usr/lib/libffi.dylib
0x7fffd3701000 - 0x7fffd37f3ff7 libiconv.2.dylib (50) <42125B35-81D7-3FC4-9475-A26DBE10884D> /usr/lib/libiconv.2.dylib
0x7fffd37f4000 - 0x7fffd3a19ffb libicucore.A.dylib (57167.0.1) <E720801C-2D92-3108-B853-469551EDF21F> /usr/lib/libicucore.A.dylib
0x7fffd3a21000 - 0x7fffd3a3affb liblzma.5.dylib (10) <44BD0279-99DD-36B5-8A6E-C11432E2098D> /usr/lib/liblzma.5.dylib
0x7fffd3d2d000 - 0x7fffd3da7ff3 libnetwork.dylib (856.60.1) <191E99F5-4723-3180-8013-02AF2F9AE4B8> /usr/lib/libnetwork.dylib
0x7fffd3da8000 - 0x7fffd417a047 libobjc.A.dylib (709.1) <70614861-0340-32E2-85ED-FE65759CDFFA> /usr/lib/libobjc.A.dylib
0x7fffd417d000 - 0x7fffd4181fff libpam.2.dylib (21.30.1) <71EB0D88-DE84-3C8D-A2C5-58AA282BC5BC> /usr/lib/libpam.2.dylib
0x7fffd4182000 - 0x7fffd41b3fff libpcap.A.dylib (67.60.2) <B2D36AD8-D5C8-3875-AC81-4787A15E44C2> /usr/lib/libpcap.A.dylib
0x7fffd423c000 - 0x7fffd438aff7 libsqlite3.dylib (254.8) <1ECF7DF7-7A07-3B4B-A63B-F4EFF6BC7ACF> /usr/lib/libsqlite3.dylib
0x7fffd43ad000 - 0x7fffd43e5ff3 libssl.0.9.8.dylib (64.50.7) <3B6EAD4B-F7FA-369C-AB54-755B08219D2A> /usr/lib/libssl.0.9.8.dylib
0x7fffd447f000 - 0x7fffd448cfff libxar.1.dylib (357) <69547C64-E811-326F-BBED-490C6361BDCB> /usr/lib/libxar.1.dylib
0x7fffd448d000 - 0x7fffd457cff3 libxml2.2.dylib (30.20) <40B1027A-43B6-38EC-9EB9-9E7871E98CBC> /usr/lib/libxml2.2.dylib
0x7fffd45a7000 - 0x7fffd45b8ff3 libz.1.dylib (67) <46E3FFA2-4328-327A-8D34-A03E20BFFB8E> /usr/lib/libz.1.dylib
0x7fffd45c7000 - 0x7fffd45cbff7 libcache.dylib (79) <093A4DAB-8385-3D47-A350-E20CB7CCF7BF> /usr/lib/system/libcache.dylib
0x7fffd45cc000 - 0x7fffd45d6fff libcommonCrypto.dylib (60092.50.5) <8A64D1B0-C70E-385C-92F0-E669079FDA90> /usr/lib/system/libcommonCrypto.dylib
0x7fffd45d7000 - 0x7fffd45defff libcompiler_rt.dylib (62) <55D47421-772A-32AB-B529-1A46C2F43B4D> /usr/lib/system/libcompiler_rt.dylib
0x7fffd45df000 - 0x7fffd45e7fff libcopyfile.dylib (138) <819BEA3C-DF11-3E3D-A1A1-5A51C5BF1961> /usr/lib/system/libcopyfile.dylib
0x7fffd45e8000 - 0x7fffd466bfdf libcorecrypto.dylib (442.50.19) <65D7165E-2E71-335D-A2D6-33F78E2DF0C1> /usr/lib/system/libcorecrypto.dylib
0x7fffd466c000 - 0x7fffd469dfff libdispatch.dylib (703.50.37) <6582BAD6-ED27-3B30-B620-90B1C5A4AE3C> /usr/lib/system/libdispatch.dylib
0x7fffd469e000 - 0x7fffd46a3ffb libdyld.dylib (433.5) <E7268165-BE34-35CA-8488-BCD4D71C7EBC> /usr/lib/system/libdyld.dylib
0x7fffd46a4000 - 0x7fffd46a4ffb libkeymgr.dylib (28) <7AA011A9-DC21-3488-BF73-3B5B14D1FDD6> /usr/lib/system/libkeymgr.dylib
0x7fffd46a5000 - 0x7fffd46b1fff libkxld.dylib (3789.73.13) <9A739C49-DD82-3B7F-AF41-60395C1AE071> /usr/lib/system/libkxld.dylib
0x7fffd46b2000 - 0x7fffd46b2fff liblaunch.dylib (972.70.1) <B856ABD2-896E-3DE0-B2C8-146A6AF8E2A7> /usr/lib/system/liblaunch.dylib
0x7fffd46b3000 - 0x7fffd46b8ff3 libmacho.dylib (898) <17D5D855-F6C3-3B04-B680-E9BF02EF8AED> /usr/lib/system/libmacho.dylib
0x7fffd46b9000 - 0x7fffd46bbff3 libquarantine.dylib (85.50.1) <12448CC2-378E-35F3-BE33-9DC395A5B970> /usr/lib/system/libquarantine.dylib
0x7fffd46bc000 - 0x7fffd46bdffb libremovefile.dylib (45) <38D4CB9C-10CD-30D3-8B7B-A515EC75FE85> /usr/lib/system/libremovefile.dylib
0x7fffd46be000 - 0x7fffd46d6ff7 libsystem_asl.dylib (349.50.5) <096E4228-3B7C-30A6-8B13-EC909A64499A> /usr/lib/system/libsystem_asl.dylib
0x7fffd46d7000 - 0x7fffd46d7ff7 libsystem_blocks.dylib (67) <10DC5404-73AB-35B3-A277-A8AFECB476EB> /usr/lib/system/libsystem_blocks.dylib
0x7fffd46d8000 - 0x7fffd4765fef libsystem_c.dylib (1158.50.2) <E5AE5244-7D0C-36AC-8BB6-C7AE7EA52A4B> /usr/lib/system/libsystem_c.dylib
0x7fffd4766000 - 0x7fffd4769ffb libsystem_configuration.dylib (888.60.2) <BECC01A2-CA8D-31E6-BCDF-D452965FA976> /usr/lib/system/libsystem_configuration.dylib
0x7fffd476a000 - 0x7fffd476dfff libsystem_coreservices.dylib (41.4) <7D26DE79-B424-3450-85E1-F7FAB32714AB> /usr/lib/system/libsystem_coreservices.dylib
0x7fffd476e000 - 0x7fffd4786fff libsystem_coretls.dylib (121.50.4) <EC6FCF07-DCFB-3A03-9CC9-6DD3709974C6> /usr/lib/system/libsystem_coretls.dylib
0x7fffd4787000 - 0x7fffd478dfff libsystem_dnssd.dylib (765.50.9) <CC960215-0B1B-3822-A13A-3DDE96FA796F> /usr/lib/system/libsystem_dnssd.dylib
0x7fffd478e000 - 0x7fffd47b7ff7 libsystem_info.dylib (503.50.4) <611DB84C-BF70-3F92-8702-B9F28A900920> /usr/lib/system/libsystem_info.dylib
0x7fffd47b8000 - 0x7fffd47daff7 libsystem_kernel.dylib (3789.73.13) <AA3C2E69-1311-3DC3-89C2-9502F1A34E00> /usr/lib/system/libsystem_kernel.dylib
0x7fffd47db000 - 0x7fffd4822fe7 libsystem_m.dylib (3121.6) <86D499B5-BBDC-3D3B-8A4E-97AE8E6672A4> /usr/lib/system/libsystem_m.dylib
0x7fffd4823000 - 0x7fffd4841ff7 libsystem_malloc.dylib (116.50.8) <A3D15F17-99A6-3367-8C7E-4280E8619C95> /usr/lib/system/libsystem_malloc.dylib
0x7fffd4842000 - 0x7fffd489bffb libsystem_network.dylib (856.60.1) <369D0221-56CA-3C3E-9EDE-94B41CAE77B7> /usr/lib/system/libsystem_network.dylib
0x7fffd489c000 - 0x7fffd48a5ff3 libsystem_networkextension.dylib (563.60.2) <B021F2B3-8A75-3633-ABB0-FC012B8E9B0C> /usr/lib/system/libsystem_networkextension.dylib
0x7fffd48a6000 - 0x7fffd48afff3 libsystem_notify.dylib (165.20.1) <B8160190-A069-3B3A-BDF6-2AA408221FAE> /usr/lib/system/libsystem_notify.dylib
0x7fffd48b0000 - 0x7fffd48b8fe7 libsystem_platform.dylib (126.50.8) <897462FD-B318-321B-A554-E61982630F7E> /usr/lib/system/libsystem_platform.dylib
0x7fffd48b9000 - 0x7fffd48c3ff7 libsystem_pthread.dylib (218.60.3) <B8FB5E20-3295-39E2-B5EB-B464D1D4B104> /usr/lib/system/libsystem_pthread.dylib
0x7fffd48c4000 - 0x7fffd48c7ff7 libsystem_sandbox.dylib (592.70.2) <19320A42-2E3B-361B-BBDA-2F5F2E87B100> /usr/lib/system/libsystem_sandbox.dylib
0x7fffd48c8000 - 0x7fffd48c9ff3 libsystem_secinit.dylib (24.50.4) <F78B847B-3565-3E4B-98A6-F7AD40392E2D> /usr/lib/system/libsystem_secinit.dylib
0x7fffd48ca000 - 0x7fffd48d1ffb libsystem_symptoms.dylib (532.50.47) <3390E07C-C1CE-348F-ADBD-2C5440B45EAA> /usr/lib/system/libsystem_symptoms.dylib
0x7fffd48d2000 - 0x7fffd48e5ff7 libsystem_trace.dylib (518.70.1) <AC63A7FE-50D9-3A30-96E6-F6B7FF16E465> /usr/lib/system/libsystem_trace.dylib
0x7fffd48e6000 - 0x7fffd48ebffb libunwind.dylib (35.3) <3D50D8A8-C460-334D-A519-2DA841102C6B> /usr/lib/system/libunwind.dylib
0x7fffd48ec000 - 0x7fffd4915ff7 libxpc.dylib (972.70.1) <BF896DF0-D8E9-31A8-A4B3-01120BFEEE52> /usr/lib/system/libxpc.dylib
External Modification Summary:
Calls made by other processes targeting this process:
task_for_pid: 0
thread_create: 0
thread_set_state: 0
Calls made by this process:
task_for_pid: 0
thread_create: 0
thread_set_state: 0
Calls made by all processes on this machine:
task_for_pid: 6040
thread_create: 0
thread_set_state: 0
VM Region Summary:
ReadOnly portion of Libraries: Total=209.2M resident=0K(0%) swapped_out_or_unallocated=209.2M(100%)
Writable regions: Total=73.9M written=0K(0%) resident=0K(0%) swapped_out=0K(0%) unallocated=73.9M(100%)
VIRTUAL REGION
REGION TYPE SIZE COUNT (non-coalesced)
=========== ======= =======
Activity Tracing 256K 2
Kernel Alloc Once 8K 2
MALLOC 44.1M 12
MALLOC guard page 16K 4
SQLite page cache 64K 2
STACK GUARD 56.0M 3
Stack 12.0M 3
VM_ALLOCATE 17.0M 29
__DATA 6824K 129
__LINKEDIT 161.2M 60
__TEXT 48.0M 124
__UNICODE 556K 2
shared memory 12K 4
=========== ======= =======
TOTAL 345.9M 363
Model: MacBookPro11,4, BootROM MBP114.0183.B00, 4 processors, Intel Core i7, 2.8 GHz, 16 GB, SMC 2.29f24
Graphics: Intel Iris Pro, Intel Iris Pro, Built-In
Memory Module: BANK 0/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120
Memory Module: BANK 1/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120
AirPort: spairport_wireless_card_type_airport_extreme (0x14E4, 0x152), Broadcom BCM43xx 1.0 (7.21.171.133.1a2)
Bluetooth: Version 5.0.5f2, 3 services, 27 devices, 1 incoming serial ports
Network Service: Wi-Fi, AirPort, en0
PCI Card: Apple 57762-A0, Ethernet Controller, Thunderbolt@195,0,0
Serial ATA Device: APPLE SSD SM0256G, 251 GB
USB Device: USB 3.0 Bus
USB Device: USB5537B
USB Device: Apple Internal Keyboard / Trackpad
USB Device: Bluetooth USB Host Controller
USB Device: USB2137B
USB Device: U2717D_0B2A_15091601
Thunderbolt Bus: MacBook Pro, Apple Inc., 27.1
Thunderbolt Device: Thunderbolt to Gigabit Ethernet Adapter, Apple Inc., 1, 5.5
```
Migrated from https://code.icecube.wisc.edu/ticket/2167
```json
{
"status": "closed",
"changetime": "2019-02-13T14:15:18",
"description": "it happens at the `PyDateTime_IMPORT;` line of the pybindings\n\n\n{{{\nProcess: Python [4592]\nPath: /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python\nIdentifier: Python\nVersion: 2.7.10 (2.7.10)\nCode Type: X86-64 (Native)\nParent Process: bash [872]\nResponsible: Python [4592]\nUser ID: 502\n\nDate/Time: 2018-06-25 10:29:42.575 -0500\nOS Version: Mac OS X 10.12.6 (16G1408)\nReport Version: 12\nAnonymous UUID: C6AB07E7-6F3A-648C-DEDF-1A57F1E27536\n\nSleep/Wake UUID: FC76580E-32A7-4132-B601-30541F484DDB\n\nTime Awake Since Boot: 10000 seconds\nTime Since Wake: 6100 seconds\n\nSystem Integrity Protection: enabled\n\nCrashed Thread: 0 Dispatch queue: com.apple.main-thread\n\nException Type: EXC_BAD_ACCESS (SIGSEGV)\nException Codes: KERN_INVALID_ADDRESS at 0x0000000000000000\nException Note: EXC_CORPSE_NOTIFY\n\nTermination Signal: Segmentation fault: 11\nTermination Reason: Namespace SIGNAL, Code 0xb\nTerminating Process: exc handler [0]\n\nVM Regions Near 0:\n--> \n __TEXT 0000000108a12000-0000000108a14000 [ 8K] r-x/rwx SM=COW /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python\n\nThread 0 Crashed:: Dispatch queue: com.apple.main-thread\n0 ??? \t000000000000000000 0 + 0\n1 org.python.python \t0x000000010a807668 PyEval_GetGlobals + 23\n2 org.python.python \t0x000000010a81615e PyImport_Import + 32\n3 org.python.python \t0x000000010a81477b PyImport_ImportModule + 28\n4 org.python.python \t0x000000010a7924a9 PyCapsule_Import + 204\n5 dataclasses.so \t0x000000010c549df2 register_I3Time() + 34\n6 dataclasses.so \t0x000000010c9c11e9 init_module_dataclasses() + 9\n7 libboost_python27-mt.dylib \t0x000000010a4b5d78 boost::python::handle_exception_impl(boost::function0<void>) + 72\n8 libboost_python27-mt.dylib \t0x000000010a4b6dfb bool boost::python::handle_exception<void (*)()>(void (*)()) + 59\n9 libboost_python27-mt.dylib \t0x000000010a4b6cd4 boost::python::detail::init_module(char const*, void (*)()) + 84\n10 org.python.python \t0x0000000108ab3130 _PyImport_LoadDynamicModule + 140\n11 org.python.python \t0x0000000108ab2f6a 0x108a18000 + 634730\n12 org.python.python \t0x0000000108a9e4d4 PyEval_EvalFrameEx + 14624\n13 org.python.python \t0x0000000108aa1475 0x108a18000 + 562293\n14 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n15 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n16 org.python.python \t0x0000000108a9a367 PyEval_EvalCode + 48\n17 org.python.python \t0x0000000108aaf6bd PyImport_ExecCodeModuleEx + 241\n18 org.python.python \t0x0000000108ab23c7 0x108a18000 + 631751\n19 org.python.python \t0x0000000108ab264f 0x108a18000 + 632399\n20 org.python.python \t0x0000000108ab1e2c 0x108a18000 + 630316\n21 org.python.python \t0x0000000108ab1c62 0x108a18000 + 629858\n22 org.python.python \t0x0000000108ab0cac PyImport_ImportModuleLevel + 1341\n23 org.python.python \t0x0000000108a96006 0x108a18000 + 516102\n24 org.python.python \t0x0000000108a226fb PyObject_Call + 99\n25 org.python.python \t0x0000000108aa0dbb PyEval_CallObjectWithKeywords + 165\n26 org.python.python \t0x0000000108a9cc0f PyEval_EvalFrameEx + 8283\n27 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n28 org.python.python \t0x0000000108a9f0c0 PyEval_EvalFrameEx + 17676\n29 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n30 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n31 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n32 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n33 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n34 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n35 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n36 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n37 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n38 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n39 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n40 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n41 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n42 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n43 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n44 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n45 org.python.python \t0x0000000108a404d1 0x108a18000 + 165073\n46 org.python.python \t0x0000000108a226fb PyObject_Call + 99\n47 org.python.python \t0x0000000108a9dfe5 PyEval_EvalFrameEx + 13361\n48 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n49 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n50 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n51 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n52 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n53 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n54 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n55 org.python.python \t0x0000000108a404d1 0x108a18000 + 165073\n56 org.python.python \t0x0000000108a226fb PyObject_Call + 99\n57 org.python.python \t0x0000000108a9dfe5 PyEval_EvalFrameEx + 13361\n58 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n59 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n60 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n61 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n62 org.python.python \t0x0000000108a9a367 PyEval_EvalCode + 48\n63 org.python.python \t0x0000000108aba5dd 0x108a18000 + 665053\n64 org.python.python \t0x0000000108aba680 PyRun_FileExFlags + 133\n65 org.python.python \t0x0000000108aba1d1 PyRun_SimpleFileExFlags + 702\n66 org.python.python \t0x0000000108acbb6a Py_Main + 3094\n67 libdyld.dylib \t0x00007fffd46a3235 start + 1\n\nThread 1:\n0 libsystem_kernel.dylib \t0x00007fffd47d1bf2 __psynch_cvwait + 10\n1 libsystem_pthread.dylib \t0x00007fffd48bd7fa _pthread_cond_wait + 712\n2 org.python.python \t0x0000000108ac9d27 PyThread_acquire_lock + 101\n3 org.python.python \t0x0000000108acdf02 0x108a18000 + 745218\n4 org.python.python \t0x0000000108a9e4d4 PyEval_EvalFrameEx + 14624\n5 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n6 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n7 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n8 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n9 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n10 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n11 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n12 org.python.python \t0x0000000108a404d1 0x108a18000 + 165073\n13 org.python.python \t0x0000000108a226fb PyObject_Call + 99\n14 org.python.python \t0x0000000108a9dfe5 PyEval_EvalFrameEx + 13361\n15 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n16 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n17 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n18 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n19 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n20 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n21 org.python.python \t0x0000000108aa1475 0x108a18000 + 562293\n22 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n23 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n24 org.python.python \t0x0000000108a404d1 0x108a18000 + 165073\n25 org.python.python \t0x0000000108a226fb PyObject_Call + 99\n26 org.python.python \t0x0000000108a2d3ac 0x108a18000 + 86956\n27 org.python.python \t0x0000000108a226fb PyObject_Call + 99\n28 org.python.python \t0x0000000108aa0dbb PyEval_CallObjectWithKeywords + 165\n29 org.python.python \t0x0000000108acdd4e 0x108a18000 + 744782\n30 libsystem_pthread.dylib \t0x00007fffd48bc93b _pthread_body + 180\n31 libsystem_pthread.dylib \t0x00007fffd48bc887 _pthread_start + 286\n32 libsystem_pthread.dylib \t0x00007fffd48bc08d thread_start + 13\n\nThread 0 crashed with X86 Thread State (64-bit):\n rax: 0x000000010a8cb570 rbx: 0x000000010e961030 rcx: 0x6c132e1d26bc00d7 rdx: 0x0000000000000000\n rdi: 0x0000000000000000 rsi: 0x000000010a84ae04 rbp: 0x00007fff571ea820 rsp: 0x00007fff571ea818\n r8: 0x0000000000000006 r9: 0x00007f99fc422580 r10: 0x0000000000001002 r11: 0x00000000041162e0\n r12: 0x00007f99fc44a5c9 r13: 0x0000000000000000 r14: 0x000000010e961030 r15: 0x0000000000000000\n rip: 0x0000000000000000 rfl: 0x0000000000010206 cr2: 0x0000000000000000\n \nLogical CPU: 4\nError Code: 0x00000014\nTrap Number: 14\n\n\nBinary Images:\n 0x108a12000 - 0x108a13fff org.python.python (2.7.10 - 2.7.10) <FDF4A2EF-05B5-37B9-8624-045A152B6DB7> /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python\n 0x108a18000 - 0x108b09ff7 org.python.python (2.7.10 - 2.7.10) <BDCDC395-7F55-3DF4-819B-7719E69BCBD9> /System/Library/Frameworks/Python.framework/Versions/2.7/Python\n 0x108cd6000 - 0x108cd7fff _locale.so (97.50.7) <16EECFD3-0814-3B9C-8CF5-D82DB670AE7F> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_locale.so\n 0x108d5c000 - 0x108d5dffb time.so (97.50.7) <9094E95E-EA50-30DF-A250-6003D2EDEFD5> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/time.so\n 0x108d64000 - 0x108d65fff cStringIO.so (97.50.7) <FBA2E408-33F8-3506-AD37-1B356A6F787D> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/cStringIO.so\n 0x108dab000 - 0x108dadff7 _collections.so (97.50.7) <1DDC550E-8ACD-3E34-B9AA-2F2575D5085E> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_collections.so\n 0x108db4000 - 0x108db7fff operator.so (97.50.7) <CA736B38-65D4-37D9-AAE8-04D697531142> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/operator.so\n 0x108dbe000 - 0x108dc2fff itertools.so (97.50.7) <3AFFF65F-D249-3EC2-8F6E-ED970FF199D6> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/itertools.so\n 0x108dcc000 - 0x108dcdfff _heapq.so (97.50.7) <E4FC7F34-E74C-3D8E-9474-BAC1648A7E5C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_heapq.so\n 0x108dd3000 - 0x108dd3fff grp.so (97.50.7) <7CB7F994-D049-3D83-A295-D1389785A691> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/grp.so\n 0x108e18000 - 0x108e19fff _functools.so (97.50.7) <4A63F438-0EDC-36E2-963C-C93D38C662A2> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_functools.so\n 0x108e5e000 - 0x108e61fff strop.so (97.50.7) <F5AAE1C3-EFC0-3991-893C-B4CA54894A6C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/strop.so\n 0x108fa7000 - 0x108faaffb _struct.so (97.50.7) <EF8EE29B-C0A0-32BF-AA30-ADEBEAD8EEF4> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_struct.so\n 0x108ff1000 - 0x108ff5ff3 _json.so (97.50.7) <F424F15C-E08B-3DD3-B1FC-623159BC7F7C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_json.so\n 0x108ffb000 - 0x108ffdff3 binascii.so (97.50.7) <86E49B82-5582-347E-92EB-B107F70BBB49> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/binascii.so\n 0x109082000 - 0x109085ff7 math.so (97.50.7) <5A58C237-99FB-3CA3-BCB9-E6F150CE96BF> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/math.so\n 0x10908c000 - 0x10908dfff _hashlib.so (97.50.7) <6B04CCCA-D1B8-32F0-BF9A-C7FE22356617> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_hashlib.so\n 0x109093000 - 0x109094fff _random.so (97.50.7) <2837E6D6-86F4-3ED6-AA29-F0D11DC73F85> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_random.so\n 0x109119000 - 0x109128ffb _io.so (97.50.7) <092C0207-64D8-3BAD-BE0F-427C8FC6EE06> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_io.so\n 0x1091ba000 - 0x1091bcffb select.so (97.50.7) <E5838201-45EA-35C7-AB30-90D7CEFB08A0> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/select.so\n 0x1091c3000 - 0x1091c4fff fcntl.so (97.50.7) <E1CEBE57-DB25-30FE-9C7C-56DD717D188E> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/fcntl.so\n 0x1091c9000 - 0x1091cafff termios.so (97.50.7) <51D1C82A-E5E4-3008-B02E-BFCCCB878BE2> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/termios.so\n 0x1091d0000 - 0x1091d1ffb resource.so (97.50.7) <576E890B-3F89-3847-8E6B-998855EA43A2> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/resource.so\n 0x109216000 - 0x109224ffb _ctypes.so (97.50.7) <5E1FA7E6-2A2F-304F-9344-3BA03463DA86> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_ctypes.so\n 0x1092b1000 - 0x1092b8fff _socket.so (97.50.7) <076AA6AE-10D1-3033-9BF9-EC53ACF9B0E8> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_socket.so\n 0x1092c3000 - 0x1092ccfff _ssl.so (97.50.7) <BA546970-1B58-336A-86CC-C58C34F35668> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_ssl.so\n 0x109358000 - 0x109358fff _scproxy.so (97.50.7) <F577CB62-2192-39A3-8341-923EEA55DF9D> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_scproxy.so\n 0x10935d000 - 0x10935eff3 +_scandir.so (0) <5A4A4D1E-9EA8-3B33-B580-770EC7654967> /Users/USER/Library/Python/2.7/lib/python/site-packages/_scandir.so\n 0x1093a2000 - 0x1093abff3 datetime.so (97.50.7) <EC351EC8-FBC7-33E9-B5D1-DA9D614D1648> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/datetime.so\n 0x1094b5000 - 0x1094c0ffb cPickle.so (97.50.7) <C1F3E5FC-D920-3896-B393-5B89A265376C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/cPickle.so\n 0x109547000 - 0x10954fffb _sqlite3.so (97.50.7) <07AEFDDB-86F7-30F7-9D9E-AC0F9EEA9198> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_sqlite3.so\n 0x10961a000 - 0x10961afff _bisect.so (97.50.7) <C7356EA2-77CF-34A0-8FC8-7F87074E8CF8> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_bisect.so\n 0x1097df000 - 0x1097e3fff array.so (97.50.7) <8F606B8E-0AA2-3FF9-97F5-57DE3DD63C33> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/array.so\n 0x1097ea000 - 0x10988eff3 unicodedata.so (97.50.7) <3906B514-5FFD-31E5-9D64-3004EBFA0EC3> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/unicodedata.so\n 0x109956000 - 0x109957ffb _lsprof.so (97.50.7) <750C5676-166E-376C-905A-351811B326F5> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_lsprof.so\n 0x109cac000 - 0x109cb3fff +icetray.so (0) <36456467-7620-3952-B70E-15789244F30F> /Users/USER/*/icetray.so\n 0x109cbd000 - 0x109f88ff7 +libicetray.dylib (0) <515E3C78-73A7-3D30-B3C6-861101C8BFE0> /Users/USER/*/libicetray.dylib\n 0x10a49e000 - 0x10a4ccfff +libboost_python27-mt.dylib (0) <D74B7B4E-4730-3E9F-9193-D24A1002C6FC> /usr/local/opt/boost-python/lib/libboost_python27-mt.dylib\n 0x10a508000 - 0x10a50affb +libboost_system-mt.dylib (0) <D62AB9A1-52C7-390F-84B2-9D37E487E86E> /usr/local/opt/boost/lib/libboost_system-mt.dylib\n 0x10a50f000 - 0x10a51afff +libboost_signals-mt.dylib (0) <9048E894-CB19-3732-9F8C-14F73E566801> /usr/local/opt/boost/lib/libboost_signals-mt.dylib\n 0x10a52e000 - 0x10a53bfff +libboost_thread-mt.dylib (0) <A9472435-3E86-3669-B6BF-EF8BBF614B71> /usr/local/opt/boost/lib/libboost_thread-mt.dylib\n 0x10a557000 - 0x10a55bfff +libboost_date_time-mt.dylib (0) <6DC43739-E3E8-3EE4-B3BB-FC04903A0622> /usr/local/opt/boost/lib/libboost_date_time-mt.dylib\n 0x10a569000 - 0x10a578ff7 +libboost_filesystem-mt.dylib (0) <6F693033-FF11-35E9-90F8-C87B5623A6DD> /usr/local/opt/boost/lib/libboost_filesystem-mt.dylib\n 0x10a58b000 - 0x10a5bdfff +libboost_program_options-mt.dylib (0) <E7A97BA1-7040-3033-8310-F34A6658311B> /usr/local/opt/boost/lib/libboost_program_options-mt.dylib\n 0x10a617000 - 0x10a6bdfff +libboost_regex-mt.dylib (0) <9CEE3EFE-F1BA-35D9-A686-49E92EFAEA54> /usr/local/opt/boost/lib/libboost_regex-mt.dylib\n 0x10a74c000 - 0x10a757ff7 +libboost_iostreams-mt.dylib (0) <3B6518B4-7968-34D4-B93A-EA200E2CB6BB> /usr/local/opt/boost/lib/libboost_iostreams-mt.dylib\n 0x10a772000 - 0x10a775ff7 +libboost_chrono-mt.dylib (0) <2843F685-E64E-34E8-A1DF-9C0655E9E902> /usr/local/opt/boost/lib/libboost_chrono-mt.dylib\n 0x10a77c000 - 0x10a77dfff +libboost_atomic-mt.dylib (0) <E8A79FBA-BA08-326F-8C85-1CB888629895> /usr/local/opt/boost/lib/libboost_atomic-mt.dylib\n 0x10a780000 - 0x10a871fff +org.python.python (2.7.15, [c] 2001-2018 Python Software Foundation. - 2.7.15) <9AF9FD73-6537-3A67-B191-7B75D9BCF980> /usr/local/opt/python@2/Frameworks/Python.framework/Versions/2.7/Python\n 0x10a905000 - 0x10a980fff +libarchive.13.dylib (0) <2B88C81E-AD82-366F-9CCB-8C88FF42F9AB> /usr/local/opt/libarchive/lib/libarchive.13.dylib\n 0x10a999000 - 0x10a9c3ff7 +libserialization.dylib (0) <86BB0348-F166-3FA1-A099-7E70AB9BD2CB> /Users/USER/*/libserialization.dylib\n 0x10aa08000 - 0x10aa73ff3 +libzstd.1.dylib (0) <FF6884E3-F4E4-3B75-B67A-A82831A87F80> /usr/local/opt/zstd/lib/libzstd.1.dylib\n 0x10aa7f000 - 0x10aa98fff libexpat.1.dylib (15.1) <588CA992-60BB-363B-BEE7-3CC0A26C1AFA> /usr/lib/libexpat.1.dylib\n 0x10aaa2000 - 0x10aabdfff +liblzma.5.dylib (0) <12A41495-97BA-35A4-97E7-22DBF7CF6D47> /usr/local/opt/xz/lib/liblzma.5.dylib\n 0x10afc3000 - 0x10afc3fff +_speedups.so (0) <A78A2094-6736-3F77-BD9F-F071383DDBF0> /Users/USER/Library/Python/2.7/lib/python/site-packages/markupsafe/_speedups.so\n 0x10b0c6000 - 0x10b51cffb +libdataclasses.dylib (0) <854B5114-AF18-3C78-B4F1-487C493E8FEB> /Users/USER/*/libdataclasses.dylib\n 0x10c1fe000 - 0x10cd0cff7 +dataclasses.so (0) <515727AF-958B-3490-9BDB-7C90DF291361> /Users/USER/*/dataclasses.so\n 0x117cbd000 - 0x117cfadc7 dyld (433.5) <322C06B7-8878-311D-888C-C8FD2CA96FF3> /usr/lib/dyld\n 0x7fffbee8e000 - 0x7fffbf327ff7 com.apple.CoreFoundation (6.9 - 1349.92) <6D0D0311-7C61-3313-BC55-22B7E876BEFA> /System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation\n 0x7fffc0e6d000 - 0x7fffc0f03ff7 com.apple.framework.IOKit (2.0.2 - 1324.60.4) <454036AD-86AA-3ABB-8C53-B5F654A6824D> /System/Library/Frameworks/IOKit.framework/Versions/A/IOKit\n 0x7fffc519c000 - 0x7fffc549efff com.apple.security (7.0 - 57740.60.23) <9F23DF40-1A2F-3177-8DCE-FBC4F8F43BAF> /System/Library/Frameworks/Security.framework/Versions/A/Security\n 0x7fffc58c9000 - 0x7fffc5938ff7 com.apple.SystemConfiguration (1.14 - 1.14) <A4A350BA-23F1-3D44-9770-84D549D1D74B> /System/Library/Frameworks/SystemConfiguration.framework/Versions/A/SystemConfiguration\n 0x7fffd1b68000 - 0x7fffd1b69fff com.apple.TrustEvaluationAgent (2.0 - 28.50.1) <EBE65DD5-1732-3747-8C6C-7BECEBF089A4> /System/Library/PrivateFrameworks/TrustEvaluationAgent.framework/Versions/A/TrustEvaluationAgent\n 0x7fffd2ebb000 - 0x7fffd2ebcff3 libDiagnosticMessagesClient.dylib (102) <84A04D24-0E60-3810-A8C0-90A65E2DF61A> /usr/lib/libDiagnosticMessagesClient.dylib\n 0x7fffd30f4000 - 0x7fffd30f4fff libOpenScriptingUtil.dylib (172.1) <0F1BA407-97D1-36F6-882D-A355EAAD5E00> /usr/lib/libOpenScriptingUtil.dylib\n 0x7fffd30fa000 - 0x7fffd30fbffb libSystem.B.dylib (1238.60.2) <45C5C363-67A0-308C-8D35-A4DF23069A9F> /usr/lib/libSystem.B.dylib\n 0x7fffd3213000 - 0x7fffd3213ff3 libauto.dylib (187) <34388D0B-C539-3C1B-9408-2BC152162E43> /usr/lib/libauto.dylib\n 0x7fffd3214000 - 0x7fffd3224ff3 libbsm.0.dylib (34) <20084796-B04D-3B35-A003-EA11459557A9> /usr/lib/libbsm.0.dylib\n 0x7fffd3225000 - 0x7fffd3233ff7 libbz2.1.0.dylib (38) <ADFA329A-DCE7-356D-8F09-A3168DFC6610> /usr/lib/libbz2.1.0.dylib\n 0x7fffd3234000 - 0x7fffd328aff7 libc++.1.dylib (307.5) <0B43BB5D-E6EB-3464-8DE9-B41AC8ED9D1C> /usr/lib/libc++.1.dylib\n 0x7fffd328b000 - 0x7fffd32b4ff7 libc++abi.dylib (307.4) <BC271AD3-831B-362A-9DA7-E8C51F285FE4> /usr/lib/libc++abi.dylib\n 0x7fffd32dd000 - 0x7fffd32ddff7 libcoretls.dylib (121.50.4) <64B1001E-10F6-3542-A3B2-C4B49F51817F> /usr/lib/libcoretls.dylib\n 0x7fffd32de000 - 0x7fffd32dfff3 libcoretls_cfhelpers.dylib (121.50.4) <1A10303E-5EB0-3C7C-9165-021FCDFD934D> /usr/lib/libcoretls_cfhelpers.dylib\n 0x7fffd3399000 - 0x7fffd347dff7 libcrypto.0.9.8.dylib (64.50.7) <B34BC0FA-18ED-37C5-9D46-393803CADEBB> /usr/lib/libcrypto.0.9.8.dylib\n 0x7fffd36eb000 - 0x7fffd36ebfff libenergytrace.dylib (15) <A1B040A2-7977-3097-9ADF-34FF181EB970> /usr/lib/libenergytrace.dylib\n 0x7fffd36f9000 - 0x7fffd36fafff libffi.dylib (18.1) <49D03682-E111-351C-8266-4519B3B82BE9> /usr/lib/libffi.dylib\n 0x7fffd3701000 - 0x7fffd37f3ff7 libiconv.2.dylib (50) <42125B35-81D7-3FC4-9475-A26DBE10884D> /usr/lib/libiconv.2.dylib\n 0x7fffd37f4000 - 0x7fffd3a19ffb libicucore.A.dylib (57167.0.1) <E720801C-2D92-3108-B853-469551EDF21F> /usr/lib/libicucore.A.dylib\n 0x7fffd3a21000 - 0x7fffd3a3affb liblzma.5.dylib (10) <44BD0279-99DD-36B5-8A6E-C11432E2098D> /usr/lib/liblzma.5.dylib\n 0x7fffd3d2d000 - 0x7fffd3da7ff3 libnetwork.dylib (856.60.1) <191E99F5-4723-3180-8013-02AF2F9AE4B8> /usr/lib/libnetwork.dylib\n 0x7fffd3da8000 - 0x7fffd417a047 libobjc.A.dylib (709.1) <70614861-0340-32E2-85ED-FE65759CDFFA> /usr/lib/libobjc.A.dylib\n 0x7fffd417d000 - 0x7fffd4181fff libpam.2.dylib (21.30.1) <71EB0D88-DE84-3C8D-A2C5-58AA282BC5BC> /usr/lib/libpam.2.dylib\n 0x7fffd4182000 - 0x7fffd41b3fff libpcap.A.dylib (67.60.2) <B2D36AD8-D5C8-3875-AC81-4787A15E44C2> /usr/lib/libpcap.A.dylib\n 0x7fffd423c000 - 0x7fffd438aff7 libsqlite3.dylib (254.8) <1ECF7DF7-7A07-3B4B-A63B-F4EFF6BC7ACF> /usr/lib/libsqlite3.dylib\n 0x7fffd43ad000 - 0x7fffd43e5ff3 libssl.0.9.8.dylib (64.50.7) <3B6EAD4B-F7FA-369C-AB54-755B08219D2A> /usr/lib/libssl.0.9.8.dylib\n 0x7fffd447f000 - 0x7fffd448cfff libxar.1.dylib (357) <69547C64-E811-326F-BBED-490C6361BDCB> /usr/lib/libxar.1.dylib\n 0x7fffd448d000 - 0x7fffd457cff3 libxml2.2.dylib (30.20) <40B1027A-43B6-38EC-9EB9-9E7871E98CBC> /usr/lib/libxml2.2.dylib\n 0x7fffd45a7000 - 0x7fffd45b8ff3 libz.1.dylib (67) <46E3FFA2-4328-327A-8D34-A03E20BFFB8E> /usr/lib/libz.1.dylib\n 0x7fffd45c7000 - 0x7fffd45cbff7 libcache.dylib (79) <093A4DAB-8385-3D47-A350-E20CB7CCF7BF> /usr/lib/system/libcache.dylib\n 0x7fffd45cc000 - 0x7fffd45d6fff libcommonCrypto.dylib (60092.50.5) <8A64D1B0-C70E-385C-92F0-E669079FDA90> /usr/lib/system/libcommonCrypto.dylib\n 0x7fffd45d7000 - 0x7fffd45defff libcompiler_rt.dylib (62) <55D47421-772A-32AB-B529-1A46C2F43B4D> /usr/lib/system/libcompiler_rt.dylib\n 0x7fffd45df000 - 0x7fffd45e7fff libcopyfile.dylib (138) <819BEA3C-DF11-3E3D-A1A1-5A51C5BF1961> /usr/lib/system/libcopyfile.dylib\n 0x7fffd45e8000 - 0x7fffd466bfdf libcorecrypto.dylib (442.50.19) <65D7165E-2E71-335D-A2D6-33F78E2DF0C1> /usr/lib/system/libcorecrypto.dylib\n 0x7fffd466c000 - 0x7fffd469dfff libdispatch.dylib (703.50.37) <6582BAD6-ED27-3B30-B620-90B1C5A4AE3C> /usr/lib/system/libdispatch.dylib\n 0x7fffd469e000 - 0x7fffd46a3ffb libdyld.dylib (433.5) <E7268165-BE34-35CA-8488-BCD4D71C7EBC> /usr/lib/system/libdyld.dylib\n 0x7fffd46a4000 - 0x7fffd46a4ffb libkeymgr.dylib (28) <7AA011A9-DC21-3488-BF73-3B5B14D1FDD6> /usr/lib/system/libkeymgr.dylib\n 0x7fffd46a5000 - 0x7fffd46b1fff libkxld.dylib (3789.73.13) <9A739C49-DD82-3B7F-AF41-60395C1AE071> /usr/lib/system/libkxld.dylib\n 0x7fffd46b2000 - 0x7fffd46b2fff liblaunch.dylib (972.70.1) <B856ABD2-896E-3DE0-B2C8-146A6AF8E2A7> /usr/lib/system/liblaunch.dylib\n 0x7fffd46b3000 - 0x7fffd46b8ff3 libmacho.dylib (898) <17D5D855-F6C3-3B04-B680-E9BF02EF8AED> /usr/lib/system/libmacho.dylib\n 0x7fffd46b9000 - 0x7fffd46bbff3 libquarantine.dylib (85.50.1) <12448CC2-378E-35F3-BE33-9DC395A5B970> /usr/lib/system/libquarantine.dylib\n 0x7fffd46bc000 - 0x7fffd46bdffb libremovefile.dylib (45) <38D4CB9C-10CD-30D3-8B7B-A515EC75FE85> /usr/lib/system/libremovefile.dylib\n 0x7fffd46be000 - 0x7fffd46d6ff7 libsystem_asl.dylib (349.50.5) <096E4228-3B7C-30A6-8B13-EC909A64499A> /usr/lib/system/libsystem_asl.dylib\n 0x7fffd46d7000 - 0x7fffd46d7ff7 libsystem_blocks.dylib (67) <10DC5404-73AB-35B3-A277-A8AFECB476EB> /usr/lib/system/libsystem_blocks.dylib\n 0x7fffd46d8000 - 0x7fffd4765fef libsystem_c.dylib (1158.50.2) <E5AE5244-7D0C-36AC-8BB6-C7AE7EA52A4B> /usr/lib/system/libsystem_c.dylib\n 0x7fffd4766000 - 0x7fffd4769ffb libsystem_configuration.dylib (888.60.2) <BECC01A2-CA8D-31E6-BCDF-D452965FA976> /usr/lib/system/libsystem_configuration.dylib\n 0x7fffd476a000 - 0x7fffd476dfff libsystem_coreservices.dylib (41.4) <7D26DE79-B424-3450-85E1-F7FAB32714AB> /usr/lib/system/libsystem_coreservices.dylib\n 0x7fffd476e000 - 0x7fffd4786fff libsystem_coretls.dylib (121.50.4) <EC6FCF07-DCFB-3A03-9CC9-6DD3709974C6> /usr/lib/system/libsystem_coretls.dylib\n 0x7fffd4787000 - 0x7fffd478dfff libsystem_dnssd.dylib (765.50.9) <CC960215-0B1B-3822-A13A-3DDE96FA796F> /usr/lib/system/libsystem_dnssd.dylib\n 0x7fffd478e000 - 0x7fffd47b7ff7 libsystem_info.dylib (503.50.4) <611DB84C-BF70-3F92-8702-B9F28A900920> /usr/lib/system/libsystem_info.dylib\n 0x7fffd47b8000 - 0x7fffd47daff7 libsystem_kernel.dylib (3789.73.13) <AA3C2E69-1311-3DC3-89C2-9502F1A34E00> /usr/lib/system/libsystem_kernel.dylib\n 0x7fffd47db000 - 0x7fffd4822fe7 libsystem_m.dylib (3121.6) <86D499B5-BBDC-3D3B-8A4E-97AE8E6672A4> /usr/lib/system/libsystem_m.dylib\n 0x7fffd4823000 - 0x7fffd4841ff7 libsystem_malloc.dylib (116.50.8) <A3D15F17-99A6-3367-8C7E-4280E8619C95> /usr/lib/system/libsystem_malloc.dylib\n 0x7fffd4842000 - 0x7fffd489bffb libsystem_network.dylib (856.60.1) <369D0221-56CA-3C3E-9EDE-94B41CAE77B7> /usr/lib/system/libsystem_network.dylib\n 0x7fffd489c000 - 0x7fffd48a5ff3 libsystem_networkextension.dylib (563.60.2) <B021F2B3-8A75-3633-ABB0-FC012B8E9B0C> /usr/lib/system/libsystem_networkextension.dylib\n 0x7fffd48a6000 - 0x7fffd48afff3 libsystem_notify.dylib (165.20.1) <B8160190-A069-3B3A-BDF6-2AA408221FAE> /usr/lib/system/libsystem_notify.dylib\n 0x7fffd48b0000 - 0x7fffd48b8fe7 libsystem_platform.dylib (126.50.8) <897462FD-B318-321B-A554-E61982630F7E> /usr/lib/system/libsystem_platform.dylib\n 0x7fffd48b9000 - 0x7fffd48c3ff7 libsystem_pthread.dylib (218.60.3) <B8FB5E20-3295-39E2-B5EB-B464D1D4B104> /usr/lib/system/libsystem_pthread.dylib\n 0x7fffd48c4000 - 0x7fffd48c7ff7 libsystem_sandbox.dylib (592.70.2) <19320A42-2E3B-361B-BBDA-2F5F2E87B100> /usr/lib/system/libsystem_sandbox.dylib\n 0x7fffd48c8000 - 0x7fffd48c9ff3 libsystem_secinit.dylib (24.50.4) <F78B847B-3565-3E4B-98A6-F7AD40392E2D> /usr/lib/system/libsystem_secinit.dylib\n 0x7fffd48ca000 - 0x7fffd48d1ffb libsystem_symptoms.dylib (532.50.47) <3390E07C-C1CE-348F-ADBD-2C5440B45EAA> /usr/lib/system/libsystem_symptoms.dylib\n 0x7fffd48d2000 - 0x7fffd48e5ff7 libsystem_trace.dylib (518.70.1) <AC63A7FE-50D9-3A30-96E6-F6B7FF16E465> /usr/lib/system/libsystem_trace.dylib\n 0x7fffd48e6000 - 0x7fffd48ebffb libunwind.dylib (35.3) <3D50D8A8-C460-334D-A519-2DA841102C6B> /usr/lib/system/libunwind.dylib\n 0x7fffd48ec000 - 0x7fffd4915ff7 libxpc.dylib (972.70.1) <BF896DF0-D8E9-31A8-A4B3-01120BFEEE52> /usr/lib/system/libxpc.dylib\n\nExternal Modification Summary:\n Calls made by other processes targeting this process:\n task_for_pid: 0\n thread_create: 0\n thread_set_state: 0\n Calls made by this process:\n task_for_pid: 0\n thread_create: 0\n thread_set_state: 0\n Calls made by all processes on this machine:\n task_for_pid: 6040\n thread_create: 0\n thread_set_state: 0\n\nVM Region Summary:\nReadOnly portion of Libraries: Total=209.2M resident=0K(0%) swapped_out_or_unallocated=209.2M(100%)\nWritable regions: Total=73.9M written=0K(0%) resident=0K(0%) swapped_out=0K(0%) unallocated=73.9M(100%)\n \n VIRTUAL REGION \nREGION TYPE SIZE COUNT (non-coalesced) \n=========== ======= ======= \nActivity Tracing 256K 2 \nKernel Alloc Once 8K 2 \nMALLOC 44.1M 12 \nMALLOC guard page 16K 4 \nSQLite page cache 64K 2 \nSTACK GUARD 56.0M 3 \nStack 12.0M 3 \nVM_ALLOCATE 17.0M 29 \n__DATA 6824K 129 \n__LINKEDIT 161.2M 60 \n__TEXT 48.0M 124 \n__UNICODE 556K 2 \nshared memory 12K 4 \n=========== ======= ======= \nTOTAL 345.9M 363 \n\nModel: MacBookPro11,4, BootROM MBP114.0183.B00, 4 processors, Intel Core i7, 2.8 GHz, 16 GB, SMC 2.29f24\nGraphics: Intel Iris Pro, Intel Iris Pro, Built-In\nMemory Module: BANK 0/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120\nMemory Module: BANK 1/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120\nAirPort: spairport_wireless_card_type_airport_extreme (0x14E4, 0x152), Broadcom BCM43xx 1.0 (7.21.171.133.1a2)\nBluetooth: Version 5.0.5f2, 3 services, 27 devices, 1 incoming serial ports\nNetwork Service: Wi-Fi, AirPort, en0\nPCI Card: Apple 57762-A0, Ethernet Controller, Thunderbolt@195,0,0\nSerial ATA Device: APPLE SSD SM0256G, 251 GB\nUSB Device: USB 3.0 Bus\nUSB Device: USB5537B\nUSB Device: Apple Internal Keyboard / Trackpad\nUSB Device: Bluetooth USB Host Controller\nUSB Device: USB2137B\nUSB Device: U2717D_0B2A_15091601\nThunderbolt Bus: MacBook Pro, Apple Inc., 27.1\nThunderbolt Device: Thunderbolt to Gigabit Ethernet Adapter, Apple Inc., 1, 5.5\n\n}}}\n",
"reporter": "kjmeagher",
"cc": "",
"resolution": "invalid",
"_ts": "1550067318169976",
"component": "combo core",
"summary": "[dataclasses] I3Time pybindings segfault on Sierra",
"priority": "normal",
"keywords": "",
"time": "2018-06-25T15:32:21",
"milestone": "",
"owner": "kjmeagher",
"type": "defect"
}
```
| 1.0 | [dataclasses] I3Time pybindings segfault on Sierra (Trac #2167) - it happens at the `PyDateTime_IMPORT;` line of the pybindings
```text
Process: Python [4592]
Path: /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python
Identifier: Python
Version: 2.7.10 (2.7.10)
Code Type: X86-64 (Native)
Parent Process: bash [872]
Responsible: Python [4592]
User ID: 502
Date/Time: 2018-06-25 10:29:42.575 -0500
OS Version: Mac OS X 10.12.6 (16G1408)
Report Version: 12
Anonymous UUID: C6AB07E7-6F3A-648C-DEDF-1A57F1E27536
Sleep/Wake UUID: FC76580E-32A7-4132-B601-30541F484DDB
Time Awake Since Boot: 10000 seconds
Time Since Wake: 6100 seconds
System Integrity Protection: enabled
Crashed Thread: 0 Dispatch queue: com.apple.main-thread
Exception Type: EXC_BAD_ACCESS (SIGSEGV)
Exception Codes: KERN_INVALID_ADDRESS at 0x0000000000000000
Exception Note: EXC_CORPSE_NOTIFY
Termination Signal: Segmentation fault: 11
Termination Reason: Namespace SIGNAL, Code 0xb
Terminating Process: exc handler [0]
VM Regions Near 0:
-->
__TEXT 0000000108a12000-0000000108a14000 [ 8K] r-x/rwx SM=COW /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python
Thread 0 Crashed:: Dispatch queue: com.apple.main-thread
0 ??? 000000000000000000 0 + 0
1 org.python.python 0x000000010a807668 PyEval_GetGlobals + 23
2 org.python.python 0x000000010a81615e PyImport_Import + 32
3 org.python.python 0x000000010a81477b PyImport_ImportModule + 28
4 org.python.python 0x000000010a7924a9 PyCapsule_Import + 204
5 dataclasses.so 0x000000010c549df2 register_I3Time() + 34
6 dataclasses.so 0x000000010c9c11e9 init_module_dataclasses() + 9
7 libboost_python27-mt.dylib 0x000000010a4b5d78 boost::python::handle_exception_impl(boost::function0<void>) + 72
8 libboost_python27-mt.dylib 0x000000010a4b6dfb bool boost::python::handle_exception<void (*)()>(void (*)()) + 59
9 libboost_python27-mt.dylib 0x000000010a4b6cd4 boost::python::detail::init_module(char const*, void (*)()) + 84
10 org.python.python 0x0000000108ab3130 _PyImport_LoadDynamicModule + 140
11 org.python.python 0x0000000108ab2f6a 0x108a18000 + 634730
12 org.python.python 0x0000000108a9e4d4 PyEval_EvalFrameEx + 14624
13 org.python.python 0x0000000108aa1475 0x108a18000 + 562293
14 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
15 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
16 org.python.python 0x0000000108a9a367 PyEval_EvalCode + 48
17 org.python.python 0x0000000108aaf6bd PyImport_ExecCodeModuleEx + 241
18 org.python.python 0x0000000108ab23c7 0x108a18000 + 631751
19 org.python.python 0x0000000108ab264f 0x108a18000 + 632399
20 org.python.python 0x0000000108ab1e2c 0x108a18000 + 630316
21 org.python.python 0x0000000108ab1c62 0x108a18000 + 629858
22 org.python.python 0x0000000108ab0cac PyImport_ImportModuleLevel + 1341
23 org.python.python 0x0000000108a96006 0x108a18000 + 516102
24 org.python.python 0x0000000108a226fb PyObject_Call + 99
25 org.python.python 0x0000000108aa0dbb PyEval_CallObjectWithKeywords + 165
26 org.python.python 0x0000000108a9cc0f PyEval_EvalFrameEx + 8283
27 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
28 org.python.python 0x0000000108a9f0c0 PyEval_EvalFrameEx + 17676
29 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
30 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
31 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
32 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
33 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
34 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
35 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
36 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
37 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
38 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
39 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
40 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
41 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
42 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
43 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
44 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
45 org.python.python 0x0000000108a404d1 0x108a18000 + 165073
46 org.python.python 0x0000000108a226fb PyObject_Call + 99
47 org.python.python 0x0000000108a9dfe5 PyEval_EvalFrameEx + 13361
48 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
49 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
50 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
51 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
52 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
53 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
54 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
55 org.python.python 0x0000000108a404d1 0x108a18000 + 165073
56 org.python.python 0x0000000108a226fb PyObject_Call + 99
57 org.python.python 0x0000000108a9dfe5 PyEval_EvalFrameEx + 13361
58 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
59 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
60 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
61 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
62 org.python.python 0x0000000108a9a367 PyEval_EvalCode + 48
63 org.python.python 0x0000000108aba5dd 0x108a18000 + 665053
64 org.python.python 0x0000000108aba680 PyRun_FileExFlags + 133
65 org.python.python 0x0000000108aba1d1 PyRun_SimpleFileExFlags + 702
66 org.python.python 0x0000000108acbb6a Py_Main + 3094
67 libdyld.dylib 0x00007fffd46a3235 start + 1
Thread 1:
0 libsystem_kernel.dylib 0x00007fffd47d1bf2 __psynch_cvwait + 10
1 libsystem_pthread.dylib 0x00007fffd48bd7fa _pthread_cond_wait + 712
2 org.python.python 0x0000000108ac9d27 PyThread_acquire_lock + 101
3 org.python.python 0x0000000108acdf02 0x108a18000 + 745218
4 org.python.python 0x0000000108a9e4d4 PyEval_EvalFrameEx + 14624
5 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
6 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
7 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
8 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
9 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
10 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
11 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
12 org.python.python 0x0000000108a404d1 0x108a18000 + 165073
13 org.python.python 0x0000000108a226fb PyObject_Call + 99
14 org.python.python 0x0000000108a9dfe5 PyEval_EvalFrameEx + 13361
15 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
16 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
17 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
18 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
19 org.python.python 0x0000000108aa13e2 0x108a18000 + 562146
20 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
21 org.python.python 0x0000000108aa1475 0x108a18000 + 562293
22 org.python.python 0x0000000108a9de4e PyEval_EvalFrameEx + 12954
23 org.python.python 0x0000000108a9a9be PyEval_EvalCodeEx + 1617
24 org.python.python 0x0000000108a404d1 0x108a18000 + 165073
25 org.python.python 0x0000000108a226fb PyObject_Call + 99
26 org.python.python 0x0000000108a2d3ac 0x108a18000 + 86956
27 org.python.python 0x0000000108a226fb PyObject_Call + 99
28 org.python.python 0x0000000108aa0dbb PyEval_CallObjectWithKeywords + 165
29 org.python.python 0x0000000108acdd4e 0x108a18000 + 744782
30 libsystem_pthread.dylib 0x00007fffd48bc93b _pthread_body + 180
31 libsystem_pthread.dylib 0x00007fffd48bc887 _pthread_start + 286
32 libsystem_pthread.dylib 0x00007fffd48bc08d thread_start + 13
Thread 0 crashed with X86 Thread State (64-bit):
rax: 0x000000010a8cb570 rbx: 0x000000010e961030 rcx: 0x6c132e1d26bc00d7 rdx: 0x0000000000000000
rdi: 0x0000000000000000 rsi: 0x000000010a84ae04 rbp: 0x00007fff571ea820 rsp: 0x00007fff571ea818
r8: 0x0000000000000006 r9: 0x00007f99fc422580 r10: 0x0000000000001002 r11: 0x00000000041162e0
r12: 0x00007f99fc44a5c9 r13: 0x0000000000000000 r14: 0x000000010e961030 r15: 0x0000000000000000
rip: 0x0000000000000000 rfl: 0x0000000000010206 cr2: 0x0000000000000000
Logical CPU: 4
Error Code: 0x00000014
Trap Number: 14
Binary Images:
0x108a12000 - 0x108a13fff org.python.python (2.7.10 - 2.7.10) <FDF4A2EF-05B5-37B9-8624-045A152B6DB7> /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python
0x108a18000 - 0x108b09ff7 org.python.python (2.7.10 - 2.7.10) <BDCDC395-7F55-3DF4-819B-7719E69BCBD9> /System/Library/Frameworks/Python.framework/Versions/2.7/Python
0x108cd6000 - 0x108cd7fff _locale.so (97.50.7) <16EECFD3-0814-3B9C-8CF5-D82DB670AE7F> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_locale.so
0x108d5c000 - 0x108d5dffb time.so (97.50.7) <9094E95E-EA50-30DF-A250-6003D2EDEFD5> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/time.so
0x108d64000 - 0x108d65fff cStringIO.so (97.50.7) <FBA2E408-33F8-3506-AD37-1B356A6F787D> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/cStringIO.so
0x108dab000 - 0x108dadff7 _collections.so (97.50.7) <1DDC550E-8ACD-3E34-B9AA-2F2575D5085E> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_collections.so
0x108db4000 - 0x108db7fff operator.so (97.50.7) <CA736B38-65D4-37D9-AAE8-04D697531142> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/operator.so
0x108dbe000 - 0x108dc2fff itertools.so (97.50.7) <3AFFF65F-D249-3EC2-8F6E-ED970FF199D6> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/itertools.so
0x108dcc000 - 0x108dcdfff _heapq.so (97.50.7) <E4FC7F34-E74C-3D8E-9474-BAC1648A7E5C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_heapq.so
0x108dd3000 - 0x108dd3fff grp.so (97.50.7) <7CB7F994-D049-3D83-A295-D1389785A691> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/grp.so
0x108e18000 - 0x108e19fff _functools.so (97.50.7) <4A63F438-0EDC-36E2-963C-C93D38C662A2> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_functools.so
0x108e5e000 - 0x108e61fff strop.so (97.50.7) <F5AAE1C3-EFC0-3991-893C-B4CA54894A6C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/strop.so
0x108fa7000 - 0x108faaffb _struct.so (97.50.7) <EF8EE29B-C0A0-32BF-AA30-ADEBEAD8EEF4> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_struct.so
0x108ff1000 - 0x108ff5ff3 _json.so (97.50.7) <F424F15C-E08B-3DD3-B1FC-623159BC7F7C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_json.so
0x108ffb000 - 0x108ffdff3 binascii.so (97.50.7) <86E49B82-5582-347E-92EB-B107F70BBB49> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/binascii.so
0x109082000 - 0x109085ff7 math.so (97.50.7) <5A58C237-99FB-3CA3-BCB9-E6F150CE96BF> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/math.so
0x10908c000 - 0x10908dfff _hashlib.so (97.50.7) <6B04CCCA-D1B8-32F0-BF9A-C7FE22356617> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_hashlib.so
0x109093000 - 0x109094fff _random.so (97.50.7) <2837E6D6-86F4-3ED6-AA29-F0D11DC73F85> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_random.so
0x109119000 - 0x109128ffb _io.so (97.50.7) <092C0207-64D8-3BAD-BE0F-427C8FC6EE06> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_io.so
0x1091ba000 - 0x1091bcffb select.so (97.50.7) <E5838201-45EA-35C7-AB30-90D7CEFB08A0> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/select.so
0x1091c3000 - 0x1091c4fff fcntl.so (97.50.7) <E1CEBE57-DB25-30FE-9C7C-56DD717D188E> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/fcntl.so
0x1091c9000 - 0x1091cafff termios.so (97.50.7) <51D1C82A-E5E4-3008-B02E-BFCCCB878BE2> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/termios.so
0x1091d0000 - 0x1091d1ffb resource.so (97.50.7) <576E890B-3F89-3847-8E6B-998855EA43A2> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/resource.so
0x109216000 - 0x109224ffb _ctypes.so (97.50.7) <5E1FA7E6-2A2F-304F-9344-3BA03463DA86> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_ctypes.so
0x1092b1000 - 0x1092b8fff _socket.so (97.50.7) <076AA6AE-10D1-3033-9BF9-EC53ACF9B0E8> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_socket.so
0x1092c3000 - 0x1092ccfff _ssl.so (97.50.7) <BA546970-1B58-336A-86CC-C58C34F35668> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_ssl.so
0x109358000 - 0x109358fff _scproxy.so (97.50.7) <F577CB62-2192-39A3-8341-923EEA55DF9D> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_scproxy.so
0x10935d000 - 0x10935eff3 +_scandir.so (0) <5A4A4D1E-9EA8-3B33-B580-770EC7654967> /Users/USER/Library/Python/2.7/lib/python/site-packages/_scandir.so
0x1093a2000 - 0x1093abff3 datetime.so (97.50.7) <EC351EC8-FBC7-33E9-B5D1-DA9D614D1648> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/datetime.so
0x1094b5000 - 0x1094c0ffb cPickle.so (97.50.7) <C1F3E5FC-D920-3896-B393-5B89A265376C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/cPickle.so
0x109547000 - 0x10954fffb _sqlite3.so (97.50.7) <07AEFDDB-86F7-30F7-9D9E-AC0F9EEA9198> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_sqlite3.so
0x10961a000 - 0x10961afff _bisect.so (97.50.7) <C7356EA2-77CF-34A0-8FC8-7F87074E8CF8> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_bisect.so
0x1097df000 - 0x1097e3fff array.so (97.50.7) <8F606B8E-0AA2-3FF9-97F5-57DE3DD63C33> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/array.so
0x1097ea000 - 0x10988eff3 unicodedata.so (97.50.7) <3906B514-5FFD-31E5-9D64-3004EBFA0EC3> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/unicodedata.so
0x109956000 - 0x109957ffb _lsprof.so (97.50.7) <750C5676-166E-376C-905A-351811B326F5> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_lsprof.so
0x109cac000 - 0x109cb3fff +icetray.so (0) <36456467-7620-3952-B70E-15789244F30F> /Users/USER/*/icetray.so
0x109cbd000 - 0x109f88ff7 +libicetray.dylib (0) <515E3C78-73A7-3D30-B3C6-861101C8BFE0> /Users/USER/*/libicetray.dylib
0x10a49e000 - 0x10a4ccfff +libboost_python27-mt.dylib (0) <D74B7B4E-4730-3E9F-9193-D24A1002C6FC> /usr/local/opt/boost-python/lib/libboost_python27-mt.dylib
0x10a508000 - 0x10a50affb +libboost_system-mt.dylib (0) <D62AB9A1-52C7-390F-84B2-9D37E487E86E> /usr/local/opt/boost/lib/libboost_system-mt.dylib
0x10a50f000 - 0x10a51afff +libboost_signals-mt.dylib (0) <9048E894-CB19-3732-9F8C-14F73E566801> /usr/local/opt/boost/lib/libboost_signals-mt.dylib
0x10a52e000 - 0x10a53bfff +libboost_thread-mt.dylib (0) <A9472435-3E86-3669-B6BF-EF8BBF614B71> /usr/local/opt/boost/lib/libboost_thread-mt.dylib
0x10a557000 - 0x10a55bfff +libboost_date_time-mt.dylib (0) <6DC43739-E3E8-3EE4-B3BB-FC04903A0622> /usr/local/opt/boost/lib/libboost_date_time-mt.dylib
0x10a569000 - 0x10a578ff7 +libboost_filesystem-mt.dylib (0) <6F693033-FF11-35E9-90F8-C87B5623A6DD> /usr/local/opt/boost/lib/libboost_filesystem-mt.dylib
0x10a58b000 - 0x10a5bdfff +libboost_program_options-mt.dylib (0) <E7A97BA1-7040-3033-8310-F34A6658311B> /usr/local/opt/boost/lib/libboost_program_options-mt.dylib
0x10a617000 - 0x10a6bdfff +libboost_regex-mt.dylib (0) <9CEE3EFE-F1BA-35D9-A686-49E92EFAEA54> /usr/local/opt/boost/lib/libboost_regex-mt.dylib
0x10a74c000 - 0x10a757ff7 +libboost_iostreams-mt.dylib (0) <3B6518B4-7968-34D4-B93A-EA200E2CB6BB> /usr/local/opt/boost/lib/libboost_iostreams-mt.dylib
0x10a772000 - 0x10a775ff7 +libboost_chrono-mt.dylib (0) <2843F685-E64E-34E8-A1DF-9C0655E9E902> /usr/local/opt/boost/lib/libboost_chrono-mt.dylib
0x10a77c000 - 0x10a77dfff +libboost_atomic-mt.dylib (0) <E8A79FBA-BA08-326F-8C85-1CB888629895> /usr/local/opt/boost/lib/libboost_atomic-mt.dylib
0x10a780000 - 0x10a871fff +org.python.python (2.7.15, [c] 2001-2018 Python Software Foundation. - 2.7.15) <9AF9FD73-6537-3A67-B191-7B75D9BCF980> /usr/local/opt/python@2/Frameworks/Python.framework/Versions/2.7/Python
0x10a905000 - 0x10a980fff +libarchive.13.dylib (0) <2B88C81E-AD82-366F-9CCB-8C88FF42F9AB> /usr/local/opt/libarchive/lib/libarchive.13.dylib
0x10a999000 - 0x10a9c3ff7 +libserialization.dylib (0) <86BB0348-F166-3FA1-A099-7E70AB9BD2CB> /Users/USER/*/libserialization.dylib
0x10aa08000 - 0x10aa73ff3 +libzstd.1.dylib (0) <FF6884E3-F4E4-3B75-B67A-A82831A87F80> /usr/local/opt/zstd/lib/libzstd.1.dylib
0x10aa7f000 - 0x10aa98fff libexpat.1.dylib (15.1) <588CA992-60BB-363B-BEE7-3CC0A26C1AFA> /usr/lib/libexpat.1.dylib
0x10aaa2000 - 0x10aabdfff +liblzma.5.dylib (0) <12A41495-97BA-35A4-97E7-22DBF7CF6D47> /usr/local/opt/xz/lib/liblzma.5.dylib
0x10afc3000 - 0x10afc3fff +_speedups.so (0) <A78A2094-6736-3F77-BD9F-F071383DDBF0> /Users/USER/Library/Python/2.7/lib/python/site-packages/markupsafe/_speedups.so
0x10b0c6000 - 0x10b51cffb +libdataclasses.dylib (0) <854B5114-AF18-3C78-B4F1-487C493E8FEB> /Users/USER/*/libdataclasses.dylib
0x10c1fe000 - 0x10cd0cff7 +dataclasses.so (0) <515727AF-958B-3490-9BDB-7C90DF291361> /Users/USER/*/dataclasses.so
0x117cbd000 - 0x117cfadc7 dyld (433.5) <322C06B7-8878-311D-888C-C8FD2CA96FF3> /usr/lib/dyld
0x7fffbee8e000 - 0x7fffbf327ff7 com.apple.CoreFoundation (6.9 - 1349.92) <6D0D0311-7C61-3313-BC55-22B7E876BEFA> /System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation
0x7fffc0e6d000 - 0x7fffc0f03ff7 com.apple.framework.IOKit (2.0.2 - 1324.60.4) <454036AD-86AA-3ABB-8C53-B5F654A6824D> /System/Library/Frameworks/IOKit.framework/Versions/A/IOKit
