Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
757
labels
stringlengths
4
664
body
stringlengths
3
261k
index
stringclasses
10 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
232k
binary_label
int64
0
1
278,404
30,702,308,966
IssuesEvent
2023-07-27 01:19:22
pazhanivel07/linux_4.1.15
https://api.github.com/repos/pazhanivel07/linux_4.1.15
closed
CVE-2018-1120 (Medium) detected in linuxlinux-4.6 - autoclosed
Mend: dependency security vulnerability
## CVE-2018-1120 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.6</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/linux_4.1.15/commit/2d5b61684c3e6642174b25f3a96ed7dd8bf327e3">2d5b61684c3e6642174b25f3a96ed7dd8bf327e3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/<pid>/cmdline (or /proc/<pid>/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks). <p>Publish Date: 2018-06-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-1120>CVE-2018-1120</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1120">https://nvd.nist.gov/vuln/detail/CVE-2018-1120</a></p> <p>Release Date: 2018-06-20</p> <p>Fix Resolution: 4.17</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-1120 (Medium) detected in linuxlinux-4.6 - autoclosed - ## CVE-2018-1120 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.6</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/linux_4.1.15/commit/2d5b61684c3e6642174b25f3a96ed7dd8bf327e3">2d5b61684c3e6642174b25f3a96ed7dd8bf327e3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/<pid>/cmdline (or /proc/<pid>/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks). <p>Publish Date: 2018-06-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-1120>CVE-2018-1120</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1120">https://nvd.nist.gov/vuln/detail/CVE-2018-1120</a></p> <p>Release Date: 2018-06-20</p> <p>Fix Resolution: 4.17</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve medium detected in linuxlinux autoclosed cve medium severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details a flaw was found affecting the linux kernel before version by mmap ing a fuse backed file onto a process s memory containing command line arguments or environment strings an attacker can cause utilities from psutils or procps such as ps w or any other program which makes a read call to the proc cmdline or proc environ files to block indefinitely denial of service or for some controlled time as a synchronization primitive for other attacks publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
2,031
2,603,975,235
IssuesEvent
2015-02-24 19:01:19
chrsmith/nishazi6
https://api.github.com/repos/chrsmith/nishazi6
opened
沈阳治疗肛门疱疹
auto-migrated Priority-Medium Type-Defect
``` 沈阳治疗肛门疱疹〓沈陽軍區政治部醫院性病〓TEL:024-3102330 8〓成立于1946年,68年專注于性傳播疾病的研究和治療。位于� ��陽市沈河區二緯路32號。是一所與新中國同建立共輝煌的歷� ��悠久、設備精良、技術權威、專家云集,是預防、保健、醫 療、科研康復為一體的綜合性醫院。是國家首批公立甲等部�� �醫院、全國首批醫療規范定點單位,是第四軍醫大學、東南� ��學等知名高等院校的教學醫院。曾被中國人民解放軍空軍后 勤部衛生部評為衛生工作先進單位,先后兩次榮立集體二等�� �。 ``` ----- Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 8:15
1.0
沈阳治疗肛门疱疹 - ``` 沈阳治疗肛门疱疹〓沈陽軍區政治部醫院性病〓TEL:024-3102330 8〓成立于1946年,68年專注于性傳播疾病的研究和治療。位于� ��陽市沈河區二緯路32號。是一所與新中國同建立共輝煌的歷� ��悠久、設備精良、技術權威、專家云集,是預防、保健、醫 療、科研康復為一體的綜合性醫院。是國家首批公立甲等部�� �醫院、全國首批醫療規范定點單位,是第四軍醫大學、東南� ��學等知名高等院校的教學醫院。曾被中國人民解放軍空軍后 勤部衛生部評為衛生工作先進單位,先后兩次榮立集體二等�� �。 ``` ----- Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 8:15
defect
沈阳治疗肛门疱疹 沈阳治疗肛门疱疹〓沈陽軍區政治部醫院性病〓tel: 〓 , 。位于� �� 。是一所與新中國同建立共輝煌的歷� ��悠久、設備精良、技術權威、專家云集,是預防、保健、醫 療、科研康復為一體的綜合性醫院。是國家首批公立甲等部�� �醫院、全國首批醫療規范定點單位,是第四軍醫大學、東南� ��學等知名高等院校的教學醫院。曾被中國人民解放軍空軍后 勤部衛生部評為衛生工作先進單位,先后兩次榮立集體二等�� �。 original issue reported on code google com by gmail com on jun at
1
25,139
4,217,250,968
IssuesEvent
2016-06-30 12:27:10
schuel/hmmm
https://api.github.com/repos/schuel/hmmm
closed
Regionselect Regionsearch
defect Layout
in branch regionSearch: ![regionselect](https://cloud.githubusercontent.com/assets/4281072/14660317/b1ee8402-06a4-11e6-9f7f-f37f397651ba.png) ---- prop. solutions: * change breakpoint or rather make input field smaller * set field back to selected region when not focused anymore
1.0
Regionselect Regionsearch - in branch regionSearch: ![regionselect](https://cloud.githubusercontent.com/assets/4281072/14660317/b1ee8402-06a4-11e6-9f7f-f37f397651ba.png) ---- prop. solutions: * change breakpoint or rather make input field smaller * set field back to selected region when not focused anymore
defect
regionselect regionsearch in branch regionsearch prop solutions change breakpoint or rather make input field smaller set field back to selected region when not focused anymore
1
38,449
8,821,541,978
IssuesEvent
2019-01-02 02:48:01
ophrescue/RescueRails
https://api.github.com/repos/ophrescue/RescueRails
closed
Set Adopted Date when status is 'adptd sn pend'
Defect in progress
Adoption date is current set when an adopter status enters into the 'adopted' or the 'completed' status for the first time. The adoption date should also be populated when an adopter transitions into the 'adptd sn pend' status for first time. If the adoption date has already been populated once it should not be changed again.
1.0
Set Adopted Date when status is 'adptd sn pend' - Adoption date is current set when an adopter status enters into the 'adopted' or the 'completed' status for the first time. The adoption date should also be populated when an adopter transitions into the 'adptd sn pend' status for first time. If the adoption date has already been populated once it should not be changed again.
defect
set adopted date when status is adptd sn pend adoption date is current set when an adopter status enters into the adopted or the completed status for the first time the adoption date should also be populated when an adopter transitions into the adptd sn pend status for first time if the adoption date has already been populated once it should not be changed again
1
1,018
2,594,445,973
IssuesEvent
2015-02-20 03:30:52
BALL-Project/ball
https://api.github.com/repos/BALL-Project/ball
closed
Menu entry 'aromatische Ringe' without function
C: BALL Core P: major R: worksforme T: defect
**Reported by mkonietzko on 8 Nov 42616192 04:18 UTC** Menu entry 'aromatische Ringe' without function.
1.0
Menu entry 'aromatische Ringe' without function - **Reported by mkonietzko on 8 Nov 42616192 04:18 UTC** Menu entry 'aromatische Ringe' without function.