0x7fffc519c000 - 0x7fffc549efff com.apple.security (7.0 - 57740.60.23) <9F23DF40-1A2F-3177-8DCE-FBC4F8F43BAF> /System/Library/Frameworks/Security.framework/Versions/A/Security
0x7fffc58c9000 - 0x7fffc5938ff7 com.apple.SystemConfiguration (1.14 - 1.14) <A4A350BA-23F1-3D44-9770-84D549D1D74B> /System/Library/Frameworks/SystemConfiguration.framework/Versions/A/SystemConfiguration
0x7fffd1b68000 - 0x7fffd1b69fff com.apple.TrustEvaluationAgent (2.0 - 28.50.1) <EBE65DD5-1732-3747-8C6C-7BECEBF089A4> /System/Library/PrivateFrameworks/TrustEvaluationAgent.framework/Versions/A/TrustEvaluationAgent
0x7fffd2ebb000 - 0x7fffd2ebcff3 libDiagnosticMessagesClient.dylib (102) <84A04D24-0E60-3810-A8C0-90A65E2DF61A> /usr/lib/libDiagnosticMessagesClient.dylib
0x7fffd30f4000 - 0x7fffd30f4fff libOpenScriptingUtil.dylib (172.1) <0F1BA407-97D1-36F6-882D-A355EAAD5E00> /usr/lib/libOpenScriptingUtil.dylib
0x7fffd30fa000 - 0x7fffd30fbffb libSystem.B.dylib (1238.60.2) <45C5C363-67A0-308C-8D35-A4DF23069A9F> /usr/lib/libSystem.B.dylib
0x7fffd3213000 - 0x7fffd3213ff3 libauto.dylib (187) <34388D0B-C539-3C1B-9408-2BC152162E43> /usr/lib/libauto.dylib
0x7fffd3214000 - 0x7fffd3224ff3 libbsm.0.dylib (34) <20084796-B04D-3B35-A003-EA11459557A9> /usr/lib/libbsm.0.dylib
0x7fffd3225000 - 0x7fffd3233ff7 libbz2.1.0.dylib (38) <ADFA329A-DCE7-356D-8F09-A3168DFC6610> /usr/lib/libbz2.1.0.dylib
0x7fffd3234000 - 0x7fffd328aff7 libc++.1.dylib (307.5) <0B43BB5D-E6EB-3464-8DE9-B41AC8ED9D1C> /usr/lib/libc++.1.dylib
0x7fffd328b000 - 0x7fffd32b4ff7 libc++abi.dylib (307.4) <BC271AD3-831B-362A-9DA7-E8C51F285FE4> /usr/lib/libc++abi.dylib
0x7fffd32dd000 - 0x7fffd32ddff7 libcoretls.dylib (121.50.4) <64B1001E-10F6-3542-A3B2-C4B49F51817F> /usr/lib/libcoretls.dylib
0x7fffd32de000 - 0x7fffd32dfff3 libcoretls_cfhelpers.dylib (121.50.4) <1A10303E-5EB0-3C7C-9165-021FCDFD934D> /usr/lib/libcoretls_cfhelpers.dylib
0x7fffd3399000 - 0x7fffd347dff7 libcrypto.0.9.8.dylib (64.50.7) <B34BC0FA-18ED-37C5-9D46-393803CADEBB> /usr/lib/libcrypto.0.9.8.dylib
0x7fffd36eb000 - 0x7fffd36ebfff libenergytrace.dylib (15) <A1B040A2-7977-3097-9ADF-34FF181EB970> /usr/lib/libenergytrace.dylib
0x7fffd36f9000 - 0x7fffd36fafff libffi.dylib (18.1) <49D03682-E111-351C-8266-4519B3B82BE9> /usr/lib/libffi.dylib
0x7fffd3701000 - 0x7fffd37f3ff7 libiconv.2.dylib (50) <42125B35-81D7-3FC4-9475-A26DBE10884D> /usr/lib/libiconv.2.dylib
0x7fffd37f4000 - 0x7fffd3a19ffb libicucore.A.dylib (57167.0.1) <E720801C-2D92-3108-B853-469551EDF21F> /usr/lib/libicucore.A.dylib
0x7fffd3a21000 - 0x7fffd3a3affb liblzma.5.dylib (10) <44BD0279-99DD-36B5-8A6E-C11432E2098D> /usr/lib/liblzma.5.dylib
0x7fffd3d2d000 - 0x7fffd3da7ff3 libnetwork.dylib (856.60.1) <191E99F5-4723-3180-8013-02AF2F9AE4B8> /usr/lib/libnetwork.dylib
0x7fffd3da8000 - 0x7fffd417a047 libobjc.A.dylib (709.1) <70614861-0340-32E2-85ED-FE65759CDFFA> /usr/lib/libobjc.A.dylib
0x7fffd417d000 - 0x7fffd4181fff libpam.2.dylib (21.30.1) <71EB0D88-DE84-3C8D-A2C5-58AA282BC5BC> /usr/lib/libpam.2.dylib
0x7fffd4182000 - 0x7fffd41b3fff libpcap.A.dylib (67.60.2) <B2D36AD8-D5C8-3875-AC81-4787A15E44C2> /usr/lib/libpcap.A.dylib
0x7fffd423c000 - 0x7fffd438aff7 libsqlite3.dylib (254.8) <1ECF7DF7-7A07-3B4B-A63B-F4EFF6BC7ACF> /usr/lib/libsqlite3.dylib
0x7fffd43ad000 - 0x7fffd43e5ff3 libssl.0.9.8.dylib (64.50.7) <3B6EAD4B-F7FA-369C-AB54-755B08219D2A> /usr/lib/libssl.0.9.8.dylib
0x7fffd447f000 - 0x7fffd448cfff libxar.1.dylib (357) <69547C64-E811-326F-BBED-490C6361BDCB> /usr/lib/libxar.1.dylib
0x7fffd448d000 - 0x7fffd457cff3 libxml2.2.dylib (30.20) <40B1027A-43B6-38EC-9EB9-9E7871E98CBC> /usr/lib/libxml2.2.dylib
0x7fffd45a7000 - 0x7fffd45b8ff3 libz.1.dylib (67) <46E3FFA2-4328-327A-8D34-A03E20BFFB8E> /usr/lib/libz.1.dylib
0x7fffd45c7000 - 0x7fffd45cbff7 libcache.dylib (79) <093A4DAB-8385-3D47-A350-E20CB7CCF7BF> /usr/lib/system/libcache.dylib
0x7fffd45cc000 - 0x7fffd45d6fff libcommonCrypto.dylib (60092.50.5) <8A64D1B0-C70E-385C-92F0-E669079FDA90> /usr/lib/system/libcommonCrypto.dylib
0x7fffd45d7000 - 0x7fffd45defff libcompiler_rt.dylib (62) <55D47421-772A-32AB-B529-1A46C2F43B4D> /usr/lib/system/libcompiler_rt.dylib
0x7fffd45df000 - 0x7fffd45e7fff libcopyfile.dylib (138) <819BEA3C-DF11-3E3D-A1A1-5A51C5BF1961> /usr/lib/system/libcopyfile.dylib
0x7fffd45e8000 - 0x7fffd466bfdf libcorecrypto.dylib (442.50.19) <65D7165E-2E71-335D-A2D6-33F78E2DF0C1> /usr/lib/system/libcorecrypto.dylib
0x7fffd466c000 - 0x7fffd469dfff libdispatch.dylib (703.50.37) <6582BAD6-ED27-3B30-B620-90B1C5A4AE3C> /usr/lib/system/libdispatch.dylib
0x7fffd469e000 - 0x7fffd46a3ffb libdyld.dylib (433.5) <E7268165-BE34-35CA-8488-BCD4D71C7EBC> /usr/lib/system/libdyld.dylib
0x7fffd46a4000 - 0x7fffd46a4ffb libkeymgr.dylib (28) <7AA011A9-DC21-3488-BF73-3B5B14D1FDD6> /usr/lib/system/libkeymgr.dylib
0x7fffd46a5000 - 0x7fffd46b1fff libkxld.dylib (3789.73.13) <9A739C49-DD82-3B7F-AF41-60395C1AE071> /usr/lib/system/libkxld.dylib
0x7fffd46b2000 - 0x7fffd46b2fff liblaunch.dylib (972.70.1) <B856ABD2-896E-3DE0-B2C8-146A6AF8E2A7> /usr/lib/system/liblaunch.dylib
0x7fffd46b3000 - 0x7fffd46b8ff3 libmacho.dylib (898) <17D5D855-F6C3-3B04-B680-E9BF02EF8AED> /usr/lib/system/libmacho.dylib
0x7fffd46b9000 - 0x7fffd46bbff3 libquarantine.dylib (85.50.1) <12448CC2-378E-35F3-BE33-9DC395A5B970> /usr/lib/system/libquarantine.dylib
0x7fffd46bc000 - 0x7fffd46bdffb libremovefile.dylib (45) <38D4CB9C-10CD-30D3-8B7B-A515EC75FE85> /usr/lib/system/libremovefile.dylib
0x7fffd46be000 - 0x7fffd46d6ff7 libsystem_asl.dylib (349.50.5) <096E4228-3B7C-30A6-8B13-EC909A64499A> /usr/lib/system/libsystem_asl.dylib
0x7fffd46d7000 - 0x7fffd46d7ff7 libsystem_blocks.dylib (67) <10DC5404-73AB-35B3-A277-A8AFECB476EB> /usr/lib/system/libsystem_blocks.dylib
0x7fffd46d8000 - 0x7fffd4765fef libsystem_c.dylib (1158.50.2) <E5AE5244-7D0C-36AC-8BB6-C7AE7EA52A4B> /usr/lib/system/libsystem_c.dylib
0x7fffd4766000 - 0x7fffd4769ffb libsystem_configuration.dylib (888.60.2) <BECC01A2-CA8D-31E6-BCDF-D452965FA976> /usr/lib/system/libsystem_configuration.dylib
0x7fffd476a000 - 0x7fffd476dfff libsystem_coreservices.dylib (41.4) <7D26DE79-B424-3450-85E1-F7FAB32714AB> /usr/lib/system/libsystem_coreservices.dylib
0x7fffd476e000 - 0x7fffd4786fff libsystem_coretls.dylib (121.50.4) <EC6FCF07-DCFB-3A03-9CC9-6DD3709974C6> /usr/lib/system/libsystem_coretls.dylib
0x7fffd4787000 - 0x7fffd478dfff libsystem_dnssd.dylib (765.50.9) <CC960215-0B1B-3822-A13A-3DDE96FA796F> /usr/lib/system/libsystem_dnssd.dylib
0x7fffd478e000 - 0x7fffd47b7ff7 libsystem_info.dylib (503.50.4) <611DB84C-BF70-3F92-8702-B9F28A900920> /usr/lib/system/libsystem_info.dylib
0x7fffd47b8000 - 0x7fffd47daff7 libsystem_kernel.dylib (3789.73.13) <AA3C2E69-1311-3DC3-89C2-9502F1A34E00> /usr/lib/system/libsystem_kernel.dylib
0x7fffd47db000 - 0x7fffd4822fe7 libsystem_m.dylib (3121.6) <86D499B5-BBDC-3D3B-8A4E-97AE8E6672A4> /usr/lib/system/libsystem_m.dylib
0x7fffd4823000 - 0x7fffd4841ff7 libsystem_malloc.dylib (116.50.8) <A3D15F17-99A6-3367-8C7E-4280E8619C95> /usr/lib/system/libsystem_malloc.dylib
0x7fffd4842000 - 0x7fffd489bffb libsystem_network.dylib (856.60.1) <369D0221-56CA-3C3E-9EDE-94B41CAE77B7> /usr/lib/system/libsystem_network.dylib
0x7fffd489c000 - 0x7fffd48a5ff3 libsystem_networkextension.dylib (563.60.2) <B021F2B3-8A75-3633-ABB0-FC012B8E9B0C> /usr/lib/system/libsystem_networkextension.dylib
0x7fffd48a6000 - 0x7fffd48afff3 libsystem_notify.dylib (165.20.1) <B8160190-A069-3B3A-BDF6-2AA408221FAE> /usr/lib/system/libsystem_notify.dylib
0x7fffd48b0000 - 0x7fffd48b8fe7 libsystem_platform.dylib (126.50.8) <897462FD-B318-321B-A554-E61982630F7E> /usr/lib/system/libsystem_platform.dylib
0x7fffd48b9000 - 0x7fffd48c3ff7 libsystem_pthread.dylib (218.60.3) <B8FB5E20-3295-39E2-B5EB-B464D1D4B104> /usr/lib/system/libsystem_pthread.dylib
0x7fffd48c4000 - 0x7fffd48c7ff7 libsystem_sandbox.dylib (592.70.2) <19320A42-2E3B-361B-BBDA-2F5F2E87B100> /usr/lib/system/libsystem_sandbox.dylib
0x7fffd48c8000 - 0x7fffd48c9ff3 libsystem_secinit.dylib (24.50.4) <F78B847B-3565-3E4B-98A6-F7AD40392E2D> /usr/lib/system/libsystem_secinit.dylib
0x7fffd48ca000 - 0x7fffd48d1ffb libsystem_symptoms.dylib (532.50.47) <3390E07C-C1CE-348F-ADBD-2C5440B45EAA> /usr/lib/system/libsystem_symptoms.dylib
0x7fffd48d2000 - 0x7fffd48e5ff7 libsystem_trace.dylib (518.70.1) <AC63A7FE-50D9-3A30-96E6-F6B7FF16E465> /usr/lib/system/libsystem_trace.dylib
0x7fffd48e6000 - 0x7fffd48ebffb libunwind.dylib (35.3) <3D50D8A8-C460-334D-A519-2DA841102C6B> /usr/lib/system/libunwind.dylib
0x7fffd48ec000 - 0x7fffd4915ff7 libxpc.dylib (972.70.1) <BF896DF0-D8E9-31A8-A4B3-01120BFEEE52> /usr/lib/system/libxpc.dylib
External Modification Summary:
Calls made by other processes targeting this process:
task_for_pid: 0
thread_create: 0
thread_set_state: 0
Calls made by this process:
task_for_pid: 0
thread_create: 0
thread_set_state: 0
Calls made by all processes on this machine:
task_for_pid: 6040
thread_create: 0
thread_set_state: 0
VM Region Summary:
ReadOnly portion of Libraries: Total=209.2M resident=0K(0%) swapped_out_or_unallocated=209.2M(100%)
Writable regions: Total=73.9M written=0K(0%) resident=0K(0%) swapped_out=0K(0%) unallocated=73.9M(100%)
VIRTUAL REGION
REGION TYPE SIZE COUNT (non-coalesced)
=========== ======= =======
Activity Tracing 256K 2
Kernel Alloc Once 8K 2
MALLOC 44.1M 12
MALLOC guard page 16K 4
SQLite page cache 64K 2
STACK GUARD 56.0M 3
Stack 12.0M 3
VM_ALLOCATE 17.0M 29
__DATA 6824K 129
__LINKEDIT 161.2M 60
__TEXT 48.0M 124
__UNICODE 556K 2
shared memory 12K 4
=========== ======= =======
TOTAL 345.9M 363
Model: MacBookPro11,4, BootROM MBP114.0183.B00, 4 processors, Intel Core i7, 2.8 GHz, 16 GB, SMC 2.29f24
Graphics: Intel Iris Pro, Intel Iris Pro, Built-In
Memory Module: BANK 0/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120
Memory Module: BANK 1/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120
AirPort: spairport_wireless_card_type_airport_extreme (0x14E4, 0x152), Broadcom BCM43xx 1.0 (7.21.171.133.1a2)
Bluetooth: Version 5.0.5f2, 3 services, 27 devices, 1 incoming serial ports
Network Service: Wi-Fi, AirPort, en0
PCI Card: Apple 57762-A0, Ethernet Controller, Thunderbolt@195,0,0
Serial ATA Device: APPLE SSD SM0256G, 251 GB
USB Device: USB 3.0 Bus
USB Device: USB5537B
USB Device: Apple Internal Keyboard / Trackpad
USB Device: Bluetooth USB Host Controller
USB Device: USB2137B
USB Device: U2717D_0B2A_15091601
Thunderbolt Bus: MacBook Pro, Apple Inc., 27.1
Thunderbolt Device: Thunderbolt to Gigabit Ethernet Adapter, Apple Inc., 1, 5.5
```
Migrated from https://code.icecube.wisc.edu/ticket/2167
```json
{
"status": "closed",
"changetime": "2019-02-13T14:15:18",
"description": "it happens at the `PyDateTime_IMPORT;` line of the pybindings\n\n\n{{{\nProcess: Python [4592]\nPath: /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python\nIdentifier: Python\nVersion: 2.7.10 (2.7.10)\nCode Type: X86-64 (Native)\nParent Process: bash [872]\nResponsible: Python [4592]\nUser ID: 502\n\nDate/Time: 2018-06-25 10:29:42.575 -0500\nOS Version: Mac OS X 10.12.6 (16G1408)\nReport Version: 12\nAnonymous UUID: C6AB07E7-6F3A-648C-DEDF-1A57F1E27536\n\nSleep/Wake UUID: FC76580E-32A7-4132-B601-30541F484DDB\n\nTime Awake Since Boot: 10000 seconds\nTime Since Wake: 6100 seconds\n\nSystem Integrity Protection: enabled\n\nCrashed Thread: 0 Dispatch queue: com.apple.main-thread\n\nException Type: EXC_BAD_ACCESS (SIGSEGV)\nException Codes: KERN_INVALID_ADDRESS at 0x0000000000000000\nException Note: EXC_CORPSE_NOTIFY\n\nTermination Signal: Segmentation fault: 11\nTermination Reason: Namespace SIGNAL, Code 0xb\nTerminating Process: exc handler [0]\n\nVM Regions Near 0:\n--> \n __TEXT 0000000108a12000-0000000108a14000 [ 8K] r-x/rwx SM=COW /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python\n\nThread 0 Crashed:: Dispatch queue: com.apple.main-thread\n0 ??? \t000000000000000000 0 + 0\n1 org.python.python \t0x000000010a807668 PyEval_GetGlobals + 23\n2 org.python.python \t0x000000010a81615e PyImport_Import + 32\n3 org.python.python \t0x000000010a81477b PyImport_ImportModule + 28\n4 org.python.python \t0x000000010a7924a9 PyCapsule_Import + 204\n5 dataclasses.so \t0x000000010c549df2 register_I3Time() + 34\n6 dataclasses.so \t0x000000010c9c11e9 init_module_dataclasses() + 9\n7 libboost_python27-mt.dylib \t0x000000010a4b5d78 boost::python::handle_exception_impl(boost::function0<void>) + 72\n8 libboost_python27-mt.dylib \t0x000000010a4b6dfb bool boost::python::handle_exception<void (*)()>(void (*)()) + 59\n9 libboost_python27-mt.dylib \t0x000000010a4b6cd4 boost::python::detail::init_module(char const*, void (*)()) + 84\n10 org.python.python \t0x0000000108ab3130 _PyImport_LoadDynamicModule + 140\n11 org.python.python \t0x0000000108ab2f6a 0x108a18000 + 634730\n12 org.python.python \t0x0000000108a9e4d4 PyEval_EvalFrameEx + 14624\n13 org.python.python \t0x0000000108aa1475 0x108a18000 + 562293\n14 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n15 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n16 org.python.python \t0x0000000108a9a367 PyEval_EvalCode + 48\n17 org.python.python \t0x0000000108aaf6bd PyImport_ExecCodeModuleEx + 241\n18 org.python.python \t0x0000000108ab23c7 0x108a18000 + 631751\n19 org.python.python \t0x0000000108ab264f 0x108a18000 + 632399\n20 org.python.python \t0x0000000108ab1e2c 0x108a18000 + 630316\n21 org.python.python \t0x0000000108ab1c62 0x108a18000 + 629858\n22 org.python.python \t0x0000000108ab0cac PyImport_ImportModuleLevel + 1341\n23 org.python.python \t0x0000000108a96006 0x108a18000 + 516102\n24 org.python.python \t0x0000000108a226fb PyObject_Call + 99\n25 org.python.python \t0x0000000108aa0dbb PyEval_CallObjectWithKeywords + 165\n26 org.python.python \t0x0000000108a9cc0f PyEval_EvalFrameEx + 8283\n27 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n28 org.python.python \t0x0000000108a9f0c0 PyEval_EvalFrameEx + 17676\n29 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n30 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n31 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n32 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n33 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n34 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n35 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n36 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n37 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n38 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n39 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n40 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n41 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n42 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n43 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n44 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n45 org.python.python \t0x0000000108a404d1 0x108a18000 + 165073\n46 org.python.python \t0x0000000108a226fb PyObject_Call + 99\n47 org.python.python \t0x0000000108a9dfe5 PyEval_EvalFrameEx + 13361\n48 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n49 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n50 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n51 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n52 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n53 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n54 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n55 org.python.python \t0x0000000108a404d1 0x108a18000 + 165073\n56 org.python.python \t0x0000000108a226fb PyObject_Call + 99\n57 org.python.python \t0x0000000108a9dfe5 PyEval_EvalFrameEx + 13361\n58 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n59 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n60 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n61 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n62 org.python.python \t0x0000000108a9a367 PyEval_EvalCode + 48\n63 org.python.python \t0x0000000108aba5dd 0x108a18000 + 665053\n64 org.python.python \t0x0000000108aba680 PyRun_FileExFlags + 133\n65 org.python.python \t0x0000000108aba1d1 PyRun_SimpleFileExFlags + 702\n66 org.python.python \t0x0000000108acbb6a Py_Main + 3094\n67 libdyld.dylib \t0x00007fffd46a3235 start + 1\n\nThread 1:\n0 libsystem_kernel.dylib \t0x00007fffd47d1bf2 __psynch_cvwait + 10\n1 libsystem_pthread.dylib \t0x00007fffd48bd7fa _pthread_cond_wait + 712\n2 org.python.python \t0x0000000108ac9d27 PyThread_acquire_lock + 101\n3 org.python.python \t0x0000000108acdf02 0x108a18000 + 745218\n4 org.python.python \t0x0000000108a9e4d4 PyEval_EvalFrameEx + 14624\n5 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n6 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n7 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n8 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n9 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n10 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n11 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n12 org.python.python \t0x0000000108a404d1 0x108a18000 + 165073\n13 org.python.python \t0x0000000108a226fb PyObject_Call + 99\n14 org.python.python \t0x0000000108a9dfe5 PyEval_EvalFrameEx + 13361\n15 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n16 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n17 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n18 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n19 org.python.python \t0x0000000108aa13e2 0x108a18000 + 562146\n20 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n21 org.python.python \t0x0000000108aa1475 0x108a18000 + 562293\n22 org.python.python \t0x0000000108a9de4e PyEval_EvalFrameEx + 12954\n23 org.python.python \t0x0000000108a9a9be PyEval_EvalCodeEx + 1617\n24 org.python.python \t0x0000000108a404d1 0x108a18000 + 165073\n25 org.python.python \t0x0000000108a226fb PyObject_Call + 99\n26 org.python.python \t0x0000000108a2d3ac 0x108a18000 + 86956\n27 org.python.python \t0x0000000108a226fb PyObject_Call + 99\n28 org.python.python \t0x0000000108aa0dbb PyEval_CallObjectWithKeywords + 165\n29 org.python.python \t0x0000000108acdd4e 0x108a18000 + 744782\n30 libsystem_pthread.dylib \t0x00007fffd48bc93b _pthread_body + 180\n31 libsystem_pthread.dylib \t0x00007fffd48bc887 _pthread_start + 286\n32 libsystem_pthread.dylib \t0x00007fffd48bc08d thread_start + 13\n\nThread 0 crashed with X86 Thread State (64-bit):\n rax: 0x000000010a8cb570 rbx: 0x000000010e961030 rcx: 0x6c132e1d26bc00d7 rdx: 0x0000000000000000\n rdi: 0x0000000000000000 rsi: 0x000000010a84ae04 rbp: 0x00007fff571ea820 rsp: 0x00007fff571ea818\n r8: 0x0000000000000006 r9: 0x00007f99fc422580 r10: 0x0000000000001002 r11: 0x00000000041162e0\n r12: 0x00007f99fc44a5c9 r13: 0x0000000000000000 r14: 0x000000010e961030 r15: 0x0000000000000000\n rip: 0x0000000000000000 rfl: 0x0000000000010206 cr2: 0x0000000000000000\n \nLogical CPU: 4\nError Code: 0x00000014\nTrap Number: 14\n\n\nBinary Images:\n 0x108a12000 - 0x108a13fff org.python.python (2.7.10 - 2.7.10) <FDF4A2EF-05B5-37B9-8624-045A152B6DB7> /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python\n 0x108a18000 - 0x108b09ff7 org.python.python (2.7.10 - 2.7.10) <BDCDC395-7F55-3DF4-819B-7719E69BCBD9> /System/Library/Frameworks/Python.framework/Versions/2.7/Python\n 0x108cd6000 - 0x108cd7fff _locale.so (97.50.7) <16EECFD3-0814-3B9C-8CF5-D82DB670AE7F> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_locale.so\n 0x108d5c000 - 0x108d5dffb time.so (97.50.7) <9094E95E-EA50-30DF-A250-6003D2EDEFD5> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/time.so\n 0x108d64000 - 0x108d65fff cStringIO.so (97.50.7) <FBA2E408-33F8-3506-AD37-1B356A6F787D> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/cStringIO.so\n 0x108dab000 - 0x108dadff7 _collections.so (97.50.7) <1DDC550E-8ACD-3E34-B9AA-2F2575D5085E> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_collections.so\n 0x108db4000 - 0x108db7fff operator.so (97.50.7) <CA736B38-65D4-37D9-AAE8-04D697531142> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/operator.so\n 0x108dbe000 - 0x108dc2fff itertools.so (97.50.7) <3AFFF65F-D249-3EC2-8F6E-ED970FF199D6> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/itertools.so\n 0x108dcc000 - 0x108dcdfff _heapq.so (97.50.7) <E4FC7F34-E74C-3D8E-9474-BAC1648A7E5C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_heapq.so\n 0x108dd3000 - 0x108dd3fff grp.so (97.50.7) <7CB7F994-D049-3D83-A295-D1389785A691> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/grp.so\n 0x108e18000 - 0x108e19fff _functools.so (97.50.7) <4A63F438-0EDC-36E2-963C-C93D38C662A2> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_functools.so\n 0x108e5e000 - 0x108e61fff strop.so (97.50.7) <F5AAE1C3-EFC0-3991-893C-B4CA54894A6C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/strop.so\n 0x108fa7000 - 0x108faaffb _struct.so (97.50.7) <EF8EE29B-C0A0-32BF-AA30-ADEBEAD8EEF4> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_struct.so\n 0x108ff1000 - 0x108ff5ff3 _json.so (97.50.7) <F424F15C-E08B-3DD3-B1FC-623159BC7F7C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_json.so\n 0x108ffb000 - 0x108ffdff3 binascii.so (97.50.7) <86E49B82-5582-347E-92EB-B107F70BBB49> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/binascii.so\n 0x109082000 - 0x109085ff7 math.so (97.50.7) <5A58C237-99FB-3CA3-BCB9-E6F150CE96BF> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/math.so\n 0x10908c000 - 0x10908dfff _hashlib.so (97.50.7) <6B04CCCA-D1B8-32F0-BF9A-C7FE22356617> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_hashlib.so\n 0x109093000 - 0x109094fff _random.so (97.50.7) <2837E6D6-86F4-3ED6-AA29-F0D11DC73F85> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_random.so\n 0x109119000 - 0x109128ffb _io.so (97.50.7) <092C0207-64D8-3BAD-BE0F-427C8FC6EE06> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_io.so\n 0x1091ba000 - 0x1091bcffb select.so (97.50.7) <E5838201-45EA-35C7-AB30-90D7CEFB08A0> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/select.so\n 0x1091c3000 - 0x1091c4fff fcntl.so (97.50.7) <E1CEBE57-DB25-30FE-9C7C-56DD717D188E> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/fcntl.so\n 0x1091c9000 - 0x1091cafff termios.so (97.50.7) <51D1C82A-E5E4-3008-B02E-BFCCCB878BE2> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/termios.so\n 0x1091d0000 - 0x1091d1ffb resource.so (97.50.7) <576E890B-3F89-3847-8E6B-998855EA43A2> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/resource.so\n 0x109216000 - 0x109224ffb _ctypes.so (97.50.7) <5E1FA7E6-2A2F-304F-9344-3BA03463DA86> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_ctypes.so\n 0x1092b1000 - 0x1092b8fff _socket.so (97.50.7) <076AA6AE-10D1-3033-9BF9-EC53ACF9B0E8> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_socket.so\n 0x1092c3000 - 0x1092ccfff _ssl.so (97.50.7) <BA546970-1B58-336A-86CC-C58C34F35668> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_ssl.so\n 0x109358000 - 0x109358fff _scproxy.so (97.50.7) <F577CB62-2192-39A3-8341-923EEA55DF9D> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_scproxy.so\n 0x10935d000 - 0x10935eff3 +_scandir.so (0) <5A4A4D1E-9EA8-3B33-B580-770EC7654967> /Users/USER/Library/Python/2.7/lib/python/site-packages/_scandir.so\n 0x1093a2000 - 0x1093abff3 datetime.so (97.50.7) <EC351EC8-FBC7-33E9-B5D1-DA9D614D1648> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/datetime.so\n 0x1094b5000 - 0x1094c0ffb cPickle.so (97.50.7) <C1F3E5FC-D920-3896-B393-5B89A265376C> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/cPickle.so\n 0x109547000 - 0x10954fffb _sqlite3.so (97.50.7) <07AEFDDB-86F7-30F7-9D9E-AC0F9EEA9198> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_sqlite3.so\n 0x10961a000 - 0x10961afff _bisect.so (97.50.7) <C7356EA2-77CF-34A0-8FC8-7F87074E8CF8> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_bisect.so\n 0x1097df000 - 0x1097e3fff array.so (97.50.7) <8F606B8E-0AA2-3FF9-97F5-57DE3DD63C33> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/array.so\n 0x1097ea000 - 0x10988eff3 unicodedata.so (97.50.7) <3906B514-5FFD-31E5-9D64-3004EBFA0EC3> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/unicodedata.so\n 0x109956000 - 0x109957ffb _lsprof.so (97.50.7) <750C5676-166E-376C-905A-351811B326F5> /System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/lib-dynload/_lsprof.so\n 0x109cac000 - 0x109cb3fff +icetray.so (0) <36456467-7620-3952-B70E-15789244F30F> /Users/USER/*/icetray.so\n 0x109cbd000 - 0x109f88ff7 +libicetray.dylib (0) <515E3C78-73A7-3D30-B3C6-861101C8BFE0> /Users/USER/*/libicetray.dylib\n 0x10a49e000 - 0x10a4ccfff +libboost_python27-mt.dylib (0) <D74B7B4E-4730-3E9F-9193-D24A1002C6FC> /usr/local/opt/boost-python/lib/libboost_python27-mt.dylib\n 0x10a508000 - 0x10a50affb +libboost_system-mt.dylib (0) <D62AB9A1-52C7-390F-84B2-9D37E487E86E> /usr/local/opt/boost/lib/libboost_system-mt.dylib\n 0x10a50f000 - 0x10a51afff +libboost_signals-mt.dylib (0) <9048E894-CB19-3732-9F8C-14F73E566801> /usr/local/opt/boost/lib/libboost_signals-mt.dylib\n 0x10a52e000 - 0x10a53bfff +libboost_thread-mt.dylib (0) <A9472435-3E86-3669-B6BF-EF8BBF614B71> /usr/local/opt/boost/lib/libboost_thread-mt.dylib\n 0x10a557000 - 0x10a55bfff +libboost_date_time-mt.dylib (0) <6DC43739-E3E8-3EE4-B3BB-FC04903A0622> /usr/local/opt/boost/lib/libboost_date_time-mt.dylib\n 0x10a569000 - 0x10a578ff7 +libboost_filesystem-mt.dylib (0) <6F693033-FF11-35E9-90F8-C87B5623A6DD> /usr/local/opt/boost/lib/libboost_filesystem-mt.dylib\n 0x10a58b000 - 0x10a5bdfff +libboost_program_options-mt.dylib (0) <E7A97BA1-7040-3033-8310-F34A6658311B> /usr/local/opt/boost/lib/libboost_program_options-mt.dylib\n 0x10a617000 - 0x10a6bdfff +libboost_regex-mt.dylib (0) <9CEE3EFE-F1BA-35D9-A686-49E92EFAEA54> /usr/local/opt/boost/lib/libboost_regex-mt.dylib\n 0x10a74c000 - 0x10a757ff7 +libboost_iostreams-mt.dylib (0) <3B6518B4-7968-34D4-B93A-EA200E2CB6BB> /usr/local/opt/boost/lib/libboost_iostreams-mt.dylib\n 0x10a772000 - 0x10a775ff7 +libboost_chrono-mt.dylib (0) <2843F685-E64E-34E8-A1DF-9C0655E9E902> /usr/local/opt/boost/lib/libboost_chrono-mt.dylib\n 0x10a77c000 - 0x10a77dfff +libboost_atomic-mt.dylib (0) <E8A79FBA-BA08-326F-8C85-1CB888629895> /usr/local/opt/boost/lib/libboost_atomic-mt.dylib\n 0x10a780000 - 0x10a871fff +org.python.python (2.7.15, [c] 2001-2018 Python Software Foundation. - 2.7.15) <9AF9FD73-6537-3A67-B191-7B75D9BCF980> /usr/local/opt/python@2/Frameworks/Python.framework/Versions/2.7/Python\n 0x10a905000 - 0x10a980fff +libarchive.13.dylib (0) <2B88C81E-AD82-366F-9CCB-8C88FF42F9AB> /usr/local/opt/libarchive/lib/libarchive.13.dylib\n 0x10a999000 - 0x10a9c3ff7 +libserialization.dylib (0) <86BB0348-F166-3FA1-A099-7E70AB9BD2CB> /Users/USER/*/libserialization.dylib\n 0x10aa08000 - 0x10aa73ff3 +libzstd.1.dylib (0) <FF6884E3-F4E4-3B75-B67A-A82831A87F80> /usr/local/opt/zstd/lib/libzstd.1.dylib\n 0x10aa7f000 - 0x10aa98fff libexpat.1.dylib (15.1) <588CA992-60BB-363B-BEE7-3CC0A26C1AFA> /usr/lib/libexpat.1.dylib\n 0x10aaa2000 - 0x10aabdfff +liblzma.5.dylib (0) <12A41495-97BA-35A4-97E7-22DBF7CF6D47> /usr/local/opt/xz/lib/liblzma.5.dylib\n 0x10afc3000 - 0x10afc3fff +_speedups.so (0) <A78A2094-6736-3F77-BD9F-F071383DDBF0> /Users/USER/Library/Python/2.7/lib/python/site-packages/markupsafe/_speedups.so\n 0x10b0c6000 - 0x10b51cffb +libdataclasses.dylib (0) <854B5114-AF18-3C78-B4F1-487C493E8FEB> /Users/USER/*/libdataclasses.dylib\n 0x10c1fe000 - 0x10cd0cff7 +dataclasses.so (0) <515727AF-958B-3490-9BDB-7C90DF291361> /Users/USER/*/dataclasses.so\n 0x117cbd000 - 0x117cfadc7 dyld (433.5) <322C06B7-8878-311D-888C-C8FD2CA96FF3> /usr/lib/dyld\n 0x7fffbee8e000 - 0x7fffbf327ff7 com.apple.CoreFoundation (6.9 - 1349.92) <6D0D0311-7C61-3313-BC55-22B7E876BEFA> /System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation\n 0x7fffc0e6d000 - 0x7fffc0f03ff7 com.apple.framework.IOKit (2.0.2 - 1324.60.4) <454036AD-86AA-3ABB-8C53-B5F654A6824D> /System/Library/Frameworks/IOKit.framework/Versions/A/IOKit\n 0x7fffc519c000 - 0x7fffc549efff com.apple.security (7.0 - 57740.60.23) <9F23DF40-1A2F-3177-8DCE-FBC4F8F43BAF> /System/Library/Frameworks/Security.framework/Versions/A/Security\n 0x7fffc58c9000 - 0x7fffc5938ff7 com.apple.SystemConfiguration (1.14 - 1.14) <A4A350BA-23F1-3D44-9770-84D549D1D74B> /System/Library/Frameworks/SystemConfiguration.framework/Versions/A/SystemConfiguration\n 0x7fffd1b68000 - 0x7fffd1b69fff com.apple.TrustEvaluationAgent (2.0 - 28.50.1) <EBE65DD5-1732-3747-8C6C-7BECEBF089A4> /System/Library/PrivateFrameworks/TrustEvaluationAgent.framework/Versions/A/TrustEvaluationAgent\n 0x7fffd2ebb000 - 0x7fffd2ebcff3 libDiagnosticMessagesClient.dylib (102) <84A04D24-0E60-3810-A8C0-90A65E2DF61A> /usr/lib/libDiagnosticMessagesClient.dylib\n 0x7fffd30f4000 - 0x7fffd30f4fff libOpenScriptingUtil.dylib (172.1) <0F1BA407-97D1-36F6-882D-A355EAAD5E00> /usr/lib/libOpenScriptingUtil.dylib\n 0x7fffd30fa000 - 0x7fffd30fbffb libSystem.B.dylib (1238.60.2) <45C5C363-67A0-308C-8D35-A4DF23069A9F> /usr/lib/libSystem.B.dylib\n 0x7fffd3213000 - 0x7fffd3213ff3 libauto.dylib (187) <34388D0B-C539-3C1B-9408-2BC152162E43> /usr/lib/libauto.dylib\n 0x7fffd3214000 - 0x7fffd3224ff3 libbsm.0.dylib (34) <20084796-B04D-3B35-A003-EA11459557A9> /usr/lib/libbsm.0.dylib\n 0x7fffd3225000 - 0x7fffd3233ff7 libbz2.1.0.dylib (38) <ADFA329A-DCE7-356D-8F09-A3168DFC6610> /usr/lib/libbz2.1.0.dylib\n 0x7fffd3234000 - 0x7fffd328aff7 libc++.1.dylib (307.5) <0B43BB5D-E6EB-3464-8DE9-B41AC8ED9D1C> /usr/lib/libc++.1.dylib\n 0x7fffd328b000 - 0x7fffd32b4ff7 libc++abi.dylib (307.4) <BC271AD3-831B-362A-9DA7-E8C51F285FE4> /usr/lib/libc++abi.dylib\n 0x7fffd32dd000 - 0x7fffd32ddff7 libcoretls.dylib (121.50.4) <64B1001E-10F6-3542-A3B2-C4B49F51817F> /usr/lib/libcoretls.dylib\n 0x7fffd32de000 - 0x7fffd32dfff3 libcoretls_cfhelpers.dylib (121.50.4) <1A10303E-5EB0-3C7C-9165-021FCDFD934D> /usr/lib/libcoretls_cfhelpers.dylib\n 0x7fffd3399000 - 0x7fffd347dff7 libcrypto.0.9.8.dylib (64.50.7) <B34BC0FA-18ED-37C5-9D46-393803CADEBB> /usr/lib/libcrypto.0.9.8.dylib\n 0x7fffd36eb000 - 0x7fffd36ebfff libenergytrace.dylib (15) <A1B040A2-7977-3097-9ADF-34FF181EB970> /usr/lib/libenergytrace.dylib\n 0x7fffd36f9000 - 0x7fffd36fafff libffi.dylib (18.1) <49D03682-E111-351C-8266-4519B3B82BE9> /usr/lib/libffi.dylib\n 0x7fffd3701000 - 0x7fffd37f3ff7 libiconv.2.dylib (50) <42125B35-81D7-3FC4-9475-A26DBE10884D> /usr/lib/libiconv.2.dylib\n 0x7fffd37f4000 - 0x7fffd3a19ffb libicucore.A.dylib (57167.0.1) <E720801C-2D92-3108-B853-469551EDF21F> /usr/lib/libicucore.A.dylib\n 0x7fffd3a21000 - 0x7fffd3a3affb liblzma.5.dylib (10) <44BD0279-99DD-36B5-8A6E-C11432E2098D> /usr/lib/liblzma.5.dylib\n 0x7fffd3d2d000 - 0x7fffd3da7ff3 libnetwork.dylib (856.60.1) <191E99F5-4723-3180-8013-02AF2F9AE4B8> /usr/lib/libnetwork.dylib\n 0x7fffd3da8000 - 0x7fffd417a047 libobjc.A.dylib (709.1) <70614861-0340-32E2-85ED-FE65759CDFFA> /usr/lib/libobjc.A.dylib\n 0x7fffd417d000 - 0x7fffd4181fff libpam.2.dylib (21.30.1) <71EB0D88-DE84-3C8D-A2C5-58AA282BC5BC> /usr/lib/libpam.2.dylib\n 0x7fffd4182000 - 0x7fffd41b3fff libpcap.A.dylib (67.60.2) <B2D36AD8-D5C8-3875-AC81-4787A15E44C2> /usr/lib/libpcap.A.dylib\n 0x7fffd423c000 - 0x7fffd438aff7 libsqlite3.dylib (254.8) <1ECF7DF7-7A07-3B4B-A63B-F4EFF6BC7ACF> /usr/lib/libsqlite3.dylib\n 0x7fffd43ad000 - 0x7fffd43e5ff3 libssl.0.9.8.dylib (64.50.7) <3B6EAD4B-F7FA-369C-AB54-755B08219D2A> /usr/lib/libssl.0.9.8.dylib\n 0x7fffd447f000 - 0x7fffd448cfff libxar.1.dylib (357) <69547C64-E811-326F-BBED-490C6361BDCB> /usr/lib/libxar.1.dylib\n 0x7fffd448d000 - 0x7fffd457cff3 libxml2.2.dylib (30.20) <40B1027A-43B6-38EC-9EB9-9E7871E98CBC> /usr/lib/libxml2.2.dylib\n 0x7fffd45a7000 - 0x7fffd45b8ff3 libz.1.dylib (67) <46E3FFA2-4328-327A-8D34-A03E20BFFB8E> /usr/lib/libz.1.dylib\n 0x7fffd45c7000 - 0x7fffd45cbff7 libcache.dylib (79) <093A4DAB-8385-3D47-A350-E20CB7CCF7BF> /usr/lib/system/libcache.dylib\n 0x7fffd45cc000 - 0x7fffd45d6fff libcommonCrypto.dylib (60092.50.5) <8A64D1B0-C70E-385C-92F0-E669079FDA90> /usr/lib/system/libcommonCrypto.dylib\n 0x7fffd45d7000 - 0x7fffd45defff libcompiler_rt.dylib (62) <55D47421-772A-32AB-B529-1A46C2F43B4D> /usr/lib/system/libcompiler_rt.dylib\n 0x7fffd45df000 - 0x7fffd45e7fff libcopyfile.dylib (138) <819BEA3C-DF11-3E3D-A1A1-5A51C5BF1961> /usr/lib/system/libcopyfile.dylib\n 0x7fffd45e8000 - 0x7fffd466bfdf libcorecrypto.dylib (442.50.19) <65D7165E-2E71-335D-A2D6-33F78E2DF0C1> /usr/lib/system/libcorecrypto.dylib\n 0x7fffd466c000 - 0x7fffd469dfff libdispatch.dylib (703.50.37) <6582BAD6-ED27-3B30-B620-90B1C5A4AE3C> /usr/lib/system/libdispatch.dylib\n 0x7fffd469e000 - 0x7fffd46a3ffb libdyld.dylib (433.5) <E7268165-BE34-35CA-8488-BCD4D71C7EBC> /usr/lib/system/libdyld.dylib\n 0x7fffd46a4000 - 0x7fffd46a4ffb libkeymgr.dylib (28) <7AA011A9-DC21-3488-BF73-3B5B14D1FDD6> /usr/lib/system/libkeymgr.dylib\n 0x7fffd46a5000 - 0x7fffd46b1fff libkxld.dylib (3789.73.13) <9A739C49-DD82-3B7F-AF41-60395C1AE071> /usr/lib/system/libkxld.dylib\n 0x7fffd46b2000 - 0x7fffd46b2fff liblaunch.dylib (972.70.1) <B856ABD2-896E-3DE0-B2C8-146A6AF8E2A7> /usr/lib/system/liblaunch.dylib\n 0x7fffd46b3000 - 0x7fffd46b8ff3 libmacho.dylib (898) <17D5D855-F6C3-3B04-B680-E9BF02EF8AED> /usr/lib/system/libmacho.dylib\n 0x7fffd46b9000 - 0x7fffd46bbff3 libquarantine.dylib (85.50.1) <12448CC2-378E-35F3-BE33-9DC395A5B970> /usr/lib/system/libquarantine.dylib\n 0x7fffd46bc000 - 0x7fffd46bdffb libremovefile.dylib (45) <38D4CB9C-10CD-30D3-8B7B-A515EC75FE85> /usr/lib/system/libremovefile.dylib\n 0x7fffd46be000 - 0x7fffd46d6ff7 libsystem_asl.dylib (349.50.5) <096E4228-3B7C-30A6-8B13-EC909A64499A> /usr/lib/system/libsystem_asl.dylib\n 0x7fffd46d7000 - 0x7fffd46d7ff7 libsystem_blocks.dylib (67) <10DC5404-73AB-35B3-A277-A8AFECB476EB> /usr/lib/system/libsystem_blocks.dylib\n 0x7fffd46d8000 - 0x7fffd4765fef libsystem_c.dylib (1158.50.2) <E5AE5244-7D0C-36AC-8BB6-C7AE7EA52A4B> /usr/lib/system/libsystem_c.dylib\n 0x7fffd4766000 - 0x7fffd4769ffb libsystem_configuration.dylib (888.60.2) <BECC01A2-CA8D-31E6-BCDF-D452965FA976> /usr/lib/system/libsystem_configuration.dylib\n 0x7fffd476a000 - 0x7fffd476dfff libsystem_coreservices.dylib (41.4) <7D26DE79-B424-3450-85E1-F7FAB32714AB> /usr/lib/system/libsystem_coreservices.dylib\n 0x7fffd476e000 - 0x7fffd4786fff libsystem_coretls.dylib (121.50.4) <EC6FCF07-DCFB-3A03-9CC9-6DD3709974C6> /usr/lib/system/libsystem_coretls.dylib\n 0x7fffd4787000 - 0x7fffd478dfff libsystem_dnssd.dylib (765.50.9) <CC960215-0B1B-3822-A13A-3DDE96FA796F> /usr/lib/system/libsystem_dnssd.dylib\n 0x7fffd478e000 - 0x7fffd47b7ff7 libsystem_info.dylib (503.50.4) <611DB84C-BF70-3F92-8702-B9F28A900920> /usr/lib/system/libsystem_info.dylib\n 0x7fffd47b8000 - 0x7fffd47daff7 libsystem_kernel.dylib (3789.73.13) <AA3C2E69-1311-3DC3-89C2-9502F1A34E00> /usr/lib/system/libsystem_kernel.dylib\n 0x7fffd47db000 - 0x7fffd4822fe7 libsystem_m.dylib (3121.6) <86D499B5-BBDC-3D3B-8A4E-97AE8E6672A4> /usr/lib/system/libsystem_m.dylib\n 0x7fffd4823000 - 0x7fffd4841ff7 libsystem_malloc.dylib (116.50.8) <A3D15F17-99A6-3367-8C7E-4280E8619C95> /usr/lib/system/libsystem_malloc.dylib\n 0x7fffd4842000 - 0x7fffd489bffb libsystem_network.dylib (856.60.1) <369D0221-56CA-3C3E-9EDE-94B41CAE77B7> /usr/lib/system/libsystem_network.dylib\n 0x7fffd489c000 - 0x7fffd48a5ff3 libsystem_networkextension.dylib (563.60.2) <B021F2B3-8A75-3633-ABB0-FC012B8E9B0C> /usr/lib/system/libsystem_networkextension.dylib\n 0x7fffd48a6000 - 0x7fffd48afff3 libsystem_notify.dylib (165.20.1) <B8160190-A069-3B3A-BDF6-2AA408221FAE> /usr/lib/system/libsystem_notify.dylib\n 0x7fffd48b0000 - 0x7fffd48b8fe7 libsystem_platform.dylib (126.50.8) <897462FD-B318-321B-A554-E61982630F7E> /usr/lib/system/libsystem_platform.dylib\n 0x7fffd48b9000 - 0x7fffd48c3ff7 libsystem_pthread.dylib (218.60.3) <B8FB5E20-3295-39E2-B5EB-B464D1D4B104> /usr/lib/system/libsystem_pthread.dylib\n 0x7fffd48c4000 - 0x7fffd48c7ff7 libsystem_sandbox.dylib (592.70.2) <19320A42-2E3B-361B-BBDA-2F5F2E87B100> /usr/lib/system/libsystem_sandbox.dylib\n 0x7fffd48c8000 - 0x7fffd48c9ff3 libsystem_secinit.dylib (24.50.4) <F78B847B-3565-3E4B-98A6-F7AD40392E2D> /usr/lib/system/libsystem_secinit.dylib\n 0x7fffd48ca000 - 0x7fffd48d1ffb libsystem_symptoms.dylib (532.50.47) <3390E07C-C1CE-348F-ADBD-2C5440B45EAA> /usr/lib/system/libsystem_symptoms.dylib\n 0x7fffd48d2000 - 0x7fffd48e5ff7 libsystem_trace.dylib (518.70.1) <AC63A7FE-50D9-3A30-96E6-F6B7FF16E465> /usr/lib/system/libsystem_trace.dylib\n 0x7fffd48e6000 - 0x7fffd48ebffb libunwind.dylib (35.3) <3D50D8A8-C460-334D-A519-2DA841102C6B> /usr/lib/system/libunwind.dylib\n 0x7fffd48ec000 - 0x7fffd4915ff7 libxpc.dylib (972.70.1) <BF896DF0-D8E9-31A8-A4B3-01120BFEEE52> /usr/lib/system/libxpc.dylib\n\nExternal Modification Summary:\n Calls made by other processes targeting this process:\n task_for_pid: 0\n thread_create: 0\n thread_set_state: 0\n Calls made by this process:\n task_for_pid: 0\n thread_create: 0\n thread_set_state: 0\n Calls made by all processes on this machine:\n task_for_pid: 6040\n thread_create: 0\n thread_set_state: 0\n\nVM Region Summary:\nReadOnly portion of Libraries: Total=209.2M resident=0K(0%) swapped_out_or_unallocated=209.2M(100%)\nWritable regions: Total=73.9M written=0K(0%) resident=0K(0%) swapped_out=0K(0%) unallocated=73.9M(100%)\n \n VIRTUAL REGION \nREGION TYPE SIZE COUNT (non-coalesced) \n=========== ======= ======= \nActivity Tracing 256K 2 \nKernel Alloc Once 8K 2 \nMALLOC 44.1M 12 \nMALLOC guard page 16K 4 \nSQLite page cache 64K 2 \nSTACK GUARD 56.0M 3 \nStack 12.0M 3 \nVM_ALLOCATE 17.0M 29 \n__DATA 6824K 129 \n__LINKEDIT 161.2M 60 \n__TEXT 48.0M 124 \n__UNICODE 556K 2 \nshared memory 12K 4 \n=========== ======= ======= \nTOTAL 345.9M 363 \n\nModel: MacBookPro11,4, BootROM MBP114.0183.B00, 4 processors, Intel Core i7, 2.8 GHz, 16 GB, SMC 2.29f24\nGraphics: Intel Iris Pro, Intel Iris Pro, Built-In\nMemory Module: BANK 0/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120\nMemory Module: BANK 1/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120\nAirPort: spairport_wireless_card_type_airport_extreme (0x14E4, 0x152), Broadcom BCM43xx 1.0 (7.21.171.133.1a2)\nBluetooth: Version 5.0.5f2, 3 services, 27 devices, 1 incoming serial ports\nNetwork Service: Wi-Fi, AirPort, en0\nPCI Card: Apple 57762-A0, Ethernet Controller, Thunderbolt@195,0,0\nSerial ATA Device: APPLE SSD SM0256G, 251 GB\nUSB Device: USB 3.0 Bus\nUSB Device: USB5537B\nUSB Device: Apple Internal Keyboard / Trackpad\nUSB Device: Bluetooth USB Host Controller\nUSB Device: USB2137B\nUSB Device: U2717D_0B2A_15091601\nThunderbolt Bus: MacBook Pro, Apple Inc., 27.1\nThunderbolt Device: Thunderbolt to Gigabit Ethernet Adapter, Apple Inc., 1, 5.5\n\n}}}\n",
"reporter": "kjmeagher",
"cc": "",
"resolution": "invalid",
"_ts": "1550067318169976",
"component": "combo core",
"summary": "[dataclasses] I3Time pybindings segfault on Sierra",
"priority": "normal",
"keywords": "",
"time": "2018-06-25T15:32:21",
"milestone": "",
"owner": "kjmeagher",
"type": "defect"
}
```
| defect | pybindings segfault on sierra trac it happens at the pydatetime import line of the pybindings text process python path system library frameworks python framework versions resources python app contents macos python identifier python version code type native parent process bash responsible python user id date time os version mac os x report version anonymous uuid dedf sleep wake uuid time awake since boot seconds time since wake seconds system integrity protection enabled crashed thread dispatch queue com apple main thread exception type exc bad access sigsegv exception codes kern invalid address at exception note exc corpse notify termination signal segmentation fault termination reason namespace signal code terminating process exc handler vm regions near text r x rwx sm cow system library frameworks python framework versions resources python app contents macos python thread crashed dispatch queue com apple main thread org python python pyeval getglobals org python python pyimport import org python python pyimport importmodule org python python pycapsule import dataclasses so register dataclasses so init module dataclasses libboost mt dylib boost python handle exception impl boost libboost mt dylib bool boost python handle exception void libboost mt dylib boost python detail init module char const void org python python pyimport loaddynamicmodule org python python org python python pyeval evalframeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python pyeval evalcode org python python pyimport execcodemoduleex org python python org python python org python python org python python org python python pyimport importmodulelevel org python python org python python pyobject call org python python pyeval callobjectwithkeywords org python python pyeval evalframeex org python python pyeval evalcodeex org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyobject call org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyobject call org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python pyeval evalcode org python python org python python pyrun fileexflags org python python pyrun simplefileexflags org python python py main libdyld dylib start thread libsystem kernel dylib psynch cvwait libsystem pthread dylib pthread cond wait org python python pythread acquire lock org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyobject call org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyobject call org python python org python python pyobject call org python python pyeval callobjectwithkeywords org python python libsystem pthread dylib pthread body libsystem pthread dylib pthread start libsystem pthread dylib thread start thread crashed with thread state bit rax rbx rcx rdx rdi rsi rbp rsp rip rfl logical cpu error code trap number binary images org python python system library frameworks python framework versions resources python app contents macos python org python python system library frameworks python framework versions python locale so system library frameworks python framework versions lib lib dynload locale so time so system library frameworks python framework versions lib lib dynload time so cstringio so system library frameworks python framework versions lib lib dynload cstringio so collections so system library frameworks python framework versions lib lib dynload collections so operator so system library frameworks python framework versions lib lib dynload operator so itertools so system library frameworks python framework versions lib lib dynload itertools so heapq so system library frameworks python framework versions lib lib dynload heapq so grp so system library frameworks python framework versions lib lib dynload grp so functools so system library frameworks python framework versions lib lib dynload functools so strop so system library frameworks python framework versions lib lib dynload strop so struct so system library frameworks python framework versions lib lib dynload struct so json so system library frameworks python framework versions lib lib dynload json so binascii so system library frameworks python framework versions lib lib dynload binascii so math so system library frameworks python framework versions lib lib dynload math so hashlib so system library frameworks python framework versions lib lib dynload hashlib so random so system library frameworks python framework versions lib lib dynload random so io so system library frameworks python framework versions lib lib dynload io so select so system library frameworks python framework versions lib lib dynload select so fcntl so system library frameworks python framework versions lib lib dynload fcntl so termios so system library frameworks python framework versions lib lib dynload termios so resource so system library frameworks python framework versions lib lib dynload resource so ctypes so system library frameworks python framework versions lib lib dynload ctypes so socket so system library frameworks python framework versions lib lib dynload socket so ssl so system library frameworks python framework versions lib lib dynload ssl so scproxy so system library frameworks python framework versions lib lib dynload scproxy so scandir so users user library python lib python site packages scandir so datetime so system library frameworks python framework versions lib lib dynload datetime so cpickle so system library frameworks python framework versions lib lib dynload cpickle so so system library frameworks python framework versions lib lib dynload so bisect so system library frameworks python framework versions lib lib dynload bisect so array so system library frameworks python framework versions lib lib dynload array so unicodedata so system library frameworks python framework versions lib lib dynload unicodedata so lsprof so system library frameworks python framework versions lib lib dynload lsprof so icetray so users user icetray so libicetray dylib users user libicetray dylib libboost mt dylib usr local opt boost python lib libboost mt dylib libboost system mt dylib usr local opt boost lib libboost system mt dylib libboost signals mt dylib usr local opt boost lib libboost signals mt dylib libboost thread mt dylib usr local opt boost lib libboost thread mt dylib libboost date time mt dylib usr local opt boost lib libboost date time mt dylib libboost filesystem mt dylib usr local opt boost lib libboost filesystem mt dylib libboost program options mt dylib usr local opt boost lib libboost program options mt dylib libboost regex mt dylib usr local opt boost lib libboost regex mt dylib libboost iostreams mt dylib usr local opt boost lib libboost iostreams mt dylib libboost chrono mt dylib usr local opt boost lib libboost chrono mt dylib libboost atomic mt dylib usr local opt boost lib libboost atomic mt dylib org python python python software foundation usr local opt python frameworks python framework versions python libarchive dylib usr local opt libarchive lib libarchive dylib libserialization dylib users user libserialization dylib libzstd dylib usr local opt zstd lib libzstd dylib libexpat dylib usr lib libexpat dylib liblzma dylib usr local opt xz lib liblzma dylib speedups so users user library python lib python site packages markupsafe speedups so libdataclasses dylib users user libdataclasses dylib dataclasses so users user dataclasses so dyld usr lib dyld com apple corefoundation system library frameworks corefoundation framework versions a corefoundation com apple framework iokit system library frameworks iokit framework versions a iokit com apple security system library frameworks security framework versions a security com apple systemconfiguration system library frameworks systemconfiguration framework versions a systemconfiguration com apple trustevaluationagent system library privateframeworks trustevaluationagent framework versions a trustevaluationagent libdiagnosticmessagesclient dylib usr lib libdiagnosticmessagesclient dylib libopenscriptingutil dylib usr lib libopenscriptingutil dylib libsystem b dylib usr lib libsystem b dylib libauto dylib usr lib libauto dylib libbsm dylib usr lib libbsm dylib dylib usr lib dylib libc dylib usr lib libc dylib libc abi dylib usr lib libc abi dylib libcoretls dylib usr lib libcoretls dylib libcoretls cfhelpers dylib usr lib libcoretls cfhelpers dylib libcrypto dylib usr lib libcrypto dylib libenergytrace dylib usr lib libenergytrace dylib libffi dylib usr lib libffi dylib libiconv dylib usr lib libiconv dylib libicucore a dylib usr lib libicucore a dylib liblzma dylib usr lib liblzma dylib libnetwork dylib usr lib libnetwork dylib libobjc a dylib usr lib libobjc a dylib libpam dylib usr lib libpam dylib libpcap a dylib usr lib libpcap a dylib dylib usr lib dylib libssl dylib usr lib libssl dylib libxar dylib usr lib libxar dylib dylib usr lib dylib libz dylib usr lib libz dylib libcache dylib usr lib system libcache dylib libcommoncrypto dylib usr lib system libcommoncrypto dylib libcompiler rt dylib usr lib system libcompiler rt dylib libcopyfile dylib usr lib system libcopyfile dylib libcorecrypto dylib usr lib system libcorecrypto dylib libdispatch dylib usr lib system libdispatch dylib libdyld dylib usr lib system libdyld dylib libkeymgr dylib usr lib system libkeymgr dylib libkxld dylib usr lib system libkxld dylib liblaunch dylib usr lib system liblaunch dylib libmacho dylib usr lib system libmacho dylib libquarantine dylib usr lib system libquarantine dylib libremovefile dylib usr lib system libremovefile dylib libsystem asl dylib usr lib system libsystem asl dylib libsystem blocks dylib usr lib system libsystem blocks dylib libsystem c dylib usr lib system libsystem c dylib libsystem configuration dylib usr lib system libsystem configuration dylib libsystem coreservices dylib usr lib system libsystem coreservices dylib libsystem coretls dylib usr lib system libsystem coretls dylib libsystem dnssd dylib usr lib system libsystem dnssd dylib libsystem info dylib usr lib system libsystem info dylib libsystem kernel dylib usr lib system libsystem kernel dylib libsystem m dylib usr lib system libsystem m dylib libsystem malloc dylib usr lib system libsystem malloc dylib libsystem network dylib usr lib system libsystem network dylib libsystem networkextension dylib usr lib system libsystem networkextension dylib libsystem notify dylib usr lib system libsystem notify dylib libsystem platform dylib usr lib system libsystem platform dylib libsystem pthread dylib usr lib system libsystem pthread dylib libsystem sandbox dylib usr lib system libsystem sandbox dylib libsystem secinit dylib usr lib system libsystem secinit dylib libsystem symptoms dylib usr lib system libsystem symptoms dylib libsystem trace dylib usr lib system libsystem trace dylib libunwind dylib usr lib system libunwind dylib libxpc dylib usr lib system libxpc dylib external modification summary calls made by other processes targeting this process task for pid thread create thread set state calls made by this process task for pid thread create thread set state calls made by all processes on this machine task for pid thread create thread set state vm region summary readonly portion of libraries total resident swapped out or unallocated writable regions total written resident swapped out unallocated virtual region region type size count non coalesced activity tracing kernel alloc once malloc malloc guard page sqlite page cache stack guard stack vm allocate data linkedit text unicode shared memory total model bootrom processors intel core ghz gb smc graphics intel iris pro intel iris pro built in memory module bank gb mhz memory module bank gb mhz airport spairport wireless card type airport extreme broadcom bluetooth version services devices incoming serial ports network service wi fi airport pci card apple ethernet controller thunderbolt serial ata device apple ssd gb usb device usb bus usb device usb device apple internal keyboard trackpad usb device bluetooth usb host controller usb device usb device thunderbolt bus macbook pro apple inc thunderbolt device thunderbolt to gigabit ethernet adapter apple inc migrated from json status closed changetime description it happens at the pydatetime import line of the pybindings n n n nprocess python npath system library frameworks python framework versions resources python app contents macos python nidentifier python nversion ncode type native nparent process bash nresponsible python nuser id n ndate time nos version mac os x nreport version nanonymous uuid dedf n nsleep wake uuid n ntime awake since boot seconds ntime since wake seconds n nsystem integrity protection enabled n ncrashed thread dispatch queue com apple main thread n nexception type exc bad access sigsegv nexception codes kern invalid address at nexception note exc corpse notify n ntermination signal segmentation fault ntermination reason namespace signal code nterminating process exc handler n nvm regions near n n text r x rwx sm cow system library frameworks python framework versions resources python app contents macos python n nthread crashed dispatch queue com apple main thread org python python pyeval getglobals org python python pyimport import org python python pyimport importmodule org python python pycapsule import dataclasses so register dataclasses so init module dataclasses libboost mt dylib boost python handle exception impl boost libboost mt dylib bool boost python handle exception void libboost mt dylib boost python detail init module char const void org python python pyimport loaddynamicmodule org python python org python python pyeval evalframeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python pyeval evalcode org python python pyimport execcodemoduleex org python python org python python org python python org python python org python python pyimport importmodulelevel org python python org python python pyobject call org python python pyeval callobjectwithkeywords org python python pyeval evalframeex org python python pyeval evalcodeex org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyobject call org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyobject call org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python pyeval evalcode org python python org python python pyrun fileexflags org python python pyrun simplefileexflags org python python py main libdyld dylib start n nthread libsystem kernel dylib psynch cvwait libsystem pthread dylib pthread cond wait org python python pythread acquire lock org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyobject call org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyeval evalframeex org python python org python python pyeval evalframeex org python python pyeval evalcodeex org python python org python python pyobject call org python python org python python pyobject call org python python pyeval callobjectwithkeywords org python python libsystem pthread dylib pthread body libsystem pthread dylib pthread start libsystem pthread dylib thread start n nthread crashed with thread state bit n rax rbx rcx rdx n rdi rsi rbp rsp n n n rip rfl n nlogical cpu nerror code ntrap number n n nbinary images n org python python system library frameworks python framework versions resources python app contents macos python n org python python system library frameworks python framework versions python n locale so system library frameworks python framework versions lib lib dynload locale so n time so system library frameworks python framework versions lib lib dynload time so n cstringio so system library frameworks python framework versions lib lib dynload cstringio so n collections so system library frameworks python framework versions lib lib dynload collections so n operator so system library frameworks python framework versions lib lib dynload operator so n itertools so system library frameworks python framework versions lib lib dynload itertools so n heapq so system library frameworks python framework versions lib lib dynload heapq so n grp so system library frameworks python framework versions lib lib dynload grp so n functools so system library frameworks python framework versions lib lib dynload functools so n strop so system library frameworks python framework versions lib lib dynload strop so n struct so system library frameworks python framework versions lib lib dynload struct so n json so system library frameworks python framework versions lib lib dynload json so n binascii so system library frameworks python framework versions lib lib dynload binascii so n math so system library frameworks python framework versions lib lib dynload math so n hashlib so system library frameworks python framework versions lib lib dynload hashlib so n random so system library frameworks python framework versions lib lib dynload random so n io so system library frameworks python framework versions lib lib dynload io so n select so system library frameworks python framework versions lib lib dynload select so n fcntl so system library frameworks python framework versions lib lib dynload fcntl so n termios so system library frameworks python framework versions lib lib dynload termios so n resource so system library frameworks python framework versions lib lib dynload resource so n ctypes so system library frameworks python framework versions lib lib dynload ctypes so n socket so system library frameworks python framework versions lib lib dynload socket so n ssl so system library frameworks python framework versions lib lib dynload ssl so n scproxy so system library frameworks python framework versions lib lib dynload scproxy so n scandir so users user library python lib python site packages scandir so n datetime so system library frameworks python framework versions lib lib dynload datetime so n cpickle so system library frameworks python framework versions lib lib dynload cpickle so n so system library frameworks python framework versions lib lib dynload so n bisect so system library frameworks python framework versions lib lib dynload bisect so n array so system library frameworks python framework versions lib lib dynload array so n unicodedata so system library frameworks python framework versions lib lib dynload unicodedata so n lsprof so system library frameworks python framework versions lib lib dynload lsprof so n icetray so users user icetray so n libicetray dylib users user libicetray dylib n libboost mt dylib usr local opt boost python lib libboost mt dylib n libboost system mt dylib usr local opt boost lib libboost system mt dylib n libboost signals mt dylib usr local opt boost lib libboost signals mt dylib n libboost thread mt dylib usr local opt boost lib libboost thread mt dylib n libboost date time mt dylib usr local opt boost lib libboost date time mt dylib n libboost filesystem mt dylib usr local opt boost lib libboost filesystem mt dylib n libboost program options mt dylib usr local opt boost lib libboost program options mt dylib n libboost regex mt dylib usr local opt boost lib libboost regex mt dylib n libboost iostreams mt dylib usr local opt boost lib libboost iostreams mt dylib n libboost chrono mt dylib usr local opt boost lib libboost chrono mt dylib n libboost atomic mt dylib usr local opt boost lib libboost atomic mt dylib n org python python python software foundation usr local opt python frameworks python framework versions python n libarchive dylib usr local opt libarchive lib libarchive dylib n libserialization dylib users user libserialization dylib n libzstd dylib usr local opt zstd lib libzstd dylib n libexpat dylib usr lib libexpat dylib n liblzma dylib usr local opt xz lib liblzma dylib n speedups so users user library python lib python site packages markupsafe speedups so n libdataclasses dylib users user libdataclasses dylib n dataclasses so users user dataclasses so n dyld usr lib dyld n com apple corefoundation system library frameworks corefoundation framework versions a corefoundation n com apple framework iokit system library frameworks iokit framework versions a iokit n com apple security system library frameworks security framework versions a security n com apple systemconfiguration system library frameworks systemconfiguration framework versions a systemconfiguration n com apple trustevaluationagent system library privateframeworks trustevaluationagent framework versions a trustevaluationagent n libdiagnosticmessagesclient dylib usr lib libdiagnosticmessagesclient dylib n libopenscriptingutil dylib usr lib libopenscriptingutil dylib n libsystem b dylib usr lib libsystem b dylib n libauto dylib usr lib libauto dylib n libbsm dylib usr lib libbsm dylib n dylib usr lib dylib n libc dylib usr lib libc dylib n libc abi dylib usr lib libc abi dylib n libcoretls dylib usr lib libcoretls dylib n libcoretls cfhelpers dylib usr lib libcoretls cfhelpers dylib n libcrypto dylib usr lib libcrypto dylib n libenergytrace dylib usr lib libenergytrace dylib n libffi dylib usr lib libffi dylib n libiconv dylib usr lib libiconv dylib n libicucore a dylib usr lib libicucore a dylib n liblzma dylib usr lib liblzma dylib n libnetwork dylib usr lib libnetwork dylib n libobjc a dylib usr lib libobjc a dylib n libpam dylib usr lib libpam dylib n libpcap a dylib usr lib libpcap a dylib n dylib usr lib dylib n libssl dylib usr lib libssl dylib n libxar dylib usr lib libxar dylib n dylib usr lib dylib n libz dylib usr lib libz dylib n libcache dylib usr lib system libcache dylib n libcommoncrypto dylib usr lib system libcommoncrypto dylib n libcompiler rt dylib usr lib system libcompiler rt dylib n libcopyfile dylib usr lib system libcopyfile dylib n libcorecrypto dylib usr lib system libcorecrypto dylib n libdispatch dylib usr lib system libdispatch dylib n libdyld dylib usr lib system libdyld dylib n libkeymgr dylib usr lib system libkeymgr dylib n libkxld dylib usr lib system libkxld dylib n liblaunch dylib usr lib system liblaunch dylib n libmacho dylib usr lib system libmacho dylib n libquarantine dylib usr lib system libquarantine dylib n libremovefile dylib usr lib system libremovefile dylib n libsystem asl dylib usr lib system libsystem asl dylib n libsystem blocks dylib usr lib system libsystem blocks dylib n libsystem c dylib usr lib system libsystem c dylib n libsystem configuration dylib usr lib system libsystem configuration dylib n libsystem coreservices dylib usr lib system libsystem coreservices dylib n libsystem coretls dylib usr lib system libsystem coretls dylib n libsystem dnssd dylib usr lib system libsystem dnssd dylib n libsystem info dylib usr lib system libsystem info dylib n libsystem kernel dylib usr lib system libsystem kernel dylib n libsystem m dylib usr lib system libsystem m dylib n libsystem malloc dylib usr lib system libsystem malloc dylib n libsystem network dylib usr lib system libsystem network dylib n libsystem networkextension dylib usr lib system libsystem networkextension dylib n libsystem notify dylib usr lib system libsystem notify dylib n libsystem platform dylib usr lib system libsystem platform dylib n libsystem pthread dylib usr lib system libsystem pthread dylib n libsystem sandbox dylib usr lib system libsystem sandbox dylib n libsystem secinit dylib usr lib system libsystem secinit dylib n libsystem symptoms dylib usr lib system libsystem symptoms dylib n libsystem trace dylib usr lib system libsystem trace dylib n libunwind dylib usr lib system libunwind dylib n libxpc dylib usr lib system libxpc dylib n nexternal modification summary n calls made by other processes targeting this process n task for pid n thread create n thread set state n calls made by this process n task for pid n thread create n thread set state n calls made by all processes on this machine n task for pid n thread create n thread set state n nvm region summary nreadonly portion of libraries total resident swapped out or unallocated nwritable regions total written resident swapped out unallocated n n virtual region nregion type size count non coalesced n nactivity tracing nkernel alloc once nmalloc nmalloc guard page nsqlite page cache nstack guard nstack nvm allocate n data n linkedit n text n unicode nshared memory n ntotal n nmodel bootrom processors intel core ghz gb smc ngraphics intel iris pro intel iris pro built in nmemory module bank gb mhz nmemory module bank gb mhz nairport spairport wireless card type airport extreme broadcom nbluetooth version services devices incoming serial ports nnetwork service wi fi airport npci card apple ethernet controller thunderbolt nserial ata device apple ssd gb nusb device usb bus nusb device nusb device apple internal keyboard trackpad nusb device bluetooth usb host controller nusb device nusb device nthunderbolt bus macbook pro apple inc nthunderbolt device thunderbolt to gigabit ethernet adapter apple inc n n n reporter kjmeagher cc resolution invalid ts component combo core summary pybindings segfault on sierra priority normal keywords time milestone owner kjmeagher type defect | 1 |
231,634 | 25,525,471,195 | IssuesEvent | 2022-11-29 01:36:53 | kapseliboi/WeiPay | https://api.github.com/repos/kapseliboi/WeiPay | reopened | CVE-2020-28498 (Medium) detected in elliptic-6.3.3.tgz | security vulnerability | ## CVE-2020-28498 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>elliptic-6.3.3.tgz</b></p></summary>
<p>EC cryptography</p>
<p>Library home page: <a href="https://registry.npmjs.org/elliptic/-/elliptic-6.3.3.tgz">https://registry.npmjs.org/elliptic/-/elliptic-6.3.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/elliptic/package.json</p>
<p>
Dependency Hierarchy:
- ethers-3.0.29.tgz (Root Library)
- :x: **elliptic-6.3.3.tgz** (Vulnerable Library)
<p>Found in base branch: <b>stable</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
<p>Publish Date: 2021-02-02
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-28498>CVE-2020-28498</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28498">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28498</a></p>
<p>Release Date: 2021-02-02</p>
<p>Fix Resolution (elliptic): 6.5.4</p>
<p>Direct dependency fix Resolution (ethers): 4.0.49</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-28498 (Medium) detected in elliptic-6.3.3.tgz - ## CVE-2020-28498 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>elliptic-6.3.3.tgz</b></p></summary>
<p>EC cryptography</p>
<p>Library home page: <a href="https://registry.npmjs.org/elliptic/-/elliptic-6.3.3.tgz">https://registry.npmjs.org/elliptic/-/elliptic-6.3.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/elliptic/package.json</p>
<p>
Dependency Hierarchy:
- ethers-3.0.29.tgz (Root Library)
- :x: **elliptic-6.3.3.tgz** (Vulnerable Library)
<p>Found in base branch: <b>stable</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
<p>Publish Date: 2021-02-02
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-28498>CVE-2020-28498</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28498">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28498</a></p>
<p>Release Date: 2021-02-02</p>
<p>Fix Resolution (elliptic): 6.5.4</p>
<p>Direct dependency fix Resolution (ethers): 4.0.49</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_defect | cve medium detected in elliptic tgz cve medium severity vulnerability vulnerable library elliptic tgz ec cryptography library home page a href path to dependency file package json path to vulnerable library node modules elliptic package json dependency hierarchy ethers tgz root library x elliptic tgz vulnerable library found in base branch stable vulnerability details the package elliptic before are vulnerable to cryptographic issues via the implementation in elliptic ec key js there is no check to confirm that the public key point passed into the derive function actually exists on the curve this results in the potential for the private key used in this implementation to be revealed after a number of ecdh operations are performed publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope changed impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution elliptic direct dependency fix resolution ethers step up your open source security game with mend | 0 |
45,483 | 2,933,895,505 | IssuesEvent | 2015-06-30 03:16:36 | openpnp/openpnp | https://api.github.com/repos/openpnp/openpnp | closed | Make unit precision display configurable | Component-GUI enhancement imported Priority-Medium | _Original author: ja...@vonnieda.org (July 14, 2012 09:53:05)_
Add a configuration open that allows the user to configure the precision with which values will be shown.
_Original issue: http://code.google.com/p/openpnp/issues/detail?id=22_ | 1.0 | Make unit precision display configurable - _Original author: ja...@vonnieda.org (July 14, 2012 09:53:05)_
Add a configuration open that allows the user to configure the precision with which values will be shown.
_Original issue: http://code.google.com/p/openpnp/issues/detail?id=22_ | non_defect | make unit precision display configurable original author ja vonnieda org july add a configuration open that allows the user to configure the precision with which values will be shown original issue | 0 |
61,140 | 17,023,617,318 | IssuesEvent | 2021-07-03 02:56:52 | tomhughes/trac-tickets | https://api.github.com/repos/tomhughes/trac-tickets | closed | Way not found. Named highway=service not considered? | Component: nominatim Priority: minor Resolution: worksforme Type: defect | **[Submitted to the original trac issue database at 5.54am, Tuesday, 20th July 2010]**
Search: Old Way, Frinton
Map: http://osm.org/go/0EHtHZtC
Way: http://www.openstreetmap.org/browse/way/60879333
| 1.0 | Way not found. Named highway=service not considered? - **[Submitted to the original trac issue database at 5.54am, Tuesday, 20th July 2010]**
Search: Old Way, Frinton
Map: http://osm.org/go/0EHtHZtC
Way: http://www.openstreetmap.org/browse/way/60879333
| defect | way not found named highway service not considered search old way frinton map way | 1 |
2,352 | 2,607,897,308 | IssuesEvent | 2015-02-26 00:11:58 | chrsmithdemos/zen-coding | https://api.github.com/repos/chrsmithdemos/zen-coding | closed | Eclipse support | auto-migrated Priority-Low Type-Defect | ```
1. Хотелось бы поддержку Eclipse без Aptana. В
следующей версии можно будет
писать расширения на javascript.
2. Очень удобно было бы создать update-сайт,
откуда можно было бы
инсталлировать и обновлять этот плагин.
Если понадобиться помощь в создании
сайта, то я могу заняться.
```
-----
Original issue reported on code.google.com by `levin.se...@gmail.com` on 11 Nov 2009 at 5:51 | 1.0 | Eclipse support - ```
1. Хотелось бы поддержку Eclipse без Aptana. В
следующей версии можно будет
писать расширения на javascript.
2. Очень удобно было бы создать update-сайт,
откуда можно было бы
инсталлировать и обновлять этот плагин.
Если понадобиться помощь в создании
сайта, то я могу заняться.
```
-----
Original issue reported on code.google.com by `levin.se...@gmail.com` on 11 Nov 2009 at 5:51 | defect | eclipse support хотелось бы поддержку eclipse без aptana в следующей версии можно будет писать расширения на javascript очень удобно было бы создать update сайт откуда можно было бы инсталлировать и обновлять этот плагин если понадобиться помощь в создании сайта то я могу заняться original issue reported on code google com by levin se gmail com on nov at | 1 |
396,404 | 27,117,078,934 | IssuesEvent | 2023-02-15 19:28:13 | aurora-opensource/au | https://api.github.com/repos/aurora-opensource/au | opened | Document migration facilities | documentation on-the-table | Deliverables:
- Document the general facilities, via "corresponding quantity".
- Migrate our nholthaus/units conversion file, including the unit tests.
- Add documentation page using nholthaus as worked migration example. | 1.0 | Document migration facilities - Deliverables:
- Document the general facilities, via "corresponding quantity".
- Migrate our nholthaus/units conversion file, including the unit tests.
- Add documentation page using nholthaus as worked migration example. | non_defect | document migration facilities deliverables document the general facilities via corresponding quantity migrate our nholthaus units conversion file including the unit tests add documentation page using nholthaus as worked migration example | 0 |
289,461 | 24,991,216,559 | IssuesEvent | 2022-11-02 18:57:23 | Azure/azure-dev | https://api.github.com/repos/Azure/azure-dev | closed | [CI/CD Issues] app settings/configuration not getting applied - deployed app/UI doesn't come up | flaky test | See original error here:
https://dev.azure.com/azure-sdk/internal/_build/results?buildId=1947117&view=logs&j=98dfbbaa-4468-5ea8-0424-3e05dc9382fb&t=c52aa7c5-7457-5d87-592e-3a914f365cd6&l=216
Gate: TestTemplates Azure-Samples_todo-nodejs-mongo
```
2022-10-27T00:11:53.3744211Z ##[section]Starting: Test templates
2022-10-27T00:11:53.3757123Z ==============================================================================
2022-10-27T00:11:53.3758267Z Task : Bash
2022-10-27T00:11:53.3759160Z Description : Run a Bash script on macOS, Linux, or Windows
2022-10-27T00:11:53.3760227Z Version : 3.201.1
2022-10-27T00:11:53.3760996Z Author : Microsoft Corporation
2022-10-27T00:11:53.3762051Z Help : https://docs.microsoft.com/azure/devops/pipelines/tasks/utility/bash
2022-10-27T00:11:53.3763120Z ==============================================================================
2022-10-27T00:11:53.5116462Z Generating script.
2022-10-27T00:11:53.5128941Z Formatted command: exec bash '/mnt/vss/_work/1/s/templates/tests/test-templates.sh' -e 'azd-template-test' -t 'Azure-Samples/todo-nodejs-mongo' -b 'staging' -s '1947117' -l 'eastus2' -p 'list'
2022-10-27T00:11:53.5138796Z ========================== Starting Command Output ===========================
2022-10-27T00:11:53.5151174Z [command]/usr/bin/bash /mnt/vss/_work/_temp/43ecbaf2-de88-4e5f-95ed-aa1bc432494a.sh
2022-10-27T00:11:53.5261771Z Creating new project folder @ '/home/cloudtest/azd-template-test-todo-nodejs-mongo-1947117'...
2022-10-27T00:11:53.5271187Z Initializing template 'Azure-Samples/todo-nodejs-mongo' with branch 'staging'
2022-10-27T00:11:53.7430652Z Initializing a new project in /home/cloudtest/azd-template-test-todo-nodejs-mongo-1947117
2022-10-27T00:11:53.7432846Z
2022-10-27T00:11:53.7435005Z Downloading template |
2022-10-27T00:11:59.2627939Z Provisioning infrastructure for azd-template-test-todo-nodejs-mongo-1947117...
2022-10-27T00:12:04.7592059Z Planning infrastructure provisioning |
2022-10-27T00:12:04.7593976Z Generating Bicep parameters file... /
2022-10-27T00:12:04.7596168Z Compiling Bicep template... -
2022-10-27T00:12:09.4914474Z
2022-10-27T00:12:09.4916738Z Infrastructure provisioning plan completed successfully
2022-10-27T00:12:09.4917991Z Provisioning Azure resources |
2022-10-27T00:12:12.7985158Z Provisioning Azure resources... /
2022-10-27T00:12:23.2583006Z Provisioning Azure resources can take some time.
2022-10-27T00:12:23.2584178Z
2022-10-27T00:12:23.2585497Z You can view detailed progress in the Azure Portal:
2022-10-27T00:12:23.2590293Z https://portal.azure.com/#blade/HubsExtension/DeploymentDetailsBlade/overview/id/%2Fsubscriptions%2F***%2Fproviders%2FMicrosoft.Resources%2Fdeployments%2Fazd-template-test-todo-nodejs-mongo-1947117
2022-10-27T00:12:23.2591979Z
2022-10-27T00:12:23.2594795Z Provisioning Azure resources... |
2022-10-27T00:12:26.5457984Z Created Resource group: rg-azd-template-test-todo-nodejs-mongo-1947117
2022-10-27T00:12:26.5459502Z Provisioning Azure resources (1 of ~4 completed)... |
2022-10-27T00:12:26.5460476Z Provisioning Azure resources (1 of ~4 completed)... /
2022-10-27T00:12:39.7062404Z Created App Service plan: plan-cwbvdpq4mslrm
2022-10-27T00:12:39.7064157Z Created Key vault: kv-cwbvdpq4mslrm
2022-10-27T00:12:39.7065239Z Provisioning Azure resources (3 of ~5 completed)... |
2022-10-27T00:12:39.7066320Z Provisioning Azure resources (3 of ~5 completed)... /
2022-10-27T00:12:52.9962737Z Created Log Analytics workspace: log-cwbvdpq4mslrm
2022-10-27T00:12:52.9963943Z Provisioning Azure resources (4 of ~5 completed)... |
2022-10-27T00:12:52.9964667Z Provisioning Azure resources (4 of ~5 completed)... /
2022-10-27T00:13:09.8472504Z Created Application Insights: appi-cwbvdpq4mslrm
2022-10-27T00:13:09.8490591Z Created Portal dashboard: dash-cwbvdpq4mslrm
2022-10-27T00:13:09.8491783Z Provisioning Azure resources (6 of ~8 completed)... |
2022-10-27T00:13:09.8492661Z Provisioning Azure resources (6 of ~8 completed)... /
2022-10-27T00:13:26.4836039Z Provisioning Azure resources (6 of ~8 completed)... -
2022-10-27T00:13:43.6469955Z Provisioning Azure resources (6 of ~8 completed)... \
2022-10-27T00:14:01.3567911Z Provisioning Azure resources (6 of ~8 completed)... |
2022-10-27T00:14:19.3701996Z Created Web App: app-web-cwbvdpq4mslrm
2022-10-27T00:14:19.3703708Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:14:19.3705635Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:14:37.1678890Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:14:54.7771236Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:15:12.4769907Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:15:30.3084219Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:15:48.0279951Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:16:05.7073895Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:16:23.6248481Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:16:41.3035983Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:16:59.0542500Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:17:16.7758970Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:17:34.4348150Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:17:52.5234332Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:18:10.5702285Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:18:28.5547492Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:18:46.6627061Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:19:04.6395476Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:19:22.6733844Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:19:40.6778756Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:19:58.5417396Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:20:16.2370745Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:20:33.9285872Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:20:52.8735654Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:21:10.6203283Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:21:28.2258109Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:21:45.9409288Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:22:03.7442836Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:22:21.5167880Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:22:39.2181417Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:22:56.8526201Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:23:14.4678495Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:23:39.4118398Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:23:56.1647273Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:24:14.0315996Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:24:32.7276038Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:24:50.4811114Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:25:08.3640773Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:25:26.0604113Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:25:43.7889148Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:26:01.4389576Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:26:19.1905144Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:26:36.8399464Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:26:54.5584085Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:27:12.3624273Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:27:30.1059378Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:27:47.7535029Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:28:05.4920177Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:28:23.2674480Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:28:41.0568069Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:28:59.6032826Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:29:17.2269635Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:29:34.8885419Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:29:52.6603908Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:30:10.3845426Z Created Azure Cosmos DB: cosmos-cwbvdpq4mslrm
2022-10-27T00:30:10.3846618Z Provisioning Azure resources (11 of ~12 completed)... |
2022-10-27T00:30:10.3847382Z Provisioning Azure resources (11 of ~12 completed)... /
2022-10-27T00:30:28.3231125Z Provisioning Azure resources (11 of ~13 completed)... -
2022-10-27T00:30:46.0535112Z Provisioning Azure resources (12 of ~15 completed)... \
2022-10-27T00:31:03.9074269Z Provisioning Azure resources (14 of ~15 completed)... |
2022-10-27T00:31:22.7003505Z Provisioning Azure resources (14 of ~15 completed)... /
2022-10-27T00:31:41.4879313Z Provisioning Azure resources (14 of ~15 completed)... -
2022-10-27T00:32:00.5718507Z Created Web App: app-api-cwbvdpq4mslrm
2022-10-27T00:32:00.5720551Z Provisioning Azure resources (16 of ~17 completed)... |
2022-10-27T00:32:19.4968282Z Provisioning Azure resources (17 of ~18 completed)... /
2022-10-27T00:32:38.8001321Z Provisioning Azure resources (18 of ~19 completed)... -
2022-10-27T00:32:58.1955187Z Provisioning Azure resources (19 of ~20 completed)... \
2022-10-27T00:32:58.1956111Z
2022-10-27T00:32:58.1957093Z Azure resource provisioning completed successfully
2022-10-27T00:32:58.5206427Z View the resources created under the resource group rg-azd-template-test-todo-nodejs-mongo-1947117 in Azure Portal:
2022-10-27T00:32:58.5209684Z https://portal.azure.com/#@/resource/subscriptions/***/resourceGroups/rg-azd-template-test-todo-nodejs-mongo-1947117/overview
2022-10-27T00:32:58.5210743Z
2022-10-27T00:32:58.5241360Z Deploying apps for azd-template-test-todo-nodejs-mongo-1947117...
2022-10-27T00:33:00.4996552Z Deploying service api...
2022-10-27T00:33:00.4998430Z Deploying service api... |
2022-10-27T00:33:00.5000257Z - Preparing packaging... /
2022-10-27T00:33:00.5001302Z - Installing dependencies... -
2022-10-27T00:33:17.1506285Z - Building service... \
2022-10-27T00:33:24.1871044Z - Copying deployment package... |
2022-10-27T00:33:24.1901526Z - Compressing deployment artifacts... /
2022-10-27T00:33:24.1904317Z - Compressing deployment artifacts... -
2022-10-27T00:33:24.2071221Z - Publishing deployment package... \
2022-10-27T00:33:59.2686582Z - Fetching endpoints for app service... |
2022-10-27T00:33:59.9430386Z Deployed service api
2022-10-27T00:33:59.9433758Z - Endpoint: https://app-api-cwbvdpq4mslrm.azurewebsites.net/
2022-10-27T00:33:59.9434942Z
2022-10-27T00:33:59.9436814Z Deploying service web...
2022-10-27T00:33:59.9438720Z Deploying service web... |
2022-10-27T00:33:59.9441006Z - Preparing packaging... /
2022-10-27T00:33:59.9443000Z - Installing dependencies... -
2022-10-27T00:34:18.3684492Z - Building service... \
2022-10-27T00:34:50.2421138Z - Copying deployment package... |
2022-10-27T00:34:50.2466320Z - Compressing deployment artifacts... /
2022-10-27T00:34:50.2468034Z - Compressing deployment artifacts... -
2022-10-27T00:34:50.3840979Z - Publishing deployment package... \
2022-10-27T00:35:13.6386457Z - Fetching endpoints for app service... |
2022-10-27T00:35:14.3312294Z Deployed service web
2022-10-27T00:35:14.3314417Z - Endpoint: https://app-web-cwbvdpq4mslrm.azurewebsites.net/
2022-10-27T00:35:14.3315757Z
2022-10-27T00:35:14.3337535Z Running template smoke tests for azd-template-test-todo-nodejs-mongo-1947117...
2022-10-27T00:35:15.1492519Z
2022-10-27T00:35:15.1494896Z added 6 packages, and audited 7 packages in 478ms
2022-10-27T00:35:15.1495467Z
2022-10-27T00:35:15.1496203Z found 0 vulnerabilities
2022-10-27T00:35:15.8666567Z Downloading Chromium 102.0.5005.40 (playwright build v1005)...
2022-10-27T00:35:15.9020751Z | | 0% of 129.7 Mb
2022-10-27T00:35:16.0091153Z |■■■■■■■■ | 10% of 129.7 Mb
2022-10-27T00:35:16.0855363Z |■■■■■■■■■■■■■■■■ | 20% of 129.7 Mb
2022-10-27T00:35:16.1585871Z |■■■■■■■■■■■■■■■■■■■■■■■■ | 30% of 129.7 Mb
2022-10-27T00:35:16.2237845Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 40% of 129.7 Mb
2022-10-27T00:35:16.2871955Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 50% of 129.7 Mb
2022-10-27T00:35:16.3497979Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 60% of 129.7 Mb
2022-10-27T00:35:16.4078577Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 70% of 129.7 Mb
2022-10-27T00:35:16.4729186Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 80% of 129.7 Mb
2022-10-27T00:35:16.5378937Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 90% of 129.7 Mb
2022-10-27T00:35:16.6010975Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■| 100% of 129.7 Mb
2022-10-27T00:35:20.2513331Z Chromium 102.0.5005.40 (playwright build v1005) downloaded to /home/cloudtest/.cache/ms-playwright/chromium-1005
2022-10-27T00:35:20.2520101Z Downloading FFMPEG playwright build v1007...
2022-10-27T00:35:20.2724576Z | | 0% of 2.6 Mb
2022-10-27T00:35:20.2793266Z |■■■■■■■■ | 10% of 2.6 Mb
2022-10-27T00:35:20.2824147Z |■■■■■■■■■■■■■■■■ | 20% of 2.6 Mb
2022-10-27T00:35:20.2839400Z |■■■■■■■■■■■■■■■■■■■■■■■■ | 30% of 2.6 Mb
2022-10-27T00:35:20.2851005Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 40% of 2.6 Mb
2022-10-27T00:35:20.2868366Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 50% of 2.6 Mb
2022-10-27T00:35:20.2885481Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 60% of 2.6 Mb
2022-10-27T00:35:20.2901455Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 70% of 2.6 Mb
2022-10-27T00:35:20.2918198Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 80% of 2.6 Mb
2022-10-27T00:35:20.2932051Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 90% of 2.6 Mb
2022-10-27T00:35:20.2949277Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■| 100% of 2.6 Mb
2022-10-27T00:35:20.3604627Z FFMPEG playwright build v1007 downloaded to /home/cloudtest/.cache/ms-playwright/ffmpeg-1007
2022-10-27T00:35:20.3606845Z Downloading Firefox 99.0.1 (playwright build v1323)...
2022-10-27T00:35:20.3796507Z | | 0% of 76.6 Mb
2022-10-27T00:35:20.4278625Z |■■■■■■■■ | 10% of 76.6 Mb
2022-10-27T00:35:20.4656237Z |■■■■■■■■■■■■■■■■ | 20% of 76.6 Mb
2022-10-27T00:35:20.5029821Z |■■■■■■■■■■■■■■■■■■■■■■■■ | 30% of 76.6 Mb
2022-10-27T00:35:20.5426997Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 40% of 76.6 Mb
2022-10-27T00:35:20.5801729Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 50% of 76.6 Mb
2022-10-27T00:35:20.6177767Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 60% of 76.6 Mb
2022-10-27T00:35:20.6575520Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 70% of 76.6 Mb
2022-10-27T00:35:20.6928887Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 80% of 76.6 Mb
2022-10-27T00:35:20.7260395Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 90% of 76.6 Mb
2022-10-27T00:35:20.7633379Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■| 100% of 76.6 Mb
2022-10-27T00:35:22.7301850Z Firefox 99.0.1 (playwright build v1323) downloaded to /home/cloudtest/.cache/ms-playwright/firefox-1323
2022-10-27T00:35:22.7306875Z Downloading Webkit 15.4 (playwright build v1641)...
2022-10-27T00:35:22.7414898Z | | 0% of 90.1 Mb
2022-10-27T00:35:22.8032883Z |■■■■■■■■ | 10% of 90.1 Mb
2022-10-27T00:35:22.8450103Z |■■■■■■■■■■■■■■■■ | 20% of 90.1 Mb
2022-10-27T00:35:22.8846727Z |■■■■■■■■■■■■■■■■■■■■■■■■ | 30% of 90.1 Mb
2022-10-27T00:35:22.9285065Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 40% of 90.1 Mb
2022-10-27T00:35:22.9697108Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 50% of 90.1 Mb
2022-10-27T00:35:23.0098989Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 60% of 90.1 Mb
2022-10-27T00:35:23.0451341Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 70% of 90.1 Mb
2022-10-27T00:35:23.0936172Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 80% of 90.1 Mb
2022-10-27T00:35:23.1318364Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 90% of 90.1 Mb
2022-10-27T00:35:23.1757273Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■| 100% of 90.1 Mb
2022-10-27T00:35:25.3646773Z Webkit 15.4 (playwright build v1641) downloaded to /home/cloudtest/.cache/ms-playwright/webkit-1641
2022-10-27T00:35:26.3064573Z Loading env from: /home/cloudtest/azd-template-test-todo-nodejs-mongo-1947117/.azure/azd-template-test-todo-nodejs-mongo-1947117/.env
2022-10-27T00:35:26.3546165Z
2022-10-27T00:35:26.3548249Z Running 1 test using 1 worker
2022-10-27T00:35:26.3548979Z
2022-10-27T00:35:26.7891850Z baseUrl: https://app-web-cwbvdpq4mslrm.azurewebsites.net
2022-10-27T00:39:26.8666692Z ✘ [chromium] › todo.spec.ts:4:1 › Create and delete item test (4m)
2022-10-27T00:39:27.3107929Z baseUrl: https://app-web-cwbvdpq4mslrm.azurewebsites.net
2022-10-27T00:43:28.6299446Z ✘ [chromium] › todo.spec.ts:4:1 › Create and delete item test (retry #1) (4m)
2022-10-27T00:43:28.6425020Z
2022-10-27T00:43:28.6430954Z
2022-10-27T00:43:28.6461931Z 1) [chromium] › todo.spec.ts:4:1 › Create and delete item test ===================================
2022-10-27T00:43:28.6462889Z
2022-10-27T00:43:28.6464351Z [31mTimeout of 240000ms exceeded.[39m
2022-10-27T00:43:28.6464931Z
2022-10-27T00:43:28.6466378Z Error: [2mexpect([22m[31mreceived[39m[2m).[22mtoBeVisible[2m()[22m
2022-10-27T00:43:28.6467764Z Call log:
2022-10-27T00:43:28.6469575Z [2m- expect.toBeVisible with timeout 240000ms[22m
2022-10-27T00:43:28.6476606Z [2m - waiting for selector "text=My List >> nth=0"[22m
2022-10-27T00:43:28.6477462Z
2022-10-27T00:43:28.6478078Z
2022-10-27T00:43:28.6479610Z 5 | await page.goto("/", { waitUntil: 'networkidle' });
2022-10-27T00:43:28.6480796Z 6 |
2022-10-27T00:43:28.6485236Z > 7 | await expect(page.locator("text=My List").first()).toBeVisible({
2022-10-27T00:43:28.6486604Z | ^
2022-10-27T00:43:28.6487628Z 8 | timeout: 240 * 1000,
2022-10-27T00:43:28.6488565Z 9 | });
2022-10-27T00:43:28.6489395Z 10 |
2022-10-27T00:43:28.6489816Z
2022-10-27T00:43:28.6491263Z at /home/cloudtest/azd-template-test-todo-nodejs-mongo-1947117/tests/todo.spec.ts:7:54
2022-10-27T00:43:28.6491770Z
2022-10-27T00:43:28.6492352Z Pending operations:
2022-10-27T00:43:28.6493184Z - expect.toBeVisible at todo.spec.ts:7:54
2022-10-27T00:43:28.6493553Z
2022-10-27T00:43:28.6493816Z
2022-10-27T00:43:28.6494681Z Retry #1 ---------------------------------------------------------------------------------------
2022-10-27T00:43:28.6495104Z
2022-10-27T00:43:28.6495851Z [31mTimeout of 240000ms exceeded.[39m
2022-10-27T00:43:28.6496192Z
2022-10-27T00:43:28.6497012Z Error: [2mexpect([22m[31mreceived[39m[2m).[22mtoBeVisible[2m()[22m
2022-10-27T00:43:28.6497729Z Call log:
2022-10-27T00:43:28.6498514Z [2m- expect.toBeVisible with timeout 240000ms[22m
2022-10-27T00:43:28.6499419Z [2m - waiting for selector "text=My List >> nth=0"[22m
2022-10-27T00:43:28.6499774Z
2022-10-27T00:43:28.6500009Z
2022-10-27T00:43:28.6500784Z 5 | await page.goto("/", { waitUntil: 'networkidle' });
2022-10-27T00:43:28.6501851Z 6 |
2022-10-27T00:43:28.6502531Z > 7 | await expect(page.locator("text=My List").first()).toBeVisible({
2022-10-27T00:43:28.6503254Z | ^
2022-10-27T00:43:28.6503990Z 8 | timeout: 240 * 1000,
2022-10-27T00:43:28.6504592Z 9 | });
2022-10-27T00:43:28.6505142Z 10 |
2022-10-27T00:43:28.6505396Z
2022-10-27T00:43:28.6506316Z at /home/cloudtest/azd-template-test-todo-nodejs-mongo-1947117/tests/todo.spec.ts:7:54
2022-10-27T00:43:28.6506786Z
2022-10-27T00:43:28.6507340Z Pending operations:
2022-10-27T00:43:28.6508167Z - expect.toBeVisible at todo.spec.ts:7:54
2022-10-27T00:43:28.6508532Z
2022-10-27T00:43:28.6509303Z
2022-10-27T00:43:28.6510819Z attachment #1: trace (application/zip) ---------------------------------------------------------
2022-10-27T00:43:28.6512005Z test-results/todo-Create-and-delete-item-test-chromium-retry1/trace.zip
2022-10-27T00:43:28.6512723Z Usage:
2022-10-27T00:43:28.6513007Z
2022-10-27T00:43:28.6513919Z npx playwright show-trace test-results/todo-Create-and-delete-item-test-chromium-retry1/trace.zip
2022-10-27T00:43:28.6514373Z
2022-10-27T00:43:28.6515252Z ------------------------------------------------------------------------------------------------
2022-10-27T00:43:28.6515679Z
2022-10-27T00:43:28.6516431Z Slow test file: [chromium] › todo.spec.ts (8m)
2022-10-27T00:43:28.6517219Z Consider splitting slow test files to speed up parallel execution
2022-10-27T00:43:28.6517597Z
2022-10-27T00:43:28.6518121Z 1 failed
2022-10-27T00:43:28.6519061Z [chromium] › todo.spec.ts:4:1 › Create and delete item test ====================================
2022-10-27T00:43:28.6674260Z ##[error]Bash exited with code '1'.
2022-10-27T00:43:28.6689641Z ##[section]Finishing: Test templates
``` | 1.0 | [CI/CD Issues] app settings/configuration not getting applied - deployed app/UI doesn't come up - See original error here:
https://dev.azure.com/azure-sdk/internal/_build/results?buildId=1947117&view=logs&j=98dfbbaa-4468-5ea8-0424-3e05dc9382fb&t=c52aa7c5-7457-5d87-592e-3a914f365cd6&l=216
Gate: TestTemplates Azure-Samples_todo-nodejs-mongo
```
2022-10-27T00:11:53.3744211Z ##[section]Starting: Test templates
2022-10-27T00:11:53.3757123Z ==============================================================================
2022-10-27T00:11:53.3758267Z Task : Bash
2022-10-27T00:11:53.3759160Z Description : Run a Bash script on macOS, Linux, or Windows
2022-10-27T00:11:53.3760227Z Version : 3.201.1
2022-10-27T00:11:53.3760996Z Author : Microsoft Corporation
2022-10-27T00:11:53.3762051Z Help : https://docs.microsoft.com/azure/devops/pipelines/tasks/utility/bash
2022-10-27T00:11:53.3763120Z ==============================================================================
2022-10-27T00:11:53.5116462Z Generating script.
2022-10-27T00:11:53.5128941Z Formatted command: exec bash '/mnt/vss/_work/1/s/templates/tests/test-templates.sh' -e 'azd-template-test' -t 'Azure-Samples/todo-nodejs-mongo' -b 'staging' -s '1947117' -l 'eastus2' -p 'list'
2022-10-27T00:11:53.5138796Z ========================== Starting Command Output ===========================
2022-10-27T00:11:53.5151174Z [command]/usr/bin/bash /mnt/vss/_work/_temp/43ecbaf2-de88-4e5f-95ed-aa1bc432494a.sh
2022-10-27T00:11:53.5261771Z Creating new project folder @ '/home/cloudtest/azd-template-test-todo-nodejs-mongo-1947117'...
2022-10-27T00:11:53.5271187Z Initializing template 'Azure-Samples/todo-nodejs-mongo' with branch 'staging'
2022-10-27T00:11:53.7430652Z Initializing a new project in /home/cloudtest/azd-template-test-todo-nodejs-mongo-1947117
2022-10-27T00:11:53.7432846Z
2022-10-27T00:11:53.7435005Z Downloading template |
2022-10-27T00:11:59.2627939Z Provisioning infrastructure for azd-template-test-todo-nodejs-mongo-1947117...
2022-10-27T00:12:04.7592059Z Planning infrastructure provisioning |
2022-10-27T00:12:04.7593976Z Generating Bicep parameters file... /
2022-10-27T00:12:04.7596168Z Compiling Bicep template... -
2022-10-27T00:12:09.4914474Z
2022-10-27T00:12:09.4916738Z Infrastructure provisioning plan completed successfully
2022-10-27T00:12:09.4917991Z Provisioning Azure resources |
2022-10-27T00:12:12.7985158Z Provisioning Azure resources... /
2022-10-27T00:12:23.2583006Z Provisioning Azure resources can take some time.
2022-10-27T00:12:23.2584178Z
2022-10-27T00:12:23.2585497Z You can view detailed progress in the Azure Portal:
2022-10-27T00:12:23.2590293Z https://portal.azure.com/#blade/HubsExtension/DeploymentDetailsBlade/overview/id/%2Fsubscriptions%2F***%2Fproviders%2FMicrosoft.Resources%2Fdeployments%2Fazd-template-test-todo-nodejs-mongo-1947117
2022-10-27T00:12:23.2591979Z
2022-10-27T00:12:23.2594795Z Provisioning Azure resources... |
2022-10-27T00:12:26.5457984Z Created Resource group: rg-azd-template-test-todo-nodejs-mongo-1947117
2022-10-27T00:12:26.5459502Z Provisioning Azure resources (1 of ~4 completed)... |
2022-10-27T00:12:26.5460476Z Provisioning Azure resources (1 of ~4 completed)... /
2022-10-27T00:12:39.7062404Z Created App Service plan: plan-cwbvdpq4mslrm
2022-10-27T00:12:39.7064157Z Created Key vault: kv-cwbvdpq4mslrm
2022-10-27T00:12:39.7065239Z Provisioning Azure resources (3 of ~5 completed)... |
2022-10-27T00:12:39.7066320Z Provisioning Azure resources (3 of ~5 completed)... /
2022-10-27T00:12:52.9962737Z Created Log Analytics workspace: log-cwbvdpq4mslrm
2022-10-27T00:12:52.9963943Z Provisioning Azure resources (4 of ~5 completed)... |
2022-10-27T00:12:52.9964667Z Provisioning Azure resources (4 of ~5 completed)... /
2022-10-27T00:13:09.8472504Z Created Application Insights: appi-cwbvdpq4mslrm
2022-10-27T00:13:09.8490591Z Created Portal dashboard: dash-cwbvdpq4mslrm
2022-10-27T00:13:09.8491783Z Provisioning Azure resources (6 of ~8 completed)... |
2022-10-27T00:13:09.8492661Z Provisioning Azure resources (6 of ~8 completed)... /
2022-10-27T00:13:26.4836039Z Provisioning Azure resources (6 of ~8 completed)... -
2022-10-27T00:13:43.6469955Z Provisioning Azure resources (6 of ~8 completed)... \
2022-10-27T00:14:01.3567911Z Provisioning Azure resources (6 of ~8 completed)... |
2022-10-27T00:14:19.3701996Z Created Web App: app-web-cwbvdpq4mslrm
2022-10-27T00:14:19.3703708Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:14:19.3705635Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:14:37.1678890Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:14:54.7771236Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:15:12.4769907Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:15:30.3084219Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:15:48.0279951Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:16:05.7073895Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:16:23.6248481Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:16:41.3035983Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:16:59.0542500Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:17:16.7758970Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:17:34.4348150Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:17:52.5234332Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:18:10.5702285Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:18:28.5547492Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:18:46.6627061Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:19:04.6395476Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:19:22.6733844Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:19:40.6778756Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:19:58.5417396Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:20:16.2370745Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:20:33.9285872Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:20:52.8735654Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:21:10.6203283Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:21:28.2258109Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:21:45.9409288Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:22:03.7442836Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:22:21.5167880Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:22:39.2181417Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:22:56.8526201Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:23:14.4678495Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:23:39.4118398Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:23:56.1647273Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:24:14.0315996Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:24:32.7276038Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:24:50.4811114Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:25:08.3640773Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:25:26.0604113Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:25:43.7889148Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:26:01.4389576Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:26:19.1905144Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:26:36.8399464Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:26:54.5584085Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:27:12.3624273Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:27:30.1059378Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:27:47.7535029Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:28:05.4920177Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:28:23.2674480Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:28:41.0568069Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:28:59.6032826Z Provisioning Azure resources (9 of ~11 completed)... -
2022-10-27T00:29:17.2269635Z Provisioning Azure resources (9 of ~11 completed)... \
2022-10-27T00:29:34.8885419Z Provisioning Azure resources (9 of ~11 completed)... |
2022-10-27T00:29:52.6603908Z Provisioning Azure resources (9 of ~11 completed)... /
2022-10-27T00:30:10.3845426Z Created Azure Cosmos DB: cosmos-cwbvdpq4mslrm
2022-10-27T00:30:10.3846618Z Provisioning Azure resources (11 of ~12 completed)... |
2022-10-27T00:30:10.3847382Z Provisioning Azure resources (11 of ~12 completed)... /
2022-10-27T00:30:28.3231125Z Provisioning Azure resources (11 of ~13 completed)... -
2022-10-27T00:30:46.0535112Z Provisioning Azure resources (12 of ~15 completed)... \
2022-10-27T00:31:03.9074269Z Provisioning Azure resources (14 of ~15 completed)... |
2022-10-27T00:31:22.7003505Z Provisioning Azure resources (14 of ~15 completed)... /
2022-10-27T00:31:41.4879313Z Provisioning Azure resources (14 of ~15 completed)... -
2022-10-27T00:32:00.5718507Z Created Web App: app-api-cwbvdpq4mslrm
2022-10-27T00:32:00.5720551Z Provisioning Azure resources (16 of ~17 completed)... |
2022-10-27T00:32:19.4968282Z Provisioning Azure resources (17 of ~18 completed)... /
2022-10-27T00:32:38.8001321Z Provisioning Azure resources (18 of ~19 completed)... -
2022-10-27T00:32:58.1955187Z Provisioning Azure resources (19 of ~20 completed)... \
2022-10-27T00:32:58.1956111Z
2022-10-27T00:32:58.1957093Z Azure resource provisioning completed successfully
2022-10-27T00:32:58.5206427Z View the resources created under the resource group rg-azd-template-test-todo-nodejs-mongo-1947117 in Azure Portal:
2022-10-27T00:32:58.5209684Z https://portal.azure.com/#@/resource/subscriptions/***/resourceGroups/rg-azd-template-test-todo-nodejs-mongo-1947117/overview
2022-10-27T00:32:58.5210743Z
2022-10-27T00:32:58.5241360Z Deploying apps for azd-template-test-todo-nodejs-mongo-1947117...
2022-10-27T00:33:00.4996552Z Deploying service api...
2022-10-27T00:33:00.4998430Z Deploying service api... |
2022-10-27T00:33:00.5000257Z - Preparing packaging... /
2022-10-27T00:33:00.5001302Z - Installing dependencies... -
2022-10-27T00:33:17.1506285Z - Building service... \
2022-10-27T00:33:24.1871044Z - Copying deployment package... |
2022-10-27T00:33:24.1901526Z - Compressing deployment artifacts... /
2022-10-27T00:33:24.1904317Z - Compressing deployment artifacts... -
2022-10-27T00:33:24.2071221Z - Publishing deployment package... \
2022-10-27T00:33:59.2686582Z - Fetching endpoints for app service... |
2022-10-27T00:33:59.9430386Z Deployed service api
2022-10-27T00:33:59.9433758Z - Endpoint: https://app-api-cwbvdpq4mslrm.azurewebsites.net/
2022-10-27T00:33:59.9434942Z
2022-10-27T00:33:59.9436814Z Deploying service web...
2022-10-27T00:33:59.9438720Z Deploying service web... |
2022-10-27T00:33:59.9441006Z - Preparing packaging... /
2022-10-27T00:33:59.9443000Z - Installing dependencies... -
2022-10-27T00:34:18.3684492Z - Building service... \
2022-10-27T00:34:50.2421138Z - Copying deployment package... |
2022-10-27T00:34:50.2466320Z - Compressing deployment artifacts... /
2022-10-27T00:34:50.2468034Z - Compressing deployment artifacts... -
2022-10-27T00:34:50.3840979Z - Publishing deployment package... \
2022-10-27T00:35:13.6386457Z - Fetching endpoints for app service... |
2022-10-27T00:35:14.3312294Z Deployed service web
2022-10-27T00:35:14.3314417Z - Endpoint: https://app-web-cwbvdpq4mslrm.azurewebsites.net/
2022-10-27T00:35:14.3315757Z
2022-10-27T00:35:14.3337535Z Running template smoke tests for azd-template-test-todo-nodejs-mongo-1947117...
2022-10-27T00:35:15.1492519Z
2022-10-27T00:35:15.1494896Z added 6 packages, and audited 7 packages in 478ms
2022-10-27T00:35:15.1495467Z
2022-10-27T00:35:15.1496203Z found 0 vulnerabilities
2022-10-27T00:35:15.8666567Z Downloading Chromium 102.0.5005.40 (playwright build v1005)...
2022-10-27T00:35:15.9020751Z | | 0% of 129.7 Mb
2022-10-27T00:35:16.0091153Z |■■■■■■■■ | 10% of 129.7 Mb
2022-10-27T00:35:16.0855363Z |■■■■■■■■■■■■■■■■ | 20% of 129.7 Mb
2022-10-27T00:35:16.1585871Z |■■■■■■■■■■■■■■■■■■■■■■■■ | 30% of 129.7 Mb
2022-10-27T00:35:16.2237845Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 40% of 129.7 Mb
2022-10-27T00:35:16.2871955Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 50% of 129.7 Mb
2022-10-27T00:35:16.3497979Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 60% of 129.7 Mb
2022-10-27T00:35:16.4078577Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 70% of 129.7 Mb
2022-10-27T00:35:16.4729186Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 80% of 129.7 Mb
2022-10-27T00:35:16.5378937Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 90% of 129.7 Mb
2022-10-27T00:35:16.6010975Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■| 100% of 129.7 Mb
2022-10-27T00:35:20.2513331Z Chromium 102.0.5005.40 (playwright build v1005) downloaded to /home/cloudtest/.cache/ms-playwright/chromium-1005
2022-10-27T00:35:20.2520101Z Downloading FFMPEG playwright build v1007...
2022-10-27T00:35:20.2724576Z | | 0% of 2.6 Mb
2022-10-27T00:35:20.2793266Z |■■■■■■■■ | 10% of 2.6 Mb
2022-10-27T00:35:20.2824147Z |■■■■■■■■■■■■■■■■ | 20% of 2.6 Mb
2022-10-27T00:35:20.2839400Z |■■■■■■■■■■■■■■■■■■■■■■■■ | 30% of 2.6 Mb
2022-10-27T00:35:20.2851005Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 40% of 2.6 Mb
2022-10-27T00:35:20.2868366Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 50% of 2.6 Mb
2022-10-27T00:35:20.2885481Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 60% of 2.6 Mb
2022-10-27T00:35:20.2901455Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 70% of 2.6 Mb
2022-10-27T00:35:20.2918198Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 80% of 2.6 Mb
2022-10-27T00:35:20.2932051Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 90% of 2.6 Mb
2022-10-27T00:35:20.2949277Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■| 100% of 2.6 Mb
2022-10-27T00:35:20.3604627Z FFMPEG playwright build v1007 downloaded to /home/cloudtest/.cache/ms-playwright/ffmpeg-1007
2022-10-27T00:35:20.3606845Z Downloading Firefox 99.0.1 (playwright build v1323)...
2022-10-27T00:35:20.3796507Z | | 0% of 76.6 Mb
2022-10-27T00:35:20.4278625Z |■■■■■■■■ | 10% of 76.6 Mb
2022-10-27T00:35:20.4656237Z |■■■■■■■■■■■■■■■■ | 20% of 76.6 Mb
2022-10-27T00:35:20.5029821Z |■■■■■■■■■■■■■■■■■■■■■■■■ | 30% of 76.6 Mb
2022-10-27T00:35:20.5426997Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 40% of 76.6 Mb
2022-10-27T00:35:20.5801729Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 50% of 76.6 Mb
2022-10-27T00:35:20.6177767Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 60% of 76.6 Mb
2022-10-27T00:35:20.6575520Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 70% of 76.6 Mb
2022-10-27T00:35:20.6928887Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 80% of 76.6 Mb
2022-10-27T00:35:20.7260395Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 90% of 76.6 Mb
2022-10-27T00:35:20.7633379Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■| 100% of 76.6 Mb
2022-10-27T00:35:22.7301850Z Firefox 99.0.1 (playwright build v1323) downloaded to /home/cloudtest/.cache/ms-playwright/firefox-1323
2022-10-27T00:35:22.7306875Z Downloading Webkit 15.4 (playwright build v1641)...