defect
menu entry aromatische ringe without function reported by mkonietzko on nov utc menu entry aromatische ringe without function
1
6,071
2,610,220,410
IssuesEvent
2015-02-26 19:10:00
chrsmith/somefinders
https://api.github.com/repos/chrsmith/somefinders
opened
демидович решебник
auto-migrated Priority-Medium Type-Defect
``` '''Адольф Игнатьев''' Привет всем не подскажите где можно найти .демидович решебник. как то выкладывали уже '''Александр Кабанов''' Вот держи линк http://bit.ly/19geYY3 '''Гертруд Чернов''' Просит ввести номер мобилы!Не опасно ли это? '''Винцент Селиверстов''' Не это не влияет на баланс '''Гаспар Бобылёв''' Неа все ок у меня ничего не списало Информация о файле: демидович решебник Загружен: В этом месяце Скачан раз: 135 Рейтинг: 1443 Средняя скорость скачивания: 1375 Похожих файлов: 25 ``` ----- Original issue reported on code.google.com by `kondense...@gmail.com` on 17 Dec 2013 at 7:32
1.0
демидович решебник - ``` '''Адольф Игнатьев''' Привет всем не подскажите где можно найти .демидович решебник. как то выкладывали уже '''Александр Кабанов''' Вот держи линк http://bit.ly/19geYY3 '''Гертруд Чернов''' Просит ввести номер мобилы!Не опасно ли это? '''Винцент Селиверстов''' Не это не влияет на баланс '''Гаспар Бобылёв''' Неа все ок у меня ничего не списало Информация о файле: демидович решебник Загружен: В этом месяце Скачан раз: 135 Рейтинг: 1443 Средняя скорость скачивания: 1375 Похожих файлов: 25 ``` ----- Original issue reported on code.google.com by `kondense...@gmail.com` on 17 Dec 2013 at 7:32
defect
демидович решебник адольф игнатьев привет всем не подскажите где можно найти демидович решебник как то выкладывали уже александр кабанов вот держи линк гертруд чернов просит ввести номер мобилы не опасно ли это винцент селиверстов не это не влияет на баланс гаспар бобылёв неа все ок у меня ничего не списало информация о файле демидович решебник загружен в этом месяце скачан раз рейтинг средняя скорость скачивания похожих файлов original issue reported on code google com by kondense gmail com on dec at
1
60,805
17,023,526,775
IssuesEvent
2021-07-03 02:28:55
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
closed
Why does choosing the preset 'service' in Potlatch wipe out the name?
Component: potlatch (flash editor) Priority: minor Resolution: fixed Type: defect
**[Submitted to the original trac issue database at 2.57pm, Tuesday, 22nd December 2009]** Choose a road with a name. Choose the preset 'service'. Bam, no name.
1.0
Why does choosing the preset 'service' in Potlatch wipe out the name? - **[Submitted to the original trac issue database at 2.57pm, Tuesday, 22nd December 2009]** Choose a road with a name. Choose the preset 'service'. Bam, no name.
defect
why does choosing the preset service in potlatch wipe out the name choose a road with a name choose the preset service bam no name
1
115,217
17,292,127,724
IssuesEvent
2021-07-25 01:10:46
RoyHarrow/DO180-apps
https://api.github.com/repos/RoyHarrow/DO180-apps
opened
CVE-2016-10550 (High) detected in sequelize-3.14.2.tgz
security vulnerability
## CVE-2016-10550 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sequelize-3.14.2.tgz</b></p></summary> <p>Multi dialect ORM for Node.JS/io.js</p> <p>Library home page: <a href="https://registry.npmjs.org/sequelize/-/sequelize-3.14.2.tgz">https://registry.npmjs.org/sequelize/-/sequelize-3.14.2.tgz</a></p> <p>Path to dependency file: DO180-apps/todoapp/nodejs_api/package.json</p> <p>Path to vulnerable library: DO180-apps/todoapp/nodejs_api/node_modules/sequelize/package.json,DO180-apps/todoapp/nodejs/node_modules/sequelize/package.json</p> <p> Dependency Hierarchy: - :x: **sequelize-3.14.2.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS If user input goes into the `limit` or `order` parameters, a malicious user can put in their own SQL statements. This affects sequelize 3.16.0 and earlier. <p>Publish Date: 2018-05-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10550>CVE-2016-10550</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10550">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10550</a></p> <p>Release Date: 2018-12-15</p> <p>Fix Resolution: v3.17.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2016-10550 (High) detected in sequelize-3.14.2.tgz - ## CVE-2016-10550 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sequelize-3.14.2.tgz</b></p></summary> <p>Multi dialect ORM for Node.JS/io.js</p> <p>Library home page: <a href="https://registry.npmjs.org/sequelize/-/sequelize-3.14.2.tgz">https://registry.npmjs.org/sequelize/-/sequelize-3.14.2.tgz</a></p> <p>Path to dependency file: DO180-apps/todoapp/nodejs_api/package.json</p> <p>Path to vulnerable library: DO180-apps/todoapp/nodejs_api/node_modules/sequelize/package.json,DO180-apps/todoapp/nodejs/node_modules/sequelize/package.json</p> <p> Dependency Hierarchy: - :x: **sequelize-3.14.2.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS If user input goes into the `limit` or `order` parameters, a malicious user can put in their own SQL statements. This affects sequelize 3.16.0 and earlier. <p>Publish Date: 2018-05-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10550>CVE-2016-10550</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10550">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10550</a></p> <p>Release Date: 2018-12-15</p> <p>Fix Resolution: v3.17.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in sequelize tgz cve high severity vulnerability vulnerable library sequelize tgz multi dialect orm for node js io js library home page a href path to dependency file apps todoapp nodejs api package json path to vulnerable library apps todoapp nodejs api node modules sequelize package json apps todoapp nodejs node modules sequelize package json dependency hierarchy x sequelize tgz vulnerable library found in base branch master vulnerability details sequelize is an object relational mapping or a middleman to convert things from postgres mysql mariadb sqlite and microsoft sql server into usable data for nodejs if user input goes into the limit or order parameters a malicious user can put in their own sql statements this affects sequelize and earlier publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
17,184
2,982,308,968
IssuesEvent
2015-07-17 10:10:41
testing-cabal/mock
https://api.github.com/repos/testing-cabal/mock
closed
Cannot autospec mock builtins.print in python3.4
auto-migrated Priority-Medium Type-Defect
``` This code works prior to 3.4: ``` import builtins import mock with mock.patch.object(builtins, 'print', autospec=True): print('hai') ``` In 3.4: ``` $ python test.py Traceback (most recent call last): File "test.py", line 4, in <module> with mock.patch.object(builtins, 'print', autospec=True): File "/tmp/venv34/lib/python3.4/site-packages/mock.py", line 1349, in __enter__ _name=self.attribute, **kwargs) File "/tmp/venv34/lib/python3.4/site-packages/mock.py", line 2193, in create_autospec _check_signature(spec, mock, is_type, instance) File "/tmp/venv34/lib/python3.4/site-packages/mock.py", line 213, in _check_signature _copy_func_details(func, checksig) File "/tmp/venv34/lib/python3.4/site-packages/mock.py", line 221, in _copy_func_details funcopy.__module__ = func.__module__ AttributeError: 'method-wrapper' object has no attribute '__module__' ``` ``` Original issue reported on code.google.com by `asott...@yelp.com` on 7 Jul 2014 at 11:23
1.0
Cannot autospec mock builtins.print in python3.4 - ``` This code works prior to 3.4: ``` import builtins import mock with mock.patch.object(builtins, 'print', autospec=True): print('hai') ``` In 3.4: ``` $ python test.py Traceback (most recent call last): File "test.py", line 4, in <module> with mock.patch.object(builtins, 'print', autospec=True): File "/tmp/venv34/lib/python3.4/site-packages/mock.py", line 1349, in __enter__ _name=self.attribute, **kwargs) File "/tmp/venv34/lib/python3.4/site-packages/mock.py", line 2193, in create_autospec _check_signature(spec, mock, is_type, instance) File "/tmp/venv34/lib/python3.4/site-packages/mock.py", line 213, in _check_signature _copy_func_details(func, checksig) File "/tmp/venv34/lib/python3.4/site-packages/mock.py", line 221, in _copy_func_details funcopy.__module__ = func.__module__ AttributeError: 'method-wrapper' object has no attribute '__module__' ``` ``` Original issue reported on code.google.com by `asott...@yelp.com` on 7 Jul 2014 at 11:23