2022-10-27T00:35:22.7414898Z | | 0% of 90.1 Mb
2022-10-27T00:35:22.8032883Z |■■■■■■■■ | 10% of 90.1 Mb
2022-10-27T00:35:22.8450103Z |■■■■■■■■■■■■■■■■ | 20% of 90.1 Mb
2022-10-27T00:35:22.8846727Z |■■■■■■■■■■■■■■■■■■■■■■■■ | 30% of 90.1 Mb
2022-10-27T00:35:22.9285065Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 40% of 90.1 Mb
2022-10-27T00:35:22.9697108Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 50% of 90.1 Mb
2022-10-27T00:35:23.0098989Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 60% of 90.1 Mb
2022-10-27T00:35:23.0451341Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 70% of 90.1 Mb
2022-10-27T00:35:23.0936172Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 80% of 90.1 Mb
2022-10-27T00:35:23.1318364Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ | 90% of 90.1 Mb
2022-10-27T00:35:23.1757273Z |■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■| 100% of 90.1 Mb
2022-10-27T00:35:25.3646773Z Webkit 15.4 (playwright build v1641) downloaded to /home/cloudtest/.cache/ms-playwright/webkit-1641
2022-10-27T00:35:26.3064573Z Loading env from: /home/cloudtest/azd-template-test-todo-nodejs-mongo-1947117/.azure/azd-template-test-todo-nodejs-mongo-1947117/.env
2022-10-27T00:35:26.3546165Z
2022-10-27T00:35:26.3548249Z Running 1 test using 1 worker
2022-10-27T00:35:26.3548979Z
2022-10-27T00:35:26.7891850Z baseUrl: https://app-web-cwbvdpq4mslrm.azurewebsites.net
2022-10-27T00:39:26.8666692Z ✘ [chromium] › todo.spec.ts:4:1 › Create and delete item test (4m)
2022-10-27T00:39:27.3107929Z baseUrl: https://app-web-cwbvdpq4mslrm.azurewebsites.net
2022-10-27T00:43:28.6299446Z ✘ [chromium] › todo.spec.ts:4:1 › Create and delete item test (retry #1) (4m)
2022-10-27T00:43:28.6425020Z
2022-10-27T00:43:28.6430954Z
2022-10-27T00:43:28.6461931Z 1) [chromium] › todo.spec.ts:4:1 › Create and delete item test ===================================
2022-10-27T00:43:28.6462889Z
2022-10-27T00:43:28.6464351Z [31mTimeout of 240000ms exceeded.[39m
2022-10-27T00:43:28.6464931Z
2022-10-27T00:43:28.6466378Z Error: [2mexpect([22m[31mreceived[39m[2m).[22mtoBeVisible[2m()[22m
2022-10-27T00:43:28.6467764Z Call log:
2022-10-27T00:43:28.6469575Z [2m- expect.toBeVisible with timeout 240000ms[22m
2022-10-27T00:43:28.6476606Z [2m - waiting for selector "text=My List >> nth=0"[22m
2022-10-27T00:43:28.6477462Z
2022-10-27T00:43:28.6478078Z
2022-10-27T00:43:28.6479610Z 5 | await page.goto("/", { waitUntil: 'networkidle' });
2022-10-27T00:43:28.6480796Z 6 |
2022-10-27T00:43:28.6485236Z > 7 | await expect(page.locator("text=My List").first()).toBeVisible({
2022-10-27T00:43:28.6486604Z | ^
2022-10-27T00:43:28.6487628Z 8 | timeout: 240 * 1000,
2022-10-27T00:43:28.6488565Z 9 | });
2022-10-27T00:43:28.6489395Z 10 |
2022-10-27T00:43:28.6489816Z
2022-10-27T00:43:28.6491263Z at /home/cloudtest/azd-template-test-todo-nodejs-mongo-1947117/tests/todo.spec.ts:7:54
2022-10-27T00:43:28.6491770Z
2022-10-27T00:43:28.6492352Z Pending operations:
2022-10-27T00:43:28.6493184Z - expect.toBeVisible at todo.spec.ts:7:54
2022-10-27T00:43:28.6493553Z
2022-10-27T00:43:28.6493816Z
2022-10-27T00:43:28.6494681Z Retry #1 ---------------------------------------------------------------------------------------
2022-10-27T00:43:28.6495104Z
2022-10-27T00:43:28.6495851Z [31mTimeout of 240000ms exceeded.[39m
2022-10-27T00:43:28.6496192Z
2022-10-27T00:43:28.6497012Z Error: [2mexpect([22m[31mreceived[39m[2m).[22mtoBeVisible[2m()[22m
2022-10-27T00:43:28.6497729Z Call log:
2022-10-27T00:43:28.6498514Z [2m- expect.toBeVisible with timeout 240000ms[22m
2022-10-27T00:43:28.6499419Z [2m - waiting for selector "text=My List >> nth=0"[22m
2022-10-27T00:43:28.6499774Z
2022-10-27T00:43:28.6500009Z
2022-10-27T00:43:28.6500784Z 5 | await page.goto("/", { waitUntil: 'networkidle' });
2022-10-27T00:43:28.6501851Z 6 |
2022-10-27T00:43:28.6502531Z > 7 | await expect(page.locator("text=My List").first()).toBeVisible({
2022-10-27T00:43:28.6503254Z | ^
2022-10-27T00:43:28.6503990Z 8 | timeout: 240 * 1000,
2022-10-27T00:43:28.6504592Z 9 | });
2022-10-27T00:43:28.6505142Z 10 |
2022-10-27T00:43:28.6505396Z
2022-10-27T00:43:28.6506316Z at /home/cloudtest/azd-template-test-todo-nodejs-mongo-1947117/tests/todo.spec.ts:7:54
2022-10-27T00:43:28.6506786Z
2022-10-27T00:43:28.6507340Z Pending operations:
2022-10-27T00:43:28.6508167Z - expect.toBeVisible at todo.spec.ts:7:54
2022-10-27T00:43:28.6508532Z
2022-10-27T00:43:28.6509303Z
2022-10-27T00:43:28.6510819Z attachment #1: trace (application/zip) ---------------------------------------------------------
2022-10-27T00:43:28.6512005Z test-results/todo-Create-and-delete-item-test-chromium-retry1/trace.zip
2022-10-27T00:43:28.6512723Z Usage:
2022-10-27T00:43:28.6513007Z
2022-10-27T00:43:28.6513919Z npx playwright show-trace test-results/todo-Create-and-delete-item-test-chromium-retry1/trace.zip
2022-10-27T00:43:28.6514373Z
2022-10-27T00:43:28.6515252Z ------------------------------------------------------------------------------------------------
2022-10-27T00:43:28.6515679Z
2022-10-27T00:43:28.6516431Z Slow test file: [chromium] › todo.spec.ts (8m)
2022-10-27T00:43:28.6517219Z Consider splitting slow test files to speed up parallel execution
2022-10-27T00:43:28.6517597Z
2022-10-27T00:43:28.6518121Z 1 failed
2022-10-27T00:43:28.6519061Z [chromium] › todo.spec.ts:4:1 › Create and delete item test ====================================
2022-10-27T00:43:28.6674260Z ##[error]Bash exited with code '1'.
2022-10-27T00:43:28.6689641Z ##[section]Finishing: Test templates
``` | non_defect | app settings configuration not getting applied deployed app ui doesn t come up see original error here gate testtemplates azure samples todo nodejs mongo starting test templates task bash description run a bash script on macos linux or windows version author microsoft corporation help generating script formatted command exec bash mnt vss work s templates tests test templates sh e azd template test t azure samples todo nodejs mongo b staging s l p list starting command output usr bin bash mnt vss work temp sh creating new project folder home cloudtest azd template test todo nodejs mongo initializing template azure samples todo nodejs mongo with branch staging initializing a new project in home cloudtest azd template test todo nodejs mongo downloading template provisioning infrastructure for azd template test todo nodejs mongo planning infrastructure provisioning generating bicep parameters file compiling bicep template infrastructure provisioning plan completed successfully provisioning azure resources provisioning azure resources provisioning azure resources can take some time you can view detailed progress in the azure portal provisioning azure resources created resource group rg azd template test todo nodejs mongo provisioning azure resources of completed provisioning azure resources of completed created app service plan plan created key vault kv provisioning azure resources of completed provisioning azure resources of completed created log analytics workspace log provisioning azure resources of completed provisioning azure resources of completed created application insights appi created portal dashboard dash provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed created web app app web provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed created azure cosmos db cosmos provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed created web app app api provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed provisioning azure resources of completed azure resource provisioning completed successfully view the resources created under the resource group rg azd template test todo nodejs mongo in azure portal deploying apps for azd template test todo nodejs mongo deploying service api deploying service api preparing packaging installing dependencies building service copying deployment package compressing deployment artifacts compressing deployment artifacts publishing deployment package fetching endpoints for app service deployed service api endpoint deploying service web deploying service web preparing packaging installing dependencies building service copying deployment package compressing deployment artifacts compressing deployment artifacts publishing deployment package fetching endpoints for app service deployed service web endpoint running template smoke tests for azd template test todo nodejs mongo added packages and audited packages in found vulnerabilities downloading chromium playwright build of mb ■■■■■■■■ of mb ■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb chromium playwright build downloaded to home cloudtest cache ms playwright chromium downloading ffmpeg playwright build of mb ■■■■■■■■ of mb ■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ffmpeg playwright build downloaded to home cloudtest cache ms playwright ffmpeg downloading firefox playwright build of mb ■■■■■■■■ of mb ■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb firefox playwright build downloaded to home cloudtest cache ms playwright firefox downloading webkit playwright build of mb ■■■■■■■■ of mb ■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb ■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■■ of mb webkit playwright build downloaded to home cloudtest cache ms playwright webkit loading env from home cloudtest azd template test todo nodejs mongo azure azd template test todo nodejs mongo env running test using worker baseurl ✘ › todo spec ts › create and delete item test baseurl ✘ › todo spec ts › create and delete item test retry › todo spec ts › create and delete item test of exceeded error call log expect tobevisible with timeout waiting for selector text my list nth await page goto waituntil networkidle await expect page locator text my list first tobevisible timeout at home cloudtest azd template test todo nodejs mongo tests todo spec ts pending operations expect tobevisible at todo spec ts retry of exceeded error call log expect tobevisible with timeout waiting for selector text my list nth await page goto waituntil networkidle await expect page locator text my list first tobevisible timeout at home cloudtest azd template test todo nodejs mongo tests todo spec ts pending operations expect tobevisible at todo spec ts attachment trace application zip test results todo create and delete item test chromium trace zip usage npx playwright show trace test results todo create and delete item test chromium trace zip slow test file › todo spec ts consider splitting slow test files to speed up parallel execution failed › todo spec ts › create and delete item test bash exited with code finishing test templates | 0 |
3,236 | 2,610,058,747 | IssuesEvent | 2015-02-26 18:17:21 | chrsmith/jsjsj122 | https://api.github.com/repos/chrsmith/jsjsj122 | opened | 路桥医院网上预约 | auto-migrated Priority-Medium Type-Defect | ```
路桥医院网上预约【台州五洲生殖医院】24小时健康咨询热线
:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:台州市椒江
区枫南路229号(枫南大转盘旁)乘车线路:乘坐104、108、118、1
98及椒江一金清公交车直达枫南小区,乘坐107、105、109、112、
901、 902公交车到星星广场下车,步行即可到院。
诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,��
�精,无精。包皮包茎,精索静脉曲张,淋病等。
台州五洲生殖医院是台州最大的男科医院,权威专家在线免��
�咨询,拥有专业完善的男科检查治疗设备,严格按照国家标�
��收费。尖端医疗设备,与世界同步。权威专家,成就专业典
范。人性化服务,一切以患者为中心。
看男科就选台州五洲生殖医院,专业男科为男人。
```
-----
Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 6:47 | 1.0 | 路桥医院网上预约 - ```
路桥医院网上预约【台州五洲生殖医院】24小时健康咨询热线
:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:台州市椒江
区枫南路229号(枫南大转盘旁)乘车线路:乘坐104、108、118、1
98及椒江一金清公交车直达枫南小区,乘坐107、105、109、112、
901、 902公交车到星星广场下车,步行即可到院。
诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,��
�精,无精。包皮包茎,精索静脉曲张,淋病等。
台州五洲生殖医院是台州最大的男科医院,权威专家在线免��
�咨询,拥有专业完善的男科检查治疗设备,严格按照国家标�
��收费。尖端医疗设备,与世界同步。权威专家,成就专业典
范。人性化服务,一切以患者为中心。
看男科就选台州五洲生殖医院,专业男科为男人。
```
-----
Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 6:47 | defect | 路桥医院网上预约 路桥医院网上预约【台州五洲生殖医院】 微信号tzwzszyy 医院地址 台州市椒江 (枫南大转盘旁)乘车线路 、 、 、 , 、 、 、 、 、 ,步行即可到院。 诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,�� �精,无精。包皮包茎,精索静脉曲张,淋病等。 台州五洲生殖医院是台州最大的男科医院,权威专家在线免�� �咨询,拥有专业完善的男科检查治疗设备,严格按照国家标� ��收费。尖端医疗设备,与世界同步。权威专家,成就专业典 范。人性化服务,一切以患者为中心。 看男科就选台州五洲生殖医院,专业男科为男人。 original issue reported on code google com by poweragr gmail com on may at | 1 |
145,275 | 22,634,505,734 | IssuesEvent | 2022-06-30 17:32:13 | mexyn/statev_v2_issues | https://api.github.com/repos/mexyn/statev_v2_issues | closed | Schwebender Abgabepunkt | gamedesign solved | **Charakter Name**
Tyrone Murphy
**Auftrittszeitpunkt (Datum / Uhrzeit)**
15.06.2022 - 13:47 Uhr
**Beobachtetes Verhalten**
Ein Abgabepunkt, bei einer 40er Kokslieferung schwebt in der Luft:



Lässt sich nur so erledigen:

| 1.0 | Schwebender Abgabepunkt - **Charakter Name**
Tyrone Murphy
**Auftrittszeitpunkt (Datum / Uhrzeit)**
15.06.2022 - 13:47 Uhr
**Beobachtetes Verhalten**
Ein Abgabepunkt, bei einer 40er Kokslieferung schwebt in der Luft:



Lässt sich nur so erledigen:

| non_defect | schwebender abgabepunkt charakter name tyrone murphy auftrittszeitpunkt datum uhrzeit uhr beobachtetes verhalten ein abgabepunkt bei einer kokslieferung schwebt in der luft lässt sich nur so erledigen | 0 |
346,501 | 24,886,915,466 | IssuesEvent | 2022-10-28 08:35:03 | square/reader-sdk-flutter-plugin | https://api.github.com/repos/square/reader-sdk-flutter-plugin | closed | Kotlin Android Example | documentation | ### Describe the change you would like to see
The technical reference only includes a java example for the android setup.
### How would the suggested change make the documentation more useful?
Please provide updated examples that include Kotlin examples for setting up android.
| 1.0 | Kotlin Android Example - ### Describe the change you would like to see
The technical reference only includes a java example for the android setup.
### How would the suggested change make the documentation more useful?
Please provide updated examples that include Kotlin examples for setting up android.
| non_defect | kotlin android example describe the change you would like to see the technical reference only includes a java example for the android setup how would the suggested change make the documentation more useful please provide updated examples that include kotlin examples for setting up android | 0 |
83,049 | 7,860,104,944 | IssuesEvent | 2018-06-21 18:47:42 | ObiWanLansi/SIGENCE-Scenario-Tool | https://api.github.com/repos/ObiWanLansi/SIGENCE-Scenario-Tool | opened | .NET Click & Once Support | PrioLow enhancement test | Is it possible to deploy the binaries in GitHub as Click & Once Application ? | 1.0 | .NET Click & Once Support - Is it possible to deploy the binaries in GitHub as Click & Once Application ? | non_defect | net click once support is it possible to deploy the binaries in github as click once application | 0 |
45,113 | 12,552,247,448 | IssuesEvent | 2020-06-06 17:27:22 | ascott18/TellMeWhen | https://api.github.com/repos/ascott18/TellMeWhen | closed | [Bug] | S: more-info-needed T: defect V: retail | **What version of TellMeWhen are you using? **
8.7.4
Hi!
Im getting the following errors, only when i switch to Brewmaster spec. I do NOT get these errors when in windwalker spec
*******************
****ERROR 1******
*******************
Message: Interface\AddOns\TellMeWhen\TellMeWhen.lua:2721: [string "Condition_SPELLCHARGES_STAGGER_BUFFDUR_SPEL..."]:4: attempt to perform arithmetic on a nil value
Time: Tue Mar 3 19:26:16 2020
Count: 1
Stack: Interface\AddOns\TellMeWhen\TellMeWhen.lua:2721: [string "Condition_SPELLCHARGES_STAGGER_BUFFDUR_SPEL..."]:4: attempt to perform arithmetic on a nil value
[string "=[C]"]: ?
[string "@Interface\AddOns\TellMeWhen\TellMeWhen.lua"]:2721: in function <Interface\AddOns\TellMeWhen\TellMeWhen.lua:2710>
Locals: (*temporary) = false
(*temporary) = "[string "Condition_SPELLCHARGES_STAGGER_BUFFDUR_SPEL..."]:4: attempt to perform arithmetic on a nil value"
************************
*******ERROR 2********
************************
Message: [string "Condition_SPELLCHARGES_STAGGER_BUFFDUR_SPEL..."]:4: attempt to perform arithmetic on a nil value
Time: Tue Mar 3 19:26:16 2020
Count: 6
Stack: [string "Condition_SPELLCHARGES_STAGGER_BUFFDUR_SPEL..."]:4: attempt to perform arithmetic on a nil value
[string "Condition_SPELLCHARGES_STAGGER_BUFFDUR_SPELLCHARGES_STAGGER_ABS_THREATSCALED"]:4: in function `CheckFunction'
[string "@Interface\AddOns\TellMeWhen\Components\Core\Conditions\ConditionObject.lua"]:265: in function `Check'
[string "@Interface\AddOns\TellMeWhen\Components\Core\Icon.lua"]:756: in function <Interface\AddOns\TellMeWhen\Components\Core\Icon.lua:727>
[string "=(tail call)"]: ?
[string "=[C]"]: ?
[string "safecall Dispatcher[1]"]:9: in function <[string "safecall Dispatcher[1]"]:5>
[string "=(tail call)"]: ?
[string "@Interface\AddOns\TellMeWhen\TellMeWhen.lua"]:2681: in function <Interface\AddOns\TellMeWhen\TellMeWhen.lua:2643>
Locals: <none>
If you have any idea what is causing this, it would be greatly appreciated! Let me know if any other information required that would help
Thanks very much!! | 1.0 | [Bug] - **What version of TellMeWhen are you using? **
8.7.4
Hi!
Im getting the following errors, only when i switch to Brewmaster spec. I do NOT get these errors when in windwalker spec
*******************
****ERROR 1******
*******************
Message: Interface\AddOns\TellMeWhen\TellMeWhen.lua:2721: [string "Condition_SPELLCHARGES_STAGGER_BUFFDUR_SPEL..."]:4: attempt to perform arithmetic on a nil value
Time: Tue Mar 3 19:26:16 2020
Count: 1
Stack: Interface\AddOns\TellMeWhen\TellMeWhen.lua:2721: [string "Condition_SPELLCHARGES_STAGGER_BUFFDUR_SPEL..."]:4: attempt to perform arithmetic on a nil value
[string "=[C]"]: ?
[string "@Interface\AddOns\TellMeWhen\TellMeWhen.lua"]:2721: in function <Interface\AddOns\TellMeWhen\TellMeWhen.lua:2710>
Locals: (*temporary) = false
(*temporary) = "[string "Condition_SPELLCHARGES_STAGGER_BUFFDUR_SPEL..."]:4: attempt to perform arithmetic on a nil value"
************************
*******ERROR 2********
************************
Message: [string "Condition_SPELLCHARGES_STAGGER_BUFFDUR_SPEL..."]:4: attempt to perform arithmetic on a nil value
Time: Tue Mar 3 19:26:16 2020
Count: 6
Stack: [string "Condition_SPELLCHARGES_STAGGER_BUFFDUR_SPEL..."]:4: attempt to perform arithmetic on a nil value
[string "Condition_SPELLCHARGES_STAGGER_BUFFDUR_SPELLCHARGES_STAGGER_ABS_THREATSCALED"]:4: in function `CheckFunction'
[string "@Interface\AddOns\TellMeWhen\Components\Core\Conditions\ConditionObject.lua"]:265: in function `Check'
[string "@Interface\AddOns\TellMeWhen\Components\Core\Icon.lua"]:756: in function <Interface\AddOns\TellMeWhen\Components\Core\Icon.lua:727>
[string "=(tail call)"]: ?
[string "=[C]"]: ?
[string "safecall Dispatcher[1]"]:9: in function <[string "safecall Dispatcher[1]"]:5>
[string "=(tail call)"]: ?
[string "@Interface\AddOns\TellMeWhen\TellMeWhen.lua"]:2681: in function <Interface\AddOns\TellMeWhen\TellMeWhen.lua:2643>
Locals: <none>
If you have any idea what is causing this, it would be greatly appreciated! Let me know if any other information required that would help
Thanks very much!! | defect | what version of tellmewhen are you using hi im getting the following errors only when i switch to brewmaster spec i do not get these errors when in windwalker spec error message interface addons tellmewhen tellmewhen lua attempt to perform arithmetic on a nil value time tue mar count stack interface addons tellmewhen tellmewhen lua attempt to perform arithmetic on a nil value in function locals temporary false temporary attempt to perform arithmetic on a nil value error message attempt to perform arithmetic on a nil value time tue mar count stack attempt to perform arithmetic on a nil value in function checkfunction in function check in function in function in function locals if you have any idea what is causing this it would be greatly appreciated let me know if any other information required that would help thanks very much | 1 |
17,553 | 3,012,746,988 | IssuesEvent | 2015-07-29 02:09:09 | yawlfoundation/yawl | https://api.github.com/repos/yawlfoundation/yawl | closed | [CLOSED] Net var removal does not always lead to removal of this var in all mappings | auto-migrated Category-Editor Priority-Medium Type-Defect | <a href="https://github.com/GoogleCodeExporter"><img src="https://avatars.githubusercontent.com/u/9614759?v=3" align="left" width="96" height="96" hspace="10"></img></a> **Issue by [GoogleCodeExporter](https://github.com/GoogleCodeExporter)**
_Monday Jul 27, 2015 at 03:21 GMT_
_Originally opened as https://github.com/adamsmj/yawl/issues/98_
----
```
In new43 the net variable StringVar was removed, yet as can be seen from
new44 this variable still occurs in an output parameter mapping for task
Unique.
```
Original issue reported on code.google.com by `arthurte...@gmail.com` on 15 Aug 2008 at 6:01
Attachments:
* [new43.xml](https://storage.googleapis.com/google-code-attachments/yawl/issue-98/comment-0/new43.xml)
* [new44.xml](https://storage.googleapis.com/google-code-attachments/yawl/issue-98/comment-0/new44.xml)
| 1.0 | [CLOSED] Net var removal does not always lead to removal of this var in all mappings - <a href="https://github.com/GoogleCodeExporter"><img src="https://avatars.githubusercontent.com/u/9614759?v=3" align="left" width="96" height="96" hspace="10"></img></a> **Issue by [GoogleCodeExporter](https://github.com/GoogleCodeExporter)**
_Monday Jul 27, 2015 at 03:21 GMT_
_Originally opened as https://github.com/adamsmj/yawl/issues/98_
----
```
In new43 the net variable StringVar was removed, yet as can be seen from
new44 this variable still occurs in an output parameter mapping for task
Unique.
```
Original issue reported on code.google.com by `arthurte...@gmail.com` on 15 Aug 2008 at 6:01
Attachments:
* [new43.xml](https://storage.googleapis.com/google-code-attachments/yawl/issue-98/comment-0/new43.xml)
* [new44.xml](https://storage.googleapis.com/google-code-attachments/yawl/issue-98/comment-0/new44.xml)
| defect | net var removal does not always lead to removal of this var in all mappings issue by monday jul at gmt originally opened as in the net variable stringvar was removed yet as can be seen from this variable still occurs in an output parameter mapping for task unique original issue reported on code google com by arthurte gmail com on aug at attachments | 1 |
77,738 | 27,139,758,501 | IssuesEvent | 2023-02-16 15:34:21 | zed-industries/community | https://api.github.com/repos/zed-industries/community | closed | TypeScript error reporting issues in Zed | defect typescript language quality week candidate | ### Check for existing issues
- [X] Completed
### Describe the bug / provide steps to reproduce it
- After you fix some error, you usually have to save the file twice for the Zed to recognize that the error has been fixed. One first save, the file is shown as saved, but the diagnostics error count doesn't change. On second save, the diagnostics error count vanishes and you can tell you have fixed the bug. This happens so often that I've just started double saving every file.
- Imports don't resolve, errors don't clear
- Jumping to a definition of something in node_modules often creates all sorts of errors
### Environment
Zed 0.66.0 – /Applications/Zed Preview.app
macOS 13.0.1
architecture arm64
### If applicable, add mockups / screenshots to help explain present your vision of the feature
_No response_
### If applicable, attach your `~/Library/Logs/Zed/Zed.log` file to this issue
_No response_ | 1.0 | TypeScript error reporting issues in Zed - ### Check for existing issues
- [X] Completed
### Describe the bug / provide steps to reproduce it
- After you fix some error, you usually have to save the file twice for the Zed to recognize that the error has been fixed. One first save, the file is shown as saved, but the diagnostics error count doesn't change. On second save, the diagnostics error count vanishes and you can tell you have fixed the bug. This happens so often that I've just started double saving every file.
- Imports don't resolve, errors don't clear
- Jumping to a definition of something in node_modules often creates all sorts of errors
### Environment
Zed 0.66.0 – /Applications/Zed Preview.app
macOS 13.0.1
architecture arm64
### If applicable, add mockups / screenshots to help explain present your vision of the feature
_No response_
### If applicable, attach your `~/Library/Logs/Zed/Zed.log` file to this issue
_No response_ | defect | typescript error reporting issues in zed check for existing issues completed describe the bug provide steps to reproduce it after you fix some error you usually have to save the file twice for the zed to recognize that the error has been fixed one first save the file is shown as saved but the diagnostics error count doesn t change on second save the diagnostics error count vanishes and you can tell you have fixed the bug this happens so often that i ve just started double saving every file imports don t resolve errors don t clear jumping to a definition of something in node modules often creates all sorts of errors environment zed – applications zed preview app macos architecture if applicable add mockups screenshots to help explain present your vision of the feature no response if applicable attach your library logs zed zed log file to this issue no response | 1 |
73,189 | 24,489,883,111 | IssuesEvent | 2022-10-09 23:01:59 | caerwynj/acme-sac | https://api.github.com/repos/caerwynj/acme-sac | closed | Visible spelled wrong in README | auto-migrated Priority-Medium Type-Defect | ```
/usr/<username>README has a typo where visible is spelled visibile
```
Original issue reported on code.google.com by `brad.fr...@gmail.com` on 21 Sep 2012 at 12:46
| 1.0 | Visible spelled wrong in README - ```
/usr/<username>README has a typo where visible is spelled visibile
```
Original issue reported on code.google.com by `brad.fr...@gmail.com` on 21 Sep 2012 at 12:46
| defect | visible spelled wrong in readme usr readme has a typo where visible is spelled visibile original issue reported on code google com by brad fr gmail com on sep at | 1 |
83,382 | 16,136,952,821 | IssuesEvent | 2021-04-29 13:03:35 | joomla/joomla-cms | https://api.github.com/repos/joomla/joomla-cms | reopened | Joomla 4 - startTabSet() in some circumstances can return void | No Code Attached Yet | ### Steps to reproduce the issue
Component view html making use of Bootstrap tabs.
### Expected result
startTabSet() to return a string or a raise a sensible exception.
### Actual result
Get this message on screen:
Return value of Joomla\CMS\HTML\Helpers\Bootstrap::startTabSet() must be of the type string, none returned
### System information (as much as possible)
PHP 7.4
### Additional comments
Before closing braces should either return string or raise a sensible exception.
| 1.0 | Joomla 4 - startTabSet() in some circumstances can return void - ### Steps to reproduce the issue
Component view html making use of Bootstrap tabs.
### Expected result
startTabSet() to return a string or a raise a sensible exception.
### Actual result
Get this message on screen:
Return value of Joomla\CMS\HTML\Helpers\Bootstrap::startTabSet() must be of the type string, none returned
### System information (as much as possible)
PHP 7.4
### Additional comments
Before closing braces should either return string or raise a sensible exception.
| non_defect | joomla starttabset in some circumstances can return void steps to reproduce the issue component view html making use of bootstrap tabs expected result starttabset to return a string or a raise a sensible exception actual result get this message on screen return value of joomla cms html helpers bootstrap starttabset must be of the type string none returned system information as much as possible php additional comments before closing braces should either return string or raise a sensible exception | 0 |
344,268 | 10,342,193,467 | IssuesEvent | 2019-09-04 05:33:52 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | www.pornhub.com - video or audio doesn't play | browser-firefox-mobile engine-gecko priority-critical | <!-- @browser: Firefox Mobile 67.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 8.1.0; Mobile; rv:67.0) Gecko/67.0 Firefox/67.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: https://www.pornhub.com/view_video.php?viewkey=ph5ae24f8d51787
**Browser / Version**: Firefox Mobile 67.0
**Operating System**: Android 8.1.0
**Tested Another Browser**: Yes
**Problem type**: Video or audio doesn't play
**Description**: the video doesn't play
**Steps to Reproduce**:
[](https://webcompat.com/uploads/2019/8/28b68ff2-d4c1-4d94-a979-704c3241693c.jpeg)
<details>
<summary>Browser Configuration</summary>
<ul>
<li>mixed active content blocked: false</li><li>image.mem.shared: true</li><li>buildID: 20190415085659</li><li>tracking content blocked: false</li><li>gfx.webrender.blob-images: true</li><li>hasTouchScreen: true</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>gfx.webrender.all: false</li><li>channel: beta</li>
</ul>
<p>Console Messages:</p>
<pre>
[u'[JavaScript Warning: "Invalid URI. Load of media resource failed." {file: "https://www.pornhub.com/view_video.php?viewkey=ph5ae24f8d51787" line: 0}]', u'[JavaScript Warning: "All candidate resources failed to load. Media load paused." {file: "https://www.pornhub.com/view_video.php?viewkey=ph5ae24f8d51787" line: 0}]', u'[JavaScript Warning: "The character encoding of a framed document was not declared. The document may appear different if viewed without the document framing it." {file: "https://www.pornhub.com/ads/iframe-mobile-3.0.0.html#981|pornhub|305px|99px|#000|23|||big-dick,rough,adult-toys,orgasm,squirting,butt,big-boobs,bdsm,kink,teenager,young,petite,brunette,small-tits,tattooed,rope-bondage|Blowjob,Bondage,Brunette,HD-Porn,Popular-With-Women,Pornstar,Pussy-Licking,Rough-Sex,Small-Tits,Toys|Bruce-Venture,Sabrina-Banks|top|video|0|2019082901" line: 0}]', u'[JavaScript Warning: "The character encoding of a framed document was not declared. The document may appear different if viewed without the document framing it." {file: "https://www.pornhub.com/ads/iframe-mobile-3.0.0.html#4038|pornhub|305px|99px|#000|23|||big-dick,rough,adult-toys,orgasm,squirting,butt,big-boobs,bdsm,kink,teenager,young,petite,brunette,small-tits,tattooed,rope-bondage|Blowjob,Bondage,Brunette,HD-Porn,Popular-With-Women,Pornstar,Pussy-Licking,Rough-Sex,Small-Tits,Toys|Bruce-Venture,Sabrina-Banks|video|video|0|2019082901" line: 0}]', u'[JavaScript Warning: "The character encoding of a framed document was not declared. The document may appear different if viewed without the document framing it." {file: "https://www.pornhub.com/ads/iframe-mobile-3.0.0.html#985|pornhub|305px|250px|#000|23|||big-dick,rough,adult-toys,orgasm,squirting,butt,big-boobs,bdsm,kink,teenager,young,petite,brunette,small-tits,tattooed,rope-bondage|Blowjob,Bondage,Brunette,HD-Porn,Popular-With-Women,Pornstar,Pussy-Licking,Rough-Sex,Small-Tits,Toys|Bruce-Venture,Sabrina-Banks|bottom|video|0|2019082901" line: 0}]', u'[console.info(Getting LocalStorageManager instance) https://ci.phncdn.com/www-static/js/lib/ph-functions.js?cache=2019082901:1:16499]', u'[JavaScript Warning: "Use of Mutation Events is deprecated. Use MutationObserver instead." {file: "https://cdn1d-static-shared.phncdn.com/jquery-2.0.3.js?cache=2019082901" line: 25}]', u'[JavaScript Warning: "HTTP load failed with status 474. Load of media resource https://em.phncdn.com/videos/201804/26/163675441/480P_600K_163675441.mp4?validfrom=1567251632&validto=1567258832&rate=96k&burst=1400k&ip=197.210.58.41&hash=AC6rJc0vJ2OpzMrF4JbWyYCK1c0%3D failed." {file: "https://www.pornhub.com/view_video.php?viewkey=ph5ae24f8d51787" line: 0}]', u'[JavaScript Error: "NotSupportedError: The media resource indicated by the src attribute or assigned media provider object was not suitable."]']
</pre>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_ | 1.0 | www.pornhub.com - video or audio doesn't play - <!-- @browser: Firefox Mobile 67.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 8.1.0; Mobile; rv:67.0) Gecko/67.0 Firefox/67.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: https://www.pornhub.com/view_video.php?viewkey=ph5ae24f8d51787
**Browser / Version**: Firefox Mobile 67.0
**Operating System**: Android 8.1.0
**Tested Another Browser**: Yes
**Problem type**: Video or audio doesn't play
**Description**: the video doesn't play
**Steps to Reproduce**:
[](https://webcompat.com/uploads/2019/8/28b68ff2-d4c1-4d94-a979-704c3241693c.jpeg)
<details>
<summary>Browser Configuration</summary>
<ul>
<li>mixed active content blocked: false</li><li>image.mem.shared: true</li><li>buildID: 20190415085659</li><li>tracking content blocked: false</li><li>gfx.webrender.blob-images: true</li><li>hasTouchScreen: true</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>gfx.webrender.all: false</li><li>channel: beta</li>
</ul>
<p>Console Messages:</p>
<pre>
[u'[JavaScript Warning: "Invalid URI. Load of media resource failed." {file: "https://www.pornhub.com/view_video.php?viewkey=ph5ae24f8d51787" line: 0}]', u'[JavaScript Warning: "All candidate resources failed to load. Media load paused." {file: "https://www.pornhub.com/view_video.php?viewkey=ph5ae24f8d51787" line: 0}]', u'[JavaScript Warning: "The character encoding of a framed document was not declared. The document may appear different if viewed without the document framing it." {file: "https://www.pornhub.com/ads/iframe-mobile-3.0.0.html#981|pornhub|305px|99px|#000|23|||big-dick,rough,adult-toys,orgasm,squirting,butt,big-boobs,bdsm,kink,teenager,young,petite,brunette,small-tits,tattooed,rope-bondage|Blowjob,Bondage,Brunette,HD-Porn,Popular-With-Women,Pornstar,Pussy-Licking,Rough-Sex,Small-Tits,Toys|Bruce-Venture,Sabrina-Banks|top|video|0|2019082901" line: 0}]', u'[JavaScript Warning: "The character encoding of a framed document was not declared. The document may appear different if viewed without the document framing it." {file: "https://www.pornhub.com/ads/iframe-mobile-3.0.0.html#4038|pornhub|305px|99px|#000|23|||big-dick,rough,adult-toys,orgasm,squirting,butt,big-boobs,bdsm,kink,teenager,young,petite,brunette,small-tits,tattooed,rope-bondage|Blowjob,Bondage,Brunette,HD-Porn,Popular-With-Women,Pornstar,Pussy-Licking,Rough-Sex,Small-Tits,Toys|Bruce-Venture,Sabrina-Banks|video|video|0|2019082901" line: 0}]', u'[JavaScript Warning: "The character encoding of a framed document was not declared. The document may appear different if viewed without the document framing it." {file: "https://www.pornhub.com/ads/iframe-mobile-3.0.0.html#985|pornhub|305px|250px|#000|23|||big-dick,rough,adult-toys,orgasm,squirting,butt,big-boobs,bdsm,kink,teenager,young,petite,brunette,small-tits,tattooed,rope-bondage|Blowjob,Bondage,Brunette,HD-Porn,Popular-With-Women,Pornstar,Pussy-Licking,Rough-Sex,Small-Tits,Toys|Bruce-Venture,Sabrina-Banks|bottom|video|0|2019082901" line: 0}]', u'[console.info(Getting LocalStorageManager instance) https://ci.phncdn.com/www-static/js/lib/ph-functions.js?cache=2019082901:1:16499]', u'[JavaScript Warning: "Use of Mutation Events is deprecated. Use MutationObserver instead." {file: "https://cdn1d-static-shared.phncdn.com/jquery-2.0.3.js?cache=2019082901" line: 25}]', u'[JavaScript Warning: "HTTP load failed with status 474. Load of media resource https://em.phncdn.com/videos/201804/26/163675441/480P_600K_163675441.mp4?validfrom=1567251632&validto=1567258832&rate=96k&burst=1400k&ip=197.210.58.41&hash=AC6rJc0vJ2OpzMrF4JbWyYCK1c0%3D failed." {file: "https://www.pornhub.com/view_video.php?viewkey=ph5ae24f8d51787" line: 0}]', u'[JavaScript Error: "NotSupportedError: The media resource indicated by the src attribute or assigned media provider object was not suitable."]']
</pre>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_ | non_defect | video or audio doesn t play url browser version firefox mobile operating system android tested another browser yes problem type video or audio doesn t play description the video doesn t play steps to reproduce browser configuration mixed active content blocked false image mem shared true buildid tracking content blocked false gfx webrender blob images true hastouchscreen true mixed passive content blocked false gfx webrender enabled false gfx webrender all false channel beta console messages u u u u u u u u from with ❤️ | 0 |
198,797 | 22,674,117,221 | IssuesEvent | 2022-07-04 01:18:30 | attesch/zencart | https://api.github.com/repos/attesch/zencart | opened | CVE-2022-31091 (High) detected in guzzlehttp/guzzle-6.3.3 | security vulnerability | ## CVE-2022-31091 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>guzzlehttp/guzzle-6.3.3</b></p></summary>
<p>Guzzle, an extensible PHP HTTP client</p>
<p>
Dependency Hierarchy:
- behat/mink-goutte-driver-v1.2.1 (Root Library)
- fabpot/goutte-v3.2.3
- :x: **guzzlehttp/guzzle-6.3.3** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Guzzle, an extensible PHP HTTP client. `Authorization` and `Cookie` headers on requests are sensitive information. In affected versions on making a request which responds with a redirect to a URI with a different port, if we choose to follow it, we should remove the `Authorization` and `Cookie` headers from the request, before containing. Previously, we would only consider a change in host or scheme. Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5. Note that a partial fix was implemented in Guzzle 7.4.2, where a change in host would trigger removal of the curl-added Authorization header, however this earlier fix did not cover change in scheme or change in port. An alternative approach would be to use your own redirect middleware, rather than ours, if you are unable to upgrade. If you do not require or expect redirects to be followed, one should simply disable redirects all together.
<p>Publish Date: 2022-06-27
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-31091>CVE-2022-31091</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31091">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31091</a></p>
<p>Release Date: 2022-06-27</p>
<p>Fix Resolution: 6.5.8,7.4.5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-31091 (High) detected in guzzlehttp/guzzle-6.3.3 - ## CVE-2022-31091 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>guzzlehttp/guzzle-6.3.3</b></p></summary>
<p>Guzzle, an extensible PHP HTTP client</p>
<p>
Dependency Hierarchy:
- behat/mink-goutte-driver-v1.2.1 (Root Library)
- fabpot/goutte-v3.2.3
- :x: **guzzlehttp/guzzle-6.3.3** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Guzzle, an extensible PHP HTTP client. `Authorization` and `Cookie` headers on requests are sensitive information. In affected versions on making a request which responds with a redirect to a URI with a different port, if we choose to follow it, we should remove the `Authorization` and `Cookie` headers from the request, before containing. Previously, we would only consider a change in host or scheme. Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5. Note that a partial fix was implemented in Guzzle 7.4.2, where a change in host would trigger removal of the curl-added Authorization header, however this earlier fix did not cover change in scheme or change in port. An alternative approach would be to use your own redirect middleware, rather than ours, if you are unable to upgrade. If you do not require or expect redirects to be followed, one should simply disable redirects all together.
<p>Publish Date: 2022-06-27
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-31091>CVE-2022-31091</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31091">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31091</a></p>
<p>Release Date: 2022-06-27</p>
<p>Fix Resolution: 6.5.8,7.4.5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_defect | cve high detected in guzzlehttp guzzle cve high severity vulnerability vulnerable library guzzlehttp guzzle guzzle an extensible php http client dependency hierarchy behat mink goutte driver root library fabpot goutte x guzzlehttp guzzle vulnerable library vulnerability details guzzle an extensible php http client authorization and cookie headers on requests are sensitive information in affected versions on making a request which responds with a redirect to a uri with a different port if we choose to follow it we should remove the authorization and cookie headers from the request before containing previously we would only consider a change in host or scheme affected guzzle users should upgrade to guzzle as soon as possible affected users using any earlier series of guzzle should upgrade to guzzle or note that a partial fix was implemented in guzzle where a change in host would trigger removal of the curl added authorization header however this earlier fix did not cover change in scheme or change in port an alternative approach would be to use your own redirect middleware rather than ours if you are unable to upgrade if you do not require or expect redirects to be followed one should simply disable redirects all together publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
155,966 | 5,962,813,357 | IssuesEvent | 2017-05-30 01:02:47 | input-output-hk/cardano-sl | https://api.github.com/repos/input-output-hk/cardano-sl | closed | [CSL-332] Integrate latest Kademlia with CSL | Mirroring Priority:Normal State:Done Tag:Star Type:Task | <blockquote>@georgeee</blockquote>
Under issues, marked with `P2P modification proposal` tag, we introduced some improvements to Kademlia.
Need to:
* Test all these changes work well
* Use latest Kademlia commit in CSL
* Expose additional APIs to CSL, at least:
** Use of smarter keys (based on hashing)
** `banNode :: ResponseMode ssc m => Text -> Severity -> m ()`
*** `Text` is reason of ban, for logging purposes
*** `Severity` is some enum-like data type, reflecting how severe should be punishment
*** `Severity` should map to period of ban
<!--MIRROR_META={"service":"youtrack","id":"CSL-332"}--> | 1.0 | [CSL-332] Integrate latest Kademlia with CSL - <blockquote>@georgeee</blockquote>
Under issues, marked with `P2P modification proposal` tag, we introduced some improvements to Kademlia.
Need to:
* Test all these changes work well
* Use latest Kademlia commit in CSL
* Expose additional APIs to CSL, at least:
** Use of smarter keys (based on hashing)
** `banNode :: ResponseMode ssc m => Text -> Severity -> m ()`
*** `Text` is reason of ban, for logging purposes
*** `Severity` is some enum-like data type, reflecting how severe should be punishment
*** `Severity` should map to period of ban
<!--MIRROR_META={"service":"youtrack","id":"CSL-332"}--> | non_defect | integrate latest kademlia with csl georgeee under issues marked with modification proposal tag we introduced some improvements to kademlia need to test all these changes work well use latest kademlia commit in csl expose additional apis to csl at least use of smarter keys based on hashing bannode responsemode ssc m text severity m text is reason of ban for logging purposes severity is some enum like data type reflecting how severe should be punishment severity should map to period of ban | 0 |
56,368 | 15,037,876,987 | IssuesEvent | 2021-02-02 16:49:23 | galasa-dev/projectmanagement | https://api.github.com/repos/galasa-dev/projectmanagement | closed | BackupCPS fails with `ClosedByInterruptException` - intermittent. | defect | Currently occurs when backing up properties from a remote ecosystem. Suspect content (to be written) size is a factor - though avoiding the actual interrupt may be preferable.
Need to investigate and fix. Possibly to do with a local environment setup. Tracking here just in case.
Example output of failure in logs:
```
28/01/2021 09:52:41.387 ERROR d.g.f.BackupCPS - Failed to save CPS properties:
java.nio.channels.ClosedByInterruptException
at java.nio.channels.spi.AbstractInterruptibleChannel.end(AbstractInterruptibleChannel.java:202)
at sun.nio.ch.FileChannelImpl.write(FileChannelImpl.java:216)
at java.nio.channels.Channels.writeFullyImpl(Channels.java:78)
at java.nio.channels.Channels.writeFully(Channels.java:101)
at java.nio.channels.Channels.access$000(Channels.java:61)
at java.nio.channels.Channels$1.write(Channels.java:174)
at java.nio.file.Files.write(Files.java:3297)
at dev.galasa.framework.BackupCPS.outputCPSProperties(BackupCPS.java:103)
at dev.galasa.framework.BackupCPS.backup(BackupCPS.java:70)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at dev.galasa.boot.felix.FelixFramework.runBackupCPS(FelixFramework.java:483)
at dev.galasa.boot.Launcher.launch(Launcher.java:181)
at dev.galasa.boot.Launcher.main(Launcher.java:117)
28/01/2021 09:52:41.389 INFO d.g.f.BackupCPS - Ending CPS Backup Service
28/01/2021 09:52:41.389 INFO d.g.f.Framework - Shutting down the framework
28/01/2021 09:52:41.395 INFO d.g.f.Framework - Framework shutdown
28/01/2021 09:52:41.396 DEBUG dev.galasa.boot.felix.FelixFramework.stopFramework - Stopping Felix framework
28/01/2021 09:52:41.400 INFO d.g.f.Framework - Framework service deactivated
```
| 1.0 | BackupCPS fails with `ClosedByInterruptException` - intermittent. - Currently occurs when backing up properties from a remote ecosystem. Suspect content (to be written) size is a factor - though avoiding the actual interrupt may be preferable.
Need to investigate and fix. Possibly to do with a local environment setup. Tracking here just in case.
Example output of failure in logs:
```
28/01/2021 09:52:41.387 ERROR d.g.f.BackupCPS - Failed to save CPS properties:
java.nio.channels.ClosedByInterruptException
at java.nio.channels.spi.AbstractInterruptibleChannel.end(AbstractInterruptibleChannel.java:202)
at sun.nio.ch.FileChannelImpl.write(FileChannelImpl.java:216)
at java.nio.channels.Channels.writeFullyImpl(Channels.java:78)
at java.nio.channels.Channels.writeFully(Channels.java:101)
at java.nio.channels.Channels.access$000(Channels.java:61)
at java.nio.channels.Channels$1.write(Channels.java:174)
at java.nio.file.Files.write(Files.java:3297)
at dev.galasa.framework.BackupCPS.outputCPSProperties(BackupCPS.java:103)
at dev.galasa.framework.BackupCPS.backup(BackupCPS.java:70)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at dev.galasa.boot.felix.FelixFramework.runBackupCPS(FelixFramework.java:483)
at dev.galasa.boot.Launcher.launch(Launcher.java:181)
at dev.galasa.boot.Launcher.main(Launcher.java:117)
28/01/2021 09:52:41.389 INFO d.g.f.BackupCPS - Ending CPS Backup Service
28/01/2021 09:52:41.389 INFO d.g.f.Framework - Shutting down the framework
28/01/2021 09:52:41.395 INFO d.g.f.Framework - Framework shutdown
28/01/2021 09:52:41.396 DEBUG dev.galasa.boot.felix.FelixFramework.stopFramework - Stopping Felix framework
28/01/2021 09:52:41.400 INFO d.g.f.Framework - Framework service deactivated
```
| defect | backupcps fails with closedbyinterruptexception intermittent currently occurs when backing up properties from a remote ecosystem suspect content to be written size is a factor though avoiding the actual interrupt may be preferable need to investigate and fix possibly to do with a local environment setup tracking here just in case example output of failure in logs error d g f backupcps failed to save cps properties java nio channels closedbyinterruptexception at java nio channels spi abstractinterruptiblechannel end abstractinterruptiblechannel java at sun nio ch filechannelimpl write filechannelimpl java at java nio channels channels writefullyimpl channels java at java nio channels channels writefully channels java at java nio channels channels access channels java at java nio channels channels write channels java at java nio file files write files java at dev galasa framework backupcps outputcpsproperties backupcps java at dev galasa framework backupcps backup backupcps java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at dev galasa boot felix felixframework runbackupcps felixframework java at dev galasa boot launcher launch launcher java at dev galasa boot launcher main launcher java info d g f backupcps ending cps backup service info d g f framework shutting down the framework info d g f framework framework shutdown debug dev galasa boot felix felixframework stopframework stopping felix framework info d g f framework framework service deactivated | 1 |
125,110 | 26,595,360,863 | IssuesEvent | 2023-01-23 12:03:43 | nopSolutions/nopCommerce | https://api.github.com/repos/nopSolutions/nopCommerce | closed | System.Text.Json instead of Newtonsoft.Json | refactoring / source code | Measurements of performance show that this library is faster, but its functionality is still inferior to "Newtonsoft.Json". We will need to solve a number of problems to start using "System.Text.Json"
See [more](https://docs.microsoft.com/en-us/dotnet/standard/serialization/system-text-json-overview)
[How to migrate from Newtonsoft.Json to System.Text.Json](https://docs.microsoft.com/en-us/dotnet/standard/serialization/system-text-json-migrate-from-newtonsoft-how-to)
| 1.0 | System.Text.Json instead of Newtonsoft.Json - Measurements of performance show that this library is faster, but its functionality is still inferior to "Newtonsoft.Json". We will need to solve a number of problems to start using "System.Text.Json"
See [more](https://docs.microsoft.com/en-us/dotnet/standard/serialization/system-text-json-overview)
[How to migrate from Newtonsoft.Json to System.Text.Json](https://docs.microsoft.com/en-us/dotnet/standard/serialization/system-text-json-migrate-from-newtonsoft-how-to)
| non_defect | system text json instead of newtonsoft json measurements of performance show that this library is faster but its functionality is still inferior to newtonsoft json we will need to solve a number of problems to start using system text json see | 0 |
70,160 | 23,026,182,775 | IssuesEvent | 2022-07-22 09:26:11 | matrix-org/synapse | https://api.github.com/repos/matrix-org/synapse | closed | Memory leak in `/sync` when opentracing is enabled | A-Sync S-Minor T-Defect | The latest version of frozendict, 2.3.2, has a memory leak in `__repr__` which gets triggered during `/sync` when opentracing is enabled.
To demonstrate:
```py
d = {"asdsd": "dklfj"}
while True:
_ = repr(frozendict(d))
```
`__repr__` gets hit during `/sync` like so (line numbers are wonky for some reason):
```
Thread 1 "python" hit Breakpoint 1, frozendict_repr (mp=0x7f62eada3130) at frozendict/src/3_8/frozendictobject.c:300
300 in frozendict/src/3_8/frozendictobject.c
(gdb) py-bt
Traceback (most recent call first):
File "<attrs generated repr synapse.types.RoomStreamToken>", line 13, in __repr__
File "<attrs generated repr synapse.types.StreamToken>", line 13, in __repr__
File "/home/squah/repos/synapse/.venv/lib/python3.8/site-packages/jaeger_client/thrift.py", line 58, in _to_string
return str(s)
File "/home/squah/repos/synapse/.venv/lib/python3.8/site-packages/jaeger_client/thrift.py", line 107, in _make_string_tag
value = _to_string(value)
File "/home/squah/repos/synapse/.venv/lib/python3.8/site-packages/jaeger_client/thrift.py", line 1366, in make_tag
File "/home/squah/repos/synapse/.venv/lib/python3.8/site-packages/jaeger_client/thrift.py", line 669, in <listcomp>
File "/home/squah/repos/synapse/.venv/lib/python3.8/site-packages/jaeger_client/thrift.py", line 412, in make_tags
File "/home/squah/repos/synapse/.venv/lib/python3.8/site-packages/jaeger_client/thrift.py", line 422, in make_log
File "/home/squah/repos/synapse/.venv/lib/python3.8/site-packages/jaeger_client/span.py", line 397, in log_kv
File "/home/squah/repos/synapse/synapse/logging/opentracing.py", line 614, in log_kv
opentracing.tracer.active_span.log_kv(key_values, timestamp)
File "/home/squah/repos/synapse/synapse/logging/opentracing.py", line 632, in ensure_active_span_inner_2
"""
File "/home/squah/repos/synapse/synapse/handlers/sync.py", line 2771, in _generate_room_entry
File "/home/squah/repos/synapse/synapse/handlers/sync.py", line 1818, in handle_room_entries
# We loop through all room ids, even if there are no new events, in case
File "/home/squah/repos/synapse/synapse/util/async_helpers.py", line 227, in _concurrently_execute_inner
await maybe_awaitable(func(value))
```
Once the memory leak in frozendict has been fixed, we need to update our locked dependencies.
This might not be the only memory leak during sync, since memory usage still appears to grow with lots of initial `/sync` requests even with opentracing disabled. | 1.0 | Memory leak in `/sync` when opentracing is enabled - The latest version of frozendict, 2.3.2, has a memory leak in `__repr__` which gets triggered during `/sync` when opentracing is enabled.
To demonstrate:
```py
d = {"asdsd": "dklfj"}
while True:
_ = repr(frozendict(d))
```
`__repr__` gets hit during `/sync` like so (line numbers are wonky for some reason):
```
Thread 1 "python" hit Breakpoint 1, frozendict_repr (mp=0x7f62eada3130) at frozendict/src/3_8/frozendictobject.c:300
300 in frozendict/src/3_8/frozendictobject.c
(gdb) py-bt
Traceback (most recent call first):
File "<attrs generated repr synapse.types.RoomStreamToken>", line 13, in __repr__
File "<attrs generated repr synapse.types.StreamToken>", line 13, in __repr__
File "/home/squah/repos/synapse/.venv/lib/python3.8/site-packages/jaeger_client/thrift.py", line 58, in _to_string
return str(s)
File "/home/squah/repos/synapse/.venv/lib/python3.8/site-packages/jaeger_client/thrift.py", line 107, in _make_string_tag
value = _to_string(value)
File "/home/squah/repos/synapse/.venv/lib/python3.8/site-packages/jaeger_client/thrift.py", line 1366, in make_tag
File "/home/squah/repos/synapse/.venv/lib/python3.8/site-packages/jaeger_client/thrift.py", line 669, in <listcomp>
File "/home/squah/repos/synapse/.venv/lib/python3.8/site-packages/jaeger_client/thrift.py", line 412, in make_tags
File "/home/squah/repos/synapse/.venv/lib/python3.8/site-packages/jaeger_client/thrift.py", line 422, in make_log
File "/home/squah/repos/synapse/.venv/lib/python3.8/site-packages/jaeger_client/span.py", line 397, in log_kv
File "/home/squah/repos/synapse/synapse/logging/opentracing.py", line 614, in log_kv
opentracing.tracer.active_span.log_kv(key_values, timestamp)
File "/home/squah/repos/synapse/synapse/logging/opentracing.py", line 632, in ensure_active_span_inner_2
"""
File "/home/squah/repos/synapse/synapse/handlers/sync.py", line 2771, in _generate_room_entry
File "/home/squah/repos/synapse/synapse/handlers/sync.py", line 1818, in handle_room_entries
# We loop through all room ids, even if there are no new events, in case
File "/home/squah/repos/synapse/synapse/util/async_helpers.py", line 227, in _concurrently_execute_inner
await maybe_awaitable(func(value))
```
Once the memory leak in frozendict has been fixed, we need to update our locked dependencies.
This might not be the only memory leak during sync, since memory usage still appears to grow with lots of initial `/sync` requests even with opentracing disabled. | defect | memory leak in sync when opentracing is enabled the latest version of frozendict has a memory leak in repr which gets triggered during sync when opentracing is enabled to demonstrate py d asdsd dklfj while true repr frozendict d repr gets hit during sync like so line numbers are wonky for some reason thread python hit breakpoint frozendict repr mp at frozendict src frozendictobject c in frozendict src frozendictobject c gdb py bt traceback most recent call first file line in repr file line in repr file home squah repos synapse venv lib site packages jaeger client thrift py line in to string return str s file home squah repos synapse venv lib site packages jaeger client thrift py line in make string tag value to string value file home squah repos synapse venv lib site packages jaeger client thrift py line in make tag file home squah repos synapse venv lib site packages jaeger client thrift py line in file home squah repos synapse venv lib site packages jaeger client thrift py line in make tags file home squah repos synapse venv lib site packages jaeger client thrift py line in make log file home squah repos synapse venv lib site packages jaeger client span py line in log kv file home squah repos synapse synapse logging opentracing py line in log kv opentracing tracer active span log kv key values timestamp file home squah repos synapse synapse logging opentracing py line in ensure active span inner file home squah repos synapse synapse handlers sync py line in generate room entry file home squah repos synapse synapse handlers sync py line in handle room entries we loop through all room ids even if there are no new events in case file home squah repos synapse synapse util async helpers py line in concurrently execute inner await maybe awaitable func value once the memory leak in frozendict has been fixed we need to update our locked dependencies this might not be the only memory leak during sync since memory usage still appears to grow with lots of initial sync requests even with opentracing disabled | 1 |
227,140 | 25,031,390,148 | IssuesEvent | 2022-11-04 12:41:59 | sast-automation-dev/JavaVulnerableLab-46 | https://api.github.com/repos/sast-automation-dev/JavaVulnerableLab-46 | opened | jstl-1.2.jar: 1 vulnerabilities (highest severity is: 7.3) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jstl-1.2.jar</b></p></summary>
<p></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /javax/servlet/jstl/1.2/jstl-1.2.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/JavaVulnerableLab-46/commit/de38e3459d9fa32e0df1d446dc789b477ea3bf06">de38e3459d9fa32e0df1d446dc789b477ea3bf06</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (jstl version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2015-0254](https://www.mend.io/vulnerability-database/CVE-2015-0254) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | jstl-1.2.jar | Direct | org.apache.taglibs:taglibs-standard-impl:1.2.3 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2015-0254</summary>
### Vulnerable Library - <b>jstl-1.2.jar</b></p>
<p></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /javax/servlet/jstl/1.2/jstl-1.2.jar</p>
<p>
Dependency Hierarchy:
- :x: **jstl-1.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/JavaVulnerableLab-46/commit/de38e3459d9fa32e0df1d446dc789b477ea3bf06">de38e3459d9fa32e0df1d446dc789b477ea3bf06</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) <x:parse> or (2) <x:transform> JSTL XML tag.
<p>Publish Date: 2015-03-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2015-0254>CVE-2015-0254</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://tomcat.apache.org/taglibs/standard/">https://tomcat.apache.org/taglibs/standard/</a></p>
<p>Release Date: 2015-03-09</p>
<p>Fix Resolution: org.apache.taglibs:taglibs-standard-impl:1.2.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | True | jstl-1.2.jar: 1 vulnerabilities (highest severity is: 7.3) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jstl-1.2.jar</b></p></summary>
<p></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /javax/servlet/jstl/1.2/jstl-1.2.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/JavaVulnerableLab-46/commit/de38e3459d9fa32e0df1d446dc789b477ea3bf06">de38e3459d9fa32e0df1d446dc789b477ea3bf06</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (jstl version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2015-0254](https://www.mend.io/vulnerability-database/CVE-2015-0254) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | jstl-1.2.jar | Direct | org.apache.taglibs:taglibs-standard-impl:1.2.3 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2015-0254</summary>
### Vulnerable Library - <b>jstl-1.2.jar</b></p>
<p></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /javax/servlet/jstl/1.2/jstl-1.2.jar</p>
<p>
Dependency Hierarchy:
- :x: **jstl-1.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/JavaVulnerableLab-46/commit/de38e3459d9fa32e0df1d446dc789b477ea3bf06">de38e3459d9fa32e0df1d446dc789b477ea3bf06</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) <x:parse> or (2) <x:transform> JSTL XML tag.
<p>Publish Date: 2015-03-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2015-0254>CVE-2015-0254</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://tomcat.apache.org/taglibs/standard/">https://tomcat.apache.org/taglibs/standard/</a></p>
<p>Release Date: 2015-03-09</p>
<p>Fix Resolution: org.apache.taglibs:taglibs-standard-impl:1.2.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | non_defect | jstl jar vulnerabilities highest severity is vulnerable library jstl jar path to dependency file pom xml path to vulnerable library javax servlet jstl jstl jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in jstl version remediation available high jstl jar direct org apache taglibs taglibs standard impl details cve vulnerable library jstl jar path to dependency file pom xml path to vulnerable library javax servlet jstl jstl jar dependency hierarchy x jstl jar vulnerable library found in head commit a href found in base branch master vulnerability details apache standard taglibs before allows remote attackers to execute arbitrary code or conduct external xml entity xxe attacks via a crafted xslt extension in a or jstl xml tag publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache taglibs taglibs standard impl rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue | 0 |
51,767 | 13,211,304,071 | IssuesEvent | 2020-08-15 22:10:28 | icecube-trac/tix4 | https://api.github.com/repos/icecube-trac/tix4 | opened | I3Tree<I3Particle> cannot be deserialized (Trac #1013) | Incomplete Migration Migrated from Trac combo core defect | <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1013">https://code.icecube.wisc.edu/projects/icecube/ticket/1013</a>, reported by lraedeland owned by david.schultz</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2015-08-10T20:31:17",
"_ts": "1439238677802127",
"description": "Using the current icerec trunk I get the following error\n\n\"FATAL (Tree): Assertion failed: insertResult.second (I3MCTree_impl.h:625 in void TreeBase::Tree<T, Key, Hash>::insert(const T&) [with T = I3Particle, Key = I3ParticleID, Hash = __gnu_cxx::hash<I3ParticleID>])\n\nUncaught exception in event loop:\n\nAssertion failed: insertResult.second (in void TreeBase::Tree<T, Key, Hash>::insert(const T&) [with T = I3Particle, Key = I3ParticleID, Hash = __gnu_cxx::hash<I3ParticleID>])\"\n\nwhen trying to deserialize an I3Tree<I3Particle>-object with dataio, dataio-pyshovel and steamshovel. An example file can be found here /data/user/lraedel/shared/tree_serialization.i3.bz2 It only contains a single key with the mentioned type.",
"reporter": "lraedel",
"cc": "david.schultz@icecube.wisc.edu",
"resolution": "fixed",
"time": "2015-06-08T16:18:21",
"component": "combo core",
"summary": "I3Tree<I3Particle> cannot be deserialized",
"priority": "critical",
"keywords": "",
"milestone": "",
"owner": "david.schultz",
"type": "defect"
}
```
</p>
</details>
| 1.0 | I3Tree<I3Particle> cannot be deserialized (Trac #1013) - <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1013">https://code.icecube.wisc.edu/projects/icecube/ticket/1013</a>, reported by lraedeland owned by david.schultz</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2015-08-10T20:31:17",
"_ts": "1439238677802127",
"description": "Using the current icerec trunk I get the following error\n\n\"FATAL (Tree): Assertion failed: insertResult.second (I3MCTree_impl.h:625 in void TreeBase::Tree<T, Key, Hash>::insert(const T&) [with T = I3Particle, Key = I3ParticleID, Hash = __gnu_cxx::hash<I3ParticleID>])\n\nUncaught exception in event loop:\n\nAssertion failed: insertResult.second (in void TreeBase::Tree<T, Key, Hash>::insert(const T&) [with T = I3Particle, Key = I3ParticleID, Hash = __gnu_cxx::hash<I3ParticleID>])\"\n\nwhen trying to deserialize an I3Tree<I3Particle>-object with dataio, dataio-pyshovel and steamshovel. An example file can be found here /data/user/lraedel/shared/tree_serialization.i3.bz2 It only contains a single key with the mentioned type.",
"reporter": "lraedel",
"cc": "david.schultz@icecube.wisc.edu",
"resolution": "fixed",
"time": "2015-06-08T16:18:21",
"component": "combo core",
"summary": "I3Tree<I3Particle> cannot be deserialized",
"priority": "critical",
"keywords": "",
"milestone": "",
"owner": "david.schultz",
"type": "defect"
}
```
</p>
</details>
| defect | cannot be deserialized trac migrated from json status closed changetime ts description using the current icerec trunk i get the following error n n fatal tree assertion failed insertresult second impl h in void treebase tree insert const t n nuncaught exception in event loop n nassertion failed insertresult second in void treebase tree insert const t n nwhen trying to deserialize an object with dataio dataio pyshovel and steamshovel an example file can be found here data user lraedel shared tree serialization it only contains a single key with the mentioned type reporter lraedel cc david schultz icecube wisc edu resolution fixed time component combo core summary cannot be deserialized priority critical keywords milestone owner david schultz type defect | 1 |
13,283 | 2,744,364,585 | IssuesEvent | 2015-04-22 06:47:51 | jOOQ/jOOX | https://api.github.com/repos/jOOQ/jOOX | closed | Match.content() doesn't return <![CDATA[ ]]> wrapper | P: Medium R: fixed T: defect | content() ignores CDATA wrappers.
For instance:
```xml
<ALink id="URL1"><![CDATA[http://www.google.com]]></ALink>
```
will return
```
http://www.google.com
``` | 1.0 | Match.content() doesn't return <![CDATA[ ]]> wrapper - content() ignores CDATA wrappers.
For instance:
```xml
<ALink id="URL1"><![CDATA[http://www.google.com]]></ALink>
```
will return
```
http://www.google.com
``` | defect | match content doesn t return wrapper content ignores cdata wrappers for instance xml will return | 1 |
15,615 | 2,862,881,001 | IssuesEvent | 2015-06-04 08:38:21 | jOOQ/jOOQ | https://api.github.com/repos/jOOQ/jOOQ | closed | Wrong @Support value for SQLite which doesn't support ALTER TABLE .. DROP, SET, ADD CONSTRAINT, etc. | C: DB: SQLite C: Documentation P: Low R: Fixed T: Defect | See also:
http://www.sqlite.org/omitted.html | 1.0 | Wrong @Support value for SQLite which doesn't support ALTER TABLE .. DROP, SET, ADD CONSTRAINT, etc. - See also:
http://www.sqlite.org/omitted.html | defect | wrong support value for sqlite which doesn t support alter table drop set add constraint etc see also | 1 |
13,893 | 2,789,614,028 | IssuesEvent | 2015-05-08 20:24:52 | orwant/google-visualization-issues | https://api.github.com/repos/orwant/google-visualization-issues | opened | Errors : this.Rb is undefined (Firefox) | Priority-Medium Type-Defect | Original [issue 288](https://code.google.com/p/google-visualization-api-issues/issues/detail?id=288) created by orwant on 2010-05-20T06:38:24.000Z:
<b>What steps will reproduce the problem? Please provide a link to a</b>
<b>demonstration page if at all possible, or attach code.</b>
I just follow what is in on the examples using the newly released version
of the Google visualization api.
On firefox 3.0.19 it has this error : this.Rb is undefined
and on Google chrome 5.0 : Cannot read property '0' of undefined
I pasted this on the head section of my page and made sure there is a
'chart_div' in the body:
<script type="text/javascript" src="http://www.google.com/jsapi"></script>
<script type="text/javascript">
google.load("visualization", "1", {packages:["corechart"]});
google.setOnLoadCallback(drawChart);
function drawChart() {
var data = new google.visualization.DataTable();
data.addColumn('string', 'Year');
data.addColumn('number', 'Sales');
data.addColumn('number', 'Expenses');
data.addRows(4);
data.setValue(0, 0, '2004');
data.setValue(0, 1, 1000);
data.setValue(0, 2, 400);
data.setValue(1, 0, '2005');
data.setValue(1, 1, 1170);
data.setValue(1, 2, 460);
data.setValue(2, 0, '2006');
data.setValue(2, 1, 660);
data.setValue(2, 2, 1120);
data.setValue(3, 0, '2007');
data.setValue(3, 1, 1030);
data.setValue(3, 2, 540);
var chart = new
google.visualization.BarChart(document.getElementById('chart_div'));
chart.draw(data, {width: 400, height: 240, title: 'Company
Performance',
vAxis: {title: 'Year', titleColor: 'red'}
});
}
</script>
<b>What component is this issue related to (PieChart, LineChart, DataTable,</b>
Query, etc)? corechart (although in the example it uses BarChart)
<b>Are you using the test environment (version 1.1)?</b>
(If you are not sure, answer NO) - NO.
<b>What operating system and browser are you using?</b>
OS - Kubuntu 9.04 Jaunty Jackalope
Firefox 3.0.19
Google chrome 5.0
It should be noted that the above errors are only showing if I run it in a
Rails-based application. For PHP-based web applications everything's fine.
Thanks!
<b>*********************************************************</b>
<b>For developers viewing this issue: please click the 'star' icon to be</b>
<b>notified of future changes, and to let us know how many of you are</b>
<b>interested in seeing it resolved.</b>
<b>*********************************************************</b>
| 1.0 | Errors : this.Rb is undefined (Firefox) - Original [issue 288](https://code.google.com/p/google-visualization-api-issues/issues/detail?id=288) created by orwant on 2010-05-20T06:38:24.000Z:
<b>What steps will reproduce the problem? Please provide a link to a</b>
<b>demonstration page if at all possible, or attach code.</b>
I just follow what is in on the examples using the newly released version
of the Google visualization api.
On firefox 3.0.19 it has this error : this.Rb is undefined
and on Google chrome 5.0 : Cannot read property '0' of undefined
I pasted this on the head section of my page and made sure there is a
'chart_div' in the body:
<script type="text/javascript" src="http://www.google.com/jsapi"></script>
<script type="text/javascript">
google.load("visualization", "1", {packages:["corechart"]});
google.setOnLoadCallback(drawChart);
function drawChart() {
var data = new google.visualization.DataTable();
data.addColumn('string', 'Year');
data.addColumn('number', 'Sales');
data.addColumn('number', 'Expenses');
data.addRows(4);
data.setValue(0, 0, '2004');
data.setValue(0, 1, 1000);
data.setValue(0, 2, 400);
data.setValue(1, 0, '2005');
data.setValue(1, 1, 1170);
data.setValue(1, 2, 460);
data.setValue(2, 0, '2006');
data.setValue(2, 1, 660);
data.setValue(2, 2, 1120);
data.setValue(3, 0, '2007');
data.setValue(3, 1, 1030);
data.setValue(3, 2, 540);
var chart = new
google.visualization.BarChart(document.getElementById('chart_div'));
chart.draw(data, {width: 400, height: 240, title: 'Company
Performance',
vAxis: {title: 'Year', titleColor: 'red'}
});
}
</script>
<b>What component is this issue related to (PieChart, LineChart, DataTable,</b>
Query, etc)? corechart (although in the example it uses BarChart)
<b>Are you using the test environment (version 1.1)?</b>
(If you are not sure, answer NO) - NO.
<b>What operating system and browser are you using?</b>
OS - Kubuntu 9.04 Jaunty Jackalope
Firefox 3.0.19
Google chrome 5.0
It should be noted that the above errors are only showing if I run it in a
Rails-based application. For PHP-based web applications everything's fine.
Thanks!
<b>*********************************************************</b>
<b>For developers viewing this issue: please click the 'star' icon to be</b>
<b>notified of future changes, and to let us know how many of you are</b>
<b>interested in seeing it resolved.</b>
<b>*********************************************************</b>
| defect | errors this rb is undefined firefox original created by orwant on what steps will reproduce the problem please provide a link to a demonstration page if at all possible or attach code i just follow what is in on the examples using the newly released version of the google visualization api on firefox it has this error this rb is undefined and on google chrome cannot read property of undefined i pasted this on the head section of my page and made sure there is a chart div in the body lt script type quot text javascript quot src quot lt script type quot text javascript quot gt google load quot visualization quot quot quot packages google setonloadcallback drawchart function drawchart var data new google visualization datatable data addcolumn string year data addcolumn number sales data addcolumn number expenses data addrows data setvalue data setvalue data setvalue data setvalue data setvalue data setvalue data setvalue data setvalue data setvalue data setvalue data setvalue data setvalue var chart new google visualization barchart document getelementbyid chart div chart draw data width height title company performance vaxis title year titlecolor red lt script gt what component is this issue related to piechart linechart datatable query etc corechart although in the example it uses barchart are you using the test environment version if you are not sure answer no no what operating system and browser are you using os kubuntu jaunty jackalope firefox google chrome it should be noted that the above errors are only showing if i run it in a rails based application for php based web applications everything s fine thanks for developers viewing this issue please click the star icon to be notified of future changes and to let us know how many of you are interested in seeing it resolved | 1 |
379,452 | 26,371,665,705 | IssuesEvent | 2023-01-11 21:16:19 | Bench-ai/Jula | https://api.github.com/repos/Bench-ai/Jula | opened | Update JSON File | documentation enhancement good first issue API-DB | The User is able to update the layer file referenced in the layer data. The old layer file should be flagged as deleted. Should be in the app DB. Should make documentation stating how to use the API with provided JSON schema. | 1.0 | Update JSON File - The User is able to update the layer file referenced in the layer data. The old layer file should be flagged as deleted. Should be in the app DB. Should make documentation stating how to use the API with provided JSON schema. | non_defect | update json file the user is able to update the layer file referenced in the layer data the old layer file should be flagged as deleted should be in the app db should make documentation stating how to use the api with provided json schema | 0 |
3,398 | 2,762,254,625 | IssuesEvent | 2015-04-28 21:34:52 | hashicorp/terraform | https://api.github.com/repos/hashicorp/terraform | closed | Quick Start | Modules | Consul | documentation | I am having an issue while trying to follow the [modules](https://www.terraform.io/intro/getting-started/modules.html) section of the quick start guide.
consul.tf:
```
module "consul" {
source = "github.com/hashicorp/consul/terraform/aws"
key_name = "${var.key_name}"
key_path = "${var.key_path}"
region = "${var.region}"
servers = "3"
}
```
terraform.tfvars:
```
access_key = "my access key"
secret_key = "my secret key"
key_name = "my key name"
key_path = "~/.ssh/"
```
I ran terraform get and it grabbed the module just fine. But when I run ```terraform plan``` I get the following error:
```
There are warnings and/or errors related to your configuration. Please
fix these before continuing.
Errors:
* provider.aws: "region": required field is not set
```
Up until this point everything was working just great. | 1.0 | Quick Start | Modules | Consul - I am having an issue while trying to follow the [modules](https://www.terraform.io/intro/getting-started/modules.html) section of the quick start guide.
consul.tf:
```
module "consul" {
source = "github.com/hashicorp/consul/terraform/aws"
key_name = "${var.key_name}"
key_path = "${var.key_path}"
region = "${var.region}"
servers = "3"
}
```
terraform.tfvars:
```
access_key = "my access key"
secret_key = "my secret key"
key_name = "my key name"
key_path = "~/.ssh/"
```
I ran terraform get and it grabbed the module just fine. But when I run ```terraform plan``` I get the following error:
```
There are warnings and/or errors related to your configuration. Please
fix these before continuing.
Errors:
* provider.aws: "region": required field is not set
```
Up until this point everything was working just great. | non_defect | quick start modules consul i am having an issue while trying to follow the section of the quick start guide consul tf module consul source github com hashicorp consul terraform aws key name var key name key path var key path region var region servers terraform tfvars access key my access key secret key my secret key key name my key name key path ssh i ran terraform get and it grabbed the module just fine but when i run terraform plan i get the following error there are warnings and or errors related to your configuration please fix these before continuing errors provider aws region required field is not set up until this point everything was working just great | 0 |
12,966 | 2,731,955,154 | IssuesEvent | 2015-04-16 23:56:45 | p6spy/p6spy | https://api.github.com/repos/p6spy/p6spy | closed | No resultset logged when executing a stored procedure | Defect | I am trying to log the resultset from a stored procedure but nothing is logged after the procedure call.
The log file only registered the call to the DB :
2015-03-24 22:15:37:321|11|statement|connection 0|{ CALL envoi_courriel() }|{ CALL envoi_courriel() }
2015-03-24 22:15:37:339|0|commit|connection 0||
2015-03-24 22:19:48:227|-1|debug|connection -1||this is com.p6spy.engine.spy.P6SpyDriver@5db99810 and passthru is com.mysql.jdbc.Driver@7f2e7127
Nothing is excluded from the logging in the spy.proerties. That is :
excludecategories=
Am I missing something or is this feature not supported? Thanks in advance. | 1.0 | No resultset logged when executing a stored procedure - I am trying to log the resultset from a stored procedure but nothing is logged after the procedure call.
The log file only registered the call to the DB :
2015-03-24 22:15:37:321|11|statement|connection 0|{ CALL envoi_courriel() }|{ CALL envoi_courriel() }
2015-03-24 22:15:37:339|0|commit|connection 0||
2015-03-24 22:19:48:227|-1|debug|connection -1||this is com.p6spy.engine.spy.P6SpyDriver@5db99810 and passthru is com.mysql.jdbc.Driver@7f2e7127
Nothing is excluded from the logging in the spy.proerties. That is :
excludecategories=
Am I missing something or is this feature not supported? Thanks in advance. | defect | no resultset logged when executing a stored procedure i am trying to log the resultset from a stored procedure but nothing is logged after the procedure call the log file only registered the call to the db statement connection call envoi courriel call envoi courriel commit connection debug connection this is com engine spy and passthru is com mysql jdbc driver nothing is excluded from the logging in the spy proerties that is excludecategories am i missing something or is this feature not supported thanks in advance | 1 |
147,238 | 11,779,595,516 | IssuesEvent | 2020-03-16 18:19:44 | propensive/fury | https://api.github.com/repos/propensive/fury | closed | CI fails during a pending test on Mac OS | good first issue testing | The test `layer-conflict` times out for unclear reasons, but only on OSX. Let's move it to a new test directory for pending tests that shouldn't even be run. | 1.0 | CI fails during a pending test on Mac OS - The test `layer-conflict` times out for unclear reasons, but only on OSX. Let's move it to a new test directory for pending tests that shouldn't even be run. | non_defect | ci fails during a pending test on mac os the test layer conflict times out for unclear reasons but only on osx let s move it to a new test directory for pending tests that shouldn t even be run | 0 |
74,643 | 15,364,612,353 | IssuesEvent | 2021-03-01 22:15:02 | nextgenhealthcare/connect | https://api.github.com/repos/nextgenhealthcare/connect | closed | All encryption / decryption should be done on the server, not client side | Security closed-due-to-inactivity | Encryption is only done on the client-side currently for exporting (messages, channels, etc.). It would be a performance hit to do encryption on the server for these things, but I think it's necessary from a security standpoint. Right now we're passing the secret symmetric key from the server to the client over the network. Even though that obviously happens from within HTTPS, most users still use the default self-signed cert.
The LDAP extension currently also encrypts the admin password on the client.
Imported Issue. Original Details:
Jira Issue Key: MIRTH-4176
Reporter: narupley
Created: 2017-06-07T09:22:57.000-0700 | True | All encryption / decryption should be done on the server, not client side - Encryption is only done on the client-side currently for exporting (messages, channels, etc.). It would be a performance hit to do encryption on the server for these things, but I think it's necessary from a security standpoint. Right now we're passing the secret symmetric key from the server to the client over the network. Even though that obviously happens from within HTTPS, most users still use the default self-signed cert.
The LDAP extension currently also encrypts the admin password on the client.
Imported Issue. Original Details:
Jira Issue Key: MIRTH-4176
Reporter: narupley
Created: 2017-06-07T09:22:57.000-0700 | non_defect | all encryption decryption should be done on the server not client side encryption is only done on the client side currently for exporting messages channels etc it would be a performance hit to do encryption on the server for these things but i think it s necessary from a security standpoint right now we re passing the secret symmetric key from the server to the client over the network even though that obviously happens from within https most users still use the default self signed cert the ldap extension currently also encrypts the admin password on the client imported issue original details jira issue key mirth reporter narupley created | 0 |
45,227 | 12,677,423,863 | IssuesEvent | 2020-06-19 07:44:29 | cf-convention/cf-conventions | https://api.github.com/repos/cf-convention/cf-conventions | closed | Unnecessary dimensions on some examples | defect | # Title
Unnecessary dimensions on some examples.
# Moderator
@JonathanGregory
# Requirement
SummaryIn some examples where only string type is been used, there is a dimension name_strlen which it's unnecesary.
# Technical Proposal Summary
Remove them
# Benefits
Less confusing
# Status Quo
Discussion of the current state CF and other standards.
# Detailed Proposal
Those unnecessary dimensions has been removed in the PR #268
| 1.0 | Unnecessary dimensions on some examples - # Title
Unnecessary dimensions on some examples.
# Moderator
@JonathanGregory
# Requirement
SummaryIn some examples where only string type is been used, there is a dimension name_strlen which it's unnecesary.
# Technical Proposal Summary
Remove them
# Benefits
Less confusing
# Status Quo
Discussion of the current state CF and other standards.
# Detailed Proposal
Those unnecessary dimensions has been removed in the PR #268
| defect | unnecessary dimensions on some examples title unnecessary dimensions on some examples moderator jonathangregory requirement summaryin some examples where only string type is been used there is a dimension name strlen which it s unnecesary technical proposal summary remove them benefits less confusing status quo discussion of the current state cf and other standards detailed proposal those unnecessary dimensions has been removed in the pr | 1 |
446,778 | 31,559,197,346 | IssuesEvent | 2023-09-03 03:05:47 | keptn/lifecycle-toolkit | https://api.github.com/repos/keptn/lifecycle-toolkit | closed | Improve install info for only the metrics operator, cert-manager | documentation stale | Part of https://github.com/keptn/lifecycle-toolkit/issues/1623
https://lifecycle.keptn.sh/docs/install/install/#modify-helm-configuration-options mentions that you can modify the Helm chart to install only the metrics-operator but it needs to show an example.
Might be a good idea to add some specific examples of other common modifications, like increasing and decreasing the size of the KLT footprint.
The Getting Started with Keptn Custom Metrics guide should also mention that this is possible. | 1.0 | Improve install info for only the metrics operator, cert-manager - Part of https://github.com/keptn/lifecycle-toolkit/issues/1623
https://lifecycle.keptn.sh/docs/install/install/#modify-helm-configuration-options mentions that you can modify the Helm chart to install only the metrics-operator but it needs to show an example.
Might be a good idea to add some specific examples of other common modifications, like increasing and decreasing the size of the KLT footprint.
The Getting Started with Keptn Custom Metrics guide should also mention that this is possible. | non_defect | improve install info for only the metrics operator cert manager part of mentions that you can modify the helm chart to install only the metrics operator but it needs to show an example might be a good idea to add some specific examples of other common modifications like increasing and decreasing the size of the klt footprint the getting started with keptn custom metrics guide should also mention that this is possible | 0 |
53,302 | 6,715,724,808 | IssuesEvent | 2017-10-13 22:45:58 | oppia/oppia | https://api.github.com/repos/oppia/oppia | closed | Find a clean way to make the exploration graph code extensible | owner: @seanlip TODO: tech (design doc) type: feature (minor) | ```
What steps will reproduce the problem?
This is a refactoring task.
We currently have multiple state graph visualizations (for the editor, stats
and history tabs) and are about to add another one for gadgets. It would be
nice to find a clean way of doing this that doesn't involve adding a bunch of
optional bells and whistles (for shading, sub-labels, etc.) to the core graph
visualization for each use of the state graph.
```
Original issue reported on code.google.com by `s...@google.com` on 21 May 2015 at 2:11
| 1.0 | Find a clean way to make the exploration graph code extensible - ```
What steps will reproduce the problem?
This is a refactoring task.
We currently have multiple state graph visualizations (for the editor, stats
and history tabs) and are about to add another one for gadgets. It would be
nice to find a clean way of doing this that doesn't involve adding a bunch of
optional bells and whistles (for shading, sub-labels, etc.) to the core graph
visualization for each use of the state graph.
```
Original issue reported on code.google.com by `s...@google.com` on 21 May 2015 at 2:11
| non_defect | find a clean way to make the exploration graph code extensible what steps will reproduce the problem this is a refactoring task we currently have multiple state graph visualizations for the editor stats and history tabs and are about to add another one for gadgets it would be nice to find a clean way of doing this that doesn t involve adding a bunch of optional bells and whistles for shading sub labels etc to the core graph visualization for each use of the state graph original issue reported on code google com by s google com on may at | 0 |
315,621 | 27,090,642,184 | IssuesEvent | 2023-02-14 20:44:34 | larray-project/larray | https://api.github.com/repos/larray-project/larray | closed | cleanup unit tests | tests cleanup priority: low | we should rewrite most LArray unit tests using small-ish arrays created using ndtest() instead of the current demo-related examples. | 1.0 | cleanup unit tests - we should rewrite most LArray unit tests using small-ish arrays created using ndtest() instead of the current demo-related examples. | non_defect | cleanup unit tests we should rewrite most larray unit tests using small ish arrays created using ndtest instead of the current demo related examples | 0 |
42,611 | 11,171,193,480 | IssuesEvent | 2019-12-28 17:41:57 | frescobaldi/frescobaldi | https://api.github.com/repos/frescobaldi/frescobaldi | opened | NameError: name 'doc' is not defined | defect | When printing on Mac OSX.
I broke this in a3df43d13a52364938a0f668654297543abf7bc4
Will fix it. | 1.0 | NameError: name 'doc' is not defined - When printing on Mac OSX.
I broke this in a3df43d13a52364938a0f668654297543abf7bc4
Will fix it. | defect | nameerror name doc is not defined when printing on mac osx i broke this in will fix it | 1 |
50,909 | 13,187,967,445 | IssuesEvent | 2020-08-13 05:10:05 | icecube-trac/tix3 | https://api.github.com/repos/icecube-trac/tix3 | closed | [lilliput] destructor must be noexecpt in c++11 (Trac #1666) | Migrated from Trac combo reconstruction defect | Don't call log_fatal in a destructor.
Warning:
```text
from
/home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModul
e.h:4,
from /home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cxx:1:
/home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cx
x: In destructor ‘virtual PSSTestModule::~PSSTestModule()’:
/home/dschultz/Documents/combo/trunk/src/icetray/public/icetray/I3Logging.h:181:57:
warning: throw will always call terminate() [-Wterminate]
##__VA_ARGS__) + " (in " + __PRETTY_FUNCTION__ + ")")
^
/home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cxx:17:9:
note: in expansion of macro ‘log_fatal’
log_fatal("saw ZERO NADA physics frames");
^
/home/dschultz/Documents/combo/trunk/src/icetray/public/icetray/I3Logging.h:181:57:
note: in C++11 destructors default to noexcept
##__VA_ARGS__) + " (in " + __PRETTY_FUNCTION__ + ")")
^
/home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cxx:17:9:
note: in expansion of macro ‘log_fatal’
log_fatal("saw ZERO NADA physics frames");
^
```
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1666">https://code.icecube.wisc.edu/ticket/1666</a>, reported by david.schultz and owned by kkrings</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2019-02-13T14:13:10",
"description": "Don't call log_fatal in a destructor.\n\nWarning:\n{{{\nfrom\n /home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModul\n e.h:4,\nfrom /home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cxx:1:\n /home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cx\n x: In destructor \u2018virtual PSSTestModule::~PSSTestModule()\u2019:\n/home/dschultz/Documents/combo/trunk/src/icetray/public/icetray/I3Logging.h:181:57:\n warning: throw will always call terminate() [-Wterminate]\n##__VA_ARGS__) + \" (in \" + __PRETTY_FUNCTION__ + \")\")\n^\n/home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cxx:17:9:\n note: in expansion of macro \u2018log_fatal\u2019\nlog_fatal(\"saw ZERO NADA physics frames\");\n^\n/home/dschultz/Documents/combo/trunk/src/icetray/public/icetray/I3Logging.h:181:57:\n note: in C++11 destructors default to noexcept\n##__VA_ARGS__) + \" (in \" + __PRETTY_FUNCTION__ + \")\")\n^\n/home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cxx:17:9:\n note: in expansion of macro \u2018log_fatal\u2019\nlog_fatal(\"saw ZERO NADA physics frames\");\n^\n}}}",
"reporter": "david.schultz",
"cc": "",
"resolution": "fixed",
"_ts": "1550067190995086",
"component": "combo reconstruction",
"summary": "[lilliput] destructor must be noexecpt in c++11",
"priority": "normal",
"keywords": "",
"time": "2016-04-26T21:12:35",
"milestone": "",
"owner": "kkrings",
"type": "defect"
}
```
</p>
</details>
| 1.0 | [lilliput] destructor must be noexecpt in c++11 (Trac #1666) - Don't call log_fatal in a destructor.
Warning:
```text
from
/home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModul
e.h:4,
from /home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cxx:1:
/home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cx
x: In destructor ‘virtual PSSTestModule::~PSSTestModule()’:
/home/dschultz/Documents/combo/trunk/src/icetray/public/icetray/I3Logging.h:181:57:
warning: throw will always call terminate() [-Wterminate]
##__VA_ARGS__) + " (in " + __PRETTY_FUNCTION__ + ")")
^
/home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cxx:17:9:
note: in expansion of macro ‘log_fatal’
log_fatal("saw ZERO NADA physics frames");
^
/home/dschultz/Documents/combo/trunk/src/icetray/public/icetray/I3Logging.h:181:57:
note: in C++11 destructors default to noexcept
##__VA_ARGS__) + " (in " + __PRETTY_FUNCTION__ + ")")
^
/home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cxx:17:9:
note: in expansion of macro ‘log_fatal’
log_fatal("saw ZERO NADA physics frames");
^
```
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1666">https://code.icecube.wisc.edu/ticket/1666</a>, reported by david.schultz and owned by kkrings</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2019-02-13T14:13:10",
"description": "Don't call log_fatal in a destructor.\n\nWarning:\n{{{\nfrom\n /home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModul\n e.h:4,\nfrom /home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cxx:1:\n /home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cx\n x: In destructor \u2018virtual PSSTestModule::~PSSTestModule()\u2019:\n/home/dschultz/Documents/combo/trunk/src/icetray/public/icetray/I3Logging.h:181:57:\n warning: throw will always call terminate() [-Wterminate]\n##__VA_ARGS__) + \" (in \" + __PRETTY_FUNCTION__ + \")\")\n^\n/home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cxx:17:9:\n note: in expansion of macro \u2018log_fatal\u2019\nlog_fatal(\"saw ZERO NADA physics frames\");\n^\n/home/dschultz/Documents/combo/trunk/src/icetray/public/icetray/I3Logging.h:181:57:\n note: in C++11 destructors default to noexcept\n##__VA_ARGS__) + \" (in \" + __PRETTY_FUNCTION__ + \")\")\n^\n/home/dschultz/Documents/combo/trunk/src/lilliput/private/test/PSSTestModule.cxx:17:9:\n note: in expansion of macro \u2018log_fatal\u2019\nlog_fatal(\"saw ZERO NADA physics frames\");\n^\n}}}",
"reporter": "david.schultz",
"cc": "",
"resolution": "fixed",
"_ts": "1550067190995086",
"component": "combo reconstruction",
"summary": "[lilliput] destructor must be noexecpt in c++11",
"priority": "normal",
"keywords": "",
"time": "2016-04-26T21:12:35",
"milestone": "",
"owner": "kkrings",
"type": "defect"
}
```
</p>
</details>
| defect | destructor must be noexecpt in c trac don t call log fatal in a destructor warning text from home dschultz documents combo trunk src lilliput private test psstestmodul e h from home dschultz documents combo trunk src lilliput private test psstestmodule cxx home dschultz documents combo trunk src lilliput private test psstestmodule cx x in destructor ‘virtual psstestmodule psstestmodule ’ home dschultz documents combo trunk src icetray public icetray h warning throw will always call terminate va args in pretty function home dschultz documents combo trunk src lilliput private test psstestmodule cxx note in expansion of macro ‘log fatal’ log fatal saw zero nada physics frames home dschultz documents combo trunk src icetray public icetray h note in c destructors default to noexcept va args in pretty function home dschultz documents combo trunk src lilliput private test psstestmodule cxx note in expansion of macro ‘log fatal’ log fatal saw zero nada physics frames migrated from json status closed changetime description don t call log fatal in a destructor n nwarning n nfrom n home dschultz documents combo trunk src lilliput private test psstestmodul n e h nfrom home dschultz documents combo trunk src lilliput private test psstestmodule cxx n home dschultz documents combo trunk src lilliput private test psstestmodule cx n x in destructor psstestmodule psstestmodule n home dschultz documents combo trunk src icetray public icetray h n warning throw will always call terminate n va args in pretty function n n home dschultz documents combo trunk src lilliput private test psstestmodule cxx n note in expansion of macro fatal nlog fatal saw zero nada physics frames n n home dschultz documents combo trunk src icetray public icetray h n note in c destructors default to noexcept n va args in pretty function n n home dschultz documents combo trunk src lilliput private test psstestmodule cxx n note in expansion of macro fatal nlog fatal saw zero nada physics frames n n reporter david schultz cc resolution fixed ts component combo reconstruction summary destructor must be noexecpt in c priority normal keywords time milestone owner kkrings type defect | 1 |
71,555 | 23,692,618,952 | IssuesEvent | 2022-08-29 12:13:50 | scipy/scipy | https://api.github.com/repos/scipy/scipy | closed | Input data validation for RectSphereBivariateSpline | defect scipy.interpolate | I am trying to interpolate some 2D data on a sphere using `scipy.interpolate.RectSphereBivariateSpline`. Despite following the [documentation](https://docs.scipy.org/doc/scipy/reference/generated/scipy.interpolate.RectSphereBivariateSpline.html), I get a data validation error. I've uploaded [a sample netcdf file](https://drive.google.com/file/d/14h0ErUJ8yWzxs9eYEIFKbjqGUjyZ_LQo/view?usp=sharing) with data to trigger the error. As far as I can see, I've satisfied the requirements on the input latitude and longitude variables.
#### Reproducing code example:
```
from netCDF4 import Dataset
from scipy import interpolate
with Dataset('spl_debug.nc', 'r') as fid:
u = fid.variables['colatitude'][:]
v = fid.variables['longitude'][:]
r = fid.variables['input_var'][:]
spl = interpolate.RectSphereBivariateSpline(u, v, r, s=0, pole_continuity=(True,True))
```
#### Error message:
```
ValueError Traceback (most recent call last)
/gpfsm/dhome/sbasu1/Code/GEOS/mass_flux/spl_bug.py in <module>
7 r = fid.variables['input_var'][:]
8
----> 9 spl = interpolate.RectSphereBivariateSpline(u, v, r, s=0, pole_continuity=(True,True))
/discover/nobackup/projects/tm5var4d/packages/python/3.8.2/lib/python3.8/site-packages/scipy-1.4.1-py3.8-linux-x86_64.egg/scipy/interpolate/fitpack2.py in __init__(self, u, v, r, s, pole_continuity, pole_values, pole_exact, pole_flat)
1721 if ier not in [0, -1, -2]:
1722 msg = _spfit_messages.get(ier, 'ier=%s' % (ier))
-> 1723 raise ValueError(msg)
1724
1725 self.fp = fp
ValueError:
ERROR: on entry, the input data are controlled on validity
the following restrictions must be satisfied.
-1<=iopt(1)<=1, 0<=iopt(2)<=1, 0<=iopt(3)<=1,
-1<=ider(1)<=1, 0<=ider(2)<=1, ider(2)=0 if iopt(2)=0.
-1<=ider(3)<=1, 0<=ider(4)<=1, ider(4)=0 if iopt(3)=0.
mu >= mumin (see above), mv >= 4, nuest >=8, nvest >= 8,
kwrk>=5+mu+mv+nuest+nvest,
lwrk >= 12+nuest*(mv+nvest+3)+nvest*24+4*mu+8*mv+max(nuest,mv+nvest)
0< u(i-1)<u(i)< pi,i=2,..,mu,
-pi<=v(1)< pi, v(1)<v(i-1)<v(i)<v(1)+2*pi, i=3,...,mv
if iopt(1)=-1: 8<=nu<=min(nuest,mu+6+iopt(2)+iopt(3))
0<tu(5)<tu(6)<...<tu(nu-4)< pi
8<=nv<=min(nvest,mv+7)
v(1)<tv(5)<tv(6)<...<tv(nv-4)<v(1)+2*pi
the schoenberg-whitney conditions, i.e. there must be
subset of grid co-ordinates uu(p) and vv(q) such that
tu(p) < uu(p) < tu(p+4) ,p=1,...,nu-4
(iopt(2)=1 and iopt(3)=1 also count for a uu-value
tv(q) < vv(q) < tv(q+4) ,q=1,...,nv-4
(vv(q) is either a value v(j) or v(j)+2*pi)
if iopt(1)>=0: s>=0
if s=0: nuest>=mu+6+iopt(2)+iopt(3), nvest>=mv+7
if one of these conditions is found to be violated,control is
immediately repassed to the calling program. in that case there is no
approximation returned.
```
#### Scipy/Numpy/Python version information:
```
import sys, scipy, numpy; print(scipy.__version__, numpy.__version__, sys.version_info)
1.4.1 1.18.4 sys.version_info(major=3, minor=8, micro=2, releaselevel='final', serial=0)
``` | 1.0 | Input data validation for RectSphereBivariateSpline - I am trying to interpolate some 2D data on a sphere using `scipy.interpolate.RectSphereBivariateSpline`. Despite following the [documentation](https://docs.scipy.org/doc/scipy/reference/generated/scipy.interpolate.RectSphereBivariateSpline.html), I get a data validation error. I've uploaded [a sample netcdf file](https://drive.google.com/file/d/14h0ErUJ8yWzxs9eYEIFKbjqGUjyZ_LQo/view?usp=sharing) with data to trigger the error. As far as I can see, I've satisfied the requirements on the input latitude and longitude variables.
#### Reproducing code example:
```
from netCDF4 import Dataset
from scipy import interpolate
with Dataset('spl_debug.nc', 'r') as fid:
u = fid.variables['colatitude'][:]
v = fid.variables['longitude'][:]
r = fid.variables['input_var'][:]
spl = interpolate.RectSphereBivariateSpline(u, v, r, s=0, pole_continuity=(True,True))
```
#### Error message:
```
ValueError Traceback (most recent call last)
/gpfsm/dhome/sbasu1/Code/GEOS/mass_flux/spl_bug.py in <module>
7 r = fid.variables['input_var'][:]
8
----> 9 spl = interpolate.RectSphereBivariateSpline(u, v, r, s=0, pole_continuity=(True,True))
/discover/nobackup/projects/tm5var4d/packages/python/3.8.2/lib/python3.8/site-packages/scipy-1.4.1-py3.8-linux-x86_64.egg/scipy/interpolate/fitpack2.py in __init__(self, u, v, r, s, pole_continuity, pole_values, pole_exact, pole_flat)
1721 if ier not in [0, -1, -2]:
1722 msg = _spfit_messages.get(ier, 'ier=%s' % (ier))
-> 1723 raise ValueError(msg)
1724
1725 self.fp = fp
ValueError:
ERROR: on entry, the input data are controlled on validity
the following restrictions must be satisfied.
-1<=iopt(1)<=1, 0<=iopt(2)<=1, 0<=iopt(3)<=1,
-1<=ider(1)<=1, 0<=ider(2)<=1, ider(2)=0 if iopt(2)=0.
-1<=ider(3)<=1, 0<=ider(4)<=1, ider(4)=0 if iopt(3)=0.
mu >= mumin (see above), mv >= 4, nuest >=8, nvest >= 8,
kwrk>=5+mu+mv+nuest+nvest,
lwrk >= 12+nuest*(mv+nvest+3)+nvest*24+4*mu+8*mv+max(nuest,mv+nvest)
0< u(i-1)<u(i)< pi,i=2,..,mu,
-pi<=v(1)< pi, v(1)<v(i-1)<v(i)<v(1)+2*pi, i=3,...,mv
if iopt(1)=-1: 8<=nu<=min(nuest,mu+6+iopt(2)+iopt(3))
0<tu(5)<tu(6)<...<tu(nu-4)< pi
8<=nv<=min(nvest,mv+7)
v(1)<tv(5)<tv(6)<...<tv(nv-4)<v(1)+2*pi
the schoenberg-whitney conditions, i.e. there must be
subset of grid co-ordinates uu(p) and vv(q) such that
tu(p) < uu(p) < tu(p+4) ,p=1,...,nu-4
(iopt(2)=1 and iopt(3)=1 also count for a uu-value
tv(q) < vv(q) < tv(q+4) ,q=1,...,nv-4
(vv(q) is either a value v(j) or v(j)+2*pi)
if iopt(1)>=0: s>=0
if s=0: nuest>=mu+6+iopt(2)+iopt(3), nvest>=mv+7
if one of these conditions is found to be violated,control is
immediately repassed to the calling program. in that case there is no
approximation returned.
```
#### Scipy/Numpy/Python version information:
```
import sys, scipy, numpy; print(scipy.__version__, numpy.__version__, sys.version_info)
1.4.1 1.18.4 sys.version_info(major=3, minor=8, micro=2, releaselevel='final', serial=0)
``` | defect | input data validation for rectspherebivariatespline i am trying to interpolate some data on a sphere using scipy interpolate rectspherebivariatespline despite following the i get a data validation error i ve uploaded with data to trigger the error as far as i can see i ve satisfied the requirements on the input latitude and longitude variables reproducing code example from import dataset from scipy import interpolate with dataset spl debug nc r as fid u fid variables v fid variables r fid variables spl interpolate rectspherebivariatespline u v r s pole continuity true true error message valueerror traceback most recent call last gpfsm dhome code geos mass flux spl bug py in r fid variables spl interpolate rectspherebivariatespline u v r s pole continuity true true discover nobackup projects packages python lib site packages scipy linux egg scipy interpolate py in init self u v r s pole continuity pole values pole exact pole flat if ier not in msg spfit messages get ier ier s ier raise valueerror msg self fp fp valueerror error on entry the input data are controlled on validity the following restrictions must be satisfied iopt iopt iopt ider ider ider if iopt ider ider ider if iopt mu mumin see above mv nuest nvest kwrk mu mv nuest nvest lwrk nuest mv nvest nvest mu mv max nuest mv nvest u i u i pi i mu pi v pi v v i v i v pi i mv if iopt nu min nuest mu iopt iopt tu tu tu nu pi nv min nvest mv v tv tv tv nv v pi the schoenberg whitney conditions i e there must be subset of grid co ordinates uu p and vv q such that tu p uu p tu p p nu iopt and iopt also count for a uu value tv q vv q tv q q nv vv q is either a value v j or v j pi if iopt s if s nuest mu iopt iopt nvest mv if one of these conditions is found to be violated control is immediately repassed to the calling program in that case there is no approximation returned scipy numpy python version information import sys scipy numpy print scipy version numpy version sys version info sys version info major minor micro releaselevel final serial | 1 |
127,336 | 5,028,631,739 | IssuesEvent | 2016-12-15 18:48:35 | readium/readium-sdk | https://api.github.com/repos/readium/readium-sdk | closed | XML External Entity (XXE), potential security risk | difficulty:Noob func:C++ func:Security func:XML priority:Blocking status:WIP type:Bug | Thanks @bluefirepatrick for the heads-up!
```xml
<!DOCTYPE root [ <!ENTITY ent SYSTEM "file:///etc/passwd"> ]>
<root>
<e>&ent;</e>
</root>
```
(ouch!)
__short story__:
`XML_PARSE_NOENT` should be removed from the libxml parser options (see below). Note that the name can be misleading, as it in fact means that entities should be expanded so that no entity nodes should be created inside the parsed document (entity replacement / substitution).
__long story__:
Here is Readium's libxml parser config:
https://github.com/readium/readium-sdk/blob/develop/ePub3/ePub/archive_xml.cpp#L28
```cpp
const int ArchiveXmlReader::DEFAULT_OPTIONS = XML_PARSE_RECOVER | XML_PARSE_NOENT | XML_PARSE_DTDATTR | XML_PARSE_NONET;
```
As you can see, we don't use `XML_PARSE_DTDLOAD`, but we do have `XML_PARSE_NOENT`.
We do set `XML_PARSE_NONET` but the potential security risk applies to local files too.
By the way, these binary mask options are passed to:
https://github.com/readium/readium-sdk/blob/develop/ePub3/xml/utilities/io.cpp#L74
```cpp
std::shared_ptr<Document> InputBuffer::xmlReadDocument(const char * url, const char * encoding, int options)
{
_encodingCheck = encoding;
xmlDocPtr raw = xmlReadIO(_buf->readcallback, _buf->closecallback, _buf->context, url, encoding, options);
return Wrapped<Document>(raw);
}
std::shared_ptr<Document> InputBuffer::htmlReadDocument(const char *url, const char *encoding, int options)
{
_encodingCheck = encoding;
return Wrapped<Document>(htmlReadIO(_buf->readcallback, _buf->closecallback, _buf->context, url, encoding, options));
}
```
Also note `xmlSubstituteEntitiesDefault(0);` and `xmlLoadExtDtdDefaultValue = 0;` in `__resetLibXMLOverrides`:
https://github.com/readium/readium-sdk/blob/develop/ePub3/xml/utilities/base.cpp#L76
General references:
https://www.owasp.org/index.php/XML_External_Entity_%28XXE%29_Prevention_Cheat_Sheet
https://git.gnome.org//browse/libxml2/commit/?id=4629ee02ac649c27f9c0cf98ba017c6b5526070f
https://mail.gnome.org/archives/xml/2012-October/msg00045.html
https://github.com/IDPF/epubcheck/commit/66e88e46b4f2cf44ee9607c05f2eccb6254c4101
Craig Arendt (Stratum Security)
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7889
CVE-2016-7889 + CVE-2016-7666 + CVE-2016-9487
https://support.apple.com/en-us/HT207432
https://helpx.adobe.com/security/products/Digital-Editions/apsb16-45.html
https://www.kb.cert.org/vuls/id/779243
| 1.0 | XML External Entity (XXE), potential security risk - Thanks @bluefirepatrick for the heads-up!
```xml
<!DOCTYPE root [ <!ENTITY ent SYSTEM "file:///etc/passwd"> ]>
<root>
<e>&ent;</e>
</root>
```
(ouch!)
__short story__:
`XML_PARSE_NOENT` should be removed from the libxml parser options (see below). Note that the name can be misleading, as it in fact means that entities should be expanded so that no entity nodes should be created inside the parsed document (entity replacement / substitution).
__long story__:
Here is Readium's libxml parser config:
https://github.com/readium/readium-sdk/blob/develop/ePub3/ePub/archive_xml.cpp#L28
```cpp
const int ArchiveXmlReader::DEFAULT_OPTIONS = XML_PARSE_RECOVER | XML_PARSE_NOENT | XML_PARSE_DTDATTR | XML_PARSE_NONET;
```
As you can see, we don't use `XML_PARSE_DTDLOAD`, but we do have `XML_PARSE_NOENT`.
We do set `XML_PARSE_NONET` but the potential security risk applies to local files too.
By the way, these binary mask options are passed to:
https://github.com/readium/readium-sdk/blob/develop/ePub3/xml/utilities/io.cpp#L74
```cpp
std::shared_ptr<Document> InputBuffer::xmlReadDocument(const char * url, const char * encoding, int options)
{
_encodingCheck = encoding;
xmlDocPtr raw = xmlReadIO(_buf->readcallback, _buf->closecallback, _buf->context, url, encoding, options);
return Wrapped<Document>(raw);
}
std::shared_ptr<Document> InputBuffer::htmlReadDocument(const char *url, const char *encoding, int options)
{
_encodingCheck = encoding;
return Wrapped<Document>(htmlReadIO(_buf->readcallback, _buf->closecallback, _buf->context, url, encoding, options));
}
```
Also note `xmlSubstituteEntitiesDefault(0);` and `xmlLoadExtDtdDefaultValue = 0;` in `__resetLibXMLOverrides`:
https://github.com/readium/readium-sdk/blob/develop/ePub3/xml/utilities/base.cpp#L76
General references:
https://www.owasp.org/index.php/XML_External_Entity_%28XXE%29_Prevention_Cheat_Sheet
https://git.gnome.org//browse/libxml2/commit/?id=4629ee02ac649c27f9c0cf98ba017c6b5526070f
https://mail.gnome.org/archives/xml/2012-October/msg00045.html
https://github.com/IDPF/epubcheck/commit/66e88e46b4f2cf44ee9607c05f2eccb6254c4101
Craig Arendt (Stratum Security)
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7889
CVE-2016-7889 + CVE-2016-7666 + CVE-2016-9487
https://support.apple.com/en-us/HT207432
https://helpx.adobe.com/security/products/Digital-Editions/apsb16-45.html
https://www.kb.cert.org/vuls/id/779243
| non_defect | xml external entity xxe potential security risk thanks bluefirepatrick for the heads up xml ent ouch short story xml parse noent should be removed from the libxml parser options see below note that the name can be misleading as it in fact means that entities should be expanded so that no entity nodes should be created inside the parsed document entity replacement substitution long story here is readium s libxml parser config cpp const int archivexmlreader default options xml parse recover xml parse noent xml parse dtdattr xml parse nonet as you can see we don t use xml parse dtdload but we do have xml parse noent we do set xml parse nonet but the potential security risk applies to local files too by the way these binary mask options are passed to cpp std shared ptr inputbuffer xmlreaddocument const char url const char encoding int options encodingcheck encoding xmldocptr raw xmlreadio buf readcallback buf closecallback buf context url encoding options return wrapped raw std shared ptr inputbuffer htmlreaddocument const char url const char encoding int options encodingcheck encoding return wrapped htmlreadio buf readcallback buf closecallback buf context url encoding options also note xmlsubstituteentitiesdefault and xmlloadextdtddefaultvalue in resetlibxmloverrides general references craig arendt stratum security cve cve cve | 0 |
51,718 | 13,211,296,678 | IssuesEvent | 2020-08-15 22:07:27 | icecube-trac/tix4 | https://api.github.com/repos/icecube-trac/tix4 | opened | [photospline] - divzero - loop pre-conditions aren't checked (Trac #921) | Incomplete Migration Migrated from Trac combo reconstruction defect | <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/921">https://code.icecube.wisc.edu/projects/icecube/ticket/921</a>, reported by negaand owned by jvansanten</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2015-04-12T17:41:42",
"_ts": "1428860502423619",
"description": "http://goo.gl/s1mdUk\n\nloop preconditions aren't checked allowing a potential divide-by-zero error to occur in 8 steps.\n\nfix: pre-check and hard fail if loop pre-conditions suck",
"reporter": "nega",
"cc": "",
"resolution": "fixed",
"time": "2015-04-10T04:13:30",
"component": "combo reconstruction",
"summary": "[photospline] - divzero - loop pre-conditions aren't checked",
"priority": "normal",
"keywords": "photospline divzero",
"milestone": "",
"owner": "jvansanten",
"type": "defect"
}
```
</p>
</details>
| 1.0 | [photospline] - divzero - loop pre-conditions aren't checked (Trac #921) - <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/921">https://code.icecube.wisc.edu/projects/icecube/ticket/921</a>, reported by negaand owned by jvansanten</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2015-04-12T17:41:42",
"_ts": "1428860502423619",
"description": "http://goo.gl/s1mdUk\n\nloop preconditions aren't checked allowing a potential divide-by-zero error to occur in 8 steps.\n\nfix: pre-check and hard fail if loop pre-conditions suck",
"reporter": "nega",
"cc": "",
"resolution": "fixed",
"time": "2015-04-10T04:13:30",
"component": "combo reconstruction",
"summary": "[photospline] - divzero - loop pre-conditions aren't checked",
"priority": "normal",
"keywords": "photospline divzero",
"milestone": "",
"owner": "jvansanten",
"type": "defect"
}
```
</p>
</details>
| defect | divzero loop pre conditions aren t checked trac migrated from json status closed changetime ts description preconditions aren t checked allowing a potential divide by zero error to occur in steps n nfix pre check and hard fail if loop pre conditions suck reporter nega cc resolution fixed time component combo reconstruction summary divzero loop pre conditions aren t checked priority normal keywords photospline divzero milestone owner jvansanten type defect | 1 |
38,918 | 9,036,401,489 | IssuesEvent | 2019-02-09 00:06:59 | zealdocs/zeal | https://api.github.com/repos/zealdocs/zeal | closed | css file not loaded on Windows | resolution/upstream-problem scope/misc/docsets type/defect | The newly created docset for Perl 6 does not render well on Windows because the css file is not loaded.
[Windows renders incorrectly](https://github.com/schmidh/Perl6-Dash-Docset-Generator/issues/1) | 1.0 | css file not loaded on Windows - The newly created docset for Perl 6 does not render well on Windows because the css file is not loaded.
[Windows renders incorrectly](https://github.com/schmidh/Perl6-Dash-Docset-Generator/issues/1) | defect | css file not loaded on windows the newly created docset for perl does not render well on windows because the css file is not loaded | 1 |
55,005 | 14,118,414,808 | IssuesEvent | 2020-11-08 13:34:47 | oleg-shilo/cs-script | https://api.github.com/repos/oleg-shilo/cs-script | closed | .NET Core 3 Migration | defect done question | Hey Oleg,
During migration of our project to .NET Core 3 , we found a strange problem related to CSScript.Evaluator. It throws TargetInvocationException. Here are details:
Message: Inner Excception -"The type initializer for 'Microsoft.CodeAnalysis.Scripting.ScriptOptions' threw an exception."} System.Exception {System.TypeInitializationException}
StackTrace:
at System.RuntimeTypeHandle.CreateInstance(RuntimeType type, Boolean publicOnly, Boolean wrapExceptions, Boolean& canBeCached, RuntimeMethodHandleInternal& ctor, Boolean& hasNoDefaultCtor)
at System.RuntimeType.CreateInstanceDefaultCtorSlow(Boolean publicOnly, Boolean wrapExceptions, Boolean fillCache)
at System.RuntimeType.CreateInstanceDefaultCtor(Boolean publicOnly, Boolean skipCheckThis, Boolean fillCache, Boolean wrapExceptions)
at System.Activator.CreateInstance[T]()
at System.LazyHelper.CreateViaDefaultConstructor[T]()
at System.Lazy`1.CreateViaDefaultConstructor()
at System.Lazy`1.ViaConstructor()
at System.Lazy`1.ExecutionAndPublication(LazyHelper executionAndPublication, Boolean useDefaultConstructor)
at System.Lazy`1.CreateValue()
at System.Lazy`1.get_Value()
at CSScriptLib.CSScript.get_RoslynEvaluator()
at CSScriptLib.CSScript.get_Evaluator()
Probably not related but, this happens on following line of code in our project
ICodeVariable scriptObject = CSScript.Evaluator.LoadCode<ICodeVariable>(sourceCode);
| 1.0 | .NET Core 3 Migration - Hey Oleg,
During migration of our project to .NET Core 3 , we found a strange problem related to CSScript.Evaluator. It throws TargetInvocationException. Here are details:
Message: Inner Excception -"The type initializer for 'Microsoft.CodeAnalysis.Scripting.ScriptOptions' threw an exception."} System.Exception {System.TypeInitializationException}
StackTrace:
at System.RuntimeTypeHandle.CreateInstance(RuntimeType type, Boolean publicOnly, Boolean wrapExceptions, Boolean& canBeCached, RuntimeMethodHandleInternal& ctor, Boolean& hasNoDefaultCtor)
at System.RuntimeType.CreateInstanceDefaultCtorSlow(Boolean publicOnly, Boolean wrapExceptions, Boolean fillCache)
at System.RuntimeType.CreateInstanceDefaultCtor(Boolean publicOnly, Boolean skipCheckThis, Boolean fillCache, Boolean wrapExceptions)
at System.Activator.CreateInstance[T]()
at System.LazyHelper.CreateViaDefaultConstructor[T]()
at System.Lazy`1.CreateViaDefaultConstructor()
at System.Lazy`1.ViaConstructor()
at System.Lazy`1.ExecutionAndPublication(LazyHelper executionAndPublication, Boolean useDefaultConstructor)
at System.Lazy`1.CreateValue()
at System.Lazy`1.get_Value()
at CSScriptLib.CSScript.get_RoslynEvaluator()
at CSScriptLib.CSScript.get_Evaluator()
Probably not related but, this happens on following line of code in our project
ICodeVariable scriptObject = CSScript.Evaluator.LoadCode<ICodeVariable>(sourceCode);
| defect | net core migration hey oleg during migration of our project to net core we found a strange problem related to csscript evaluator it throws targetinvocationexception here are details message inner excception the type initializer for microsoft codeanalysis scripting scriptoptions threw an exception system exception system typeinitializationexception stacktrace at system runtimetypehandle createinstance runtimetype type boolean publiconly boolean wrapexceptions boolean canbecached runtimemethodhandleinternal ctor boolean hasnodefaultctor at system runtimetype createinstancedefaultctorslow boolean publiconly boolean wrapexceptions boolean fillcache at system runtimetype createinstancedefaultctor boolean publiconly boolean skipcheckthis boolean fillcache boolean wrapexceptions at system activator createinstance at system lazyhelper createviadefaultconstructor at system lazy createviadefaultconstructor at system lazy viaconstructor at system lazy executionandpublication lazyhelper executionandpublication boolean usedefaultconstructor at system lazy createvalue at system lazy get value at csscriptlib csscript get roslynevaluator at csscriptlib csscript get evaluator probably not related but this happens on following line of code in our project icodevariable scriptobject csscript evaluator loadcode sourcecode | 1 |
79,068 | 27,958,253,827 | IssuesEvent | 2023-03-24 13:56:22 | hazelcast/hazelcast | https://api.github.com/repos/hazelcast/hazelcast | closed | Wrong precondition check in MapProxyImpl#compute | Type: Defect Team: Core Source: Community Module: IMap | By random chance, I noticed that MapProxyImpl#compute checks the `key` twice instead of checking the `remappingFunction`.
https://github.com/hazelcast/hazelcast/blob/dee4a19a2afcc14da031c1f59ee8224b74dc1d8e/hazelcast/src/main/java/com/hazelcast/map/impl/proxy/MapProxyImpl.java#L1256 | 1.0 | Wrong precondition check in MapProxyImpl#compute - By random chance, I noticed that MapProxyImpl#compute checks the `key` twice instead of checking the `remappingFunction`.
https://github.com/hazelcast/hazelcast/blob/dee4a19a2afcc14da031c1f59ee8224b74dc1d8e/hazelcast/src/main/java/com/hazelcast/map/impl/proxy/MapProxyImpl.java#L1256 | defect | wrong precondition check in mapproxyimpl compute by random chance i noticed that mapproxyimpl compute checks the key twice instead of checking the remappingfunction | 1 |
333,234 | 24,368,338,111 | IssuesEvent | 2022-10-03 16:58:21 | OriginProtocol/origin-dollar | https://api.github.com/repos/OriginProtocol/origin-dollar | opened | Transition to new governance | documentation contracts governance | We want to **safely** transition to OUSD contracts being owned by the new community governance system.
In this case **safety** means:
1. Community can pass and execute governance actions
2. Bad guys can't do these things.
3. All contracts end up with the correct ownership.
### Background
<img width="533" alt="image" src="https://user-images.githubusercontent.com/837/193635092-97cbd047-aa85-4b88-828d-19f74e5afc78.png">
In our new governance system, we have a circular loop of ownership, since OGV controls veOGV, which controls voting, which controls the timelock, which controls OGV. Once we switch governance over, each of these contracts needs to keep working correctly, or we loose the ability to pass further proposals. (well, OGV could die, and previous staked governance powers would stay working). No pressure.
Previously I had been thinking we would do the governance transition in two phases, first moving control of all contracts over to the governance system, then later moving control of the governance system over to the governance system. However after more thinking about it, I don't think this gains us much. It does not mitigate a bug or misconfiguration giving uncontrolled access. And in order for governance to transition over, we'll need to use the new system to accept governance, talking to the very contracts that we need to control. In this case, we might as well just do it in one pair of transactions.
### 1. Survey contracts
We want to be sure that we move all contracts over to this new system. This will be OUSD's third governance contract, and we have some unused contracts still owned by old contracts. It would be good to all old contracts over, so that in the future we can fully depreciate the old governance contracts and don't have to have the future need of spending time digging on how to access the old governance contracts.
1. We should get a clean list of currently active contracts from an on chain tour (and verify that the docs are updated with these addresses.)
2. We should dig up a list of past contracts/proxies, then check governorship on them. Particularly we should locate the old OUSD vault proxy, since it may have user approvals on it.
### 2. Transfer ownership from old governance system
We'll need to generate a transaction on the current governance system and on the past governance system transferring ownership/governership on all contracts. This will have a two day timelock on it.
We'll also need to make a governance action on the old governor for the contracts on it.
### 3. Accept ownership from new system.
The new governance system will need to accept ownership on all these contracts. This will have the voting period and the timelock period, so we can start the process at the same time as starting governance actions on previous contracts. | 1.0 | Transition to new governance - We want to **safely** transition to OUSD contracts being owned by the new community governance system.
In this case **safety** means:
1. Community can pass and execute governance actions
2. Bad guys can't do these things.
3. All contracts end up with the correct ownership.
### Background
<img width="533" alt="image" src="https://user-images.githubusercontent.com/837/193635092-97cbd047-aa85-4b88-828d-19f74e5afc78.png">
In our new governance system, we have a circular loop of ownership, since OGV controls veOGV, which controls voting, which controls the timelock, which controls OGV. Once we switch governance over, each of these contracts needs to keep working correctly, or we loose the ability to pass further proposals. (well, OGV could die, and previous staked governance powers would stay working). No pressure.
Previously I had been thinking we would do the governance transition in two phases, first moving control of all contracts over to the governance system, then later moving control of the governance system over to the governance system. However after more thinking about it, I don't think this gains us much. It does not mitigate a bug or misconfiguration giving uncontrolled access. And in order for governance to transition over, we'll need to use the new system to accept governance, talking to the very contracts that we need to control. In this case, we might as well just do it in one pair of transactions.
### 1. Survey contracts
We want to be sure that we move all contracts over to this new system. This will be OUSD's third governance contract, and we have some unused contracts still owned by old contracts. It would be good to all old contracts over, so that in the future we can fully depreciate the old governance contracts and don't have to have the future need of spending time digging on how to access the old governance contracts.
1. We should get a clean list of currently active contracts from an on chain tour (and verify that the docs are updated with these addresses.)
2. We should dig up a list of past contracts/proxies, then check governorship on them. Particularly we should locate the old OUSD vault proxy, since it may have user approvals on it.
### 2. Transfer ownership from old governance system
We'll need to generate a transaction on the current governance system and on the past governance system transferring ownership/governership on all contracts. This will have a two day timelock on it.
We'll also need to make a governance action on the old governor for the contracts on it.
### 3. Accept ownership from new system.
The new governance system will need to accept ownership on all these contracts. This will have the voting period and the timelock period, so we can start the process at the same time as starting governance actions on previous contracts. | non_defect | transition to new governance we want to safely transition to ousd contracts being owned by the new community governance system in this case safety means community can pass and execute governance actions bad guys can t do these things all contracts end up with the correct ownership background img width alt image src in our new governance system we have a circular loop of ownership since ogv controls veogv which controls voting which controls the timelock which controls ogv once we switch governance over each of these contracts needs to keep working correctly or we loose the ability to pass further proposals well ogv could die and previous staked governance powers would stay working no pressure previously i had been thinking we would do the governance transition in two phases first moving control of all contracts over to the governance system then later moving control of the governance system over to the governance system however after more thinking about it i don t think this gains us much it does not mitigate a bug or misconfiguration giving uncontrolled access and in order for governance to transition over we ll need to use the new system to accept governance talking to the very contracts that we need to control in this case we might as well just do it in one pair of transactions survey contracts we want to be sure that we move all contracts over to this new system this will be ousd s third governance contract and we have some unused contracts still owned by old contracts it would be good to all old contracts over so that in the future we can fully depreciate the old governance contracts and don t have to have the future need of spending time digging on how to access the old governance contracts we should get a clean list of currently active contracts from an on chain tour and verify that the docs are updated with these addresses we should dig up a list of past contracts proxies then check governorship on them particularly we should locate the old ousd vault proxy since it may have user approvals on it transfer ownership from old governance system we ll need to generate a transaction on the current governance system and on the past governance system transferring ownership governership on all contracts this will have a two day timelock on it we ll also need to make a governance action on the old governor for the contracts on it accept ownership from new system the new governance system will need to accept ownership on all these contracts this will have the voting period and the timelock period so we can start the process at the same time as starting governance actions on previous contracts | 0 |
1,168 | 2,599,629,676 | IssuesEvent | 2015-02-23 10:23:34 | v-l-m/vlm | https://api.github.com/repos/v-l-m/vlm | closed | Bug dans le passage de wp au pilototo | C: phpcommon P: major R: fixed T: defect | **Reported by paparazzia on 19 Sep 2009 14:36 UTC**
Cf. http://listes.virtual-loup-de-mer.org/sympa/arc/dev/2009-09/msg00115.html
Le WP est bien sauv dans la base au moment de l'execution de l'ordre, mais la class user n'est pas mise jour | 1.0 | Bug dans le passage de wp au pilototo - **Reported by paparazzia on 19 Sep 2009 14:36 UTC**
Cf. http://listes.virtual-loup-de-mer.org/sympa/arc/dev/2009-09/msg00115.html
Le WP est bien sauv dans la base au moment de l'execution de l'ordre, mais la class user n'est pas mise jour | defect | bug dans le passage de wp au pilototo reported by paparazzia on sep utc cf le wp est bien sauv dans la base au moment de l execution de l ordre mais la class user n est pas mise jour | 1 |
79,186 | 28,034,387,529 | IssuesEvent | 2023-03-28 14:15:24 | SeleniumHQ/selenium | https://api.github.com/repos/SeleniumHQ/selenium | opened | [🐛 Bug]: Enabling new jdk-http-client leads to 'java.io.IOException: Too many open files' and ' Unable to find a free port' | I-defect needs-triaging | ### What happened?
When enabling the new jdk-http-client client I get 'java.io.IOException: Too many open files' and ' Unable to find a free port' after while. This does _not_ occur if I disable 'System.setProperty("webdriver.http.factory", "jdk-http-client");', the legacy client does not exhibit this behavior (we have run it for many many hours without seeing this once). Therefore, I think the new driver has a resource leak of some type - both related to open files and due to ports.