defect
cannot autospec mock builtins print in this code works prior to import builtins import mock with mock patch object builtins print autospec true print hai in python test py traceback most recent call last file test py line in with mock patch object builtins print autospec true file tmp lib site packages mock py line in enter name self attribute kwargs file tmp lib site packages mock py line in create autospec check signature spec mock is type instance file tmp lib site packages mock py line in check signature copy func details func checksig file tmp lib site packages mock py line in copy func details funcopy module func module attributeerror method wrapper object has no attribute module original issue reported on code google com by asott yelp com on jul at
1
164,925
20,510,505,241
IssuesEvent
2022-03-01 05:38:52
Nivaskumark/system_core
https://api.github.com/repos/Nivaskumark/system_core
opened
https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0: 3 vulnerabilities (highest severity is: 7.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0</b></p></summary> <p> <p>Library home page: <a href=https://source.codeaurora.org/quic/la/platform/system/core/>https://source.codeaurora.org/quic/la/platform/system/core/</a></p> <p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/system_core/commit/a0e615f3d39ff02946b8fc98daec2f1d45a65247">a0e615f3d39ff02946b8fc98daec2f1d45a65247</a></p> </p> </p></p> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/libutils/String8.cpp</b> </p> <p></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2020-0421](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0421) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0 | Direct | android-8.0.0_r51,android-8.1.0_r81,android-9.0.0_r61,android-10.0.0_r46,android-11.0.0_r4 | ❌ | | [CVE-2020-0409](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0409) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0 | Direct | android-11.0.0_r1 | ❌ | | [CVE-2021-0703](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0703) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.8 | multiple | Direct | android-11.0.0_r46 | ❌ | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-0421</summary> ### Vulnerable Library - <b>https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0</b></p> <p> <p>Library home page: <a href=https://source.codeaurora.org/quic/la/platform/system/core/>https://source.codeaurora.org/quic/la/platform/system/core/</a></p> <p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/system_core/commit/a0e615f3d39ff02946b8fc98daec2f1d45a65247">a0e615f3d39ff02946b8fc98daec2f1d45a65247</a></p> <p>Found in base branch: <b>master</b></p></p> </p></p> ### Vulnerable Source Files (1) <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/libutils/String8.cpp</b> </p> <p></p> </p> <p></p> ### Vulnerability Details <p> In appendFormatV of String8.cpp, there is a possible out of bounds write due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-161894517 <p>Publish Date: 2020-10-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0421>CVE-2020-0421</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://source.android.com/security/bulletin/2020-10-01">https://source.android.com/security/bulletin/2020-10-01</a></p> <p>Release Date: 2020-07-21</p> <p>Fix Resolution: android-8.0.0_r51,android-8.1.0_r81,android-9.0.0_r61,android-10.0.0_r46,android-11.0.0_r4</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-0409</summary> ### Vulnerable Library - <b>https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0</b></p> <p> <p>Library home page: <a href=https://source.codeaurora.org/quic/la/platform/system/core/>https://source.codeaurora.org/quic/la/platform/system/core/</a></p> <p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/system_core/commit/a0e615f3d39ff02946b8fc98daec2f1d45a65247">a0e615f3d39ff02946b8fc98daec2f1d45a65247</a></p> <p>Found in base branch: <b>master</b></p></p> </p></p> ### Vulnerable Source Files (1) <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/libutils/FileMap.cpp</b> </p> <p></p> </p> <p></p> ### Vulnerability Details <p> In create of FileMap.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-156997193 <p>Publish Date: 2020-11-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0409>CVE-2020-0409</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://android.googlesource.com/platform/system/core/+/refs/tags/android-11.0.0_r1">https://android.googlesource.com/platform/system/core/+/refs/tags/android-11.0.0_r1</a></p> <p>Release Date: 2020-07-21</p> <p>Fix Resolution: android-11.0.0_r1</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-0703</summary> ### Vulnerable Libraries - <b>https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0</b>, <b>https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0</b></p> <p> </p> <p></p> ### Vulnerability Details <p> In SecondStageMain of init.cpp, there is a possible use after free due to incorrect shared_ptr usage. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-184569329 <p>Publish Date: 2021-10-22 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0703>CVE-2021-0703</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Physical - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://source.android.com/security/bulletin/2021-10-01">https://source.android.com/security/bulletin/2021-10-01</a></p> <p>Release Date: 2021-10-22</p> <p>Fix Resolution: android-11.0.0_r46</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-0421","vulnerabilityDetails":"In appendFormatV of String8.cpp, there is a possible out of bounds write due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-161894517","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0421","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-0409","vulnerabilityDetails":"In create of FileMap.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-156997193","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0409","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-0703","vulnerabilityDetails":"In SecondStageMain of init.cpp, there is a possible use after free due to incorrect shared_ptr usage. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-184569329","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0703","cvss3Severity":"medium","cvss3Score":"6.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Physical","I":"High"},"extraData":{}}]</REMEDIATE> -->
True
https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0: 3 vulnerabilities (highest severity is: 7.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0</b></p></summary> <p> <p>Library home page: <a href=https://source.codeaurora.org/quic/la/platform/system/core/>https://source.codeaurora.org/quic/la/platform/system/core/</a></p> <p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/system_core/commit/a0e615f3d39ff02946b8fc98daec2f1d45a65247">a0e615f3d39ff02946b8fc98daec2f1d45a65247</a></p> </p> </p></p> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/libutils/String8.cpp</b> </p> <p></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2020-0421](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0421) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0 | Direct | android-8.0.0_r51,android-8.1.0_r81,android-9.0.0_r61,android-10.0.0_r46,android-11.0.0_r4 | ❌ | | [CVE-2020-0409](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0409) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0 | Direct | android-11.0.0_r1 | ❌ | | [CVE-2021-0703](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0703) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.8 | multiple | Direct | android-11.0.0_r46 | ❌ | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-0421</summary> ### Vulnerable Library - <b>https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0</b></p> <p> <p>Library home page: <a