### How can we reproduce the issue?
```shell
I am running in Spring Boot Application in Java 17 running via Docker. I see this after about an hour of running continuously. See below for details:
1) Enabling the client
Add System.setProperty("webdriver.http.factory", "jdk-http-client"); to the main spring boot application. Also add the following to pom.xml:
<properties>
<java.version>17</java.version>
<selenium.constructs.version>4.8.3</selenium.constructs.version>
</properties>
<dependency>
<groupId>org.seleniumhq.selenium</groupId>
<artifactId>selenium-http-jdk-client</artifactId>
<version>${selenium.constructs.version}</version>
</dependency>
```
1) Client Code:
```
private List<String> getWebpageInternal(String url) {
WebDriver localWebDriver = null;
try {
Stopwatch stopWatch = Stopwatch.createUnstarted();
stopWatch.start();
localWebDriver = getWebDriver(useFastStrategy);
localWebDriver.get("about:blank");
try {
localWebDriver.manage().timeouts().pageLoadTimeout(Duration.ofMillis(waitMs));
localWebDriver.manage().timeouts().scriptTimeout(Duration.ofMillis(waitMs));
localWebDriver.manage().timeouts().implicitlyWait(Duration.ofMillis(waitMs));
getUrl(localWebDriver, url);
} catch (Exception e) {
// Still try to get the page source - some of the page might have loaded
}
// Note that waiting can take a long time, so for speed we currently put it before the call to stopwatch.stop();
stopWatch.stop();
long lengthWaited = stopWatch.elapsed(TimeUnit.MILLISECONDS);
if (lengthWaited < minWaitMs) {
Thread.sleep(minWaitMs - lengthWaited);
}
String pageSource = getPageSourceSafely(localWebDriver);
if (pageSource == null) {
throw new WebpageScraperTimeoutException("Was not able to get page source=" + url);
}
List<String> pageSources = new ArrayList<>();
pageSources.add(pageSource);
localWebDriver.quit();
return pageSources;
} catch (Exception e) {
LOGGER.error("Got error in MakeNewWebpageScraperVersion3", e);
quitSafely(localWebDriver);
throw new RuntimeException(e);
}
}
private String getPageSourceSafely(WebDriver localWebDriver) {
try {
return localWebDriver.getPageSource();
} catch (Exception e) {
return null;
}
}
private void quitSafely(WebDriver localWebDriver) {
try {
if (localWebDriver == null) {
return;
}
localWebDriver.quit();
} catch (Exception e) {
// nothing to do
LOGGER.info("Got error in quit() call of quitSafely", e);
}
}
private WebDriver getWebDriver(boolean useFastStrategy) {
ChromeDriverService service = new ChromeDriverService.Builder()
.withVerbose(false)
.withSilent(true)
.build();
return new ChromeDriver(service, getChromeOptions(useFastStrategy));
}
private ChromeOptions getChromeOptions(boolean useFastStrategy) {
ChromeOptions chromeOptions = new ChromeOptions();
if (useFastStrategy) {
chromeOptions.setPageLoadStrategy(PageLoadStrategy.EAGER); // was default (Normal) before.
}
// User agent is required because some websites will reject your request if it does not have a user agent
chromeOptions.addArguments(String.format("user-agent=%s", USER_AGENT));
chromeOptions.addArguments("--log-level=OFF");
chromeOptions.addArguments("--headless=new");
List<String> arguments = new LinkedList<>();
arguments.add("--disable-extensions");
arguments.add("--headless");
arguments.add("--disable-gpu");
arguments.add("--no-sandbox");
arguments.add("--incognito");
arguments.add("--disable-application-cache");
arguments.add("--disable-dev-shm-usage");
chromeOptions.addArguments(arguments);
return chromeOptions;
}
```
2) Docker Code:
```
ARG CHROME_VERSION=111.0.5563.64-1
ADD google-chrome.repo /etc/yum.repos.d/google-chrome.repo
RUN microdnf install -y google-chrome-stable-$CHROME_VERSION \
&& sed -i 's/"$HERE\/chrome"/"$HERE\/chrome" --no-sandbox/g' /opt/google/chrome/google-chrome
## ChromeDriver
ARG CHROME_DRIVER_VERSION=111.0.5563.64
RUN microdnf install -y unzip \
&& curl -s -o /tmp/chromedriver.zip https://chromedriver.storage.googleapis.com/$CHROME_DRIVER_VERSION/chromedriver_linux64.zip \
&& unzip /tmp/chromedriver.zip -d /opt \
&& rm /tmp/chromedriver.zip \
&& mv /opt/chromedriver /opt/chromedriver-$CHROME_DRIVER_VERSION \
&& chmod 755 /opt/chromedriver-$CHROME_DRIVER_VERSION \
&& ln -s /opt/chromedriver-$CHROME_DRIVER_VERSION /usr/bin/chromedriver
ENV CHROMEDRIVER_PORT 4444
ENV CHROMEDRIVER_WHITELISTED_IPS "127.0.0.1"
ENV CHROMEDRIVER_URL_BASE ''
EXPOSE 4444
EXPOSE 8080
EXPOSE 5005
ARG JAR_FILE=target/*.jar
COPY ${JAR_FILE} app.jar
# For Testing
ENTRYPOINT ["java","-jar", "-Xmx600m","/app.jar"]
```
```
### Relevant log output
```shell
For 'Unable to Find a Free Port':
java.lang.RuntimeException: Unable to find a free port
3/27/2023, 6:11:47 PM at org.openqa.selenium.net.PortProber.findFreePort(PortProber.java:62)
3/27/2023, 6:11:47 PM at org.openqa.selenium.remote.service.DriverService$Builder.build(DriverService.java:452)
3/27/2023, 6:11:47 PM at monolith.scraping.MakeNewWebpageScraperVersion3.getWebDriver(MakeNewWebpageScraperVersion3.java:194)
```
```
### Operating System
Catalina and Ubuntu 22.10
### Selenium version
Java 17
### What are the browser(s) and version(s) where you see this issue?
Chrome
### What are the browser driver(s) and version(s) where you see this issue?
Chromedriver
### Are you using Selenium Grid?
No | 1.0 | [🐛 Bug]: Enabling new jdk-http-client leads to 'java.io.IOException: Too many open files' and ' Unable to find a free port' - ### What happened?
When enabling the new jdk-http-client client I get 'java.io.IOException: Too many open files' and ' Unable to find a free port' after while. This does _not_ occur if I disable 'System.setProperty("webdriver.http.factory", "jdk-http-client");', the legacy client does not exhibit this behavior (we have run it for many many hours without seeing this once). Therefore, I think the new driver has a resource leak of some type - both related to open files and due to ports.
### How can we reproduce the issue?
```shell
I am running in Spring Boot Application in Java 17 running via Docker. I see this after about an hour of running continuously. See below for details:
1) Enabling the client
Add System.setProperty("webdriver.http.factory", "jdk-http-client"); to the main spring boot application. Also add the following to pom.xml:
<properties>
<java.version>17</java.version>
<selenium.constructs.version>4.8.3</selenium.constructs.version>
</properties>
<dependency>
<groupId>org.seleniumhq.selenium</groupId>
<artifactId>selenium-http-jdk-client</artifactId>
<version>${selenium.constructs.version}</version>
</dependency>
```
1) Client Code:
```
private List<String> getWebpageInternal(String url) {
WebDriver localWebDriver = null;
try {
Stopwatch stopWatch = Stopwatch.createUnstarted();
stopWatch.start();
localWebDriver = getWebDriver(useFastStrategy);
localWebDriver.get("about:blank");
try {
localWebDriver.manage().timeouts().pageLoadTimeout(Duration.ofMillis(waitMs));
localWebDriver.manage().timeouts().scriptTimeout(Duration.ofMillis(waitMs));
localWebDriver.manage().timeouts().implicitlyWait(Duration.ofMillis(waitMs));
getUrl(localWebDriver, url);
} catch (Exception e) {
// Still try to get the page source - some of the page might have loaded
}
// Note that waiting can take a long time, so for speed we currently put it before the call to stopwatch.stop();
stopWatch.stop();
long lengthWaited = stopWatch.elapsed(TimeUnit.MILLISECONDS);
if (lengthWaited < minWaitMs) {
Thread.sleep(minWaitMs - lengthWaited);
}
String pageSource = getPageSourceSafely(localWebDriver);
if (pageSource == null) {
throw new WebpageScraperTimeoutException("Was not able to get page source=" + url);
}
List<String> pageSources = new ArrayList<>();
pageSources.add(pageSource);
localWebDriver.quit();
return pageSources;
} catch (Exception e) {
LOGGER.error("Got error in MakeNewWebpageScraperVersion3", e);
quitSafely(localWebDriver);
throw new RuntimeException(e);
}
}
private String getPageSourceSafely(WebDriver localWebDriver) {
try {
return localWebDriver.getPageSource();
} catch (Exception e) {
return null;
}
}
private void quitSafely(WebDriver localWebDriver) {
try {
if (localWebDriver == null) {
return;
}
localWebDriver.quit();
} catch (Exception e) {
// nothing to do
LOGGER.info("Got error in quit() call of quitSafely", e);
}
}
private WebDriver getWebDriver(boolean useFastStrategy) {
ChromeDriverService service = new ChromeDriverService.Builder()
.withVerbose(false)
.withSilent(true)
.build();
return new ChromeDriver(service, getChromeOptions(useFastStrategy));
}
private ChromeOptions getChromeOptions(boolean useFastStrategy) {
ChromeOptions chromeOptions = new ChromeOptions();
if (useFastStrategy) {
chromeOptions.setPageLoadStrategy(PageLoadStrategy.EAGER); // was default (Normal) before.
}
// User agent is required because some websites will reject your request if it does not have a user agent
chromeOptions.addArguments(String.format("user-agent=%s", USER_AGENT));
chromeOptions.addArguments("--log-level=OFF");
chromeOptions.addArguments("--headless=new");
List<String> arguments = new LinkedList<>();
arguments.add("--disable-extensions");
arguments.add("--headless");
arguments.add("--disable-gpu");
arguments.add("--no-sandbox");
arguments.add("--incognito");
arguments.add("--disable-application-cache");
arguments.add("--disable-dev-shm-usage");
chromeOptions.addArguments(arguments);
return chromeOptions;
}
```
2) Docker Code:
```
ARG CHROME_VERSION=111.0.5563.64-1
ADD google-chrome.repo /etc/yum.repos.d/google-chrome.repo
RUN microdnf install -y google-chrome-stable-$CHROME_VERSION \
&& sed -i 's/"$HERE\/chrome"/"$HERE\/chrome" --no-sandbox/g' /opt/google/chrome/google-chrome
## ChromeDriver
ARG CHROME_DRIVER_VERSION=111.0.5563.64
RUN microdnf install -y unzip \
&& curl -s -o /tmp/chromedriver.zip https://chromedriver.storage.googleapis.com/$CHROME_DRIVER_VERSION/chromedriver_linux64.zip \
&& unzip /tmp/chromedriver.zip -d /opt \
&& rm /tmp/chromedriver.zip \
&& mv /opt/chromedriver /opt/chromedriver-$CHROME_DRIVER_VERSION \
&& chmod 755 /opt/chromedriver-$CHROME_DRIVER_VERSION \
&& ln -s /opt/chromedriver-$CHROME_DRIVER_VERSION /usr/bin/chromedriver
ENV CHROMEDRIVER_PORT 4444
ENV CHROMEDRIVER_WHITELISTED_IPS "127.0.0.1"
ENV CHROMEDRIVER_URL_BASE ''
EXPOSE 4444
EXPOSE 8080
EXPOSE 5005
ARG JAR_FILE=target/*.jar
COPY ${JAR_FILE} app.jar
# For Testing
ENTRYPOINT ["java","-jar", "-Xmx600m","/app.jar"]
```
```
### Relevant log output
```shell
For 'Unable to Find a Free Port':
java.lang.RuntimeException: Unable to find a free port
3/27/2023, 6:11:47 PM at org.openqa.selenium.net.PortProber.findFreePort(PortProber.java:62)
3/27/2023, 6:11:47 PM at org.openqa.selenium.remote.service.DriverService$Builder.build(DriverService.java:452)
3/27/2023, 6:11:47 PM at monolith.scraping.MakeNewWebpageScraperVersion3.getWebDriver(MakeNewWebpageScraperVersion3.java:194)
```
```
### Operating System
Catalina and Ubuntu 22.10
### Selenium version
Java 17
### What are the browser(s) and version(s) where you see this issue?
Chrome
### What are the browser driver(s) and version(s) where you see this issue?
Chromedriver
### Are you using Selenium Grid?
No | defect | enabling new jdk http client leads to java io ioexception too many open files and unable to find a free port what happened when enabling the new jdk http client client i get java io ioexception too many open files and unable to find a free port after while this does not occur if i disable system setproperty webdriver http factory jdk http client the legacy client does not exhibit this behavior we have run it for many many hours without seeing this once therefore i think the new driver has a resource leak of some type both related to open files and due to ports how can we reproduce the issue shell i am running in spring boot application in java running via docker i see this after about an hour of running continuously see below for details enabling the client add system setproperty webdriver http factory jdk http client to the main spring boot application also add the following to pom xml org seleniumhq selenium selenium http jdk client selenium constructs version client code private list getwebpageinternal string url webdriver localwebdriver null try stopwatch stopwatch stopwatch createunstarted stopwatch start localwebdriver getwebdriver usefaststrategy localwebdriver get about blank try localwebdriver manage timeouts pageloadtimeout duration ofmillis waitms localwebdriver manage timeouts scripttimeout duration ofmillis waitms localwebdriver manage timeouts implicitlywait duration ofmillis waitms geturl localwebdriver url catch exception e still try to get the page source some of the page might have loaded note that waiting can take a long time so for speed we currently put it before the call to stopwatch stop stopwatch stop long lengthwaited stopwatch elapsed timeunit milliseconds if lengthwaited minwaitms thread sleep minwaitms lengthwaited string pagesource getpagesourcesafely localwebdriver if pagesource null throw new webpagescrapertimeoutexception was not able to get page source url list pagesources new arraylist pagesources add pagesource localwebdriver quit return pagesources catch exception e logger error got error in e quitsafely localwebdriver throw new runtimeexception e private string getpagesourcesafely webdriver localwebdriver try return localwebdriver getpagesource catch exception e return null private void quitsafely webdriver localwebdriver try if localwebdriver null return localwebdriver quit catch exception e nothing to do logger info got error in quit call of quitsafely e private webdriver getwebdriver boolean usefaststrategy chromedriverservice service new chromedriverservice builder withverbose false withsilent true build return new chromedriver service getchromeoptions usefaststrategy private chromeoptions getchromeoptions boolean usefaststrategy chromeoptions chromeoptions new chromeoptions if usefaststrategy chromeoptions setpageloadstrategy pageloadstrategy eager was default normal before user agent is required because some websites will reject your request if it does not have a user agent chromeoptions addarguments string format user agent s user agent chromeoptions addarguments log level off chromeoptions addarguments headless new list arguments new linkedlist arguments add disable extensions arguments add headless arguments add disable gpu arguments add no sandbox arguments add incognito arguments add disable application cache arguments add disable dev shm usage chromeoptions addarguments arguments return chromeoptions docker code arg chrome version add google chrome repo etc yum repos d google chrome repo run microdnf install y google chrome stable chrome version sed i s here chrome here chrome no sandbox g opt google chrome google chrome chromedriver arg chrome driver version run microdnf install y unzip curl s o tmp chromedriver zip unzip tmp chromedriver zip d opt rm tmp chromedriver zip mv opt chromedriver opt chromedriver chrome driver version chmod opt chromedriver chrome driver version ln s opt chromedriver chrome driver version usr bin chromedriver env chromedriver port env chromedriver whitelisted ips env chromedriver url base expose expose expose arg jar file target jar copy jar file app jar for testing entrypoint relevant log output shell for unable to find a free port java lang runtimeexception unable to find a free port pm at org openqa selenium net portprober findfreeport portprober java pm at org openqa selenium remote service driverservice builder build driverservice java pm at monolith scraping getwebdriver java operating system catalina and ubuntu selenium version java what are the browser s and version s where you see this issue chrome what are the browser driver s and version s where you see this issue chromedriver are you using selenium grid no | 1 |
201,973 | 15,817,942,391 | IssuesEvent | 2021-04-05 15:19:02 | timmo001/system-bridge | https://api.github.com/repos/timmo001/system-bridge | closed | Document API Requests | documentation priority-medium | # Description
API requests need documenting. (specifically payloads) OpenAPI doc also needs customising.
| 1.0 | Document API Requests - # Description
API requests need documenting. (specifically payloads) OpenAPI doc also needs customising.
| non_defect | document api requests description api requests need documenting specifically payloads openapi doc also needs customising | 0 |
65,611 | 12,626,588,020 | IssuesEvent | 2020-06-14 17:16:10 | sagemathinc/cocalc | https://api.github.com/repos/sagemathinc/cocalc | opened | browser spellcheck -- sometimes selecting a replacement fails | E-Codemirror HEISENBUG - hard to reproduce I-bug upstream | Reported by a user, but I've seen this sometimes, though I've also seen replacement work a lot. It would be nice to have a reliable test case:
1. I tried to use my browser spell checker in a latex document.
2. When left clicking to replace a misspelled word with spell checker suggestion, it changes the word for a millisecond, but then goes back to the previous (incorrect) word. I am using Google Chrome, and the same problem arises with chrome built in spell checker and the extension LanguageTool.
This is an upstream issue (i.e., issue with CodeMirror) not with CoCalc itself...
WORKAROUND: You can change to the "Editor Settings" panel and select the backend latex-aware spell checker. However, that doesn't have any replacement functionality at all -- it only indicates incorrectly spelled words.
Probably longterm the only way to fix this will be to have the backend project also send back a list of correct spellings, then present those in the UI. Of course, that will always have a delay over having the browser do the checking itself. | 1.0 | browser spellcheck -- sometimes selecting a replacement fails - Reported by a user, but I've seen this sometimes, though I've also seen replacement work a lot. It would be nice to have a reliable test case:
1. I tried to use my browser spell checker in a latex document.
2. When left clicking to replace a misspelled word with spell checker suggestion, it changes the word for a millisecond, but then goes back to the previous (incorrect) word. I am using Google Chrome, and the same problem arises with chrome built in spell checker and the extension LanguageTool.
This is an upstream issue (i.e., issue with CodeMirror) not with CoCalc itself...
WORKAROUND: You can change to the "Editor Settings" panel and select the backend latex-aware spell checker. However, that doesn't have any replacement functionality at all -- it only indicates incorrectly spelled words.
Probably longterm the only way to fix this will be to have the backend project also send back a list of correct spellings, then present those in the UI. Of course, that will always have a delay over having the browser do the checking itself. | non_defect | browser spellcheck sometimes selecting a replacement fails reported by a user but i ve seen this sometimes though i ve also seen replacement work a lot it would be nice to have a reliable test case i tried to use my browser spell checker in a latex document when left clicking to replace a misspelled word with spell checker suggestion it changes the word for a millisecond but then goes back to the previous incorrect word i am using google chrome and the same problem arises with chrome built in spell checker and the extension languagetool this is an upstream issue i e issue with codemirror not with cocalc itself workaround you can change to the editor settings panel and select the backend latex aware spell checker however that doesn t have any replacement functionality at all it only indicates incorrectly spelled words probably longterm the only way to fix this will be to have the backend project also send back a list of correct spellings then present those in the ui of course that will always have a delay over having the browser do the checking itself | 0 |
11,165 | 4,164,703,277 | IssuesEvent | 2016-06-19 00:29:13 | notsecure/uTox | https://api.github.com/repos/notsecure/uTox | closed | Make configuration file human-readable | Code enhancement low_priority | I know that one of aims of µTox project is to keep as few dependencies as possible, but I think that this would bring considerable benefit.
**Proposal:** to store settings and themes in `INI`, `CFG`, `JSON` or similar human-readable configuration file.
This will make it easier for users to understand and for developers to add/remove supported options in the future.
Parsing libraries tend to be very small and portable. | 1.0 | Make configuration file human-readable - I know that one of aims of µTox project is to keep as few dependencies as possible, but I think that this would bring considerable benefit.
**Proposal:** to store settings and themes in `INI`, `CFG`, `JSON` or similar human-readable configuration file.
This will make it easier for users to understand and for developers to add/remove supported options in the future.
Parsing libraries tend to be very small and portable. | non_defect | make configuration file human readable i know that one of aims of µtox project is to keep as few dependencies as possible but i think that this would bring considerable benefit proposal to store settings and themes in ini cfg json or similar human readable configuration file this will make it easier for users to understand and for developers to add remove supported options in the future parsing libraries tend to be very small and portable | 0 |
192,399 | 15,344,168,429 | IssuesEvent | 2021-02-27 23:45:26 | barrettotte/vscode-ibmi-languages | https://api.github.com/repos/barrettotte/vscode-ibmi-languages | closed | Update Documentation | documentation | - **Add link to code-for-ibmi** !
- Update "Development in VS Code" section
- Add MI file type to README and adjust README (forgot this one)
- Add last IBM i update: "Fall 2020: PTF enhancements for 7.3 and 7.4"
Add links:
- https://www.itjungle.com/2020/12/09/vs-code-provides-another-coding-option-for-ibm-i/
- https://www.anandk.dev/2020/11/VSCode-IBMi-AS400.html
| 1.0 | Update Documentation - - **Add link to code-for-ibmi** !
- Update "Development in VS Code" section
- Add MI file type to README and adjust README (forgot this one)
- Add last IBM i update: "Fall 2020: PTF enhancements for 7.3 and 7.4"
Add links:
- https://www.itjungle.com/2020/12/09/vs-code-provides-another-coding-option-for-ibm-i/
- https://www.anandk.dev/2020/11/VSCode-IBMi-AS400.html
| non_defect | update documentation add link to code for ibmi update development in vs code section add mi file type to readme and adjust readme forgot this one add last ibm i update fall ptf enhancements for and add links | 0 |
72,094 | 23,933,923,284 | IssuesEvent | 2022-09-11 00:19:53 | department-of-veterans-affairs/va.gov-cms | https://api.github.com/repos/department-of-veterans-affairs/va.gov-cms | opened | <Defect summary> | Defect Needs refining | ## Describe the defect
On a Facility page, Services with multiple locations display confusing location information
## To Reproduce
Steps to reproduce the behavior:
1. Go to https://www.va.gov/portland-health-care/locations/portland-va-medical-center/
2. Scroll down to **Health services offered here**
3. Expand the Podiatry service accordion
4. After the descriptive text, several bold headers are displayed
5. It is unclear how many distinct service locations are listed, it is unclear how these headers are grouped, and which information relates to which location.
6. Under the header Portland VA Medical Center, the word Varies is displayed in italics. T
7. See error
## AC / Expected behavior
A clear and concise description of what you expected to happen.
What should be the display behavior when an editor selects _Use the facility's hours_?
What should be the display behavior when an editor selects _Use the facility's street address_?
What should be the display behavior when an editor selects _Use the general facility phone number_?
## Screenshots
If applicable, add screenshots to help explain your problem.
## Additional context
Add any other context about the problem here. Reach out to the Product Managers to determine if it should be escalated as critical (prevents users from accomplishing their work with no known workaround and needs to be addressed within 2 business days).
## Desktop (please complete the following information if relevant, or delete)
- OS: [e.g. iOS]
- Browser [e.g. chrome, safari]
- Version [e.g. 22]
## Labels
(You can delete this section once it's complete)
- [x] Issue type (red) (defaults to "Defect")
- [ ] CMS subsystem (green)
- [ ] CMS practice area (blue)
- [x] CMS workstream (orange) (not needed for bug tickets)
- [ ] CMS-supported product (black)
### CMS Team
Please check the team(s) that will do this work.
- [ ] `Program`
- [ ] `Platform CMS Team`
- [ ] `Sitewide Crew`
- [ ] `⭐️ Sitewide CMS`
- [ ] `⭐️ Public Websites`
- [x] `⭐️ Facilities`
- [ ] `⭐️ User support`
| 1.0 | <Defect summary> - ## Describe the defect
On a Facility page, Services with multiple locations display confusing location information
## To Reproduce
Steps to reproduce the behavior:
1. Go to https://www.va.gov/portland-health-care/locations/portland-va-medical-center/
2. Scroll down to **Health services offered here**
3. Expand the Podiatry service accordion
4. After the descriptive text, several bold headers are displayed
5. It is unclear how many distinct service locations are listed, it is unclear how these headers are grouped, and which information relates to which location.
6. Under the header Portland VA Medical Center, the word Varies is displayed in italics. T
7. See error
## AC / Expected behavior
A clear and concise description of what you expected to happen.
What should be the display behavior when an editor selects _Use the facility's hours_?
What should be the display behavior when an editor selects _Use the facility's street address_?
What should be the display behavior when an editor selects _Use the general facility phone number_?
## Screenshots
If applicable, add screenshots to help explain your problem.
## Additional context
Add any other context about the problem here. Reach out to the Product Managers to determine if it should be escalated as critical (prevents users from accomplishing their work with no known workaround and needs to be addressed within 2 business days).
## Desktop (please complete the following information if relevant, or delete)
- OS: [e.g. iOS]
- Browser [e.g. chrome, safari]
- Version [e.g. 22]
## Labels
(You can delete this section once it's complete)
- [x] Issue type (red) (defaults to "Defect")
- [ ] CMS subsystem (green)
- [ ] CMS practice area (blue)
- [x] CMS workstream (orange) (not needed for bug tickets)
- [ ] CMS-supported product (black)
### CMS Team
Please check the team(s) that will do this work.
- [ ] `Program`
- [ ] `Platform CMS Team`
- [ ] `Sitewide Crew`
- [ ] `⭐️ Sitewide CMS`
- [ ] `⭐️ Public Websites`
- [x] `⭐️ Facilities`
- [ ] `⭐️ User support`
| defect | describe the defect on a facility page services with multiple locations display confusing location information to reproduce steps to reproduce the behavior go to scroll down to health services offered here expand the podiatry service accordion after the descriptive text several bold headers are displayed it is unclear how many distinct service locations are listed it is unclear how these headers are grouped and which information relates to which location under the header portland va medical center the word varies is displayed in italics t see error ac expected behavior a clear and concise description of what you expected to happen what should be the display behavior when an editor selects use the facility s hours what should be the display behavior when an editor selects use the facility s street address what should be the display behavior when an editor selects use the general facility phone number screenshots if applicable add screenshots to help explain your problem additional context add any other context about the problem here reach out to the product managers to determine if it should be escalated as critical prevents users from accomplishing their work with no known workaround and needs to be addressed within business days desktop please complete the following information if relevant or delete os browser version labels you can delete this section once it s complete issue type red defaults to defect cms subsystem green cms practice area blue cms workstream orange not needed for bug tickets cms supported product black cms team please check the team s that will do this work program platform cms team sitewide crew ⭐️ sitewide cms ⭐️ public websites ⭐️ facilities ⭐️ user support | 1 |
225,972 | 24,926,734,087 | IssuesEvent | 2022-10-31 08:08:58 | swagger-api/swagger-codegen | https://api.github.com/repos/swagger-api/swagger-codegen | reopened | CVE-2018-12022 (High) detected in jackson-databind-2.4.5.jar, jackson-databind-2.6.4.jar | security vulnerability | ## CVE-2018-12022 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.4.5.jar</b>, <b>jackson-databind-2.6.4.jar</b></p></summary>
<p>
<details><summary><b>jackson-databind-2.4.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /samples/client/petstore/scala/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar</p>
<p>
Dependency Hierarchy:
- swagger-async-httpclient_2.10-0.3.5.jar (Root Library)
- json4s-jackson_2.10-3.2.10.jar
- :x: **jackson-databind-2.4.5.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.6.4.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /samples/client/petstore/java/jersey1/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar,/aches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.6.4.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/swagger-api/swagger-codegen/commit/4b7a8d7d7384aa6a27d6309c35ade0916edae7ed">4b7a8d7d7384aa6a27d6309c35ade0916edae7ed</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
<p>Publish Date: 2019-03-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-12022>CVE-2018-12022</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022</a></p>
<p>Release Date: 2019-03-21</p>
<p>Fix Resolution: 2.6.7.3</p>
</p>
</details>
<p></p>
***
<!-- REMEDIATE-OPEN-PR-START -->
- [ ] Check this box to open an automated fix PR
<!-- REMEDIATE-OPEN-PR-END -->
| True | CVE-2018-12022 (High) detected in jackson-databind-2.4.5.jar, jackson-databind-2.6.4.jar - ## CVE-2018-12022 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.4.5.jar</b>, <b>jackson-databind-2.6.4.jar</b></p></summary>
<p>
<details><summary><b>jackson-databind-2.4.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /samples/client/petstore/scala/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar</p>
<p>
Dependency Hierarchy:
- swagger-async-httpclient_2.10-0.3.5.jar (Root Library)
- json4s-jackson_2.10-3.2.10.jar
- :x: **jackson-databind-2.4.5.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.6.4.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /samples/client/petstore/java/jersey1/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar,/aches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.6.4.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/swagger-api/swagger-codegen/commit/4b7a8d7d7384aa6a27d6309c35ade0916edae7ed">4b7a8d7d7384aa6a27d6309c35ade0916edae7ed</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
<p>Publish Date: 2019-03-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-12022>CVE-2018-12022</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022</a></p>
<p>Release Date: 2019-03-21</p>
<p>Fix Resolution: 2.6.7.3</p>
</p>
</details>
<p></p>
***
<!-- REMEDIATE-OPEN-PR-START -->
- [ ] Check this box to open an automated fix PR
<!-- REMEDIATE-OPEN-PR-END -->
| non_defect | cve high detected in jackson databind jar jackson databind jar cve high severity vulnerability vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file samples client petstore scala build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy swagger async httpclient jar root library jackson jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file samples client petstore java build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar aches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in fasterxml jackson databind prior to and when default typing is enabled either globally or for a specific property the service has the jodd db jar for database access for the jodd framework in the classpath and an attacker can provide an ldap service to access it is possible to make the service execute a malicious payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution check this box to open an automated fix pr | 0 |
20,481 | 3,367,248,654 | IssuesEvent | 2015-11-22 01:12:40 | dkfans/keeperfx | https://api.github.com/repos/dkfans/keeperfx | closed | Computer player only builds 2x2 rooms | Branch-Stable Priority-Medium Status-ReadyForTest Type-Defect | Play map [320](http://keeper.lubiki.pl/html/dk1_maps_lone.php?start=00320) in KeeperFX v0.4.6 r1768 patch, git 94f47c2, dated 2015-11-20 01:13:49.
Explore the map and use frameskip to notice one of the keepers only builds 2x2 rooms.
The level script does change computer processes but I don't think this should be the result:
```
COMPUTER_PLAYER(PLAYER1,10)
SET_COMPUTER_CHECKS(PLAYER1,"CHECK FOR NEUTRAL PLACES",15000,0,0,0,65000)
REM CheckEvery AttackPercent CTADuration MinForAttack LastCheck
SET_COMPUTER_CHECKS(PLAYER1,"CHECK FOR QUICK ATTACK",700,70,3000,8,12500)
SET_COMPUTER_PROCESS(PLAYER1,"ATTACK SAFE ATTACK",-1,100,17,100,0)
SET_COMPUTER_PROCESS(PLAYER1,"ATTACK PLAN 1",-1,100,17,100,0)
SET_COMPUTER_PROCESS(PLAYER1,"BUILD A SCAVENGER ROOM",-10,2,2,9,8)
COMPUTER_PLAYER(PLAYER2,1)
SET_COMPUTER_CHECKS(PLAYER2,"CHECK FOR NEUTRAL PLACES",15000,0,0,0,65000)
REM CheckEvery AttackPercent CTADuration MinForAttack LastCheck
SET_COMPUTER_CHECKS(PLAYER2,"CHECK FOR QUICK ATTACK",700,70,3000,8,12500)
SET_COMPUTER_PROCESS(PLAYER2,"ATTACK SAFE ATTACK",-1,100,17,100,0)
SET_COMPUTER_PROCESS(PLAYER2,"ATTACK PLAN 1",-1,100,17,100,0)
SET_COMPUTER_PROCESS(PLAYER2,"BUILD A SCAVENGER ROOM",-10,2,2,9,8)
``` | 1.0 | Computer player only builds 2x2 rooms - Play map [320](http://keeper.lubiki.pl/html/dk1_maps_lone.php?start=00320) in KeeperFX v0.4.6 r1768 patch, git 94f47c2, dated 2015-11-20 01:13:49.
Explore the map and use frameskip to notice one of the keepers only builds 2x2 rooms.
The level script does change computer processes but I don't think this should be the result:
```
COMPUTER_PLAYER(PLAYER1,10)
SET_COMPUTER_CHECKS(PLAYER1,"CHECK FOR NEUTRAL PLACES",15000,0,0,0,65000)
REM CheckEvery AttackPercent CTADuration MinForAttack LastCheck
SET_COMPUTER_CHECKS(PLAYER1,"CHECK FOR QUICK ATTACK",700,70,3000,8,12500)
SET_COMPUTER_PROCESS(PLAYER1,"ATTACK SAFE ATTACK",-1,100,17,100,0)
SET_COMPUTER_PROCESS(PLAYER1,"ATTACK PLAN 1",-1,100,17,100,0)
SET_COMPUTER_PROCESS(PLAYER1,"BUILD A SCAVENGER ROOM",-10,2,2,9,8)
COMPUTER_PLAYER(PLAYER2,1)
SET_COMPUTER_CHECKS(PLAYER2,"CHECK FOR NEUTRAL PLACES",15000,0,0,0,65000)
REM CheckEvery AttackPercent CTADuration MinForAttack LastCheck
SET_COMPUTER_CHECKS(PLAYER2,"CHECK FOR QUICK ATTACK",700,70,3000,8,12500)
SET_COMPUTER_PROCESS(PLAYER2,"ATTACK SAFE ATTACK",-1,100,17,100,0)
SET_COMPUTER_PROCESS(PLAYER2,"ATTACK PLAN 1",-1,100,17,100,0)
SET_COMPUTER_PROCESS(PLAYER2,"BUILD A SCAVENGER ROOM",-10,2,2,9,8)
``` | defect | computer player only builds rooms play map in keeperfx patch git dated explore the map and use frameskip to notice one of the keepers only builds rooms the level script does change computer processes but i don t think this should be the result computer player set computer checks check for neutral places rem checkevery attackpercent ctaduration minforattack lastcheck set computer checks check for quick attack set computer process attack safe attack set computer process attack plan set computer process build a scavenger room computer player set computer checks check for neutral places rem checkevery attackpercent ctaduration minforattack lastcheck set computer checks check for quick attack set computer process attack safe attack set computer process attack plan set computer process build a scavenger room | 1 |
282,030 | 24,445,976,355 | IssuesEvent | 2022-10-06 18:00:23 | CDCgov/prime-simplereport | https://api.github.com/repos/CDCgov/prime-simplereport | closed | Conduct Tests needs a level-one header | Better Data Accessibility Moderate Engineering Conduct Test | ## Area or Component
Conduct Test page
## Quick Summary
There's no top level header on the page.
## Accessibility Violation
Page should contain a level-one heading: https://dequeuniversity.com/rules/axe/4.4/page-has-heading-one?application=AxeChrome
## Action Requested
Add a top level header to the page structure. It should probably be the selected "Conduct Tests" navigation item, if possible.
## Original Deque Issue
https://docs.google.com/spreadsheets/d/1b6xjubAN5Uw11DV4_B5zvSu7HeDI6Z-DpV4DMcToqAY/edit#gid=981460209&range=30:30 | 1.0 | Conduct Tests needs a level-one header - ## Area or Component
Conduct Test page
## Quick Summary
There's no top level header on the page.
## Accessibility Violation
Page should contain a level-one heading: https://dequeuniversity.com/rules/axe/4.4/page-has-heading-one?application=AxeChrome
## Action Requested
Add a top level header to the page structure. It should probably be the selected "Conduct Tests" navigation item, if possible.
## Original Deque Issue
https://docs.google.com/spreadsheets/d/1b6xjubAN5Uw11DV4_B5zvSu7HeDI6Z-DpV4DMcToqAY/edit#gid=981460209&range=30:30 | non_defect | conduct tests needs a level one header area or component conduct test page quick summary there s no top level header on the page accessibility violation page should contain a level one heading action requested add a top level header to the page structure it should probably be the selected conduct tests navigation item if possible original deque issue | 0 |
13,577 | 2,770,514,017 | IssuesEvent | 2015-05-01 15:10:58 | gizmoboard/gizmoboard | https://api.github.com/repos/gizmoboard/gizmoboard | opened | Issues in Documentation | defect documentation | Instructions in README should say:
`git clone https://github.com/gizmoboard/gizmoboard`
Instructions in Contributing has mispelling of "Gizmobodo" | 1.0 | Issues in Documentation - Instructions in README should say:
`git clone https://github.com/gizmoboard/gizmoboard`
Instructions in Contributing has mispelling of "Gizmobodo" | defect | issues in documentation instructions in readme should say git clone instructions in contributing has mispelling of gizmobodo | 1 |
16,528 | 2,910,408,652 | IssuesEvent | 2015-06-21 18:35:51 | cakephp/debug_kit | https://api.github.com/repos/cakephp/debug_kit | opened | DebugKit update required for 3.x | defect | With the view updates the debug kit is now broken:
Deprecated (16384): Controller::$viewPath is deprecated. Use $this->getView()->viewPath() instead. [CORE/src/Controller/Controller.php, line 322]
Deprecated (16384): Controller::$layout is deprecated. Use $this->getView()->layout() instead. [CORE/src/Controller/Controller.php, line 322]
The result is a non-functional debug kit toolbar.
The problem here is that once you correct it, all apps that have not upgraded the core but use a `*` restraint on the debug kit will blow up.
I wonder if the current "deprecation notice throwing" strategy is a good one. | 1.0 | DebugKit update required for 3.x - With the view updates the debug kit is now broken:
Deprecated (16384): Controller::$viewPath is deprecated. Use $this->getView()->viewPath() instead. [CORE/src/Controller/Controller.php, line 322]
Deprecated (16384): Controller::$layout is deprecated. Use $this->getView()->layout() instead. [CORE/src/Controller/Controller.php, line 322]
The result is a non-functional debug kit toolbar.
The problem here is that once you correct it, all apps that have not upgraded the core but use a `*` restraint on the debug kit will blow up.
I wonder if the current "deprecation notice throwing" strategy is a good one. | defect | debugkit update required for x with the view updates the debug kit is now broken deprecated controller viewpath is deprecated use this getview viewpath instead deprecated controller layout is deprecated use this getview layout instead the result is a non functional debug kit toolbar the problem here is that once you correct it all apps that have not upgraded the core but use a restraint on the debug kit will blow up i wonder if the current deprecation notice throwing strategy is a good one | 1 |
58,765 | 16,749,395,918 | IssuesEvent | 2021-06-11 20:17:59 | vector-im/element-web | https://api.github.com/repos/vector-im/element-web | opened | image context menu has inconsistent hotkeys | T-Defect | <!-- A picture's worth a thousand words: PLEASE INCLUDE A SCREENSHOT :P -->
<!-- Please report security issues by email to security@matrix.org -->
<!-- This is a bug report template. By following the instructions below and
filling out the sections with your information, you will help the us to get all
the necessary data to fix your issue.
You can also preview your report before submitting it. You may remove sections
that aren't relevant to your particular case.
Text between <!-- and --> marks will be invisible in the report.
-->
### Description
Right clicking another users image on nightly creates this context menu:

actually I cut off the first line of this menu which presents the url `https://...../_matrix/...`
C works, A does nothing. On your own images and on stable you seem to only get the C copy option.
### Steps to reproduce
- have someone send an immage
- right click
<!-- Please send us logs for your bug report. They're very important for bugs
which are hard to reproduce. To do this, create this issue then go to your
account settings and click 'Submit Debug Logs' from the Help & About tab -->
Logs being sent: no
<!-- Include screenshots if possible: you can drag and drop images below. -->
### Version information
<!-- IMPORTANT: please answer the following questions, to help us narrow down the problem -->
- **Platform**: desktop
For the desktop app:
- **OS**: Arch
- **Version**: aur/element-desktop-nightly-bin 2021061101-1 | 1.0 | image context menu has inconsistent hotkeys - <!-- A picture's worth a thousand words: PLEASE INCLUDE A SCREENSHOT :P -->
<!-- Please report security issues by email to security@matrix.org -->
<!-- This is a bug report template. By following the instructions below and
filling out the sections with your information, you will help the us to get all
the necessary data to fix your issue.
You can also preview your report before submitting it. You may remove sections
that aren't relevant to your particular case.
Text between <!-- and --> marks will be invisible in the report.
-->
### Description
Right clicking another users image on nightly creates this context menu:

actually I cut off the first line of this menu which presents the url `https://...../_matrix/...`
C works, A does nothing. On your own images and on stable you seem to only get the C copy option.
### Steps to reproduce
- have someone send an immage
- right click
<!-- Please send us logs for your bug report. They're very important for bugs
which are hard to reproduce. To do this, create this issue then go to your
account settings and click 'Submit Debug Logs' from the Help & About tab -->
Logs being sent: no
<!-- Include screenshots if possible: you can drag and drop images below. -->
### Version information
<!-- IMPORTANT: please answer the following questions, to help us narrow down the problem -->
- **Platform**: desktop
For the desktop app:
- **OS**: Arch
- **Version**: aur/element-desktop-nightly-bin 2021061101-1 | defect | image context menu has inconsistent hotkeys this is a bug report template by following the instructions below and filling out the sections with your information you will help the us to get all the necessary data to fix your issue you can also preview your report before submitting it you may remove sections that aren t relevant to your particular case text between marks will be invisible in the report description right clicking another users image on nightly creates this context menu actually i cut off the first line of this menu which presents the url c works a does nothing on your own images and on stable you seem to only get the c copy option steps to reproduce have someone send an immage right click please send us logs for your bug report they re very important for bugs which are hard to reproduce to do this create this issue then go to your account settings and click submit debug logs from the help about tab logs being sent no version information platform desktop for the desktop app os arch version aur element desktop nightly bin | 1 |
56,406 | 15,079,369,482 | IssuesEvent | 2021-02-05 10:03:39 | hazelcast/hazelcast-jet | https://api.github.com/repos/hazelcast/hazelcast-jet | closed | Incorrect example in RecordPart.toObject | cdc defect javadoc | https://github.com/hazelcast/hazelcast-jet/blob/master/extensions/cdc-debezium/src/main/java/com/hazelcast/jet/cdc/RecordPart.java#L46-L56
1. The argument name is `daysSinceBirth`, but we use it as epoch days.
2. We say that the column in the DB is `DATE`. Maybe that's the case, but I find it surprising that such a column is sent as epoch-days. When you cast `DATE` to `NUMBER` in Oracle, it uses eopch days, but it's a fractional number and the fractional part is the time of the day.
3. I'm also surprised that `null` is represented as `0`. Maybe that's done by jackson because the set-method accepts a primitive `long`. Maybe it would be better to use `Long`, JSON supports nulls well. | 1.0 | Incorrect example in RecordPart.toObject - https://github.com/hazelcast/hazelcast-jet/blob/master/extensions/cdc-debezium/src/main/java/com/hazelcast/jet/cdc/RecordPart.java#L46-L56
1. The argument name is `daysSinceBirth`, but we use it as epoch days.
2. We say that the column in the DB is `DATE`. Maybe that's the case, but I find it surprising that such a column is sent as epoch-days. When you cast `DATE` to `NUMBER` in Oracle, it uses eopch days, but it's a fractional number and the fractional part is the time of the day.
3. I'm also surprised that `null` is represented as `0`. Maybe that's done by jackson because the set-method accepts a primitive `long`. Maybe it would be better to use `Long`, JSON supports nulls well. | defect | incorrect example in recordpart toobject the argument name is dayssincebirth but we use it as epoch days we say that the column in the db is date maybe that s the case but i find it surprising that such a column is sent as epoch days when you cast date to number in oracle it uses eopch days but it s a fractional number and the fractional part is the time of the day i m also surprised that null is represented as maybe that s done by jackson because the set method accepts a primitive long maybe it would be better to use long json supports nulls well | 1 |
125,241 | 10,339,632,097 | IssuesEvent | 2019-09-03 19:50:02 | elastic/kibana | https://api.github.com/repos/elastic/kibana | closed | Failing test: Browser Unit Tests.ML - Index Or Search Controller - ML - Index Or Search Controller Initialize Index Or Search Controller | failed-test | A test failed on a tracked branch
```
[object Object]
```
First failure: [Jenkins Build](https://kibana-ci.elastic.co/job/elastic+kibana+6.7/JOB=x-pack-intake,node=immutable/2/)
<!-- kibanaCiData = {"failed-test":{"test.class":"Browser Unit Tests.ML - Index Or Search Controller","test.name":"ML - Index Or Search Controller Initialize Index Or Search Controller","test.failCount":12}} --> | 1.0 | Failing test: Browser Unit Tests.ML - Index Or Search Controller - ML - Index Or Search Controller Initialize Index Or Search Controller - A test failed on a tracked branch
```
[object Object]
```
First failure: [Jenkins Build](https://kibana-ci.elastic.co/job/elastic+kibana+6.7/JOB=x-pack-intake,node=immutable/2/)
<!-- kibanaCiData = {"failed-test":{"test.class":"Browser Unit Tests.ML - Index Or Search Controller","test.name":"ML - Index Or Search Controller Initialize Index Or Search Controller","test.failCount":12}} --> | non_defect | failing test browser unit tests ml index or search controller ml index or search controller initialize index or search controller a test failed on a tracked branch first failure | 0 |
26,571 | 4,762,031,788 | IssuesEvent | 2016-10-25 10:07:17 | PowerDNS/pdns | https://api.github.com/repos/PowerDNS/pdns | closed | dnsdist 1.1.0-beta1 doesn't release file descriptors | defect dnsdist | Hi,
I'm trying the last dnsdist 1.1.0-beta1 in CentOS 7 and I can see that the file descriptors are not released. The dnsdist is installed using the repo.
This is the fd usage and the queries graphs for a week:


As you can see, the first days, when the file descriptors increased up to 4096 (default max open files configured in the systemd service) the dnsdist produced a segmentation fault and systemd restarted again. Then I modified the max fd up to 65000 just to check if we had too many connections, but as you can see the fd increased without releasing them.
The configuration for the dnsdist is:
```
newServer({address="1.2.3.4:53", name="pdns-server1", pool="pool1"})
newServer({address="5.6.7.8:53", name="pdns-server2", pool="pool1"})
newServer({address="1.2.3.4:54", name="pdns-recursor1", pool="pool2"})
newServer({address="5.6.7.8:54", name="pdns-recursor2", pool="pool2"})
addPoolRule({"192.168.1.0/24"}, "pool1")`
addPoolRule({"0.0.0.0/0"}, "pool2")
setServerPolicy(roundrobin)
controlSocket("127.0.0.1")
addLocal("0.0.0.0:53", true, true)
setMaxTCPClientThreads(256)
setMaxUDPOutstanding(65535)
pc = newPacketCache(10000, 86400, 0, 60, 60)
getPool("pool1"):setCache(pc)
getPool("pool2"):setCache(pc)
addACL("0.0.0.0/0")
addAction(NotRule(RecordsCountRule(DNSSection.Question, 1, 1)), RCodeAction(dnsdist.REFUSED))
webserver("1.2.3.4:8083", "xxxxxxxxx", "xxxxxxxxxx")
carbonServer("2.2.2.2","dnsdist1","30")
```
It seems a bug with this new version.
| 1.0 | dnsdist 1.1.0-beta1 doesn't release file descriptors - Hi,
I'm trying the last dnsdist 1.1.0-beta1 in CentOS 7 and I can see that the file descriptors are not released. The dnsdist is installed using the repo.
This is the fd usage and the queries graphs for a week:


As you can see, the first days, when the file descriptors increased up to 4096 (default max open files configured in the systemd service) the dnsdist produced a segmentation fault and systemd restarted again. Then I modified the max fd up to 65000 just to check if we had too many connections, but as you can see the fd increased without releasing them.
The configuration for the dnsdist is:
```
newServer({address="1.2.3.4:53", name="pdns-server1", pool="pool1"})
newServer({address="5.6.7.8:53", name="pdns-server2", pool="pool1"})
newServer({address="1.2.3.4:54", name="pdns-recursor1", pool="pool2"})
newServer({address="5.6.7.8:54", name="pdns-recursor2", pool="pool2"})
addPoolRule({"192.168.1.0/24"}, "pool1")`
addPoolRule({"0.0.0.0/0"}, "pool2")
setServerPolicy(roundrobin)
controlSocket("127.0.0.1")
addLocal("0.0.0.0:53", true, true)
setMaxTCPClientThreads(256)
setMaxUDPOutstanding(65535)
pc = newPacketCache(10000, 86400, 0, 60, 60)
getPool("pool1"):setCache(pc)
getPool("pool2"):setCache(pc)
addACL("0.0.0.0/0")
addAction(NotRule(RecordsCountRule(DNSSection.Question, 1, 1)), RCodeAction(dnsdist.REFUSED))
webserver("1.2.3.4:8083", "xxxxxxxxx", "xxxxxxxxxx")
carbonServer("2.2.2.2","dnsdist1","30")
```
It seems a bug with this new version.
| defect | dnsdist doesn t release file descriptors hi i m trying the last dnsdist in centos and i can see that the file descriptors are not released the dnsdist is installed using the repo this is the fd usage and the queries graphs for a week as you can see the first days when the file descriptors increased up to default max open files configured in the systemd service the dnsdist produced a segmentation fault and systemd restarted again then i modified the max fd up to just to check if we had too many connections but as you can see the fd increased without releasing them the configuration for the dnsdist is newserver address name pdns pool newserver address name pdns pool newserver address name pdns pool newserver address name pdns pool addpoolrule addpoolrule setserverpolicy roundrobin controlsocket addlocal true true setmaxtcpclientthreads setmaxudpoutstanding pc newpacketcache getpool setcache pc getpool setcache pc addacl addaction notrule recordscountrule dnssection question rcodeaction dnsdist refused webserver xxxxxxxxx xxxxxxxxxx carbonserver it seems a bug with this new version | 1 |
69,445 | 14,988,549,843 | IssuesEvent | 2021-01-29 01:31:45 | sourcegraph/sourcegraph | https://api.github.com/repos/sourcegraph/sourcegraph | opened | Update dotcom deployment configuration to consume GSM secrets - env vars only | RFC-249 team/security | Consume the secrets we just added to the secret manager. This issue is only for replacing values in environment variables with `sm://[PROJECT_ID]/[my-secret]`, since we have a lot of secrets here, and want to break things up. Can be merged with #17806 if relevant.
**Dependencies**
#17804
**Useful Links:**
[Sample k8s deployment using Berglas for env vars](https://github.com/GoogleCloudPlatform/berglas/blob/main/examples/kubernetes/deploy/sample.yaml)
**Repository:**
[deploy-sourcegraph-dot-com](https://github.com/sourcegraph/deploy-sourcegraph-dot-com/) | True | Update dotcom deployment configuration to consume GSM secrets - env vars only - Consume the secrets we just added to the secret manager. This issue is only for replacing values in environment variables with `sm://[PROJECT_ID]/[my-secret]`, since we have a lot of secrets here, and want to break things up. Can be merged with #17806 if relevant.
**Dependencies**
#17804
**Useful Links:**
[Sample k8s deployment using Berglas for env vars](https://github.com/GoogleCloudPlatform/berglas/blob/main/examples/kubernetes/deploy/sample.yaml)
**Repository:**
[deploy-sourcegraph-dot-com](https://github.com/sourcegraph/deploy-sourcegraph-dot-com/) | non_defect | update dotcom deployment configuration to consume gsm secrets env vars only consume the secrets we just added to the secret manager this issue is only for replacing values in environment variables with sm since we have a lot of secrets here and want to break things up can be merged with if relevant dependencies useful links repository | 0 |
20,544 | 15,681,781,074 | IssuesEvent | 2021-03-25 06:06:15 | microsoft/win32metadata | https://api.github.com/repos/microsoft/win32metadata | closed | GetProcessHeap and HeapAlloc | usability | `GetProcessHeap` returns a `HANDLE` as expected by `HeapAlloc` (according to the original sources). However, `HeapAlloc`'s metadata description expects a `HeapHandle` - a type I had not come across before.
It's very common to use `GetProcessHeap` and `HeapAlloc` together, so this makes it a little awkward.
| True | GetProcessHeap and HeapAlloc - `GetProcessHeap` returns a `HANDLE` as expected by `HeapAlloc` (according to the original sources). However, `HeapAlloc`'s metadata description expects a `HeapHandle` - a type I had not come across before.
It's very common to use `GetProcessHeap` and `HeapAlloc` together, so this makes it a little awkward.
| non_defect | getprocessheap and heapalloc getprocessheap returns a handle as expected by heapalloc according to the original sources however heapalloc s metadata description expects a heaphandle a type i had not come across before it s very common to use getprocessheap and heapalloc together so this makes it a little awkward | 0 |
256,302 | 27,561,636,522 | IssuesEvent | 2023-03-07 22:37:04 | samqws-marketing/amzn-ion-hive-serde | https://api.github.com/repos/samqws-marketing/amzn-ion-hive-serde | opened | hadoop-common-2.7.1.jar: 45 vulnerabilities (highest severity is: 9.8) | Mend: dependency security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p></summary>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (hadoop-common version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2019-10202](https://www.mend.io/vulnerability-database/CVE-2019-10202) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | jackson-mapper-asl-1.9.13.jar | Transitive | N/A* | ❌ |
| [CVE-2016-3086](https://www.mend.io/vulnerability-database/CVE-2016-3086) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | hadoop-common-2.7.1.jar | Direct | 2.7.3 | ✅ |
| [CVE-2022-26612](https://www.mend.io/vulnerability-database/CVE-2022-26612) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | hadoop-common-2.7.1.jar | Direct | org.apache.hadoop:hadoop-common:3.2.3 | ✅ |
| [CVE-2022-25168](https://www.mend.io/vulnerability-database/CVE-2022-25168) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | hadoop-common-2.7.1.jar | Direct | 2.10.2 | ✅ |
| [CVE-2020-9493](https://www.mend.io/vulnerability-database/CVE-2020-9493) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2022-23305](https://www.mend.io/vulnerability-database/CVE-2022-23305) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2019-17571](https://www.mend.io/vulnerability-database/CVE-2019-17571) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2018-8029](https://www.mend.io/vulnerability-database/CVE-2018-8029) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | hadoop-common-2.7.1.jar | Direct | 2.8.5 | ✅ |
| [CVE-2018-8009](https://www.mend.io/vulnerability-database/CVE-2018-8009) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | hadoop-common-2.7.1.jar | Direct | 2.7.4 | ✅ |
| [CVE-2016-5393](https://www.mend.io/vulnerability-database/CVE-2016-5393) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | hadoop-common-2.7.1.jar | Direct | 2.7.3 | ✅ |
| [CVE-2022-23307](https://www.mend.io/vulnerability-database/CVE-2022-23307) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2022-23302](https://www.mend.io/vulnerability-database/CVE-2022-23302) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [WS-2021-0419](https://github.com/google/gson/pull/1991) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.7 | gson-2.2.4.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-3509](https://www.mend.io/vulnerability-database/CVE-2022-3509) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | protobuf-java-2.5.0.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2014-3643](https://www.mend.io/vulnerability-database/CVE-2014-3643) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | 2.7.2 | ✅ |
| [CVE-2022-45693](https://www.mend.io/vulnerability-database/CVE-2022-45693) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-36090](https://www.mend.io/vulnerability-database/CVE-2021-36090) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2019-10172](https://www.mend.io/vulnerability-database/CVE-2019-10172) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-mapper-asl-1.9.13.jar | Transitive | N/A* | ❌ |
| [CVE-2022-25647](https://www.mend.io/vulnerability-database/CVE-2022-25647) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | gson-2.2.4.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-40149](https://www.mend.io/vulnerability-database/CVE-2022-40149) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2017-5637](https://www.mend.io/vulnerability-database/CVE-2017-5637) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | zookeeper-3.4.6.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-35517](https://www.mend.io/vulnerability-database/CVE-2021-35517) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-35516](https://www.mend.io/vulnerability-database/CVE-2021-35516) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-35515](https://www.mend.io/vulnerability-database/CVE-2021-35515) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-4104](https://www.mend.io/vulnerability-database/CVE-2021-4104) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2018-8012](https://www.mend.io/vulnerability-database/CVE-2018-8012) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | zookeeper-3.4.6.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-3171](https://www.mend.io/vulnerability-database/CVE-2022-3171) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | protobuf-java-2.5.0.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-40150](https://www.mend.io/vulnerability-database/CVE-2022-40150) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-45685](https://www.mend.io/vulnerability-database/CVE-2022-45685) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2019-10086](https://www.mend.io/vulnerability-database/CVE-2019-10086) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | detected in multiple dependencies | Transitive | 2.7.2 | ✅ |
| [CVE-2014-0114](https://www.mend.io/vulnerability-database/CVE-2014-0114) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | detected in multiple dependencies | Transitive | 2.7.2 | ✅ |
| [CVE-2021-37533](https://www.mend.io/vulnerability-database/CVE-2021-37533) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | commons-net-3.1.jar | Transitive | 2.7.2 | ✅ |
| [WS-2019-0379](https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | commons-codec-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2017-15713](https://www.mend.io/vulnerability-database/CVE-2017-15713) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | hadoop-common-2.7.1.jar | Direct | 2.8.3 | ✅ |
| [CVE-2016-5725](https://www.mend.io/vulnerability-database/CVE-2016-5725) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jsch-0.1.42.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2019-0201](https://www.mend.io/vulnerability-database/CVE-2019-0201) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | zookeeper-3.4.6.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2018-10237](https://www.mend.io/vulnerability-database/CVE-2018-10237) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | guava-16.0.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2018-11771](https://www.mend.io/vulnerability-database/CVE-2018-11771) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-22569](https://www.mend.io/vulnerability-database/CVE-2021-22569) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | protobuf-java-2.5.0.jar | Transitive | 2.7.2 | ✅ |
| [WS-2017-3734](https://github.com/apache/httpcomponents-client/commit/0554271750599756d4946c0d7ba43d04b1a7b220) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | httpclient-4.4.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2020-13956](https://www.mend.io/vulnerability-database/CVE-2020-13956) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | httpclient-4.4.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2012-5783](https://www.mend.io/vulnerability-database/CVE-2012-5783) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-httpclient-3.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-29425](https://www.mend.io/vulnerability-database/CVE-2021-29425) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-io-2.4.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2020-9488](https://www.mend.io/vulnerability-database/CVE-2020-9488) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.7 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2020-8908](https://www.mend.io/vulnerability-database/CVE-2020-8908) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.3 | guava-16.0.1.jar | Transitive | 2.7.2 | ✅ |
<p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p>
## Details
> Partial details (21 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br>
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2019-10202</summary>
### Vulnerable Library - <b>jackson-mapper-asl-1.9.13.jar</b></p>
<p>Data Mapper package is a high-performance data binding package
built on Jackson JSON processor</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jackson-mapper-asl-1.9.13.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike.
<p>Publish Date: 2019-10-01
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10202>CVE-2019-10202</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4">https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4</a></p>
<p>Release Date: 2019-10-01</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.0.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2016-3086</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The YARN NodeManager in Apache Hadoop 2.6.x before 2.6.5 and 2.7.x before 2.7.3 can leak the password for credential store provider used by the NodeManager to YARN Applications.
<p>Publish Date: 2017-09-05
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-3086>CVE-2016-3086</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://mail-archives.apache.org/mod_mbox/hadoop-general/201701.mbox/%3C0ed32746-5a53-9051-5877-2b1abd88beb6%40apache.org%3E">http://mail-archives.apache.org/mod_mbox/hadoop-general/201701.mbox/%3C0ed32746-5a53-9051-5877-2b1abd88beb6%40apache.org%3E</a></p>
<p>Release Date: 2017-01-10</p>
<p>Fix Resolution: 2.7.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-26612</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the external directory using the symlink name. This however would be caught by the same targetDirPath check on Unix because of the getCanonicalPath call. However on Windows, getCanonicalPath doesn't resolve symbolic links, which bypasses the check. unpackEntries during TAR extraction follows symbolic links which allows writing outside expected base directory on Windows. This was addressed in Apache Hadoop 3.2.3
<p>Publish Date: 2022-04-07
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-26612>CVE-2022-26612</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26612">https://nvd.nist.gov/vuln/detail/CVE-2022-26612</a></p>
<p>Release Date: 2022-04-07</p>
<p>Fix Resolution: org.apache.hadoop:hadoop-common:3.2.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-25168</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Hadoop's FileUtil.unTar(File, File) API does not escape the input file name before being passed to the shell. An attacker can inject arbitrary commands. This is only used in Hadoop 3.3 InMemoryAliasMap.completeBootstrapTransfer, which is only ever run by a local user. It has been used in Hadoop 2.x for yarn localization, which does enable remote code execution. It is used in Apache Spark, from the SQL command ADD ARCHIVE. As the ADD ARCHIVE command adds new binaries to the classpath, being able to execute shell scripts does not confer new permissions to the caller. SPARK-38305. "Check existence of file before untarring/zipping", which is included in 3.3.0, 3.1.4, 3.2.2, prevents shell commands being executed, regardless of which version of the hadoop libraries are in use. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.3 or upper (including HADOOP-18136).
<p>Publish Date: 2022-08-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25168>CVE-2022-25168</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread/mxqnb39jfrwgs3j6phwvlrfq4mlox130">https://lists.apache.org/thread/mxqnb39jfrwgs3j6phwvlrfq4mlox130</a></p>
<p>Release Date: 2022-08-04</p>
<p>Fix Resolution: 2.10.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2020-9493</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
<p>Publish Date: 2021-06-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9493>CVE-2020-9493</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.openwall.com/lists/oss-security/2021/06/16/1">https://www.openwall.com/lists/oss-security/2021/06/16/1</a></p>
<p>Release Date: 2021-06-16</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-23305</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23305>CVE-2022-23305</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2019-17571</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
<p>Publish Date: 2019-12-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17571>CVE-2019-17571</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E">https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E</a></p>
<p>Release Date: 2019-12-20</p>
<p>Fix Resolution: log4j-manual - 1.2.17-16;log4j-javadoc - 1.2.17-16;log4j - 1.2.17-16,1.2.17-16</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-8029</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Hadoop versions 3.0.0-alpha1 to 3.1.0, 2.9.0 to 2.9.1, and 2.2.0 to 2.8.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user.
<p>Publish Date: 2019-05-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-8029>CVE-2018-8029</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8029</a></p>
<p>Release Date: 2019-05-30</p>
<p>Fix Resolution: 2.8.5</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-8009</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.
<p>Publish Date: 2018-11-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-8009>CVE-2018-8009</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1593018">https://bugzilla.redhat.com/show_bug.cgi?id=1593018</a></p>
<p>Release Date: 2018-11-13</p>
<p>Fix Resolution: 2.7.4</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-5393</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Hadoop 2.6.x before 2.6.5 and 2.7.x before 2.7.3, a remote user who can authenticate with the HDFS NameNode can possibly run arbitrary commands with the same privileges as the HDFS service.