href=https://source.codeaurora.org/quic/la/platform/system/core/>https://source.codeaurora.org/quic/la/platform/system/core/</a></p> <p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/system_core/commit/a0e615f3d39ff02946b8fc98daec2f1d45a65247">a0e615f3d39ff02946b8fc98daec2f1d45a65247</a></p> <p>Found in base branch: <b>master</b></p></p> </p></p> ### Vulnerable Source Files (1) <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/libutils/String8.cpp</b> </p> <p></p> </p> <p></p> ### Vulnerability Details <p> In appendFormatV of String8.cpp, there is a possible out of bounds write due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-161894517 <p>Publish Date: 2020-10-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0421>CVE-2020-0421</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://source.android.com/security/bulletin/2020-10-01">https://source.android.com/security/bulletin/2020-10-01</a></p> <p>Release Date: 2020-07-21</p> <p>Fix Resolution: android-8.0.0_r51,android-8.1.0_r81,android-9.0.0_r61,android-10.0.0_r46,android-11.0.0_r4</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-0409</summary> ### Vulnerable Library - <b>https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0</b></p> <p> <p>Library home page: <a href=https://source.codeaurora.org/quic/la/platform/system/core/>https://source.codeaurora.org/quic/la/platform/system/core/</a></p> <p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/system_core/commit/a0e615f3d39ff02946b8fc98daec2f1d45a65247">a0e615f3d39ff02946b8fc98daec2f1d45a65247</a></p> <p>Found in base branch: <b>master</b></p></p> </p></p> ### Vulnerable Source Files (1) <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/libutils/FileMap.cpp</b> </p> <p></p> </p> <p></p> ### Vulnerability Details <p> In create of FileMap.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-156997193 <p>Publish Date: 2020-11-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0409>CVE-2020-0409</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://android.googlesource.com/platform/system/core/+/refs/tags/android-11.0.0_r1">https://android.googlesource.com/platform/system/core/+/refs/tags/android-11.0.0_r1</a></p> <p>Release Date: 2020-07-21</p> <p>Fix Resolution: android-11.0.0_r1</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-0703</summary> ### Vulnerable Libraries - <b>https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0</b>, <b>https://source.codeaurora.org/quic/la/platform/system/core/LA.UM.10.9.1.r1-00800-QCS610.0</b></p> <p> </p> <p></p> ### Vulnerability Details <p> In SecondStageMain of init.cpp, there is a possible use after free due to incorrect shared_ptr usage. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-184569329 <p>Publish Date: 2021-10-22 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0703>CVE-2021-0703</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Physical - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://source.android.com/security/bulletin/2021-10-01">https://source.android.com/security/bulletin/2021-10-01</a></p> <p>Release Date: 2021-10-22</p> <p>Fix Resolution: android-11.0.0_r46</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-0421","vulnerabilityDetails":"In appendFormatV of String8.cpp, there is a possible out of bounds write due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-161894517","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0421","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-0409","vulnerabilityDetails":"In create of FileMap.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-156997193","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0409","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-0703","vulnerabilityDetails":"In SecondStageMain of init.cpp, there is a possible use after free due to incorrect shared_ptr usage. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-184569329","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0703","cvss3Severity":"medium","cvss3Score":"6.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Physical","I":"High"},"extraData":{}}]</REMEDIATE> -->
non_defect
vulnerabilities highest severity is vulnerable library library home page a href found in head commit a href vulnerable source files libutils cpp vulnerabilities cve severity cvss dependency type fixed in remediation available high direct android android android android android ❌ high direct android ❌ medium multiple direct android ❌ details cve vulnerable library library home page a href found in head commit a href found in base branch master vulnerable source files libutils cpp vulnerability details in appendformatv of cpp there is a possible out of bounds write due to incorrect error handling this could lead to local escalation of privilege with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android android android android android step up your open source security game with whitesource cve vulnerable library library home page a href found in head commit a href found in base branch master vulnerable source files libutils filemap cpp vulnerability details in create of filemap cpp there is a possible out of bounds write due to an integer overflow this could lead to local escalation of privilege with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource cve vulnerable libraries vulnerability details in secondstagemain of init cpp there is a possible use after free due to incorrect shared ptr usage this could lead to local escalation of privilege if the attacker has physical access to the device with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector physical attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource basebranches vulnerabilityidentifier cve vulnerabilitydetails in appendformatv of cpp there is a possible out of bounds write due to incorrect error handling this could lead to local escalation of privilege with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails in create of filemap cpp there is a possible out of bounds write due to an integer overflow this could lead to local escalation of privilege with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails in secondstagemain of init cpp there is a possible use after free due to incorrect shared ptr usage this could lead to local escalation of privilege if the attacker has physical access to the device with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android id a vulnerabilityurl
0
5,968
2,610,218,703
IssuesEvent
2015-02-26 19:09:32
chrsmith/somefinders
https://api.github.com/repos/chrsmith/somefinders
opened
решебник по гидравлике куколевский.rar
auto-migrated Priority-Medium Type-Defect
``` '''Геронтий Егоров''' День добрый никак не могу найти .решебник по гидравлике куколевский.rar. где то видел уже '''Авангард Кулагин''' Качай тут http://bit.ly/1agdvgq '''Герасим Смирнов''' Просит ввести номер мобилы!Не опасно ли это? '''Гарибальди Терентьев''' Неа все ок у меня ничего не списало '''Валерий Александров''' Не это не влияет на баланс Информация о файле: решебник по гидравлике куколевский.rar Загружен: В этом месяце Скачан раз: 729 Рейтинг: 1091 Средняя скорость скачивания: 1457 Похожих файлов: 36 ``` ----- Original issue reported on code.google.com by `kondense...@gmail.com` on 17 Dec 2013 at 3:30
1.0
решебник по гидравлике куколевский.rar - ``` '''Геронтий Егоров''' День добрый никак не могу найти .решебник по гидравлике куколевский.rar. где то видел уже '''Авангард Кулагин''' Качай тут http://bit.ly/1agdvgq '''Герасим Смирнов''' Просит ввести номер мобилы!Не опасно ли это? '''Гарибальди Терентьев''' Неа все ок у меня ничего не списало '''Валерий Александров''' Не это не влияет на баланс Информация о файле: решебник по гидравлике куколевский.rar Загружен: В этом месяце Скачан раз: 729 Рейтинг: 1091 Средняя скорость скачивания: 1457 Похожих файлов: 36 ``` ----- Original issue reported on code.google.com by `kondense...@gmail.com` on 17 Dec 2013 at 3:30
defect
решебник по гидравлике куколевский rar геронтий егоров день добрый никак не могу найти решебник по гидравлике куколевский rar где то видел уже авангард кулагин качай тут герасим смирнов просит ввести номер мобилы не опасно ли это гарибальди терентьев неа все ок у меня ничего не списало валерий александров не это не влияет на баланс информация о файле решебник по гидравлике куколевский rar загружен в этом месяце скачан раз рейтинг средняя скорость скачивания похожих файлов original issue reported on code google com by kondense gmail com on dec at
1
5,480
3,930,247,249
IssuesEvent
2016-04-25 07:01:59
kolliSuman/issues
https://api.github.com/repos/kolliSuman/issues
closed
QA_MIPS Assembly Language Programming - 1_Prerequisites_p1
Category: Usability Developed By: VLEAD Release Number: Production Severity: S2 Status: Open
Defect Description : In the "MIPS Assembly Language Programming - 1 " experiment, the minimum requirement to run the experiment is not displayed in the page instead a page or Scrolling should appear providing information on minimum requirement to run this experiment, information like Bandwidth,Device Resolution,Hardware Configuration and Software Required. Actual Result : In the "MIPS Assembly Language Programming - 1 " experiment, the minimum requirement to run the experiment is not displayed in the page. Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0Bandwidth : 100Mbps Bandwidth : 100Mbps Hardware Configuration:8GBRAM , Processor:i5 Test Step Link: https://github.com/Virtual-Labs/computer-organization-iiith/blob/master/test-cases/integration_test-cases/MIPS%20Assembly%20Language%20Programming%20-%201/MIPS%20Assembly%20Language%20Programming%20-%201_23_Prerequisites_p1.org
True
QA_MIPS Assembly Language Programming - 1_Prerequisites_p1 - Defect Description : In the "MIPS Assembly Language Programming - 1 " experiment, the minimum requirement to run the experiment is not displayed in the page instead a page or Scrolling should appear providing information on minimum requirement to run this experiment, information like Bandwidth,Device Resolution,Hardware Configuration and Software Required. Actual Result : In the "MIPS Assembly Language Programming - 1 " experiment, the minimum requirement to run the experiment is not displayed in the page. Environment : OS: Windows 7, Ubuntu-16.04,Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0Bandwidth : 100Mbps Bandwidth : 100Mbps Hardware Configuration:8GBRAM , Processor:i5 Test Step Link: https://github.com/Virtual-Labs/computer-organization-iiith/blob/master/test-cases/integration_test-cases/MIPS%20Assembly%20Language%20Programming%20-%201/MIPS%20Assembly%20Language%20Programming%20-%201_23_Prerequisites_p1.org
non_defect
qa mips assembly language programming prerequisites defect description in the mips assembly language programming experiment the minimum requirement to run the experiment is not displayed in the page instead a page or scrolling should appear providing information on minimum requirement to run this experiment information like bandwidth device resolution hardware configuration and software required actual result in the mips assembly language programming experiment the minimum requirement to run the experiment is not displayed in the page environment os windows ubuntu centos browsers firefox chrome chromium bandwidth hardware configuration processor test step link
0
285,864
21,556,881,779
IssuesEvent
2022-04-30 15:19:52
napari/napari
https://api.github.com/repos/napari/napari
closed
Discussion: organization of documentation
documentation
## 📚 Documentation Hello folks, After some initial discussion with the documentation working group, and checking the current state of the documentation for napari (including the content in this repo, and on [napari.github.io](https://github.com/napari/napari.github.io)), I am proposing to re-think the organization and presentation of the docs as follows. (A few suggestions for new docs appear in italics) This reorganization tries to follow the ideas from the [Diátaxis Framework](https://diataxis.fr/), splitting document types into Tutorials (learning-oriented), How-tos (task-oriented), Reference (API documentation) and Explanations (understanding-oriented, usually aimed at experienced developers). Another consideration for splitting the docs this way is to give visitors to the web page a clearer path of where they need to go to complete a certain task, without being overwhelmed by complicated documentation before being familiar with the basics. Any feedback is highly appreciated, and this is only the beginning of the discussion, so feel free to add any suggestions or comments. Also, please let me know if I missed any relevant issues. ### Proposed organization of current documentation - Getting started/first steps - Installation - (**NEW**) *Intro for non-Python users* (title to be decided) - Getting started - Finding and installing a napari plugin - Napari viewer tutorial - Learn (tutorials) - Annotating segmentation with text and bounding boxes - Annotating videos with napari - Using Dask and napari to process & view large datasets - Single cell tracking with napari - Tracks layer tutorial (napari/napari.github.io#88) - Tasks (How-tos) - Using layers - _Layers at a glance: key differences and what each is used for_ - Image, labels, points, shapes, surface, vectors - Napari ImageJ How-to guide - Performance monitoring - _Napari in Docker_ - Hooking up your own events - _How to run [scripts in example folder from main repo](https://github.com/napari/napari/tree/master/examples)_ - _How to run napari on remote/browser based desktops_ (#3387) - Explanations - _Layers_ - Layer transform parameters (#2941) - Properties (#3025) - An Introduction to the Event Loop in napari - Multithreading in napari - Rendering - Asynchronous Rendering - Napari Performance - _Glossary_ (#3231) - (**NEW**) Plugins - _Customizing napari's interface_ (napari/napari.github.io#68) - Creating a napari plugin - napari hook specification reference - napari plugin architecture - Videos about napari (napari/napari.github.io#135) - Contributing guide - (Current content) - Translations - Roadmap - Release notes ### Relevant issues - #3231 - #3387 - #1049 - #764 - #3085 - napari/napari.github.io#43
1.0
Discussion: organization of documentation - ## 📚 Documentation Hello folks, After some initial discussion with the documentation working group, and checking the current state of the documentation for napari (including the content in this repo, and on [napari.github.io](https://github.com/napari/napari.github.io)), I am proposing to re-think the organization and presentation of the docs as follows. (A few suggestions for new docs appear in italics) This reorganization tries to follow the ideas from the [Diátaxis Framework](https://diataxis.fr/), splitting document types into Tutorials (learning-oriented), How-tos (task-oriented), Reference (API documentation) and Explanations (understanding-oriented, usually aimed at experienced developers). Another consideration for splitting the docs this way is to give visitors to the web page a clearer path of where they need to go to complete a certain task, without being overwhelmed by complicated documentation before being familiar with the basics. Any feedback is highly appreciated, and this is only the beginning of the discussion, so feel free to add any suggestions or comments. Also, please let me know if I missed any relevant issues. ### Proposed organization of current documentation - Getting started/first steps - Installation - (**NEW**) *Intro for non-Python users* (title to be decided) - Getting started - Finding and installing a napari plugin - Napari viewer tutorial - Learn (tutorials) - Annotating segmentation with text and bounding boxes - Annotating videos with napari - Using Dask and napari to process & view large datasets - Single cell tracking with napari - Tracks layer tutorial (napari/napari.github.io#88) - Tasks (How-tos) - Using layers - _Layers at a glance: key differences and what each is used for_ - Image, labels, points, shapes, surface, vectors - Napari ImageJ How-to guide - Performance monitoring - _Napari in Docker_ - Hooking up your own events - _How to run [scripts in example folder from main repo](https://github.com/napari/napari/tree/master/examples)_ - _How to run napari on remote/browser based desktops_ (#3387) - Explanations - _Layers_ - Layer transform parameters (#2941) - Properties (#3025) - An Introduction to the Event Loop in napari - Multithreading in napari - Rendering - Asynchronous Rendering - Napari Performance - _Glossary_ (#3231) - (**NEW**) Plugins - _Customizing napari's interface_ (napari/napari.github.io#68) - Creating a napari plugin - napari hook specification reference - napari plugin architecture - Videos about napari (napari/napari.github.io#135) - Contributing guide - (Current content) - Translations - Roadmap - Release notes ### Relevant issues - #3231 - #3387 - #1049 - #764 - #3085 - napari/napari.github.io#43