<p>Publish Date: 2016-11-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-5393>CVE-2016-5393</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5393">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5393</a></p>
<p>Release Date: 2016-11-29</p>
<p>Fix Resolution: 2.7.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-23307</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23307>CVE-2022-23307</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-23302</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23302>CVE-2022-23302</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2021-0419</summary>
### Vulnerable Library - <b>gson-2.2.4.jar</b></p>
<p>Google Gson library</p>
<p>Library home page: <a href="http://code.google.com/p/google-gson/">http://code.google.com/p/google-gson/</a></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **gson-2.2.4.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Denial of Service vulnerability was discovered in gson before 2.8.9 via the writeReplace() method.
<p>Publish Date: 2021-10-11
<p>URL: <a href=https://github.com/google/gson/pull/1991>WS-2021-0419</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.7</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-10-11</p>
<p>Fix Resolution (com.google.code.gson:gson): 2.8.9</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-3509</summary>
### Vulnerable Library - <b>protobuf-java-2.5.0.jar</b></p>
<p>Protocol Buffers are a way of encoding structured data in an efficient yet
extensible format.</p>
<p>Library home page: <a href="http://code.google.com/p/protobuf">http://code.google.com/p/protobuf</a></p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/2.5.0/a10732c76bfacdbd633a7eb0f7968b1059a65dfa/protobuf-java-2.5.0.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/2.5.0/a10732c76bfacdbd633a7eb0f7968b1059a65dfa/protobuf-java-2.5.0.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **protobuf-java-2.5.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
<p>Publish Date: 2022-12-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-3509>CVE-2022-3509</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3509">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3509</a></p>
<p>Release Date: 2022-12-12</p>
<p>Fix Resolution (com.google.protobuf:protobuf-java): 3.16.3</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-3643</summary>
### Vulnerable Libraries - <b>jersey-core-1.9.jar</b>, <b>jersey-server-1.9.jar</b></p>
<p>
### <b>jersey-core-1.9.jar</b></p>
<p>Jersey is the open source (under dual CDDL+GPL license) JAX-RS (JSR 311)
production quality Reference Implementation for building
RESTful Web services.</p>
<p>Library home page: <a href="https://jersey.java.net/">https://jersey.java.net/</a></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-core/1.9/8341846f18187013bb9e27e46b7ee00a6395daf4/jersey-core-1.9.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-core/1.9/8341846f18187013bb9e27e46b7ee00a6395daf4/jersey-core-1.9.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jersey-core-1.9.jar** (Vulnerable Library)
### <b>jersey-server-1.9.jar</b></p>
<p>Jersey is the open source (under dual CDDL+GPL license) JAX-RS (JSR 311)
production quality Reference Implementation for building
RESTful Web services.</p>
<p>Library home page: <a href="https://jersey.java.net/">https://jersey.java.net/</a></p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-server/1.9/3a6ea7cc5e15c824953f9f3ece2201b634d90d18/jersey-server-1.9.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-server/1.9/3a6ea7cc5e15c824953f9f3ece2201b634d90d18/jersey-server-1.9.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jersey-server-1.9.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jersey: XXE via parameter entities not disabled by the jersey SAX parser
<p>Publish Date: 2019-12-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-3643>CVE-2014-3643</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3643">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3643</a></p>
<p>Release Date: 2019-12-15</p>
<p>Fix Resolution (com.sun.jersey:jersey-core): 1.12-b01</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p><p>Fix Resolution (com.sun.jersey:jersey-server): 1.13-b01</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-45693</summary>
### Vulnerable Library - <b>jettison-1.1.jar</b></p>
<p>A StAX implementation for JSON.</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- jersey-json-1.9.jar
- :x: **jettison-1.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
<p>Publish Date: 2022-12-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-45693>CVE-2022-45693</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-12-13</p>
<p>Fix Resolution (org.codehaus.jettison:jettison): 1.5.2</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-36090</summary>
### Vulnerable Library - <b>commons-compress-1.9.jar</b></p>
<p>Apache Commons Compress software defines an API for working with
compression and archive formats.
These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional
Unix Compress, DEFLATE and ar, cpio, jar, tar, zip, dump, 7z, arj.</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.9/cc18955ff1e36d5abd39a14bfe82b19154330a34/commons-compress-1.9.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.9/cc18955ff1e36d5abd39a14bfe82b19154330a34/commons-compress-1.9.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **commons-compress-1.9.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.
<p>Publish Date: 2021-07-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-36090>CVE-2021-36090</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://commons.apache.org/proper/commons-compress/security-reports.html">https://commons.apache.org/proper/commons-compress/security-reports.html</a></p>
<p>Release Date: 2021-07-13</p>
<p>Fix Resolution (org.apache.commons:commons-compress): 1.21</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-10172</summary>
### Vulnerable Library - <b>jackson-mapper-asl-1.9.13.jar</b></p>
<p>Data Mapper package is a high-performance data binding package
built on Jackson JSON processor</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jackson-mapper-asl-1.9.13.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.
<p>Publish Date: 2019-11-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10172>CVE-2019-10172</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10172">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10172</a></p>
<p>Release Date: 2019-11-18</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.0.0-RC1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-25647</summary>
### Vulnerable Library - <b>gson-2.2.4.jar</b></p>
<p>Google Gson library</p>
<p>Library home page: <a href="http://code.google.com/p/google-gson/">http://code.google.com/p/google-gson/</a></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **gson-2.2.4.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.
<p>Publish Date: 2022-05-01
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25647>CVE-2022-25647</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25647`">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25647`</a></p>
<p>Release Date: 2022-05-01</p>
<p>Fix Resolution (com.google.code.gson:gson): 2.8.9</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-40149</summary>
### Vulnerable Library - <b>jettison-1.1.jar</b></p>
<p>A StAX implementation for JSON.</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- jersey-json-1.9.jar
- :x: **jettison-1.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
<p>Publish Date: 2022-09-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-40149>CVE-2022-40149</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-09-16</p>
<p>Fix Resolution (org.codehaus.jettison:jettison): 1.5.1</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-5637</summary>
### Vulnerable Library - <b>zookeeper-3.4.6.jar</b></p>
<p></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.zookeeper/zookeeper/3.4.6/1b2502e29da1ebaade2357cd1de35a855fa3755/zookeeper-3.4.6.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.zookeeper/zookeeper/3.4.6/1b2502e29da1ebaade2357cd1de35a855fa3755/zookeeper-3.4.6.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **zookeeper-3.4.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.
<p>Publish Date: 2017-10-10
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-5637>CVE-2017-5637</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637</a></p>
<p>Release Date: 2017-10-09</p>
<p>Fix Resolution (org.apache.zookeeper:zookeeper): 3.4.10</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | True | hadoop-common-2.7.1.jar: 45 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p></summary>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (hadoop-common version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2019-10202](https://www.mend.io/vulnerability-database/CVE-2019-10202) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | jackson-mapper-asl-1.9.13.jar | Transitive | N/A* | ❌ |
| [CVE-2016-3086](https://www.mend.io/vulnerability-database/CVE-2016-3086) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | hadoop-common-2.7.1.jar | Direct | 2.7.3 | ✅ |
| [CVE-2022-26612](https://www.mend.io/vulnerability-database/CVE-2022-26612) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | hadoop-common-2.7.1.jar | Direct | org.apache.hadoop:hadoop-common:3.2.3 | ✅ |
| [CVE-2022-25168](https://www.mend.io/vulnerability-database/CVE-2022-25168) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | hadoop-common-2.7.1.jar | Direct | 2.10.2 | ✅ |
| [CVE-2020-9493](https://www.mend.io/vulnerability-database/CVE-2020-9493) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2022-23305](https://www.mend.io/vulnerability-database/CVE-2022-23305) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2019-17571](https://www.mend.io/vulnerability-database/CVE-2019-17571) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2018-8029](https://www.mend.io/vulnerability-database/CVE-2018-8029) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | hadoop-common-2.7.1.jar | Direct | 2.8.5 | ✅ |
| [CVE-2018-8009](https://www.mend.io/vulnerability-database/CVE-2018-8009) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | hadoop-common-2.7.1.jar | Direct | 2.7.4 | ✅ |
| [CVE-2016-5393](https://www.mend.io/vulnerability-database/CVE-2016-5393) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | hadoop-common-2.7.1.jar | Direct | 2.7.3 | ✅ |
| [CVE-2022-23307](https://www.mend.io/vulnerability-database/CVE-2022-23307) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2022-23302](https://www.mend.io/vulnerability-database/CVE-2022-23302) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [WS-2021-0419](https://github.com/google/gson/pull/1991) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.7 | gson-2.2.4.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-3509](https://www.mend.io/vulnerability-database/CVE-2022-3509) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | protobuf-java-2.5.0.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2014-3643](https://www.mend.io/vulnerability-database/CVE-2014-3643) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | 2.7.2 | ✅ |
| [CVE-2022-45693](https://www.mend.io/vulnerability-database/CVE-2022-45693) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-36090](https://www.mend.io/vulnerability-database/CVE-2021-36090) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2019-10172](https://www.mend.io/vulnerability-database/CVE-2019-10172) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-mapper-asl-1.9.13.jar | Transitive | N/A* | ❌ |
| [CVE-2022-25647](https://www.mend.io/vulnerability-database/CVE-2022-25647) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | gson-2.2.4.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-40149](https://www.mend.io/vulnerability-database/CVE-2022-40149) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2017-5637](https://www.mend.io/vulnerability-database/CVE-2017-5637) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | zookeeper-3.4.6.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-35517](https://www.mend.io/vulnerability-database/CVE-2021-35517) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-35516](https://www.mend.io/vulnerability-database/CVE-2021-35516) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-35515](https://www.mend.io/vulnerability-database/CVE-2021-35515) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-4104](https://www.mend.io/vulnerability-database/CVE-2021-4104) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2018-8012](https://www.mend.io/vulnerability-database/CVE-2018-8012) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | zookeeper-3.4.6.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-3171](https://www.mend.io/vulnerability-database/CVE-2022-3171) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | protobuf-java-2.5.0.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-40150](https://www.mend.io/vulnerability-database/CVE-2022-40150) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-45685](https://www.mend.io/vulnerability-database/CVE-2022-45685) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2019-10086](https://www.mend.io/vulnerability-database/CVE-2019-10086) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | detected in multiple dependencies | Transitive | 2.7.2 | ✅ |
| [CVE-2014-0114](https://www.mend.io/vulnerability-database/CVE-2014-0114) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | detected in multiple dependencies | Transitive | 2.7.2 | ✅ |
| [CVE-2021-37533](https://www.mend.io/vulnerability-database/CVE-2021-37533) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | commons-net-3.1.jar | Transitive | 2.7.2 | ✅ |
| [WS-2019-0379](https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | commons-codec-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2017-15713](https://www.mend.io/vulnerability-database/CVE-2017-15713) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | hadoop-common-2.7.1.jar | Direct | 2.8.3 | ✅ |
| [CVE-2016-5725](https://www.mend.io/vulnerability-database/CVE-2016-5725) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jsch-0.1.42.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2019-0201](https://www.mend.io/vulnerability-database/CVE-2019-0201) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | zookeeper-3.4.6.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2018-10237](https://www.mend.io/vulnerability-database/CVE-2018-10237) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | guava-16.0.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2018-11771](https://www.mend.io/vulnerability-database/CVE-2018-11771) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-22569](https://www.mend.io/vulnerability-database/CVE-2021-22569) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | protobuf-java-2.5.0.jar | Transitive | 2.7.2 | ✅ |
| [WS-2017-3734](https://github.com/apache/httpcomponents-client/commit/0554271750599756d4946c0d7ba43d04b1a7b220) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | httpclient-4.4.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2020-13956](https://www.mend.io/vulnerability-database/CVE-2020-13956) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | httpclient-4.4.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2012-5783](https://www.mend.io/vulnerability-database/CVE-2012-5783) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-httpclient-3.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-29425](https://www.mend.io/vulnerability-database/CVE-2021-29425) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-io-2.4.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2020-9488](https://www.mend.io/vulnerability-database/CVE-2020-9488) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.7 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2020-8908](https://www.mend.io/vulnerability-database/CVE-2020-8908) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.3 | guava-16.0.1.jar | Transitive | 2.7.2 | ✅ |
<p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p>
## Details
> Partial details (21 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br>
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2019-10202</summary>
### Vulnerable Library - <b>jackson-mapper-asl-1.9.13.jar</b></p>
<p>Data Mapper package is a high-performance data binding package
built on Jackson JSON processor</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jackson-mapper-asl-1.9.13.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike.
<p>Publish Date: 2019-10-01
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10202>CVE-2019-10202</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4">https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4</a></p>
<p>Release Date: 2019-10-01</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.0.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2016-3086</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The YARN NodeManager in Apache Hadoop 2.6.x before 2.6.5 and 2.7.x before 2.7.3 can leak the password for credential store provider used by the NodeManager to YARN Applications.
<p>Publish Date: 2017-09-05
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-3086>CVE-2016-3086</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://mail-archives.apache.org/mod_mbox/hadoop-general/201701.mbox/%3C0ed32746-5a53-9051-5877-2b1abd88beb6%40apache.org%3E">http://mail-archives.apache.org/mod_mbox/hadoop-general/201701.mbox/%3C0ed32746-5a53-9051-5877-2b1abd88beb6%40apache.org%3E</a></p>
<p>Release Date: 2017-01-10</p>
<p>Fix Resolution: 2.7.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-26612</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the external directory using the symlink name. This however would be caught by the same targetDirPath check on Unix because of the getCanonicalPath call. However on Windows, getCanonicalPath doesn't resolve symbolic links, which bypasses the check. unpackEntries during TAR extraction follows symbolic links which allows writing outside expected base directory on Windows. This was addressed in Apache Hadoop 3.2.3
<p>Publish Date: 2022-04-07
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-26612>CVE-2022-26612</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26612">https://nvd.nist.gov/vuln/detail/CVE-2022-26612</a></p>
<p>Release Date: 2022-04-07</p>
<p>Fix Resolution: org.apache.hadoop:hadoop-common:3.2.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-25168</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Hadoop's FileUtil.unTar(File, File) API does not escape the input file name before being passed to the shell. An attacker can inject arbitrary commands. This is only used in Hadoop 3.3 InMemoryAliasMap.completeBootstrapTransfer, which is only ever run by a local user. It has been used in Hadoop 2.x for yarn localization, which does enable remote code execution. It is used in Apache Spark, from the SQL command ADD ARCHIVE. As the ADD ARCHIVE command adds new binaries to the classpath, being able to execute shell scripts does not confer new permissions to the caller. SPARK-38305. "Check existence of file before untarring/zipping", which is included in 3.3.0, 3.1.4, 3.2.2, prevents shell commands being executed, regardless of which version of the hadoop libraries are in use. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.3 or upper (including HADOOP-18136).
<p>Publish Date: 2022-08-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25168>CVE-2022-25168</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread/mxqnb39jfrwgs3j6phwvlrfq4mlox130">https://lists.apache.org/thread/mxqnb39jfrwgs3j6phwvlrfq4mlox130</a></p>
<p>Release Date: 2022-08-04</p>
<p>Fix Resolution: 2.10.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2020-9493</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
<p>Publish Date: 2021-06-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9493>CVE-2020-9493</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.openwall.com/lists/oss-security/2021/06/16/1">https://www.openwall.com/lists/oss-security/2021/06/16/1</a></p>
<p>Release Date: 2021-06-16</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-23305</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23305>CVE-2022-23305</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2019-17571</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
<p>Publish Date: 2019-12-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17571>CVE-2019-17571</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E">https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E</a></p>
<p>Release Date: 2019-12-20</p>
<p>Fix Resolution: log4j-manual - 1.2.17-16;log4j-javadoc - 1.2.17-16;log4j - 1.2.17-16,1.2.17-16</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-8029</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Hadoop versions 3.0.0-alpha1 to 3.1.0, 2.9.0 to 2.9.1, and 2.2.0 to 2.8.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user.
<p>Publish Date: 2019-05-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-8029>CVE-2018-8029</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8029</a></p>
<p>Release Date: 2019-05-30</p>
<p>Fix Resolution: 2.8.5</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-8009</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.
<p>Publish Date: 2018-11-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-8009>CVE-2018-8009</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1593018">https://bugzilla.redhat.com/show_bug.cgi?id=1593018</a></p>
<p>Release Date: 2018-11-13</p>
<p>Fix Resolution: 2.7.4</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-5393</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Hadoop 2.6.x before 2.6.5 and 2.7.x before 2.7.3, a remote user who can authenticate with the HDFS NameNode can possibly run arbitrary commands with the same privileges as the HDFS service.
<p>Publish Date: 2016-11-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-5393>CVE-2016-5393</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5393">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5393</a></p>
<p>Release Date: 2016-11-29</p>
<p>Fix Resolution: 2.7.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-23307</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23307>CVE-2022-23307</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-23302</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23302>CVE-2022-23302</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2021-0419</summary>
### Vulnerable Library - <b>gson-2.2.4.jar</b></p>
<p>Google Gson library</p>
<p>Library home page: <a href="http://code.google.com/p/google-gson/">http://code.google.com/p/google-gson/</a></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **gson-2.2.4.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Denial of Service vulnerability was discovered in gson before 2.8.9 via the writeReplace() method.
<p>Publish Date: 2021-10-11
<p>URL: <a href=https://github.com/google/gson/pull/1991>WS-2021-0419</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.7</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-10-11</p>
<p>Fix Resolution (com.google.code.gson:gson): 2.8.9</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-3509</summary>
### Vulnerable Library - <b>protobuf-java-2.5.0.jar</b></p>
<p>Protocol Buffers are a way of encoding structured data in an efficient yet
extensible format.</p>
<p>Library home page: <a href="http://code.google.com/p/protobuf">http://code.google.com/p/protobuf</a></p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/2.5.0/a10732c76bfacdbd633a7eb0f7968b1059a65dfa/protobuf-java-2.5.0.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/2.5.0/a10732c76bfacdbd633a7eb0f7968b1059a65dfa/protobuf-java-2.5.0.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **protobuf-java-2.5.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
<p>Publish Date: 2022-12-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-3509>CVE-2022-3509</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3509">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3509</a></p>
<p>Release Date: 2022-12-12</p>
<p>Fix Resolution (com.google.protobuf:protobuf-java): 3.16.3</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-3643</summary>
### Vulnerable Libraries - <b>jersey-core-1.9.jar</b>, <b>jersey-server-1.9.jar</b></p>
<p>
### <b>jersey-core-1.9.jar</b></p>
<p>Jersey is the open source (under dual CDDL+GPL license) JAX-RS (JSR 311)
production quality Reference Implementation for building
RESTful Web services.</p>
<p>Library home page: <a href="https://jersey.java.net/">https://jersey.java.net/</a></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-core/1.9/8341846f18187013bb9e27e46b7ee00a6395daf4/jersey-core-1.9.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-core/1.9/8341846f18187013bb9e27e46b7ee00a6395daf4/jersey-core-1.9.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jersey-core-1.9.jar** (Vulnerable Library)
### <b>jersey-server-1.9.jar</b></p>
<p>Jersey is the open source (under dual CDDL+GPL license) JAX-RS (JSR 311)
production quality Reference Implementation for building
RESTful Web services.</p>
<p>Library home page: <a href="https://jersey.java.net/">https://jersey.java.net/</a></p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-server/1.9/3a6ea7cc5e15c824953f9f3ece2201b634d90d18/jersey-server-1.9.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-server/1.9/3a6ea7cc5e15c824953f9f3ece2201b634d90d18/jersey-server-1.9.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jersey-server-1.9.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jersey: XXE via parameter entities not disabled by the jersey SAX parser
<p>Publish Date: 2019-12-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-3643>CVE-2014-3643</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3643">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3643</a></p>
<p>Release Date: 2019-12-15</p>
<p>Fix Resolution (com.sun.jersey:jersey-core): 1.12-b01</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p><p>Fix Resolution (com.sun.jersey:jersey-server): 1.13-b01</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-45693</summary>
### Vulnerable Library - <b>jettison-1.1.jar</b></p>
<p>A StAX implementation for JSON.</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- jersey-json-1.9.jar
- :x: **jettison-1.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
<p>Publish Date: 2022-12-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-45693>CVE-2022-45693</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-12-13</p>
<p>Fix Resolution (org.codehaus.jettison:jettison): 1.5.2</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-36090</summary>
### Vulnerable Library - <b>commons-compress-1.9.jar</b></p>
<p>Apache Commons Compress software defines an API for working with
compression and archive formats.
These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional
Unix Compress, DEFLATE and ar, cpio, jar, tar, zip, dump, 7z, arj.</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.9/cc18955ff1e36d5abd39a14bfe82b19154330a34/commons-compress-1.9.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.9/cc18955ff1e36d5abd39a14bfe82b19154330a34/commons-compress-1.9.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **commons-compress-1.9.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.
<p>Publish Date: 2021-07-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-36090>CVE-2021-36090</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://commons.apache.org/proper/commons-compress/security-reports.html">https://commons.apache.org/proper/commons-compress/security-reports.html</a></p>
<p>Release Date: 2021-07-13</p>
<p>Fix Resolution (org.apache.commons:commons-compress): 1.21</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-10172</summary>
### Vulnerable Library - <b>jackson-mapper-asl-1.9.13.jar</b></p>
<p>Data Mapper package is a high-performance data binding package
built on Jackson JSON processor</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jackson-mapper-asl-1.9.13.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.
<p>Publish Date: 2019-11-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10172>CVE-2019-10172</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10172">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10172</a></p>
<p>Release Date: 2019-11-18</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.0.0-RC1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-25647</summary>
### Vulnerable Library - <b>gson-2.2.4.jar</b></p>
<p>Google Gson library</p>
<p>Library home page: <a href="http://code.google.com/p/google-gson/">http://code.google.com/p/google-gson/</a></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **gson-2.2.4.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.
<p>Publish Date: 2022-05-01
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25647>CVE-2022-25647</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25647`">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25647`</a></p>
<p>Release Date: 2022-05-01</p>
<p>Fix Resolution (com.google.code.gson:gson): 2.8.9</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-40149</summary>
### Vulnerable Library - <b>jettison-1.1.jar</b></p>
<p>A StAX implementation for JSON.</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- jersey-json-1.9.jar
- :x: **jettison-1.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
<p>Publish Date: 2022-09-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-40149>CVE-2022-40149</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-09-16</p>
<p>Fix Resolution (org.codehaus.jettison:jettison): 1.5.1</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-5637</summary>
### Vulnerable Library - <b>zookeeper-3.4.6.jar</b></p>
<p></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.zookeeper/zookeeper/3.4.6/1b2502e29da1ebaade2357cd1de35a855fa3755/zookeeper-3.4.6.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.zookeeper/zookeeper/3.4.6/1b2502e29da1ebaade2357cd1de35a855fa3755/zookeeper-3.4.6.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **zookeeper-3.4.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.
<p>Publish Date: 2017-10-10
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-5637>CVE-2017-5637</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637</a></p>
<p>Release Date: 2017-10-09</p>
<p>Fix Resolution (org.apache.zookeeper:zookeeper): 3.4.10</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | non_defect | hadoop common jar vulnerabilities highest severity is vulnerable library hadoop common jar apache hadoop common path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache hadoop hadoop common hadoop common jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in hadoop common version remediation available critical jackson mapper asl jar transitive n a critical hadoop common jar direct critical hadoop common jar direct org apache hadoop hadoop common critical hadoop common jar direct critical jar transitive n a critical jar transitive n a critical jar transitive n a high hadoop common jar direct high hadoop common jar direct high hadoop common jar direct high jar transitive n a high jar transitive n a high gson jar transitive high protobuf java jar transitive high detected in multiple dependencies transitive high jettison jar transitive high commons compress jar transitive high jackson mapper asl jar transitive n a high gson jar transitive high jettison jar transitive high zookeeper jar transitive high commons compress jar transitive high commons compress jar transitive high commons compress jar transitive high jar transitive n a high zookeeper jar transitive high protobuf java jar transitive high jettison jar transitive high jettison jar transitive high detected in multiple dependencies transitive high detected in multiple dependencies transitive medium commons net jar transitive medium commons codec jar transitive medium hadoop common jar direct medium jsch jar transitive medium zookeeper jar transitive medium guava jar transitive medium commons compress jar transitive medium protobuf java jar transitive medium httpclient jar transitive medium httpclient jar transitive medium commons httpclient jar transitive medium commons io jar transitive low jar transitive n a low guava jar transitive for some transitive vulnerabilities there is no version of direct dependency with a fix check the section details below to see if there is a version of transitive dependency where vulnerability is fixed details partial details vulnerabilities are displayed below due to a content size limitation in github to view information on the remaining vulnerabilities navigate to the mend application cve vulnerable library jackson mapper asl jar data mapper package is a high performance data binding package built on jackson json processor path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files org codehaus jackson jackson mapper asl jackson mapper asl jar home wss scanner gradle caches modules files org codehaus jackson jackson mapper asl jackson mapper asl jar dependency hierarchy hadoop common jar root library x jackson mapper asl jar vulnerable library found in head commit a href found in base branch vulnerability details a series of deserialization vulnerabilities have been discovered in codehaus x implemented in eap this cve fixes cve cve cve cve cve cve cve reported for fasterxml jackson databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind cve vulnerable library hadoop common jar apache hadoop common path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache hadoop hadoop common hadoop common jar dependency hierarchy x hadoop common jar vulnerable library found in head commit a href found in base branch vulnerability details the yarn nodemanager in apache hadoop x before and x before can leak the password for credential store provider used by the nodemanager to yarn applications publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library hadoop common jar apache hadoop common path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache hadoop hadoop common hadoop common jar dependency hierarchy x hadoop common jar vulnerable library found in head commit a href found in base branch vulnerability details in apache hadoop the untar function uses untarusingjava function on windows and the built in tar utility on unix and other oses as a result a tar entry may create a symlink under the expected extraction directory which points to an external directory a subsequent tar entry may extract an arbitrary file into the external directory using the symlink name this however would be caught by the same targetdirpath check on unix because of the getcanonicalpath call however on windows getcanonicalpath doesn t resolve symbolic links which bypasses the check unpackentries during tar extraction follows symbolic links which allows writing outside expected base directory on windows this was addressed in apache hadoop publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable library hadoop common jar apache hadoop common path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache hadoop hadoop common hadoop common jar dependency hierarchy x hadoop common jar vulnerable library found in head commit a href found in base branch vulnerability details apache hadoop s fileutil untar file file api does not escape the input file name before being passed to the shell an attacker can inject arbitrary commands this is only used in hadoop inmemoryaliasmap completebootstraptransfer which is only ever run by a local user it has been used in hadoop x for yarn localization which does enable remote code execution it is used in apache spark from the sql command add archive as the add archive command adds new binaries to the classpath being able to execute shell scripts does not confer new permissions to the caller spark check existence of file before untarring zipping which is included in prevents shell commands being executed regardless of which version of the hadoop libraries are in use users should upgrade to apache hadoop or upper including hadoop publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jar apache path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files jar home wss scanner gradle caches modules files jar dependency hierarchy hadoop common jar root library x jar vulnerable library found in head commit a href found in base branch vulnerability details a deserialization flaw was found in apache chainsaw versions prior to which could lead to malicious code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos cve vulnerable library jar apache path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files jar home wss scanner gradle caches modules files jar dependency hierarchy hadoop common jar root library x jar vulnerable library found in head commit a href found in base branch vulnerability details by design the jdbcappender in x accepts an sql statement as a configuration parameter where the values to be inserted are converters from patternlayout the message converter m is likely to always be included this allows attackers to manipulate the sql by entering crafted strings into input fields or headers of an application that are logged allowing unintended sql queries to be executed note this issue only affects x when specifically configured to use the jdbcappender which is not the default beginning in version the jdbcappender was re introduced with proper support for parameterized sql queries and further customization over the columns written to in logs apache reached end of life in august users should upgrade to as it addresses numerous other issues from the previous versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos cve vulnerable library jar apache path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files jar home wss scanner gradle caches modules files jar dependency hierarchy hadoop common jar root library x jar vulnerable library found in head commit a href found in base branch vulnerability details included in is a socketserver class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data this affects versions up to up to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution manual javadoc cve vulnerable library hadoop common jar apache hadoop common path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache hadoop hadoop common hadoop common jar dependency hierarchy x hadoop common jar vulnerable library found in head commit a href found in base branch vulnerability details in apache hadoop versions to to and to a user who can escalate to yarn user can possibly run arbitrary commands as root user publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library hadoop common jar apache hadoop common path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache hadoop hadoop common hadoop common jar dependency hierarchy x hadoop common jar vulnerable library found in head commit a href found in base branch vulnerability details apache hadoop alpha to to to alpha to to is exploitable via the zip slip vulnerability in places that accept a zip file publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library hadoop common jar apache hadoop common path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache hadoop hadoop common hadoop common jar dependency hierarchy x hadoop common jar vulnerable library found in head commit a href found in base branch vulnerability details in apache hadoop x before and x before a remote user who can authenticate with the hdfs namenode can possibly run arbitrary commands with the same privileges as the hdfs service publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jar apache path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files jar home wss scanner gradle caches modules files jar dependency hierarchy hadoop common jar root library x jar vulnerable library found in head commit a href found in base branch vulnerability details cve identified a deserialization issue that was present in apache chainsaw prior to chainsaw chainsaw was a component of apache x where the same issue exists publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution ch qos cve vulnerable library jar apache path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files jar home wss scanner gradle caches modules files jar dependency hierarchy hadoop common jar root library x jar vulnerable library found in head commit a href found in base branch vulnerability details jmssink in all versions of x is vulnerable to deserialization of untrusted data when the attacker has write access to the configuration or if the configuration references an ldap service the attacker has access to the attacker can provide a topicconnectionfactorybindingname configuration causing jmssink to perform jndi requests that result in remote code execution in a similar fashion to cve note this issue only affects x when specifically configured to use jmssink which is not the default apache reached end of life in august users should upgrade to as it addresses numerous other issues from the previous versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos ws vulnerable library gson jar google gson library library home page a href path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files com google code gson gson gson jar home wss scanner gradle caches modules files com google code gson gson gson jar dependency hierarchy hadoop common jar root library x gson jar vulnerable library found in head commit a href found in base branch vulnerability details denial of service vulnerability was discovered in gson before via the writereplace method publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com google code gson gson direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable library protobuf java jar protocol buffers are a way of encoding structured data in an efficient yet extensible format library home page a href path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files com google protobuf protobuf java protobuf java jar home wss scanner gradle caches modules files com google protobuf protobuf java protobuf java jar dependency hierarchy hadoop common jar root library x protobuf java jar vulnerable library found in head commit a href found in base branch vulnerability details a parsing issue similar to cve but with textformat in protobuf java core and lite versions prior to and can lead to a denial of service attack inputs containing multiple instances of non repeated embedded messages with repeated or unknown fields causes objects to be converted back n forth between mutable and immutable forms resulting in potentially long garbage collection pauses we recommend updating to the versions mentioned above publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com google protobuf protobuf java direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable libraries jersey core jar jersey server jar jersey core jar jersey is the open source under dual cddl gpl license jax rs jsr production quality reference implementation for building restful web services library home page a href path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files com sun jersey jersey core jersey core jar home wss scanner gradle caches modules files com sun jersey jersey core jersey core jar dependency hierarchy hadoop common jar root library x jersey core jar vulnerable library jersey server jar jersey is the open source under dual cddl gpl license jax rs jsr production quality reference implementation for building restful web services library home page a href path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files com sun jersey jersey server jersey server jar home wss scanner gradle caches modules files com sun jersey jersey server jersey server jar dependency hierarchy hadoop common jar root library x jersey server jar vulnerable library found in head commit a href found in base branch vulnerability details jersey xxe via parameter entities not disabled by the jersey sax parser publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com sun jersey jersey core direct dependency fix resolution org apache hadoop hadoop common fix resolution com sun jersey jersey server direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable library jettison jar a stax implementation for json path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files org codehaus jettison jettison jettison jar home wss scanner gradle caches modules files org codehaus jettison jettison jettison jar dependency hierarchy hadoop common jar root library jersey json jar x jettison jar vulnerable library found in head commit a href found in base branch vulnerability details jettison before was discovered to contain a stack overflow via the map parameter this vulnerability allows attackers to cause a denial of service dos via a crafted string publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution org codehaus jettison jettison direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable library commons compress jar apache commons compress software defines an api for working with compression and archive formats these include gzip lzma xz snappy traditional unix compress deflate and ar cpio jar tar zip dump arj path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar dependency hierarchy hadoop common jar root library x commons compress jar vulnerable library found in head commit a href found in base branch vulnerability details when reading a specially crafted zip archive compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs this could be used to mount a denial of service attack against services that use compress zip package publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache commons commons compress direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson mapper asl jar data mapper package is a high performance data binding package built on jackson json processor path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files org codehaus jackson jackson mapper asl jackson mapper asl jar home wss scanner gradle caches modules files org codehaus jackson jackson mapper asl jackson mapper asl jar dependency hierarchy hadoop common jar root library x jackson mapper asl jar vulnerable library found in head commit a href found in base branch vulnerability details a flaw was found in org codehaus jackson jackson mapper asl x libraries xml external entity vulnerabilities similar cve also affects codehaus jackson mapper asl libraries but in different classes publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind cve vulnerable library gson jar google gson library library home page a href path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files com google code gson gson gson jar home wss scanner gradle caches modules files com google code gson gson gson jar dependency hierarchy hadoop common jar root library x gson jar vulnerable library found in head commit a href found in base branch vulnerability details the package com google code gson gson before are vulnerable to deserialization of untrusted data via the writereplace method in internal classes which may lead to dos attacks publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com google code gson gson direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable library jettison jar a stax implementation for json path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files org codehaus jettison jettison jettison jar home wss scanner gradle caches modules files org codehaus jettison jettison jettison jar dependency hierarchy hadoop common jar root library jersey json jar x jettison jar vulnerable library found in head commit a href found in base branch vulnerability details those using jettison to parse untrusted xml or json data may be vulnerable to denial of service attacks dos if the parser is running on user supplied input an attacker may supply content that causes the parser to crash by stackoverflow this effect may support a denial of service attack publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution org codehaus jettison jettison direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable library zookeeper jar path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache zookeeper zookeeper zookeeper jar home wss scanner gradle caches modules files org apache zookeeper zookeeper zookeeper jar dependency hierarchy hadoop common jar root library x zookeeper jar vulnerable library found in head commit a href found in base branch vulnerability details two four letter word commands wchp wchc are cpu intensive and could cause spike of cpu utilization on apache zookeeper server if abused which leads to the server unable to serve legitimate client requests apache zookeeper thru version and suffer from this issue fixed in and later publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache zookeeper zookeeper direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue | 0 |
69,927 | 22,750,912,016 | IssuesEvent | 2022-07-07 13:04:27 | primefaces/primefaces | https://api.github.com/repos/primefaces/primefaces | closed | Dialog: Copying Text with ctrl+c doesn't work | :lady_beetle: defect | ### Describe the bug
Copying text out of a modal Dialog doesn't work, when there is an element with tabindex in the DOM-Hierarchy.
Due to _PrimeFaces.utils.preventTabbing_ the Event gets cancelled.
Example:
```
[...]
<div tabindex="1">
<pf:dialog modal="true">
[...]
</pf:dialog>
</div>
[...]
```
### Reproducer
- Open PrimeFaces Showcase [https://www.primefaces.org/showcase/ui/overlay/dialog.xhtml](https://www.primefaces.org/showcase/ui/overlay/dialog.xhtml)
- add `tabindex="7"` to `<div class="content-section implementation">`
- open Modal Dialog with "show"
- try to copy text from the dialog with ctrl+c
### Expected behavior
Copying Text should work.
### PrimeFaces edition
Elite
### PrimeFaces version
11.0.5
### Theme
none
### JSF implementation
MyFaces
### JSF version
2.2
### Browser(s)
_No response_ | 1.0 | Dialog: Copying Text with ctrl+c doesn't work - ### Describe the bug
Copying text out of a modal Dialog doesn't work, when there is an element with tabindex in the DOM-Hierarchy.
Due to _PrimeFaces.utils.preventTabbing_ the Event gets cancelled.
Example:
```
[...]
<div tabindex="1">
<pf:dialog modal="true">
[...]
</pf:dialog>
</div>
[...]
```
### Reproducer
- Open PrimeFaces Showcase [https://www.primefaces.org/showcase/ui/overlay/dialog.xhtml](https://www.primefaces.org/showcase/ui/overlay/dialog.xhtml)
- add `tabindex="7"` to `<div class="content-section implementation">`
- open Modal Dialog with "show"
- try to copy text from the dialog with ctrl+c
### Expected behavior
Copying Text should work.
### PrimeFaces edition
Elite
### PrimeFaces version
11.0.5
### Theme
none
### JSF implementation
MyFaces
### JSF version
2.2
### Browser(s)
_No response_ | defect | dialog copying text with ctrl c doesn t work describe the bug copying text out of a modal dialog doesn t work when there is an element with tabindex in the dom hierarchy due to primefaces utils preventtabbing the event gets cancelled example reproducer open primefaces showcase add tabindex to open modal dialog with show try to copy text from the dialog with ctrl c expected behavior copying text should work primefaces edition elite primefaces version theme none jsf implementation myfaces jsf version browser s no response | 1 |
614,629 | 19,187,437,261 | IssuesEvent | 2021-12-05 12:50:28 | AwezomeStore/awezomestore_products_ms | https://api.github.com/repos/AwezomeStore/awezomestore_products_ms | closed | dockerized base project creation | type:new functionality priority:high | - database connection
- port exposition
- guiding structure for CRUD operations | 1.0 | dockerized base project creation - - database connection
- port exposition
- guiding structure for CRUD operations | non_defect | dockerized base project creation database connection port exposition guiding structure for crud operations | 0 |
125,126 | 16,727,153,191 | IssuesEvent | 2021-06-10 14:11:48 | sacloud/libsacloud | https://api.github.com/repos/sacloud/libsacloud | closed | 参照系APIの戻り値にゾーン名がない | area/design priority/low v-next | from:
- sacloud/sakuracloud_exporter
- sacloud/usacloud
現在は一部のリソースを除きAPIのレスポンスにゾーン名がない。
このため、クライアント側でリクエスト先ゾーン名を保持する独自のstructを定義して対応している。
#### sakuraclodu_exporterでの例
全ゾーンに対してAPIを呼び、戻り値をマージして利用したい。
後続処理ではゾーン名を利用したい。
```go
type Server struct {
*sacloud.Server
ZoneName string
}
// 全ゾーンに対してFindを実行、結果をマージする
var result []*Server
zones := []string { "is1a", "is1b", "tk1a" }
for _ , zone := range zones {
searched, err := serverOp.Find(ctx, zone, ...)
for _ , server := range searched.Servers {
result = append(result, &Server{
Server: server,
ZoneName: zone,
})
}
}
// 後続処理
```
これをlibsacloud側でサポートしたい。
#### libsacloud v2での実装
APIモデルに直接ゾーン名を持たせる場合、現在のmapconvを用いてAPIからの戻り値を変換する方法だけだと実現できないため別途仕組みを実装する必要があり面倒。
また、sacloud.xxxFindResultなどのように`Count`などの検索結果メタデータとしてAPIモデルの外側に持たせる方法もあるが、現在のsacloud.xxxAPIのシグニチャを大幅に変えないといけないためこれも面倒。
このため、当面は直接的な対応を行わない。
(`utils`パッケージなどでラップした型を返す実装を行う可能性はあるが未定) | 1.0 | 参照系APIの戻り値にゾーン名がない - from:
- sacloud/sakuracloud_exporter
- sacloud/usacloud
現在は一部のリソースを除きAPIのレスポンスにゾーン名がない。
このため、クライアント側でリクエスト先ゾーン名を保持する独自のstructを定義して対応している。
#### sakuraclodu_exporterでの例
全ゾーンに対してAPIを呼び、戻り値をマージして利用したい。
後続処理ではゾーン名を利用したい。
```go
type Server struct {
*sacloud.Server
ZoneName string
}
// 全ゾーンに対してFindを実行、結果をマージする
var result []*Server
zones := []string { "is1a", "is1b", "tk1a" }
for _ , zone := range zones {
searched, err := serverOp.Find(ctx, zone, ...)
for _ , server := range searched.Servers {
result = append(result, &Server{
Server: server,
ZoneName: zone,
})
}
}
// 後続処理
```
これをlibsacloud側でサポートしたい。
#### libsacloud v2での実装
APIモデルに直接ゾーン名を持たせる場合、現在のmapconvを用いてAPIからの戻り値を変換する方法だけだと実現できないため別途仕組みを実装する必要があり面倒。
また、sacloud.xxxFindResultなどのように`Count`などの検索結果メタデータとしてAPIモデルの外側に持たせる方法もあるが、現在のsacloud.xxxAPIのシグニチャを大幅に変えないといけないためこれも面倒。
このため、当面は直接的な対応を行わない。
(`utils`パッケージなどでラップした型を返す実装を行う可能性はあるが未定) | non_defect | 参照系apiの戻り値にゾーン名がない from sacloud sakuracloud exporter sacloud usacloud 現在は一部のリソースを除きapiのレスポンスにゾーン名がない。 このため、クライアント側でリクエスト先ゾーン名を保持する独自のstructを定義して対応している。 sakuraclodu exporterでの例 全ゾーンに対してapiを呼び、戻り値をマージして利用したい。 後続処理ではゾーン名を利用したい。 go type server struct sacloud server zonename string 全ゾーンに対してfindを実行、結果をマージする var result server zones string for zone range zones searched err serverop find ctx zone for server range searched servers result append result server server server zonename zone 後続処理 これをlibsacloud側でサポートしたい。 libsacloud apiモデルに直接ゾーン名を持たせる場合、現在のmapconvを用いてapiからの戻り値を変換する方法だけだと実現できないため別途仕組みを実装する必要があり面倒。 また、sacloud xxxfindresultなどのように count などの検索結果メタデータとしてapiモデルの外側に持たせる方法もあるが、現在のsacloud xxxapiのシグニチャを大幅に変えないといけないためこれも面倒。 このため、当面は直接的な対応を行わない。 utils パッケージなどでラップした型を返す実装を行う可能性はあるが未定 | 0 |
565,938 | 16,773,111,812 | IssuesEvent | 2021-06-14 17:10:02 | bireme/fi-admin | https://api.github.com/repos/bireme/fi-admin | closed | Na migração todas revistas SciELO foram marcadas como SciELO Saúde Pública | bug priority 2 severity 1 title | Solicito correção no dado de cobertura de indexação, pois todas revisas SciELO foram marcadas como SciELO Saúde Pública
Corrigi algumas manualmente.
Obrigada
Sueli | 1.0 | Na migração todas revistas SciELO foram marcadas como SciELO Saúde Pública - Solicito correção no dado de cobertura de indexação, pois todas revisas SciELO foram marcadas como SciELO Saúde Pública
Corrigi algumas manualmente.
Obrigada
Sueli | non_defect | na migração todas revistas scielo foram marcadas como scielo saúde pública solicito correção no dado de cobertura de indexação pois todas revisas scielo foram marcadas como scielo saúde pública corrigi algumas manualmente obrigada sueli | 0 |
30,233 | 2,723,144,426 | IssuesEvent | 2015-04-14 10:22:29 | eclipsesource/tabris-js | https://api.github.com/repos/eclipsesource/tabris-js | closed | Updating CollectionView item doesn't always work | bug priority: high | Tapping on an item should permanently change its text to "foo". However, tapping once again changes the item text to its initial value.
If `change:item` is replaced with `itemchange` the problem is not apparent.
```javascript
var page = tabris.create("Page");
var collectionView = tabris.create("CollectionView", {
items: [{key: "value1"}, {key: "value2"}],
itemHeight: 74,
layoutData: {left: 0, top: 0, right: 0},
initializeCell: function(cell) {
var text = tabris.create("TextView", {layoutData: {centerX: 0, centerY: 0}}).appendTo(cell);
cell.on("change:item", function(widget, item) {
text.set("text", item.key);
})
}
}).on("select", function(target, item, options) {
item.key = "foo";
collectionView.refresh(options.index);
}).appendTo(page);
page.open();
``` | 1.0 | Updating CollectionView item doesn't always work - Tapping on an item should permanently change its text to "foo". However, tapping once again changes the item text to its initial value.
If `change:item` is replaced with `itemchange` the problem is not apparent.
```javascript
var page = tabris.create("Page");
var collectionView = tabris.create("CollectionView", {
items: [{key: "value1"}, {key: "value2"}],
itemHeight: 74,
layoutData: {left: 0, top: 0, right: 0},
initializeCell: function(cell) {
var text = tabris.create("TextView", {layoutData: {centerX: 0, centerY: 0}}).appendTo(cell);
cell.on("change:item", function(widget, item) {
text.set("text", item.key);
})
}
}).on("select", function(target, item, options) {
item.key = "foo";
collectionView.refresh(options.index);
}).appendTo(page);
page.open();
``` | non_defect | updating collectionview item doesn t always work tapping on an item should permanently change its text to foo however tapping once again changes the item text to its initial value if change item is replaced with itemchange the problem is not apparent javascript var page tabris create page var collectionview tabris create collectionview items itemheight layoutdata left top right initializecell function cell var text tabris create textview layoutdata centerx centery appendto cell cell on change item function widget item text set text item key on select function target item options item key foo collectionview refresh options index appendto page page open | 0 |
240,811 | 26,256,505,445 | IssuesEvent | 2023-01-06 01:32:39 | kstring/traefik | https://api.github.com/repos/kstring/traefik | opened | CVE-2022-0536 (Medium) detected in follow-redirects-1.9.0.tgz | security vulnerability | ## CVE-2022-0536 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>follow-redirects-1.9.0.tgz</b></p></summary>
<p>HTTP and HTTPS modules that follow redirects.</p>
<p>Library home page: <a href="https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.9.0.tgz">https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.9.0.tgz</a></p>
<p>Path to dependency file: /webui/package.json</p>
<p>Path to vulnerable library: /webui/node_modules/follow-redirects/package.json</p>
<p>
Dependency Hierarchy:
- app-1.2.4.tgz (Root Library)
- webpack-dev-server-3.9.0.tgz
- http-proxy-middleware-0.19.1.tgz
- http-proxy-1.18.0.tgz
- :x: **follow-redirects-1.9.0.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.
<p>Publish Date: 2022-02-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-0536>CVE-2022-0536</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0536">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0536</a></p>
<p>Release Date: 2022-02-09</p>
<p>Fix Resolution (follow-redirects): 1.14.8</p>
<p>Direct dependency fix Resolution (@quasar/app): 1.3.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-0536 (Medium) detected in follow-redirects-1.9.0.tgz - ## CVE-2022-0536 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>follow-redirects-1.9.0.tgz</b></p></summary>
<p>HTTP and HTTPS modules that follow redirects.</p>
<p>Library home page: <a href="https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.9.0.tgz">https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.9.0.tgz</a></p>
<p>Path to dependency file: /webui/package.json</p>
<p>Path to vulnerable library: /webui/node_modules/follow-redirects/package.json</p>
<p>
Dependency Hierarchy:
- app-1.2.4.tgz (Root Library)
- webpack-dev-server-3.9.0.tgz
- http-proxy-middleware-0.19.1.tgz
- http-proxy-1.18.0.tgz
- :x: **follow-redirects-1.9.0.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.
<p>Publish Date: 2022-02-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-0536>CVE-2022-0536</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0536">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0536</a></p>
<p>Release Date: 2022-02-09</p>
<p>Fix Resolution (follow-redirects): 1.14.8</p>
<p>Direct dependency fix Resolution (@quasar/app): 1.3.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_defect | cve medium detected in follow redirects tgz cve medium severity vulnerability vulnerable library follow redirects tgz http and https modules that follow redirects library home page a href path to dependency file webui package json path to vulnerable library webui node modules follow redirects package json dependency hierarchy app tgz root library webpack dev server tgz http proxy middleware tgz http proxy tgz x follow redirects tgz vulnerable library found in base branch master vulnerability details exposure of sensitive information to an unauthorized actor in npm follow redirects prior to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution follow redirects direct dependency fix resolution quasar app step up your open source security game with mend | 0 |
40,237 | 9,932,563,033 | IssuesEvent | 2019-07-02 10:06:19 | vector-im/riot-web | https://api.github.com/repos/vector-im/riot-web | closed | Verifying a device from the unknown devices dialog does not update the device list | bug defect feature:e2e-sas-verification | I clicked "Verify" on the dialog below, did some emoji comparison, and was returned to this dialog which did not change the device to verified.

| 1.0 | Verifying a device from the unknown devices dialog does not update the device list - I clicked "Verify" on the dialog below, did some emoji comparison, and was returned to this dialog which did not change the device to verified.

| defect | verifying a device from the unknown devices dialog does not update the device list i clicked verify on the dialog below did some emoji comparison and was returned to this dialog which did not change the device to verified | 1 |
37,968 | 8,609,446,676 | IssuesEvent | 2018-11-18 21:31:48 | supertuxkart/stk-code | https://api.github.com/repos/supertuxkart/stk-code | closed | Can't change player's name in multiplayer kart selection with keyboard/gamepad navigation | C:GUI P3: normal T: defect T: regression | Most certainly an unforeseen side effect of the recent spinner changes, as this screen does things differently with a custom spinner widget.
It does work with the mouse. | 1.0 | Can't change player's name in multiplayer kart selection with keyboard/gamepad navigation - Most certainly an unforeseen side effect of the recent spinner changes, as this screen does things differently with a custom spinner widget.
It does work with the mouse. | defect | can t change player s name in multiplayer kart selection with keyboard gamepad navigation most certainly an unforeseen side effect of the recent spinner changes as this screen does things differently with a custom spinner widget it does work with the mouse | 1 |
4,420 | 2,610,093,744 | IssuesEvent | 2015-02-26 18:28:18 | chrsmith/dsdsdaadf | https://api.github.com/repos/chrsmith/dsdsdaadf | opened | 深圳韩方科颜祛痘有那些店 | auto-migrated Priority-Medium Type-Defect | ```
深圳韩方科颜祛痘有那些店【深圳韩方科颜全国热线400-869-181
8,24小时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机构��
�韩国秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳�
��,韩方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不
反弹”健康祛痘技术并结合先进“先进豪华彩光”仪,开创��
�内专业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客�
��上的痘痘。
```
-----
Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 8:10 | 1.0 | 深圳韩方科颜祛痘有那些店 - ```
深圳韩方科颜祛痘有那些店【深圳韩方科颜全国热线400-869-181
8,24小时QQ4008691818】深圳韩方科颜专业祛痘连锁机构,机构��
�韩国秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳�
��,韩方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不
反弹”健康祛痘技术并结合先进“先进豪华彩光”仪,开创��
�内专业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客�
��上的痘痘。
```
-----
Original issue reported on code.google.com by `szft...@163.com` on 14 May 2014 at 8:10 | defect | 深圳韩方科颜祛痘有那些店 深圳韩方科颜祛痘有那些店【 , 】深圳韩方科颜专业祛痘连锁机构,机构�� �韩国秘方——韩方科颜这一国妆准字号治疗型权威,祛痘佳� ��,韩方科颜专业祛痘连锁机构,采用韩国秘方配合专业“不 反弹”健康祛痘技术并结合先进“先进豪华彩光”仪,开创�� �内专业治疗粉刺、痤疮签约包治先河,成功消除了许多顾客� ��上的痘痘。 original issue reported on code google com by szft com on may at | 1 |
94,947 | 3,933,558,092 | IssuesEvent | 2016-04-25 19:33:10 | ghutchis/avogadro | https://api.github.com/repos/ghutchis/avogadro | closed | Z-Matrix Coordinates are partially wrong | auto-migrated Gaussian low priority v_1.1.0 wrong coordinates z-matrix | I i open the attached logfile and I create a Gaussian inputfile(Extensions -> Gaussian) which uses the z-matrix the coordinates are wrong. In this case the rings are turned 66.2 degrees.
If I use the cartesian format it's fine, but it seems the z-matrix algorithm is broken.
Tested on linux and windows.
Reported by: *anonymous | 1.0 | Z-Matrix Coordinates are partially wrong - I i open the attached logfile and I create a Gaussian inputfile(Extensions -> Gaussian) which uses the z-matrix the coordinates are wrong. In this case the rings are turned 66.2 degrees.
If I use the cartesian format it's fine, but it seems the z-matrix algorithm is broken.
Tested on linux and windows.
Reported by: *anonymous | non_defect | z matrix coordinates are partially wrong i i open the attached logfile and i create a gaussian inputfile extensions gaussian which uses the z matrix the coordinates are wrong in this case the rings are turned degrees if i use the cartesian format it s fine but it seems the z matrix algorithm is broken tested on linux and windows reported by anonymous | 0 |
739,241 | 25,586,936,505 | IssuesEvent | 2022-12-01 10:02:38 | python/mypy | https://api.github.com/repos/python/mypy | reopened | empty Union (either "Union" or "Union[()]") appears to be treated as NoReturn | bug priority-2-low |
**Bug Report**
From [the documentation](https://docs.python.org/3/library/typing.html#typing.Union) it indicates that Union must contain at least one item, however this doesn't seem to be implemented in mypy (and in fact, mypy seems to treat an empty union as `NoReturn`) -- the treating it as `NoReturn` is actually kinda cool, but probably not what was intended (?)
my twitch chat is telling me that pyright also considers `Union[()]` as `NoReturn`, maybe this just needs cpython documentation
**To Reproduce**
```python
from typing import Union
def f() -> Union:
print('hello hello')
def g() -> Union[()]:
print('hello hello')
```
```
$ mypy --version
mypy 0.800
$ mypy t.py
t.py:3: error: Implicit return in function which does not return
t.py:6: error: Implicit return in function which does not return
Found 2 errors in 1 file (checked 1 source file)
```
| 1.0 | empty Union (either "Union" or "Union[()]") appears to be treated as NoReturn -
**Bug Report**
From [the documentation](https://docs.python.org/3/library/typing.html#typing.Union) it indicates that Union must contain at least one item, however this doesn't seem to be implemented in mypy (and in fact, mypy seems to treat an empty union as `NoReturn`) -- the treating it as `NoReturn` is actually kinda cool, but probably not what was intended (?)
my twitch chat is telling me that pyright also considers `Union[()]` as `NoReturn`, maybe this just needs cpython documentation
**To Reproduce**
```python
from typing import Union
def f() -> Union:
print('hello hello')
def g() -> Union[()]:
print('hello hello')
```
```
$ mypy --version
mypy 0.800
$ mypy t.py
t.py:3: error: Implicit return in function which does not return
t.py:6: error: Implicit return in function which does not return
Found 2 errors in 1 file (checked 1 source file)
```
| non_defect | empty union either union or union appears to be treated as noreturn bug report from it indicates that union must contain at least one item however this doesn t seem to be implemented in mypy and in fact mypy seems to treat an empty union as noreturn the treating it as noreturn is actually kinda cool but probably not what was intended my twitch chat is telling me that pyright also considers union as noreturn maybe this just needs cpython documentation to reproduce python from typing import union def f union print hello hello def g union print hello hello mypy version mypy mypy t py t py error implicit return in function which does not return t py error implicit return in function which does not return found errors in file checked source file | 0 |
21,782 | 3,551,897,581 | IssuesEvent | 2016-01-21 07:28:55 | BOINC/boinc | https://api.github.com/repos/BOINC/boinc | closed | Spanish translation of "Main page" is wrong | C: Undetermined P: Undetermined T: Defect | **Reported by teleyinex on 28 Jul 41085751 06:40 UTC**
The Spanish translation of the term "Main page" is wrong. Adjoining you can find the modified es.po files.
Migrated-From: http://boinc.berkeley.edu/trac/ticket/1042 | 1.0 | Spanish translation of "Main page" is wrong - **Reported by teleyinex on 28 Jul 41085751 06:40 UTC**
The Spanish translation of the term "Main page" is wrong. Adjoining you can find the modified es.po files.
Migrated-From: http://boinc.berkeley.edu/trac/ticket/1042 | defect | spanish translation of main page is wrong reported by teleyinex on jul utc the spanish translation of the term main page is wrong adjoining you can find the modified es po files migrated from | 1 |
3,748 | 2,610,068,141 | IssuesEvent | 2015-02-26 18:20:00 | chrsmith/jsjsj122 | https://api.github.com/repos/chrsmith/jsjsj122 | opened | 路桥看前列腺炎哪里效果最好 | auto-migrated Priority-Medium Type-Defect | ```
路桥看前列腺炎哪里效果最好【台州五洲生殖医院】24小时健
康咨询热线:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:
台州市椒江区枫南路229号(枫南大转盘旁)乘车线路:乘坐104�
��108、118、198及椒江一金清公交车直达枫南小区,乘坐107、105
、109、112、901、 902公交车到星星广场下车,步行即可到院。
诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,��
�精,无精。包皮包茎,精索静脉曲张,淋病等。
台州五洲生殖医院是台州最大的男科医院,权威专家在线免��
�咨询,拥有专业完善的男科检查治疗设备,严格按照国家标�
��收费。尖端医疗设备,与世界同步。权威专家,成就专业典
范。人性化服务,一切以患者为中心。
看男科就选台州五洲生殖医院,专业男科为男人。
```
-----
Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 8:59 | 1.0 | 路桥看前列腺炎哪里效果最好 - ```
路桥看前列腺炎哪里效果最好【台州五洲生殖医院】24小时健
康咨询热线:0576-88066933-(扣扣800080609)-(微信号tzwzszyy)医院地址:
台州市椒江区枫南路229号(枫南大转盘旁)乘车线路:乘坐104�
��108、118、198及椒江一金清公交车直达枫南小区,乘坐107、105
、109、112、901、 902公交车到星星广场下车,步行即可到院。
诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,��
�精,无精。包皮包茎,精索静脉曲张,淋病等。
台州五洲生殖医院是台州最大的男科医院,权威专家在线免��
�咨询,拥有专业完善的男科检查治疗设备,严格按照国家标�
��收费。尖端医疗设备,与世界同步。权威专家,成就专业典
范。人性化服务,一切以患者为中心。
看男科就选台州五洲生殖医院,专业男科为男人。
```
-----
Original issue reported on code.google.com by `poweragr...@gmail.com` on 30 May 2014 at 8:59 | defect | 路桥看前列腺炎哪里效果最好 路桥看前列腺炎哪里效果最好【台州五洲生殖医院】 康咨询热线 微信号tzwzszyy 医院地址 (枫南大转盘旁)乘车线路 � �� 、 、 , 、 、 、 、 、 ,步行即可到院。 诊疗项目:阳痿,早泄,前列腺炎,前列腺增生,龟头炎,�� �精,无精。包皮包茎,精索静脉曲张,淋病等。 台州五洲生殖医院是台州最大的男科医院,权威专家在线免�� �咨询,拥有专业完善的男科检查治疗设备,严格按照国家标� ��收费。尖端医疗设备,与世界同步。权威专家,成就专业典 范。人性化服务,一切以患者为中心。 看男科就选台州五洲生殖医院,专业男科为男人。 original issue reported on code google com by poweragr gmail com on may at | 1 |
50,918 | 13,187,974,485 | IssuesEvent | 2020-08-13 05:11:19 | icecube-trac/tix3 | https://api.github.com/repos/icecube-trac/tix3 | closed | Icetop processing causing fatal crashes of filter clients (Trac #1680) | Migrated from Trac combo reconstruction defect | Using the trunk of icerec with canned data at SPTS, I've found a rare crash of the Icetop pulse processing chain. This causes the entire event to be marked as unfilterable.
Apr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: WARN (I3TopHLCPulseExtractor): Negative pulse width: 0.000000 (I3TopHLCPulseExtractor.cxx:344 in void I3TopHLCPulseExtractor::EvaluateHLCWaveform(const OMKey&, const I3Waveform&, double, double, I3RecoPulse&, I3TopPulseInfo&))
Apr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: WARN (I3TopHLCPulseExtractor): Leading edge: 19826.651162 (I3TopHLCPulseExtractor.cxx:345 in void I3TopHLCPulseExtractor::EvaluateHLCWaveform(const OMKey&, const I3Waveform&, double, double, I3RecoPulse&, I3TopPulseInfo&))
Apr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: WARN (I3TopHLCPulseExtractor): Trailing edge: 19826.651162 (I3TopHLCPulseExtractor.cxx:346 in void I3TopHLCPulseExtractor::EvaluateHLCWaveform(const OMKey&, const I3Waveform&, double, double, I3RecoPulse&, I3TopPulseInfo&))
Apr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: FATAL (I3SuperDST): Assertion failed: width > 0 && width < double(std::numeric_limits<unsigned>::max()) (I3SuperDST.cxx:441 in static uint32_t I3SuperDST::EncodeWidth(double, unsigned int, unsigned int))
Apr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: ERROR (PythonFunction): Error running python function as module: (PythonFunction.cxx:173 in virtual void PythonFunction::Process())
Apr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: ERROR (I3Module): BaseProc_SuperDST_superdst: Exception thrown (I3Module.cxx:116 in void I3Module::Do(void (I3Module::*)()))
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1680">https://code.icecube.wisc.edu/ticket/1680</a>, reported by blaufuss and owned by karg</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2019-02-13T14:11:57",
"description": "Using the trunk of icerec with canned data at SPTS, I've found a rare crash of the Icetop pulse processing chain. This causes the entire event to be marked as unfilterable. \n\nApr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: WARN (I3TopHLCPulseExtractor): Negative pulse width: 0.000000 (I3TopHLCPulseExtractor.cxx:344 in void I3TopHLCPulseExtractor::EvaluateHLCWaveform(const OMKey&, const I3Waveform&, double, double, I3RecoPulse&, I3TopPulseInfo&))\nApr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: WARN (I3TopHLCPulseExtractor): Leading edge: 19826.651162 (I3TopHLCPulseExtractor.cxx:345 in void I3TopHLCPulseExtractor::EvaluateHLCWaveform(const OMKey&, const I3Waveform&, double, double, I3RecoPulse&, I3TopPulseInfo&))\nApr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: WARN (I3TopHLCPulseExtractor): Trailing edge: 19826.651162 (I3TopHLCPulseExtractor.cxx:346 in void I3TopHLCPulseExtractor::EvaluateHLCWaveform(const OMKey&, const I3Waveform&, double, double, I3RecoPulse&, I3TopPulseInfo&))\nApr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: FATAL (I3SuperDST): Assertion failed: width > 0 && width < double(std::numeric_limits<unsigned>::max()) (I3SuperDST.cxx:441 in static uint32_t I3SuperDST::EncodeWidth(double, unsigned int, unsigned int))\nApr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: ERROR (PythonFunction): Error running python function as module: (PythonFunction.cxx:173 in virtual void PythonFunction::Process())\nApr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: ERROR (I3Module): BaseProc_SuperDST_superdst: Exception thrown (I3Module.cxx:116 in void I3Module::Do(void (I3Module::*)()))\n",
"reporter": "blaufuss",
"cc": "olivas",
"resolution": "fixed",
"_ts": "1550067117911749",
"component": "combo reconstruction",
"summary": "Icetop processing causing fatal crashes of filter clients",
"priority": "blocker",
"keywords": "",
"time": "2016-04-29T22:06:36",
"milestone": "",
"owner": "karg",
"type": "defect"
}
```
</p>
</details>
| 1.0 | Icetop processing causing fatal crashes of filter clients (Trac #1680) - Using the trunk of icerec with canned data at SPTS, I've found a rare crash of the Icetop pulse processing chain. This causes the entire event to be marked as unfilterable.