non_defect
discussion organization of documentation 📚 documentation hello folks after some initial discussion with the documentation working group and checking the current state of the documentation for napari including the content in this repo and on i am proposing to re think the organization and presentation of the docs as follows a few suggestions for new docs appear in italics this reorganization tries to follow the ideas from the splitting document types into tutorials learning oriented how tos task oriented reference api documentation and explanations understanding oriented usually aimed at experienced developers another consideration for splitting the docs this way is to give visitors to the web page a clearer path of where they need to go to complete a certain task without being overwhelmed by complicated documentation before being familiar with the basics any feedback is highly appreciated and this is only the beginning of the discussion so feel free to add any suggestions or comments also please let me know if i missed any relevant issues proposed organization of current documentation getting started first steps installation new intro for non python users title to be decided getting started finding and installing a napari plugin napari viewer tutorial learn tutorials annotating segmentation with text and bounding boxes annotating videos with napari using dask and napari to process view large datasets single cell tracking with napari tracks layer tutorial napari napari github io tasks how tos using layers layers at a glance key differences and what each is used for image labels points shapes surface vectors napari imagej how to guide performance monitoring napari in docker hooking up your own events how to run how to run napari on remote browser based desktops explanations layers layer transform parameters properties an introduction to the event loop in napari multithreading in napari rendering asynchronous rendering napari performance glossary new plugins customizing napari s interface napari napari github io creating a napari plugin napari hook specification reference napari plugin architecture videos about napari napari napari github io contributing guide current content translations roadmap release notes relevant issues napari napari github io
0
67,641
27,982,246,898
IssuesEvent
2023-03-26 09:42:29
nrnb/GoogleSummerOfCode
https://api.github.com/repos/nrnb/GoogleSummerOfCode
closed
Validation service for biological maps
Java JavaScript web services Cytoscape.js SBGN Difficulty: Hard Size: 350h
### Background Systems Biology Graphical Notation (SBGN) [1] is a standard language for representing biological pathways with SBGNML being the exchange and storage format for SBGN. The Systems Biology Markup Language (SBML) [2] is the de facto standard for encoding computational models in systems biology. Both types of XML based formats have a well defined representation for maps, which might be logically invalid even though they are syntactically valid. [1] N. Le Novère et al., "[The Systems Biology Graphical Notation](http://www.nature.com/nbt/journal/v27/n8/abs/nbt.1558.html)", Nature Biotechnology, 27, pp. 735-741, 2009. [2] M. Hucka et al. "[The systems biology markup language (SBML): a medium for representation and exchange of biochemical network models](https://doi.org/10.1093/bioinformatics/btg015)". Bioinformatics, 19, pp. 524–531, 2003. ### Goal The goal here is to take SBGNML or SBML maps (files) and construct a static image of these maps (performing an automatic layout where needed) with any invalid issues highlighted on the image. If desired, the service will try to fix these errors when possible. ### Difficulty Level: Easy/Medium/Hard **Hard** (This project requires knowledge of both standards and related libraries as well as a good level of both front and back end development experience) ### Size and Length of Project - **large: 350 hours** ### Skills Essential skills: Java, JavaScript, Cytoscape.js Nice to have skills: SBGN and SBML knowledge ### Public Repository [libSBGN](https://github.com/sbgn/libsbgn) [libSBML](https://github.com/sbmlteam/libsbml) ### Potential Mentors Ugur Dogrusoz
1.0
Validation service for biological maps - ### Background Systems Biology Graphical Notation (SBGN) [1] is a standard language for representing biological pathways with SBGNML being the exchange and storage format for SBGN. The Systems Biology Markup Language (SBML) [2] is the de facto standard for encoding computational models in systems biology. Both types of XML based formats have a well defined representation for maps, which might be logically invalid even though they are syntactically valid. [1] N. Le Novère et al., "[The Systems Biology Graphical Notation](http://www.nature.com/nbt/journal/v27/n8/abs/nbt.1558.html)", Nature Biotechnology, 27, pp. 735-741, 2009. [2] M. Hucka et al. "[The systems biology markup language (SBML): a medium for representation and exchange of biochemical network models](https://doi.org/10.1093/bioinformatics/btg015)". Bioinformatics, 19, pp. 524–531, 2003. ### Goal The goal here is to take SBGNML or SBML maps (files) and construct a static image of these maps (performing an automatic layout where needed) with any invalid issues highlighted on the image. If desired, the service will try to fix these errors when possible. ### Difficulty Level: Easy/Medium/Hard **Hard** (This project requires knowledge of both standards and related libraries as well as a good level of both front and back end development experience) ### Size and Length of Project - **large: 350 hours** ### Skills Essential skills: Java, JavaScript, Cytoscape.js Nice to have skills: SBGN and SBML knowledge ### Public Repository [libSBGN](https://github.com/sbgn/libsbgn) [libSBML](https://github.com/sbmlteam/libsbml) ### Potential Mentors Ugur Dogrusoz
non_defect
validation service for biological maps background systems biology graphical notation sbgn is a standard language for representing biological pathways with sbgnml being the exchange and storage format for sbgn the systems biology markup language sbml is the de facto standard for encoding computational models in systems biology both types of xml based formats have a well defined representation for maps which might be logically invalid even though they are syntactically valid n le novère et al nature biotechnology pp m hucka et al bioinformatics pp – goal the goal here is to take sbgnml or sbml maps files and construct a static image of these maps performing an automatic layout where needed with any invalid issues highlighted on the image if desired the service will try to fix these errors when possible difficulty level easy medium hard hard this project requires knowledge of both standards and related libraries as well as a good level of both front and back end development experience size and length of project large hours skills essential skills java javascript cytoscape js nice to have skills sbgn and sbml knowledge public repository potential mentors ugur dogrusoz
0
15,957
2,869,721,974
IssuesEvent
2015-06-06 13:29:21
souliss/souliss
https://api.github.com/repos/souliss/souliss
closed
AndroidAirConditioner, AndroidRGBLamp not proceed to detail
App Priority-Low Type-Defect
Original [issue 11](https://code.google.com/p/souliss/issues/detail?id=11) created by fazioa on 2013-06-11T08:50:55.000Z: <b>What steps will reproduce the problem?</b> The samples (ssExtra_ex01_AndroidRGBLamp and ssExtra_ex02_AndroidAirConditioner) does not proceed to the control screen when executed on typical screen landscape mode. The test was performed on the devices: Sansung Galaxy tab 7 &quot;GT P3100 Galaxy S3 and mini.
1.0
AndroidAirConditioner, AndroidRGBLamp not proceed to detail - Original [issue 11](https://code.google.com/p/souliss/issues/detail?id=11) created by fazioa on 2013-06-11T08:50:55.000Z: <b>What steps will reproduce the problem?</b> The samples (ssExtra_ex01_AndroidRGBLamp and ssExtra_ex02_AndroidAirConditioner) does not proceed to the control screen when executed on typical screen landscape mode. The test was performed on the devices: Sansung Galaxy tab 7 &quot;GT P3100 Galaxy S3 and mini.
defect
androidairconditioner androidrgblamp not proceed to detail original created by fazioa on what steps will reproduce the problem the samples ssextra androidrgblamp and ssextra androidairconditioner does not proceed to the control screen when executed on typical screen landscape mode the test was performed on the devices sansung galaxy tab quot gt galaxy and mini
1
48,926
13,184,779,047
IssuesEvent
2020-08-12 20:04:42
icecube-trac/tix3
https://api.github.com/repos/icecube-trac/tix3
opened
GCD and Vuvuzela (Trac #468)
Incomplete Migration Migrated from Trac combo simulation defect
<details> <summary>_Migrated from https://code.icecube.wisc.edu/ticket/468 , reported by olivas and owned by olivas_</summary> <p> ```json { "status": "closed", "changetime": "2015-03-11T14:44:38", "description": "Get the five parameters that vuvuzela needs into the GCD file. Whether we hack them in by hand or get I3Db to load them correctly. Either way we need them for IceSim4 simulations.", "reporter": "olivas", "cc": "", "resolution": "fixed", "_ts": "1426085078127847", "component": "combo simulation", "summary": "GCD and Vuvuzela", "priority": "blocker", "keywords": "", "time": "2013-07-19T17:44:31", "milestone": "", "owner": "olivas", "type": "defect" } ``` </p> </details>
1.0
GCD and Vuvuzela (Trac #468) - <details> <summary>_Migrated from https://code.icecube.wisc.edu/ticket/468 , reported by olivas and owned by olivas_</summary> <p> ```json { "status": "closed", "changetime": "2015-03-11T14:44:38", "description": "Get the five parameters that vuvuzela needs into the GCD file. Whether we hack them in by hand or get I3Db to load them correctly. Either way we need them for IceSim4 simulations.", "reporter": "olivas", "cc": "", "resolution": "fixed", "_ts": "1426085078127847", "component": "combo simulation", "summary": "GCD and Vuvuzela", "priority": "blocker", "keywords": "", "time": "2013-07-19T17:44:31", "milestone": "", "owner": "olivas", "type": "defect" } ``` </p> </details>
defect
gcd and vuvuzela trac migrated from reported by olivas and owned by olivas json status closed changetime description get the five parameters that vuvuzela needs into the gcd file whether we hack them in by hand or get to load them correctly either way we need them for simulations reporter olivas cc resolution fixed ts component combo simulation summary gcd and vuvuzela priority blocker keywords time milestone owner olivas type defect
1
77,698
27,113,087,009
IssuesEvent
2023-02-15 16:35:28
BOINC/boinc
https://api.github.com/repos/BOINC/boinc
closed
Adding project with weak auth causes CPU lockup, fails to add
C: Manager P: Minor R: invalid T: Defect
**Describe the bug** When adding a project with a weak authenticator (haven't tested with normal auth), BOINC manager proceeds to use 100% of a single CPU core, stall, and then never attach to the project. Running boinccmd I am able to successfully attach to project and see it in BOINC manager upon launch. **Steps To Reproduce** 1. Open boinc manager 2. Attach to project **Expected behavior** Project should be attached to **System Information** BOINC in APT: 7.20.5+dfsg+202212021500~ubuntu20.04.1 BOINC Manager: version 7.20.5 (x64) BOINC version from boinc --version 7.20.5 x86_64-pc-linux-gnu OS: Ubuntu 20.04.5 LTS Codename: focal
1.0
Adding project with weak auth causes CPU lockup, fails to add - **Describe the bug** When adding a project with a weak authenticator (haven't tested with normal auth), BOINC manager proceeds to use 100% of a single CPU core, stall, and then never attach to the project. Running boinccmd I am able to successfully attach to project and see it in BOINC manager upon launch. **Steps To Reproduce** 1. Open boinc manager 2. Attach to project **Expected behavior** Project should be attached to **System Information** BOINC in APT: 7.20.5+dfsg+202212021500~ubuntu20.04.1 BOINC Manager: version 7.20.5 (x64) BOINC version from boinc --version 7.20.5 x86_64-pc-linux-gnu OS: Ubuntu 20.04.5 LTS Codename: focal
defect
adding project with weak auth causes cpu lockup fails to add describe the bug when adding a project with a weak authenticator haven t tested with normal auth boinc manager proceeds to use of a single cpu core stall and then never attach to the project running boinccmd i am able to successfully attach to project and see it in boinc manager upon launch steps to reproduce open boinc manager attach to project expected behavior project should be attached to system information boinc in apt dfsg boinc manager version boinc version from boinc version pc linux gnu os ubuntu lts codename focal
1
54,040
7,869,978,227
IssuesEvent
2018-06-24 20:13:10
KenSuenobu/scattersphere
https://api.github.com/repos/KenSuenobu/scattersphere
closed
Update SparkCache to include base jar
cleanup deployment distribution documentation good first issue help wanted improvement
Modify the `SparkCache` class so that it adds the correct jar file(s) to `setJars` as a precaution. Once this is a Maven Central repository, add that repository to the list instead.
1.0
Update SparkCache to include base jar - Modify the `SparkCache` class so that it adds the correct jar file(s) to `setJars` as a precaution. Once this is a Maven Central repository, add that repository to the list instead.
non_defect
update sparkcache to include base jar modify the sparkcache class so that it adds the correct jar file s to setjars as a precaution once this is a maven central repository add that repository to the list instead
0
48,925
13,184,778,925
IssuesEvent
2020-08-12 20:04:41
icecube-trac/tix3
https://api.github.com/repos/icecube-trac/tix3
opened
Pythia port sets -march=native, which breaks centralized installs (Trac #467)
Incomplete Migration Migrated from Trac defect other
<details> <summary>_Migrated from https://code.icecube.wisc.edu/ticket/467 , reported by nwhitehorn and owned by nega_</summary> <p> ```json { "status": "closed", "changetime": "2013-07-09T17:38:16", "description": "The science/pythia port cannot be used on centralized installations because the Portfile unconditionally sets -march=native, resulting in illegal instruction faults when the resulting binaries are run elsewhere.", "reporter": "nwhitehorn", "cc": "", "resolution": "fixed", "_ts": "1373391496000000", "component": "other", "summary": "Pythia port sets -march=native, which breaks centralized installs", "priority": "normal", "keywords": "", "time": "2013-07-07T14:42:44", "milestone": "", "owner": "nega", "type": "defect" } ``` </p> </details>
1.0
Pythia port sets -march=native, which breaks centralized installs (Trac #467) - <details> <summary>_Migrated from https://code.icecube.wisc.edu/ticket/467 , reported by nwhitehorn and owned by nega_</summary> <p> ```json { "status": "closed", "changetime": "2013-07-09T17:38:16", "description": "The science/pythia port cannot be used on centralized installations because the Portfile unconditionally sets -march=native, resulting in illegal instruction faults when the resulting binaries are run elsewhere.", "reporter": "nwhitehorn", "cc": "", "resolution": "fixed", "_ts": "1373391496000000", "component": "other", "summary": "Pythia port sets -march=native, which breaks centralized installs", "priority": "normal", "keywords": "", "time": "2013-07-07T14:42:44", "milestone": "", "owner": "nega", "type": "defect" } ``` </p> </details>
defect
pythia port sets march native which breaks centralized installs trac migrated from reported by nwhitehorn and owned by nega json status closed changetime description the science pythia port cannot be used on centralized installations because the portfile unconditionally sets march native resulting in illegal instruction faults when the resulting binaries are run elsewhere reporter nwhitehorn cc resolution fixed ts component other summary pythia port sets march native which breaks centralized installs priority normal keywords time milestone owner nega type defect
1
251,198
18,941,405,455
IssuesEvent
2021-11-18 03:36:59
boomerang-io/roadmap
https://api.github.com/repos/boomerang-io/roadmap
closed
Strip out any reference to IBM Cloud Private
documentation project: flow
Change the bmrg-flow chart to: 1. In README file Strip out any reference to IBM Cloud Private and just talk about standard PSP or SCC and what the default is that we use now in the environments. > The worker priviledged RBAC is dependent on the IBM Cloud Private resources; - Pod Security Policy `ibm-privileged-psp`, and - Cluster Role `ibm-privileged-clusterrole` - Cluster Role `ibm-privileged-clusterrole` 2. remove the `poc`- part from the values (example) files.