Apr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: WARN (I3TopHLCPulseExtractor): Negative pulse width: 0.000000 (I3TopHLCPulseExtractor.cxx:344 in void I3TopHLCPulseExtractor::EvaluateHLCWaveform(const OMKey&, const I3Waveform&, double, double, I3RecoPulse&, I3TopPulseInfo&))
Apr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: WARN (I3TopHLCPulseExtractor): Leading edge: 19826.651162 (I3TopHLCPulseExtractor.cxx:345 in void I3TopHLCPulseExtractor::EvaluateHLCWaveform(const OMKey&, const I3Waveform&, double, double, I3RecoPulse&, I3TopPulseInfo&))
Apr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: WARN (I3TopHLCPulseExtractor): Trailing edge: 19826.651162 (I3TopHLCPulseExtractor.cxx:346 in void I3TopHLCPulseExtractor::EvaluateHLCWaveform(const OMKey&, const I3Waveform&, double, double, I3RecoPulse&, I3TopPulseInfo&))
Apr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: FATAL (I3SuperDST): Assertion failed: width > 0 && width < double(std::numeric_limits<unsigned>::max()) (I3SuperDST.cxx:441 in static uint32_t I3SuperDST::EncodeWidth(double, unsigned int, unsigned int))
Apr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: ERROR (PythonFunction): Error running python function as module: (PythonFunction.cxx:173 in virtual void PythonFunction::Process())
Apr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: ERROR (I3Module): BaseProc_SuperDST_superdst: Exception thrown (I3Module.cxx:116 in void I3Module::Do(void (I3Module::*)()))
<details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1680">https://code.icecube.wisc.edu/ticket/1680</a>, reported by blaufuss and owned by karg</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2019-02-13T14:11:57",
"description": "Using the trunk of icerec with canned data at SPTS, I've found a rare crash of the Icetop pulse processing chain. This causes the entire event to be marked as unfilterable. \n\nApr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: WARN (I3TopHLCPulseExtractor): Negative pulse width: 0.000000 (I3TopHLCPulseExtractor.cxx:344 in void I3TopHLCPulseExtractor::EvaluateHLCWaveform(const OMKey&, const I3Waveform&, double, double, I3RecoPulse&, I3TopPulseInfo&))\nApr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: WARN (I3TopHLCPulseExtractor): Leading edge: 19826.651162 (I3TopHLCPulseExtractor.cxx:345 in void I3TopHLCPulseExtractor::EvaluateHLCWaveform(const OMKey&, const I3Waveform&, double, double, I3RecoPulse&, I3TopPulseInfo&))\nApr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: WARN (I3TopHLCPulseExtractor): Trailing edge: 19826.651162 (I3TopHLCPulseExtractor.cxx:346 in void I3TopHLCPulseExtractor::EvaluateHLCWaveform(const OMKey&, const I3Waveform&, double, double, I3RecoPulse&, I3TopPulseInfo&))\nApr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: FATAL (I3SuperDST): Assertion failed: width > 0 && width < double(std::numeric_limits<unsigned>::max()) (I3SuperDST.cxx:441 in static uint32_t I3SuperDST::EncodeWidth(double, unsigned int, unsigned int))\nApr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: ERROR (PythonFunction): Error running python function as module: (PythonFunction.cxx:173 in virtual void PythonFunction::Process())\nApr 29 21:47:52 fpslave06 PFClient.fpslave06.client24[14527]: ERROR (I3Module): BaseProc_SuperDST_superdst: Exception thrown (I3Module.cxx:116 in void I3Module::Do(void (I3Module::*)()))\n",
"reporter": "blaufuss",
"cc": "olivas",
"resolution": "fixed",
"_ts": "1550067117911749",
"component": "combo reconstruction",
"summary": "Icetop processing causing fatal crashes of filter clients",
"priority": "blocker",
"keywords": "",
"time": "2016-04-29T22:06:36",
"milestone": "",
"owner": "karg",
"type": "defect"
}
```
</p>
</details>
| defect | icetop processing causing fatal crashes of filter clients trac using the trunk of icerec with canned data at spts i ve found a rare crash of the icetop pulse processing chain this causes the entire event to be marked as unfilterable apr pfclient warn negative pulse width cxx in void evaluatehlcwaveform const omkey const double double apr pfclient warn leading edge cxx in void evaluatehlcwaveform const omkey const double double apr pfclient warn trailing edge cxx in void evaluatehlcwaveform const omkey const double double apr pfclient fatal assertion failed width width max cxx in static t encodewidth double unsigned int unsigned int apr pfclient error pythonfunction error running python function as module pythonfunction cxx in virtual void pythonfunction process apr pfclient error baseproc superdst superdst exception thrown cxx in void do void migrated from json status closed changetime description using the trunk of icerec with canned data at spts i ve found a rare crash of the icetop pulse processing chain this causes the entire event to be marked as unfilterable n napr pfclient warn negative pulse width cxx in void evaluatehlcwaveform const omkey const double double napr pfclient warn leading edge cxx in void evaluatehlcwaveform const omkey const double double napr pfclient warn trailing edge cxx in void evaluatehlcwaveform const omkey const double double napr pfclient fatal assertion failed width width max cxx in static t encodewidth double unsigned int unsigned int napr pfclient error pythonfunction error running python function as module pythonfunction cxx in virtual void pythonfunction process napr pfclient error baseproc superdst superdst exception thrown cxx in void do void n reporter blaufuss cc olivas resolution fixed ts component combo reconstruction summary icetop processing causing fatal crashes of filter clients priority blocker keywords time milestone owner karg type defect | 1 |
25,109 | 4,209,505,203 | IssuesEvent | 2016-06-29 05:50:34 | netty/netty | https://api.github.com/repos/netty/netty | closed | HTTPProxyHandler Keep-alive | defect | Netty version: 4.1.0.Beta4
I think there is a bug with `io.netty.handler.proxy.HttpProxyHandler`. When the CONNECT request is sent to the proxy server, `HTTPProxyHandler#newInitialMessage`, it is sent as HTTP 1.0 without a Connection: Keep-alive request header. Then, when any pending writes are subsequently sent you get a Connection reset by peer because the connection has been closed by the server.
So, I think either the protocol needs to be changed to HTTP 1.1 or the request header needs to be added. | 1.0 | HTTPProxyHandler Keep-alive - Netty version: 4.1.0.Beta4
I think there is a bug with `io.netty.handler.proxy.HttpProxyHandler`. When the CONNECT request is sent to the proxy server, `HTTPProxyHandler#newInitialMessage`, it is sent as HTTP 1.0 without a Connection: Keep-alive request header. Then, when any pending writes are subsequently sent you get a Connection reset by peer because the connection has been closed by the server.
So, I think either the protocol needs to be changed to HTTP 1.1 or the request header needs to be added. | defect | httpproxyhandler keep alive netty version i think there is a bug with io netty handler proxy httpproxyhandler when the connect request is sent to the proxy server httpproxyhandler newinitialmessage it is sent as http without a connection keep alive request header then when any pending writes are subsequently sent you get a connection reset by peer because the connection has been closed by the server so i think either the protocol needs to be changed to http or the request header needs to be added | 1 |
91,504 | 10,721,988,189 | IssuesEvent | 2019-10-27 08:22:14 | swsnu/swpp2019-team12 | https://api.github.com/repos/swsnu/swpp2019-team12 | opened | API 수정사항 | Backend documentation | 1. /profile/:id/ 추가
- GET: 특정 프로필 반환
- PATCH: 특정 프로필 정보 수정
2. /user/:id/ 삭제
- /profile/:id/로 통합 | 1.0 | API 수정사항 - 1. /profile/:id/ 추가
- GET: 특정 프로필 반환
- PATCH: 특정 프로필 정보 수정
2. /user/:id/ 삭제
- /profile/:id/로 통합 | non_defect | api 수정사항 profile id 추가 get 특정 프로필 반환 patch 특정 프로필 정보 수정 user id 삭제 profile id 로 통합 | 0 |
57,260 | 15,728,297,469 | IssuesEvent | 2021-03-29 13:40:14 | department-of-veterans-affairs/va.gov-team | https://api.github.com/repos/department-of-veterans-affairs/va.gov-team | opened | 508-defect-3 [COGNITION]: "Sign up now" link should be styled as a link using the Action Link component | 508-defect-3 508/Accessibility | # [508-defect-3](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/platform/accessibility/guidance/defect-severity-rubric.md#508-defect-3)
## Feedback framework
- **❗️ Must** for if the feedback must be applied
- **⚠️ Should** if the feedback is best practice
- **✔️ Consider** for suggestions/enhancements
## Definition of done
1. Review and acknowledge feedback.
1. Fix and/or document decisions made.
1. Accessibility specialist will close ticket after reviewing documented decisions / validating fix.
<hr/>
## Point of Contact
**VFS Point of Contact:** Josh
## User Story or Problem Statement
- As a user, I expect links to be styled as links so that I know I can open them in a new tab.
- As a voice AT user, I expect links to be styled as links so that I can provide an accurate command based on what I see.
- As a screen reader user with low vision, I expect the screen reader to announce what I see on the page.
- As a user, I expect links to be styled consistently as links so that I do not confuse them with buttons.
## Details
The "Sign up now" link is styled as a `button` which is materially dishonest. This causes several issues:
- It's materially dishonest and damages habituation on VA.gov
- Voice assistive tech users may say "Click sign up now _button_" which may result in failure as it is tagged as a `a`
- Screen reader users with low vision may become confused at a button being announced as a link
- Sighted users may not know that they can open this in a new tab because it looks like a button, especially on mobile which gives a stronger affordance for a tap vs. a tap/hold
This is a sitewide long-tail effort. [To better track button/link inconsistencies, please view this Mural.](https://app.mural.co/invitation/mural/vsa8243/1610052905994?sender=u2134c22982ad9c7b41798011&key=87284ca2-fd99-431d-b086-5890abf480ac).
## Acceptance Criteria
- [ ] Links are styled as links
## Environment
* Operating System: all
* Browser: any
* Screenreading device: any
* Server destination: staging
## Solution (if known)
Use the new design system Action Link component
https://design.va.gov/components/action-links
## WCAG or Vendor Guidance (optional)
* [Adam Silver: But sometimes buttons look like links](https://adamsilver.io/articles/but-sometimes-buttons-look-like-links/)
## Screenshots or Trace Logs

| 1.0 | 508-defect-3 [COGNITION]: "Sign up now" link should be styled as a link using the Action Link component - # [508-defect-3](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/platform/accessibility/guidance/defect-severity-rubric.md#508-defect-3)
## Feedback framework
- **❗️ Must** for if the feedback must be applied
- **⚠️ Should** if the feedback is best practice
- **✔️ Consider** for suggestions/enhancements
## Definition of done
1. Review and acknowledge feedback.
1. Fix and/or document decisions made.
1. Accessibility specialist will close ticket after reviewing documented decisions / validating fix.
<hr/>
## Point of Contact
**VFS Point of Contact:** Josh
## User Story or Problem Statement
- As a user, I expect links to be styled as links so that I know I can open them in a new tab.
- As a voice AT user, I expect links to be styled as links so that I can provide an accurate command based on what I see.
- As a screen reader user with low vision, I expect the screen reader to announce what I see on the page.
- As a user, I expect links to be styled consistently as links so that I do not confuse them with buttons.
## Details
The "Sign up now" link is styled as a `button` which is materially dishonest. This causes several issues:
- It's materially dishonest and damages habituation on VA.gov
- Voice assistive tech users may say "Click sign up now _button_" which may result in failure as it is tagged as a `a`
- Screen reader users with low vision may become confused at a button being announced as a link
- Sighted users may not know that they can open this in a new tab because it looks like a button, especially on mobile which gives a stronger affordance for a tap vs. a tap/hold
This is a sitewide long-tail effort. [To better track button/link inconsistencies, please view this Mural.](https://app.mural.co/invitation/mural/vsa8243/1610052905994?sender=u2134c22982ad9c7b41798011&key=87284ca2-fd99-431d-b086-5890abf480ac).
## Acceptance Criteria
- [ ] Links are styled as links
## Environment
* Operating System: all
* Browser: any
* Screenreading device: any
* Server destination: staging
## Solution (if known)
Use the new design system Action Link component
https://design.va.gov/components/action-links
## WCAG or Vendor Guidance (optional)
* [Adam Silver: But sometimes buttons look like links](https://adamsilver.io/articles/but-sometimes-buttons-look-like-links/)
## Screenshots or Trace Logs

| defect | defect sign up now link should be styled as a link using the action link component feedback framework ❗️ must for if the feedback must be applied ⚠️ should if the feedback is best practice ✔️ consider for suggestions enhancements definition of done review and acknowledge feedback fix and or document decisions made accessibility specialist will close ticket after reviewing documented decisions validating fix point of contact vfs point of contact josh user story or problem statement as a user i expect links to be styled as links so that i know i can open them in a new tab as a voice at user i expect links to be styled as links so that i can provide an accurate command based on what i see as a screen reader user with low vision i expect the screen reader to announce what i see on the page as a user i expect links to be styled consistently as links so that i do not confuse them with buttons details the sign up now link is styled as a button which is materially dishonest this causes several issues it s materially dishonest and damages habituation on va gov voice assistive tech users may say click sign up now button which may result in failure as it is tagged as a a screen reader users with low vision may become confused at a button being announced as a link sighted users may not know that they can open this in a new tab because it looks like a button especially on mobile which gives a stronger affordance for a tap vs a tap hold this is a sitewide long tail effort acceptance criteria links are styled as links environment operating system all browser any screenreading device any server destination staging solution if known use the new design system action link component wcag or vendor guidance optional screenshots or trace logs | 1 |
9,086 | 2,615,128,240 | IssuesEvent | 2015-03-01 05:57:32 | chrsmith/google-api-java-client | https://api.github.com/repos/chrsmith/google-api-java-client | closed | Batch request not adding authorization to top-level request | auto-migrated Milestone-Version1.11.0 Priority-Medium Type-Defect | ```
Reported internally by gdference:
I gave both the GoogleClient and the BatchRequest a non-null
HttpRequestInitializer (more specifically,
com.google.api.client.auth.oauth2.Credential) as an argument using the
following code below.
HttpTransport httpTransport = new NetHttpTransport();
GoogleClient client = new GoogleClient.Builder(httpTransport, new
JacksonFactory(),
"...", .../v1beta1/", credential).build();
BatchRequest batch = client.batch(credential);
...
The top-level batch request header does not have authorization.
```
Original issue reported on code.google.com by `rmis...@google.com` on 13 Jul 2012 at 3:25 | 1.0 | Batch request not adding authorization to top-level request - ```
Reported internally by gdference:
I gave both the GoogleClient and the BatchRequest a non-null
HttpRequestInitializer (more specifically,
com.google.api.client.auth.oauth2.Credential) as an argument using the
following code below.
HttpTransport httpTransport = new NetHttpTransport();
GoogleClient client = new GoogleClient.Builder(httpTransport, new
JacksonFactory(),
"...", .../v1beta1/", credential).build();
BatchRequest batch = client.batch(credential);
...
The top-level batch request header does not have authorization.
```
Original issue reported on code.google.com by `rmis...@google.com` on 13 Jul 2012 at 3:25 | defect | batch request not adding authorization to top level request reported internally by gdference i gave both the googleclient and the batchrequest a non null httprequestinitializer more specifically com google api client auth credential as an argument using the following code below httptransport httptransport new nethttptransport googleclient client new googleclient builder httptransport new jacksonfactory credential build batchrequest batch client batch credential the top level batch request header does not have authorization original issue reported on code google com by rmis google com on jul at | 1 |
6,060 | 2,610,220,209 | IssuesEvent | 2015-02-26 19:09:59 | chrsmith/somefinders | https://api.github.com/repos/chrsmith/somefinders | opened | готовый букс | auto-migrated Priority-Medium Type-Defect | ```
'''Гамлет Лебедев'''
День добрый никак не могу найти .готовый
букс. где то видел уже
'''Бронислав Шаров'''
Вот хороший сайт где можно скачать
http://bit.ly/1gf9PUz
'''Аскольд Морозов'''
Спасибо вроде то но просит телефон вводить
'''Варфоломей Павлов'''
Неа все ок у меня ничего не списало
'''Вавила Петров'''
Не это не влияет на баланс
Информация о файле: готовый букс
Загружен: В этом месяце
Скачан раз: 129
Рейтинг: 371
Средняя скорость скачивания: 433
Похожих файлов: 21
```
-----
Original issue reported on code.google.com by `kondense...@gmail.com` on 17 Dec 2013 at 6:26 | 1.0 | готовый букс - ```
'''Гамлет Лебедев'''
День добрый никак не могу найти .готовый
букс. где то видел уже
'''Бронислав Шаров'''
Вот хороший сайт где можно скачать
http://bit.ly/1gf9PUz
'''Аскольд Морозов'''
Спасибо вроде то но просит телефон вводить
'''Варфоломей Павлов'''
Неа все ок у меня ничего не списало
'''Вавила Петров'''
Не это не влияет на баланс
Информация о файле: готовый букс
Загружен: В этом месяце
Скачан раз: 129
Рейтинг: 371
Средняя скорость скачивания: 433
Похожих файлов: 21
```
-----
Original issue reported on code.google.com by `kondense...@gmail.com` on 17 Dec 2013 at 6:26 | defect | готовый букс гамлет лебедев день добрый никак не могу найти готовый букс где то видел уже бронислав шаров вот хороший сайт где можно скачать аскольд морозов спасибо вроде то но просит телефон вводить варфоломей павлов неа все ок у меня ничего не списало вавила петров не это не влияет на баланс информация о файле готовый букс загружен в этом месяце скачан раз рейтинг средняя скорость скачивания похожих файлов original issue reported on code google com by kondense gmail com on dec at | 1 |
116,778 | 24,988,859,394 | IssuesEvent | 2022-11-02 17:01:17 | dotnet/roslyn | https://api.github.com/repos/dotnet/roslyn | closed | CodeFix for CS1998 does not consider/adapt all kinds of usages | Area-IDE Concept-Continuous Improvement Need Design Review IDE-CodeStyle | **Version Used**:
VS2019.3.9 - .NET Core 3.0 ConsoleApp
**Issue**
It is my opinion that applying a CodeFix should not cause syntax errors (assuming the code was valid before). Under that assumption I find it rather annoying that the CodeFix for CS1998 does not respect the usages of the methods it modifies (at least not all), resulting in syntax errors.
**Steps to Reproduce**:
Consider the following example
````
class A
{
public async Task DemoUsage1()
{
var result = await Method();
}
public void DemoUsage2()
{
var result = Method().Result;
}
public async Task DemoUsage3()
{
Func<Task<string>> func = Method;
var result = await func.Invoke();
}
public async Task<string> Method() // CS1998: This async method lacks 'await' operators and will run synchronously.
{
return "abc";
}
}
````
which is fixed to:
```
class A
{
public async Task DemoUsage1()
{
var result = Method(); // usage adapted -> valid
}
public void DemoUsage2()
{
var result = Method().Result; // usage not adapted -> invalid syntax
}
public async Task DemoUsage3()
{
Func<Task<string>> func = Method; // usage not adapted -> invalid syntax
var result = await func.Invoke();
}
public string Method() // now synchronous
{
return "abc";
}
}
```
which shows that only one of the usage kinds has been adapted correctly.
**Expected Behavior**:
As stated above: I would expect that a CodeFix does not produce incorrect code.
Obviously this is not so trivial to fix. In case 2 it would probably be OK to just remove the `.Result` (ignoring the fact that such a usage should better not exist at all). But as soon as the method is stored in a variable one probably should not modify the signature at all and instead use something like `return Task.FromResult("abc")` within the method. (This is especially relevant when used with lambda functions like `Func<Task<string>> func = async () => "abc"`, which should probably transformed to `Func<Task<string>> func = () => Task.FromResult("abc")`` or similar.
| 1.0 | CodeFix for CS1998 does not consider/adapt all kinds of usages - **Version Used**:
VS2019.3.9 - .NET Core 3.0 ConsoleApp
**Issue**
It is my opinion that applying a CodeFix should not cause syntax errors (assuming the code was valid before). Under that assumption I find it rather annoying that the CodeFix for CS1998 does not respect the usages of the methods it modifies (at least not all), resulting in syntax errors.
**Steps to Reproduce**:
Consider the following example
````
class A
{
public async Task DemoUsage1()
{
var result = await Method();
}
public void DemoUsage2()
{
var result = Method().Result;
}
public async Task DemoUsage3()
{
Func<Task<string>> func = Method;
var result = await func.Invoke();
}
public async Task<string> Method() // CS1998: This async method lacks 'await' operators and will run synchronously.
{
return "abc";
}
}
````
which is fixed to:
```
class A
{
public async Task DemoUsage1()
{
var result = Method(); // usage adapted -> valid
}
public void DemoUsage2()
{
var result = Method().Result; // usage not adapted -> invalid syntax
}
public async Task DemoUsage3()
{
Func<Task<string>> func = Method; // usage not adapted -> invalid syntax
var result = await func.Invoke();
}
public string Method() // now synchronous
{
return "abc";
}
}
```
which shows that only one of the usage kinds has been adapted correctly.
**Expected Behavior**:
As stated above: I would expect that a CodeFix does not produce incorrect code.
Obviously this is not so trivial to fix. In case 2 it would probably be OK to just remove the `.Result` (ignoring the fact that such a usage should better not exist at all). But as soon as the method is stored in a variable one probably should not modify the signature at all and instead use something like `return Task.FromResult("abc")` within the method. (This is especially relevant when used with lambda functions like `Func<Task<string>> func = async () => "abc"`, which should probably transformed to `Func<Task<string>> func = () => Task.FromResult("abc")`` or similar.
| non_defect | codefix for does not consider adapt all kinds of usages version used net core consoleapp issue it is my opinion that applying a codefix should not cause syntax errors assuming the code was valid before under that assumption i find it rather annoying that the codefix for does not respect the usages of the methods it modifies at least not all resulting in syntax errors steps to reproduce consider the following example class a public async task var result await method public void var result method result public async task func func method var result await func invoke public async task method this async method lacks await operators and will run synchronously return abc which is fixed to class a public async task var result method usage adapted valid public void var result method result usage not adapted invalid syntax public async task func func method usage not adapted invalid syntax var result await func invoke public string method now synchronous return abc which shows that only one of the usage kinds has been adapted correctly expected behavior as stated above i would expect that a codefix does not produce incorrect code obviously this is not so trivial to fix in case it would probably be ok to just remove the result ignoring the fact that such a usage should better not exist at all but as soon as the method is stored in a variable one probably should not modify the signature at all and instead use something like return task fromresult abc within the method this is especially relevant when used with lambda functions like func func async abc which should probably transformed to func func task fromresult abc or similar | 0 |
29,061 | 5,517,635,003 | IssuesEvent | 2017-03-18 00:35:17 | Cockatrice/Cockatrice | https://api.github.com/repos/Cockatrice/Cockatrice | opened | OSX - every line in chat makes audible "bel" even with sounds disabled | App - Cockatrice Defect - Basic OS - macOS UI / UX | <b>OS:</b>
OSX 10.11.5
<b>Cockatrice version:</b>
piday
___
<br>
make it stop
| 1.0 | OSX - every line in chat makes audible "bel" even with sounds disabled - <b>OS:</b>
OSX 10.11.5
<b>Cockatrice version:</b>
piday
___
<br>
make it stop
| defect | osx every line in chat makes audible bel even with sounds disabled os osx cockatrice version piday make it stop | 1 |
40,886 | 10,210,888,564 | IssuesEvent | 2019-08-14 15:40:22 | zotonic/zotonic | https://api.github.com/repos/zotonic/zotonic | closed | Prevent indexing of language switch page by bots | defect | Yandex likes our language switch page and gets lost:
93.158.178.162 - - [29/Sep/2015:09:48:56 +0200] "GET /tr/language/switch?p=%2Ftr%2Flanguage%2Fswitch%3Fcode%3Dit%26p%3D%252Ftr%252Flanguage%252Fswitch%253Fp%253D%25252Ftr%25252Flanguage%25252Fswitch%25253Fp%25253D%2525252Ftr%2525252Flanguage%2525252Fswitch%2525253Fcode%2525253Dar%25252526p%2525253D%252525252Ftr%252525252Flanguage%252525252Fswitch%252525253Fp%252525253D%25252525252Ftr%25252525252Flanguage%25252525252Fswitch%25252525253Fcode%25252525253D%2525252525253F%2525252525253F%252525252526p%25252525253D%2525252525252Ftr%2525252525252Flanguage%2525252525252Fswitch%2525252525253Fp%2525252525253D%252525252525252Ftr%252525252525252Flanguage%252525252525252Fswitch%252525252525253Fcode%252525252525253Dtr%2525252525252526p%252525252525253D%25252525252525252Ftr%25252525252525252Fblog%25252525252525252F36011%25252525252525252F9-great-ways-to-stimulate-collaborative-learning HTTP/1.1" 200 24698 "" "Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" 1058825217
| 1.0 | Prevent indexing of language switch page by bots - Yandex likes our language switch page and gets lost:
93.158.178.162 - - [29/Sep/2015:09:48:56 +0200] "GET /tr/language/switch?p=%2Ftr%2Flanguage%2Fswitch%3Fcode%3Dit%26p%3D%252Ftr%252Flanguage%252Fswitch%253Fp%253D%25252Ftr%25252Flanguage%25252Fswitch%25253Fp%25253D%2525252Ftr%2525252Flanguage%2525252Fswitch%2525253Fcode%2525253Dar%25252526p%2525253D%252525252Ftr%252525252Flanguage%252525252Fswitch%252525253Fp%252525253D%25252525252Ftr%25252525252Flanguage%25252525252Fswitch%25252525253Fcode%25252525253D%2525252525253F%2525252525253F%252525252526p%25252525253D%2525252525252Ftr%2525252525252Flanguage%2525252525252Fswitch%2525252525253Fp%2525252525253D%252525252525252Ftr%252525252525252Flanguage%252525252525252Fswitch%252525252525253Fcode%252525252525253Dtr%2525252525252526p%252525252525253D%25252525252525252Ftr%25252525252525252Fblog%25252525252525252F36011%25252525252525252F9-great-ways-to-stimulate-collaborative-learning HTTP/1.1" 200 24698 "" "Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)" 1058825217
| defect | prevent indexing of language switch page by bots yandex likes our language switch page and gets lost get tr language switch p great ways to stimulate collaborative learning http mozilla compatible yandexbot | 1 |
71,517 | 23,672,918,044 | IssuesEvent | 2022-08-27 16:42:42 | vector-im/element-web | https://api.github.com/repos/vector-im/element-web | opened | Most rooms & spaces are not shown / unusable | T-Defect | ### Steps to reproduce
1. Install Element Desktop 1.11.3 OR use https://app.element.io (same version) in Firefox
2. Log in
### Outcome
#### What did you expect?
To see all the spaces & rooms I joined like in nheko & Element Web/Desktop 1.11.2 & Element Android.
#### What happened instead?
I only see some rooms & spaces. If I try to search for rooms I'm joined (according to the clients), they get displayed as "Empty Room" and I get asked to join them.
#### What I tried so far?
- `Clear cache & reload`
- fully log out & re-log in
- for Desktop: `rm -rf ~/.config/Element`
- for Web: `Clear cookies and site data`
- a different PC (same OS)
#### Other info
- On the same PC the same rooms are not shown for Desktop & Web and at each try, on another PC other rooms are not shown
- Fully reloading / clearing cache on other clients works fine
### Operating system
Debian GNU/Linux Testing/Unstable
### Application version
Element version: 1.11.3 Olm version: 3.2.12
### How did you install the app?
deb from https://packages.element.io/debian/
### Homeserver
matrix.org
### Will you send logs?
Yes | 1.0 | Most rooms & spaces are not shown / unusable - ### Steps to reproduce
1. Install Element Desktop 1.11.3 OR use https://app.element.io (same version) in Firefox
2. Log in
### Outcome
#### What did you expect?
To see all the spaces & rooms I joined like in nheko & Element Web/Desktop 1.11.2 & Element Android.
#### What happened instead?
I only see some rooms & spaces. If I try to search for rooms I'm joined (according to the clients), they get displayed as "Empty Room" and I get asked to join them.
#### What I tried so far?
- `Clear cache & reload`
- fully log out & re-log in
- for Desktop: `rm -rf ~/.config/Element`
- for Web: `Clear cookies and site data`
- a different PC (same OS)
#### Other info
- On the same PC the same rooms are not shown for Desktop & Web and at each try, on another PC other rooms are not shown
- Fully reloading / clearing cache on other clients works fine
### Operating system
Debian GNU/Linux Testing/Unstable
### Application version
Element version: 1.11.3 Olm version: 3.2.12
### How did you install the app?
deb from https://packages.element.io/debian/
### Homeserver
matrix.org
### Will you send logs?
Yes | defect | most rooms spaces are not shown unusable steps to reproduce install element desktop or use same version in firefox log in outcome what did you expect to see all the spaces rooms i joined like in nheko element web desktop element android what happened instead i only see some rooms spaces if i try to search for rooms i m joined according to the clients they get displayed as empty room and i get asked to join them what i tried so far clear cache reload fully log out re log in for desktop rm rf config element for web clear cookies and site data a different pc same os other info on the same pc the same rooms are not shown for desktop web and at each try on another pc other rooms are not shown fully reloading clearing cache on other clients works fine operating system debian gnu linux testing unstable application version element version olm version how did you install the app deb from homeserver matrix org will you send logs yes | 1 |
1,053 | 3,022,105,701 | IssuesEvent | 2015-07-31 18:22:54 | subuser-security/subuser | https://api.github.com/repos/subuser-security/subuser | closed | X11 is horribly insecure, each subuser should get its own X11 server in a container. | bug security | The contained X11 servers should be accessible to the main X11 server via xpra.org, VNC, or wayland. | True | X11 is horribly insecure, each subuser should get its own X11 server in a container. - The contained X11 servers should be accessible to the main X11 server via xpra.org, VNC, or wayland. | non_defect | is horribly insecure each subuser should get its own server in a container the contained servers should be accessible to the main server via xpra org vnc or wayland | 0 |
23,426 | 10,884,669,837 | IssuesEvent | 2019-11-18 08:50:34 | TIBCOSoftware/bw6-plugin-maven | https://api.github.com/repos/TIBCOSoftware/bw6-plugin-maven | closed | CVE-2019-14439 (Medium) detected in jackson-databind-2.6.1.jar | security vulnerability | ## CVE-2019-14439 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.1.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /bw6-plugin-maven/Source/bw6-maven-plugin/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.1/jackson-databind-2.6.1.jar</p>
<p>
Dependency Hierarchy:
- jackson-jaxrs-base-2.6.1.jar (Root Library)
- :x: **jackson-databind-2.6.1.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.
<p>Publish Date: 2019-07-30
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439>CVE-2019-14439</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439</a></p>
<p>Release Date: 2019-07-30</p>
<p>Fix Resolution: 2.9.9.2</p>
</p>
</details>
<p></p>
| True | CVE-2019-14439 (Medium) detected in jackson-databind-2.6.1.jar - ## CVE-2019-14439 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.1.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /bw6-plugin-maven/Source/bw6-maven-plugin/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.1/jackson-databind-2.6.1.jar</p>
<p>
Dependency Hierarchy:
- jackson-jaxrs-base-2.6.1.jar (Root Library)
- :x: **jackson-databind-2.6.1.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.
<p>Publish Date: 2019-07-30
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439>CVE-2019-14439</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439</a></p>
<p>Release Date: 2019-07-30</p>
<p>Fix Resolution: 2.9.9.2</p>
</p>
</details>
<p></p>
| non_defect | cve medium detected in jackson databind jar cve medium severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file plugin maven source maven plugin pom xml path to vulnerable library root repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy jackson jaxrs base jar root library x jackson databind jar vulnerable library vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind x before this occurs when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the logback jar in the classpath publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution | 0 |
81,010 | 30,657,763,440 | IssuesEvent | 2023-07-25 13:14:41 | vector-im/element-web | https://api.github.com/repos/vector-im/element-web | opened | Stuck unread messages badge in 1.11.36 | T-Defect | ### Steps to reproduce
I don't know, sorry. Notifications debug:
```
Room ID: !muWFoAazesOnQSqwHZ:matrix.org
Room status
Room unread status: Bold
Notification state is mentions_only
Room is encrypted ✅
Main timeline
Total: 0
Highlight: 0
Dot: true
User read up to: $oysAhUmIjVOyiggu3MqMDjT0Ma0j25j-lLGinhmSkog
Last event:
ID: $ELGWc-Sla59GvdCi3-Es68AGDZfkQBSNYghan9zPG2w
Type: m.reaction
Sender: @ganfra:matrix.org
Threads timeline
```
### Outcome
#### What did you expect?
Right clicking on a room in the list and using 'Mark as read' should clear unread indicator (if not reading all messages).
#### What happened instead?
Unread dot is persistent after reading all messages / using 'Mark as read'.
### Operating system
arch linux
### Application version
Element version: 1.11.36 Olm version: 3.2.14
### How did you install the app?
arch linux package
### Homeserver
Synapse 1.76.0
### Will you send logs?
No | 1.0 | Stuck unread messages badge in 1.11.36 - ### Steps to reproduce
I don't know, sorry. Notifications debug:
```
Room ID: !muWFoAazesOnQSqwHZ:matrix.org
Room status
Room unread status: Bold
Notification state is mentions_only
Room is encrypted ✅
Main timeline
Total: 0
Highlight: 0
Dot: true
User read up to: $oysAhUmIjVOyiggu3MqMDjT0Ma0j25j-lLGinhmSkog
Last event:
ID: $ELGWc-Sla59GvdCi3-Es68AGDZfkQBSNYghan9zPG2w
Type: m.reaction
Sender: @ganfra:matrix.org
Threads timeline
```
### Outcome
#### What did you expect?
Right clicking on a room in the list and using 'Mark as read' should clear unread indicator (if not reading all messages).
#### What happened instead?
Unread dot is persistent after reading all messages / using 'Mark as read'.
### Operating system
arch linux
### Application version
Element version: 1.11.36 Olm version: 3.2.14
### How did you install the app?
arch linux package
### Homeserver
Synapse 1.76.0
### Will you send logs?
No | defect | stuck unread messages badge in steps to reproduce i don t know sorry notifications debug room id muwfoaazesonqsqwhz matrix org room status room unread status bold notification state is mentions only room is encrypted ✅ main timeline total highlight dot true user read up to llginhmskog last event id elgwc type m reaction sender ganfra matrix org threads timeline outcome what did you expect right clicking on a room in the list and using mark as read should clear unread indicator if not reading all messages what happened instead unread dot is persistent after reading all messages using mark as read operating system arch linux application version element version olm version how did you install the app arch linux package homeserver synapse will you send logs no | 1 |
794,524 | 28,039,047,294 | IssuesEvent | 2023-03-28 17:03:33 | project-chip/zap | https://api.github.com/repos/project-chip/zap | closed | ZAP generation time is too high (>500 seconds) | high priority |
!MESSAGE Job found still running after platform shutdown. Jobs should be canceled by the plugin that scheduled them during shutdown: com.silabs.ss.framework.uc.internal.generation.UcThreadingGenerator$UcProjectGenerationTask
Generation issue: Follow-up generation did not complete within 500 seconds! | 1.0 | ZAP generation time is too high (>500 seconds) -
!MESSAGE Job found still running after platform shutdown. Jobs should be canceled by the plugin that scheduled them during shutdown: com.silabs.ss.framework.uc.internal.generation.UcThreadingGenerator$UcProjectGenerationTask
Generation issue: Follow-up generation did not complete within 500 seconds! | non_defect | zap generation time is too high seconds message job found still running after platform shutdown jobs should be canceled by the plugin that scheduled them during shutdown com silabs ss framework uc internal generation ucthreadinggenerator ucprojectgenerationtask generation issue follow up generation did not complete within seconds | 0 |
64,122 | 18,236,734,963 | IssuesEvent | 2021-10-01 07:57:20 | hazelcast/hazelcast | https://api.github.com/repos/hazelcast/hazelcast | closed | Vulnerabilities in Jetty 9.4.39 used by Jet in HZ 5.0 | Type: Defect Team: Core Source: Internal dependencies Module: Jet security severity:medium | This issue was migrated from issue https://github.com/hazelcast/hazelcast-jet/issues/3067. See the original issue for more details. | 1.0 | Vulnerabilities in Jetty 9.4.39 used by Jet in HZ 5.0 - This issue was migrated from issue https://github.com/hazelcast/hazelcast-jet/issues/3067. See the original issue for more details. | defect | vulnerabilities in jetty used by jet in hz this issue was migrated from issue see the original issue for more details | 1 |
77,489 | 14,858,148,882 | IssuesEvent | 2021-01-18 16:23:09 | recoder/upptime | https://api.github.com/repos/recoder/upptime | opened | 🛑 ReCoder.AndrewZ.org is down | re-coder-andrew-z-org status | In [`94cc379`](https://github.com/recoder/upptime/commit/94cc3798acb39939c8d5aff7ea118068043b8bba
), ReCoder.AndrewZ.org (https://recoder.andrewz.org) was **down**:
- HTTP code: 0
- Response time: 0 ms
| 1.0 | 🛑 ReCoder.AndrewZ.org is down - In [`94cc379`](https://github.com/recoder/upptime/commit/94cc3798acb39939c8d5aff7ea118068043b8bba
), ReCoder.AndrewZ.org (https://recoder.andrewz.org) was **down**:
- HTTP code: 0
- Response time: 0 ms
| non_defect | 🛑 recoder andrewz org is down in recoder andrewz org was down http code response time ms | 0 |
62,651 | 17,106,253,261 | IssuesEvent | 2021-07-09 18:15:07 | vmware-tanzu-labs/yaml-overlay-tool | https://api.github.com/repos/vmware-tanzu-labs/yaml-overlay-tool | closed | Get stackoverflow when adding removeComments: true to yot.config file | defect v0.6.0 | My `./yot.config` looks like:
```yaml
outputDirectory: .out
removeComments: true
```
I get the following output:
```
runtime: goroutine stack exceeds 1000000000-byte limit
runtime: sp=0xc020260390 stack=[0xc020260000, 0xc040260000]
fatal error: stack overflow
runtime stack:
runtime.throw(0x1488bb1, 0xe)
/opt/hostedtoolcache/go/1.16.5/x64/src/runtime/panic.go:1117 +0x72
runtime.newstack()
/opt/hostedtoolcache/go/1.16.5/x64/src/runtime/stack.go:1069 +0x7ed
runtime.morestack()
/opt/hostedtoolcache/go/1.16.5/x64/src/runtime/asm_amd64.s:458 +0x8f
goroutine 1 [running]:
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:178 +0x110 fp=0xc0202603a0 sp=0xc020260398 pc=0x13d2e30
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202603d0 sp=0xc0202603a0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260400 sp=0xc0202603d0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260430 sp=0xc020260400 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260460 sp=0xc020260430 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260490 sp=0xc020260460 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202604c0 sp=0xc020260490 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202604f0 sp=0xc0202604c0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260520 sp=0xc0202604f0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260550 sp=0xc020260520 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260580 sp=0xc020260550 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202605b0 sp=0xc020260580 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202605e0 sp=0xc0202605b0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260610 sp=0xc0202605e0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260640 sp=0xc020260610 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260670 sp=0xc020260640 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202606a0 sp=0xc020260670 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202606d0 sp=0xc0202606a0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260700 sp=0xc0202606d0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260730 sp=0xc020260700 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260760 sp=0xc020260730 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260790 sp=0xc020260760 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202607c0 sp=0xc020260790 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202607f0 sp=0xc0202607c0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260820 sp=0xc0202607f0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260850 sp=0xc020260820 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260880 sp=0xc020260850 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202608b0 sp=0xc020260880 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202608e0 sp=0xc0202608b0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260910 sp=0xc0202608e0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260940 sp=0xc020260910 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260970 sp=0xc020260940 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202609a0 sp=0xc020260970 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202609d0 sp=0xc0202609a0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260a00 sp=0xc0202609d0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260a30 sp=0xc020260a00 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260a60 sp=0xc020260a30 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260a90 sp=0xc020260a60 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260ac0 sp=0xc020260a90 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260af0 sp=0xc020260ac0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260b20 sp=0xc020260af0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260b50 sp=0xc020260b20 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260b80 sp=0xc020260b50 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260bb0 sp=0xc020260b80 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260be0 sp=0xc020260bb0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260c10 sp=0xc020260be0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260c40 sp=0xc020260c10 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260c70 sp=0xc020260c40 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260ca0 sp=0xc020260c70 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260cd0 sp=0xc020260ca0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260d00 sp=0xc020260cd0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260d30 sp=0xc020260d00 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260d60 sp=0xc020260d30 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260d90 sp=0xc020260d60 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260dc0 sp=0xc020260d90 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260df0 sp=0xc020260dc0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260e20 sp=0xc020260df0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260e50 sp=0xc020260e20 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260e80 sp=0xc020260e50 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260eb0 sp=0xc020260e80 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260ee0 sp=0xc020260eb0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260f10 sp=0xc020260ee0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260f40 sp=0xc020260f10 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260f70 sp=0xc020260f40 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260fa0 sp=0xc020260f70 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260fd0 sp=0xc020260fa0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261000 sp=0xc020260fd0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261030 sp=0xc020261000 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261060 sp=0xc020261030 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261090 sp=0xc020261060 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202610c0 sp=0xc020261090 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202610f0 sp=0xc0202610c0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261120 sp=0xc0202610f0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261150 sp=0xc020261120 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261180 sp=0xc020261150 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202611b0 sp=0xc020261180 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202611e0 sp=0xc0202611b0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261210 sp=0xc0202611e0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261240 sp=0xc020261210 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261270 sp=0xc020261240 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202612a0 sp=0xc020261270 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202612d0 sp=0xc0202612a0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261300 sp=0xc0202612d0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261330 sp=0xc020261300 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261360 sp=0xc020261330 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261390 sp=0xc020261360 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202613c0 sp=0xc020261390 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202613f0 sp=0xc0202613c0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261420 sp=0xc0202613f0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261450 sp=0xc020261420 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261480 sp=0xc020261450 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202614b0 sp=0xc020261480 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202614e0 sp=0xc0202614b0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261510 sp=0xc0202614e0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261540 sp=0xc020261510 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261570 sp=0xc020261540 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202615a0 sp=0xc020261570 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202615d0 sp=0xc0202615a0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261600 sp=0xc0202615d0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261630 sp=0xc020261600 pc=0x13d2d6e
...additional frames elided...
``` | 1.0 | Get stackoverflow when adding removeComments: true to yot.config file - My `./yot.config` looks like:
```yaml
outputDirectory: .out
removeComments: true
```
I get the following output:
```
runtime: goroutine stack exceeds 1000000000-byte limit
runtime: sp=0xc020260390 stack=[0xc020260000, 0xc040260000]
fatal error: stack overflow
runtime stack:
runtime.throw(0x1488bb1, 0xe)
/opt/hostedtoolcache/go/1.16.5/x64/src/runtime/panic.go:1117 +0x72
runtime.newstack()
/opt/hostedtoolcache/go/1.16.5/x64/src/runtime/stack.go:1069 +0x7ed
runtime.morestack()
/opt/hostedtoolcache/go/1.16.5/x64/src/runtime/asm_amd64.s:458 +0x8f
goroutine 1 [running]:
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:178 +0x110 fp=0xc0202603a0 sp=0xc020260398 pc=0x13d2e30
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202603d0 sp=0xc0202603a0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260400 sp=0xc0202603d0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260430 sp=0xc020260400 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260460 sp=0xc020260430 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260490 sp=0xc020260460 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202604c0 sp=0xc020260490 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202604f0 sp=0xc0202604c0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260520 sp=0xc0202604f0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260550 sp=0xc020260520 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260580 sp=0xc020260550 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202605b0 sp=0xc020260580 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202605e0 sp=0xc0202605b0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260610 sp=0xc0202605e0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260640 sp=0xc020260610 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260670 sp=0xc020260640 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202606a0 sp=0xc020260670 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202606d0 sp=0xc0202606a0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260700 sp=0xc0202606d0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260730 sp=0xc020260700 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260760 sp=0xc020260730 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260790 sp=0xc020260760 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202607c0 sp=0xc020260790 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202607f0 sp=0xc0202607c0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260820 sp=0xc0202607f0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260850 sp=0xc020260820 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260880 sp=0xc020260850 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202608b0 sp=0xc020260880 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202608e0 sp=0xc0202608b0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260910 sp=0xc0202608e0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260940 sp=0xc020260910 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260970 sp=0xc020260940 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202609a0 sp=0xc020260970 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202609d0 sp=0xc0202609a0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260a00 sp=0xc0202609d0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260a30 sp=0xc020260a00 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260a60 sp=0xc020260a30 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260a90 sp=0xc020260a60 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260ac0 sp=0xc020260a90 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260af0 sp=0xc020260ac0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260b20 sp=0xc020260af0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260b50 sp=0xc020260b20 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260b80 sp=0xc020260b50 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260bb0 sp=0xc020260b80 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260be0 sp=0xc020260bb0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260c10 sp=0xc020260be0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260c40 sp=0xc020260c10 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260c70 sp=0xc020260c40 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260ca0 sp=0xc020260c70 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260cd0 sp=0xc020260ca0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260d00 sp=0xc020260cd0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260d30 sp=0xc020260d00 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260d60 sp=0xc020260d30 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260d90 sp=0xc020260d60 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260dc0 sp=0xc020260d90 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260df0 sp=0xc020260dc0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260e20 sp=0xc020260df0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260e50 sp=0xc020260e20 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260e80 sp=0xc020260e50 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260eb0 sp=0xc020260e80 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260ee0 sp=0xc020260eb0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260f10 sp=0xc020260ee0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260f40 sp=0xc020260f10 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260f70 sp=0xc020260f40 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260fa0 sp=0xc020260f70 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020260fd0 sp=0xc020260fa0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261000 sp=0xc020260fd0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261030 sp=0xc020261000 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261060 sp=0xc020261030 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261090 sp=0xc020261060 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202610c0 sp=0xc020261090 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202610f0 sp=0xc0202610c0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261120 sp=0xc0202610f0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261150 sp=0xc020261120 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261180 sp=0xc020261150 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202611b0 sp=0xc020261180 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202611e0 sp=0xc0202611b0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261210 sp=0xc0202611e0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261240 sp=0xc020261210 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261270 sp=0xc020261240 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202612a0 sp=0xc020261270 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202612d0 sp=0xc0202612a0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261300 sp=0xc0202612d0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261330 sp=0xc020261300 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261360 sp=0xc020261330 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261390 sp=0xc020261360 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202613c0 sp=0xc020261390 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202613f0 sp=0xc0202613c0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261420 sp=0xc0202613f0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261450 sp=0xc020261420 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261480 sp=0xc020261450 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202614b0 sp=0xc020261480 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202614e0 sp=0xc0202614b0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261510 sp=0xc0202614e0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261540 sp=0xc020261510 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261570 sp=0xc020261540 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202615a0 sp=0xc020261570 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc0202615d0 sp=0xc0202615a0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261600 sp=0xc0202615d0 pc=0x13d2d6e
github.com/vmware-tanzu-labs/yaml-overlay-tool/internal/instructions.removeCommentsFromNode(0xc000227540)
/home/runner/work/yaml-overlay-tool/yaml-overlay-tool/internal/instructions/yamlfile.go:188 +0x4e fp=0xc020261630 sp=0xc020261600 pc=0x13d2d6e
...additional frames elided...
``` | defect | get stackoverflow when adding removecomments true to yot config file my yot config looks like yaml outputdirectory out removecomments true i get the following output runtime goroutine stack exceeds byte limit runtime sp stack fatal error stack overflow runtime stack runtime throw opt hostedtoolcache go src runtime panic go runtime newstack opt hostedtoolcache go src runtime stack go runtime morestack opt hostedtoolcache go src runtime asm s goroutine github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc github com vmware tanzu labs yaml overlay tool internal instructions removecommentsfromnode home runner work yaml overlay tool yaml overlay tool internal instructions yamlfile go fp sp pc additional frames elided | 1 |
532,844 | 15,571,925,901 | IssuesEvent | 2021-03-17 06:03:31 | weaveio/forum | https://api.github.com/repos/weaveio/forum | closed | Why doesn't body metric get displayed on dispatch face? | Fixed Priority1 | Data Query:
`given user[1aca4a8e-156d-4fdf-a127-bead09725f76], given tracker[cact]`
<img width="1398" alt="スクリーンショット 2021-03-09 22 25 36" src="https://user-images.githubusercontent.com/61481039/110477734-df4c6c00-8126-11eb-8289-5f7b5493e08c.png">
<img width="996" alt="スクリーンショット 2021-03-09 22 27 28" src="https://user-images.githubusercontent.com/61481039/110477739-dfe50280-8126-11eb-9dcc-198bff1609b3.png">
| 1.0 | Why doesn't body metric get displayed on dispatch face? - Data Query:
`given user[1aca4a8e-156d-4fdf-a127-bead09725f76], given tracker[cact]`
<img width="1398" alt="スクリーンショット 2021-03-09 22 25 36" src="https://user-images.githubusercontent.com/61481039/110477734-df4c6c00-8126-11eb-8289-5f7b5493e08c.png">
<img width="996" alt="スクリーンショット 2021-03-09 22 27 28" src="https://user-images.githubusercontent.com/61481039/110477739-dfe50280-8126-11eb-9dcc-198bff1609b3.png">
| non_defect | why doesn t body metric get displayed on dispatch face data query given user given tracker img width alt スクリーンショット src img width alt スクリーンショット src | 0 |
27,952 | 5,141,869,411 | IssuesEvent | 2017-01-12 11:17:36 | bridgedotnet/Bridge | https://api.github.com/repos/bridgedotnet/Bridge | closed | Difference in compiled JS in between deck and VS - Possible symbol resolving failed | defect | [forum link](http://forums.bridge.net/forum/community/help/3240-difference-in-compiled-js-in-between-deck-and-vs)
### Expected
```js
var dataTable = $(idSelector).DataTable( { "language": { "url": "//cdn.datatables.net/plug-ins/1.10.13/i18n/Hungarian.json" } } ) ;
```
### Actual
```
TypeError: Cannot read property 'script' of undefined
/RunHandler.ashx?h=1599467679:23 Function.getTable()
```
```js
var dataTable = Bridge.bridge.script.write("$(idSelector).DataTable( { \"language\": { \"url\": \"//cdn.datatables.net/plug-ins/1.10.13/i18n/Hungarian.json\" } } ) ");
```
### Steps To Reproduce
http://deck.net/dd360cb16b6e3390243ae4d8f0909653
```cs
using Bridge;
namespace Issue1
{
public class UIUtils
{
public static void Main()
{
var t = UIUtils.DataTables.GetTable();
// Sould be 1
System.Console.WriteLine(t.i);
}
public class DataTables
{
public static DataTable GetTable()
{
return Script.Write<DataTable>("{i:1}");
}
}
public class DataTable
{
public int i;
}
}
}
```
| 1.0 | Difference in compiled JS in between deck and VS - Possible symbol resolving failed - [forum link](http://forums.bridge.net/forum/community/help/3240-difference-in-compiled-js-in-between-deck-and-vs)
### Expected
```js
var dataTable = $(idSelector).DataTable( { "language": { "url": "//cdn.datatables.net/plug-ins/1.10.13/i18n/Hungarian.json" } } ) ;
```
### Actual
```
TypeError: Cannot read property 'script' of undefined
/RunHandler.ashx?h=1599467679:23 Function.getTable()
```
```js
var dataTable = Bridge.bridge.script.write("$(idSelector).DataTable( { \"language\": { \"url\": \"//cdn.datatables.net/plug-ins/1.10.13/i18n/Hungarian.json\" } } ) ");
```
### Steps To Reproduce
http://deck.net/dd360cb16b6e3390243ae4d8f0909653
```cs
using Bridge;
namespace Issue1
{
public class UIUtils
{
public static void Main()
{
var t = UIUtils.DataTables.GetTable();
// Sould be 1
System.Console.WriteLine(t.i);
}
public class DataTables
{
public static DataTable GetTable()
{
return Script.Write<DataTable>("{i:1}");
}
}
public class DataTable
{
public int i;
}
}
}
```
| defect | difference in compiled js in between deck and vs possible symbol resolving failed expected js var datatable idselector datatable language url cdn datatables net plug ins hungarian json actual typeerror cannot read property script of undefined runhandler ashx h function gettable js var datatable bridge bridge script write idselector datatable language url cdn datatables net plug ins hungarian json steps to reproduce cs using bridge namespace public class uiutils public static void main var t uiutils datatables gettable sould be system console writeline t i public class datatables public static datatable gettable return script write i public class datatable public int i | 1 |
160,039 | 13,779,423,002 | IssuesEvent | 2020-10-08 13:44:54 | medic/cht-docs | https://api.github.com/repos/medic/cht-docs | opened | Add documentation for generic integrations | Integrations documentation | We have [content](https://docs.communityhealthtoolkit.org/apps/features/integrations/) for RapidPro, DHIS2, and Android already. We have [plans](https://github.com/medic/cht-docs/issues/252) to add content for OpenMRS integrations. We should add content for generic integrations using outbound/api . | 1.0 | Add documentation for generic integrations - We have [content](https://docs.communityhealthtoolkit.org/apps/features/integrations/) for RapidPro, DHIS2, and Android already. We have [plans](https://github.com/medic/cht-docs/issues/252) to add content for OpenMRS integrations. We should add content for generic integrations using outbound/api . | non_defect | add documentation for generic integrations we have for rapidpro and android already we have to add content for openmrs integrations we should add content for generic integrations using outbound api | 0 |
12,748 | 3,644,058,775 | IssuesEvent | 2016-02-15 07:48:41 | ingenesis/shopp | https://api.github.com/repos/ingenesis/shopp | closed | API: update customer & customer info | api documentation lighthouse | *Imported from Lighthouse* http://shopp.lighthouseapp.com/projects/47561/tickets/2166
Reported by **Hiranthi** at **Friday, 15-Feb-13 03:42:08 GMT-0500**
We do have add/remove api functions for customers, but not for updating them (entire customer object or specific customer data). | 1.0 | API: update customer & customer info - *Imported from Lighthouse* http://shopp.lighthouseapp.com/projects/47561/tickets/2166
Reported by **Hiranthi** at **Friday, 15-Feb-13 03:42:08 GMT-0500**
We do have add/remove api functions for customers, but not for updating them (entire customer object or specific customer data). | non_defect | api update customer customer info imported from lighthouse reported by hiranthi at friday feb gmt we do have add remove api functions for customers but not for updating them entire customer object or specific customer data | 0 |
57,772 | 16,049,665,987 | IssuesEvent | 2021-04-22 17:29:10 | department-of-veterans-affairs/va.gov-cms | https://api.github.com/repos/department-of-veterans-affairs/va.gov-cms | opened | Vet Center dashboard "Go to..." links are missing the anchor link | Defect Needs refining | **Describe the defect**
**To Reproduce**
1. Go to Escanaba dashboard
2. Click on Go to ... links
3. They go to the top of node edit form
**Expected behavior**
Go to links take the user to the right part of the form.
**Screenshots**

| 1.0 | Vet Center dashboard "Go to..." links are missing the anchor link - **Describe the defect**
**To Reproduce**
1. Go to Escanaba dashboard
2. Click on Go to ... links
3. They go to the top of node edit form
**Expected behavior**
Go to links take the user to the right part of the form.
**Screenshots**

| defect | vet center dashboard go to links are missing the anchor link describe the defect to reproduce go to escanaba dashboard click on go to links they go to the top of node edit form expected behavior go to links take the user to the right part of the form screenshots | 1 |
703,161 | 24,148,654,252 | IssuesEvent | 2022-09-21 21:22:19 | thoth-station/support | https://api.github.com/repos/thoth-station/support | closed | Kebechet info manager: OgrException on kebechet_runners.py:212 | kind/bug triage/duplicate priority/critical-urgent sig/devsecops bot | ## Description
This is an automated issue generated by Kebechet v1.10.1. The info manager threw an exception (OgrException)
at runtime while working on the following repository https://github.com/shreekarSS/common-1
## Traceback
```python
Traceback (most recent call last):
File "/home/user/kebechet/kebechet_runners.py", line 212, in run
instance.run(**manager_configuration)
File "/home/user/kebechet/managers/info/info.py", line 48, in run
issue = self.get_issue_by_title(_INFO_ISSUE_NAME)
File "/home/user/kebechet/managers/manager.py", line 130, in get_issue_by_title
return utils.get_issue_by_title(self.project, title)
File "/home/user/kebechet/utils.py", line 196, in get_issue_by_title
for issue in ogr_project.get_issue_list():
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/abstract.py", line 107, in wrapper
return function(*args, **kwargs)
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/utils.py", line 199, in indirectly_called
return specialized_function(self, *args, **kwargs)
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/abstract.py", line 107, in wrapper
return function(*args, **kwargs)
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/services/github/issue.py", line 120, in get_list
if not project.has_issues:
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/services/github/project.py", line 110, in has_issues
return self.github_repo.has_issues
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/services/github/project.py", line 81, in github_repo
self._github_repo = self.github_instance.get_repo(
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/services/github/project.py", line 72, in github_instance
self._github_instance = self.service.get_pygithub_instance(
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/abstract.py", line 107, in wrapper
return function(*args, **kwargs)
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/services/github/service.py", line 186, in get_pygithub_instance
token = self.authentication.get_token(namespace, repo)
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/services/github/auth_providers/github_app.py", line 90, in get_token
raise OgrException(
ogr.exceptions.OgrException: No installation ID provided for shreekarSS/common-1: please make sure that you provided correct credentials of your GitHub app.
```
| 1.0 | Kebechet info manager: OgrException on kebechet_runners.py:212 - ## Description
This is an automated issue generated by Kebechet v1.10.1. The info manager threw an exception (OgrException)
at runtime while working on the following repository https://github.com/shreekarSS/common-1
## Traceback
```python
Traceback (most recent call last):
File "/home/user/kebechet/kebechet_runners.py", line 212, in run
instance.run(**manager_configuration)
File "/home/user/kebechet/managers/info/info.py", line 48, in run
issue = self.get_issue_by_title(_INFO_ISSUE_NAME)
File "/home/user/kebechet/managers/manager.py", line 130, in get_issue_by_title
return utils.get_issue_by_title(self.project, title)
File "/home/user/kebechet/utils.py", line 196, in get_issue_by_title
for issue in ogr_project.get_issue_list():
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/abstract.py", line 107, in wrapper
return function(*args, **kwargs)
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/utils.py", line 199, in indirectly_called
return specialized_function(self, *args, **kwargs)
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/abstract.py", line 107, in wrapper
return function(*args, **kwargs)
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/services/github/issue.py", line 120, in get_list
if not project.has_issues:
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/services/github/project.py", line 110, in has_issues
return self.github_repo.has_issues
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/services/github/project.py", line 81, in github_repo
self._github_repo = self.github_instance.get_repo(
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/services/github/project.py", line 72, in github_instance
self._github_instance = self.service.get_pygithub_instance(
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/abstract.py", line 107, in wrapper
return function(*args, **kwargs)
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/services/github/service.py", line 186, in get_pygithub_instance
token = self.authentication.get_token(namespace, repo)
File "/home/user/.local/share/virtualenvs/user-5PivF_Od/lib/python3.8/site-packages/ogr/services/github/auth_providers/github_app.py", line 90, in get_token
raise OgrException(
ogr.exceptions.OgrException: No installation ID provided for shreekarSS/common-1: please make sure that you provided correct credentials of your GitHub app.
```
| non_defect | kebechet info manager ogrexception on kebechet runners py description this is an automated issue generated by kebechet the info manager threw an exception ogrexception at runtime while working on the following repository traceback python traceback most recent call last file home user kebechet kebechet runners py line in run instance run manager configuration file home user kebechet managers info info py line in run issue self get issue by title info issue name file home user kebechet managers manager py line in get issue by title return utils get issue by title self project title file home user kebechet utils py line in get issue by title for issue in ogr project get issue list file home user local share virtualenvs user od lib site packages ogr abstract py line in wrapper return function args kwargs file home user local share virtualenvs user od lib site packages ogr utils py line in indirectly called return specialized function self args kwargs file home user local share virtualenvs user od lib site packages ogr abstract py line in wrapper return function args kwargs file home user local share virtualenvs user od lib site packages ogr services github issue py line in get list if not project has issues file home user local share virtualenvs user od lib site packages ogr services github project py line in has issues return self github repo has issues file home user local share virtualenvs user od lib site packages ogr services github project py line in github repo self github repo self github instance get repo file home user local share virtualenvs user od lib site packages ogr services github project py line in github instance self github instance self service get pygithub instance file home user local share virtualenvs user od lib site packages ogr abstract py line in wrapper return function args kwargs file home user local share virtualenvs user od lib site packages ogr services github service py line in get pygithub instance token self authentication get token namespace repo file home user local share virtualenvs user od lib site packages ogr services github auth providers github app py line in get token raise ogrexception ogr exceptions ogrexception no installation id provided for shreekarss common please make sure that you provided correct credentials of your github app | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.