1.0
Strip out any reference to IBM Cloud Private - Change the bmrg-flow chart to: 1. In README file Strip out any reference to IBM Cloud Private and just talk about standard PSP or SCC and what the default is that we use now in the environments. > The worker priviledged RBAC is dependent on the IBM Cloud Private resources; - Pod Security Policy `ibm-privileged-psp`, and - Cluster Role `ibm-privileged-clusterrole` - Cluster Role `ibm-privileged-clusterrole` 2. remove the `poc`- part from the values (example) files.
non_defect
strip out any reference to ibm cloud private change the bmrg flow chart to in readme file strip out any reference to ibm cloud private and just talk about standard psp or scc and what the default is that we use now in the environments the worker priviledged rbac is dependent on the ibm cloud private resources pod security policy ibm privileged psp and cluster role ibm privileged clusterrole cluster role ibm privileged clusterrole remove the poc part from the values example files
0
40,340
8,775,351,416
IssuesEvent
2018-12-18 22:47:15
open-contracting/standard
https://api.github.com/repos/open-contracting/standard
closed
relatedProcess: Add 'planned' code
Codelist - Open
The [relatedProcess](http://standard.open-contracting.org/latest/en/schema/codelists/#related-process) codelist has an entry for 'planning' to point *upwards* from a tender to the contracting process in which it was planned. But it does not have an entry for pointing from a planning process to the tenders that resulted from it. This would be important for cases where a publisher wants to show the procurement resulting from a particular planning process.
1.0
relatedProcess: Add 'planned' code - The [relatedProcess](http://standard.open-contracting.org/latest/en/schema/codelists/#related-process) codelist has an entry for 'planning' to point *upwards* from a tender to the contracting process in which it was planned. But it does not have an entry for pointing from a planning process to the tenders that resulted from it. This would be important for cases where a publisher wants to show the procurement resulting from a particular planning process.
non_defect
relatedprocess add planned code the codelist has an entry for planning to point upwards from a tender to the contracting process in which it was planned but it does not have an entry for pointing from a planning process to the tenders that resulted from it this would be important for cases where a publisher wants to show the procurement resulting from a particular planning process
0
62,077
17,023,845,625
IssuesEvent
2021-07-03 04:08:44
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
closed
Markers not working on 180th meridian
Component: website Priority: trivial Resolution: fixed Type: defect
**[Submitted to the original trac issue database at 8.58am, Tuesday, 18th December 2012]** I'm guessing this should go to the Leaflet maintainer (I'm cc:ing Vladimir Agafonkin). 1. using Chrome version;23 2. go to: http://osm.org/?mlat=53.3&mlon=-179.999&zoom=1 3. press down left mouse 4. drag right (then left if you want to amuse yourself) Result: marker "jumps" 360 degrees left
1.0
Markers not working on 180th meridian - **[Submitted to the original trac issue database at 8.58am, Tuesday, 18th December 2012]** I'm guessing this should go to the Leaflet maintainer (I'm cc:ing Vladimir Agafonkin). 1. using Chrome version;23 2. go to: http://osm.org/?mlat=53.3&mlon=-179.999&zoom=1 3. press down left mouse 4. drag right (then left if you want to amuse yourself) Result: marker "jumps" 360 degrees left
defect
markers not working on meridian i m guessing this should go to the leaflet maintainer i m cc ing vladimir agafonkin using chrome version go to press down left mouse drag right then left if you want to amuse yourself result marker jumps degrees left
1
15,421
2,852,680,702
IssuesEvent
2015-06-01 14:49:32
tokland/pysheng
https://api.github.com/repos/tokland/pysheng
closed
error from GUI
auto-migrated Priority-Medium Type-Defect
``` What steps will reproduce the problem? 1. follow installation instructions 2. run pysheng-gui What is the expected output? What do you see instead? GUI does not open, following error is printed: Traceback (most recent call last): File "pysheng-gui", line 14, in <module> sys.exit(main(sys.argv[1:])) File "pysheng-gui", line 9, in main widgets, state = gui.run(book_url) File "/usr/local/lib/python2.7/dist-packages/pysheng/gui.py", line 362, in run raise ValueError, "cannot find glade file: main.glade" ValueError: cannot find glade file: main.glade What version of the product are you using? On what operating system? pysheng 0.1 on Linux Mint 15 NOTE: Pysheng is working fine for me without the GUI ``` Original issue reported on code.google.com by `brian....@gmail.com` on 24 Sep 2013 at 3:26
1.0
error from GUI - ``` What steps will reproduce the problem? 1. follow installation instructions 2. run pysheng-gui What is the expected output? What do you see instead? GUI does not open, following error is printed: Traceback (most recent call last): File "pysheng-gui", line 14, in <module> sys.exit(main(sys.argv[1:])) File "pysheng-gui", line 9, in main widgets, state = gui.run(book_url) File "/usr/local/lib/python2.7/dist-packages/pysheng/gui.py", line 362, in run raise ValueError, "cannot find glade file: main.glade" ValueError: cannot find glade file: main.glade What version of the product are you using? On what operating system? pysheng 0.1 on Linux Mint 15 NOTE: Pysheng is working fine for me without the GUI ``` Original issue reported on code.google.com by `brian....@gmail.com` on 24 Sep 2013 at 3:26
defect
error from gui what steps will reproduce the problem follow installation instructions run pysheng gui what is the expected output what do you see instead gui does not open following error is printed traceback most recent call last file pysheng gui line in sys exit main sys argv file pysheng gui line in main widgets state gui run book url file usr local lib dist packages pysheng gui py line in run raise valueerror cannot find glade file main glade valueerror cannot find glade file main glade what version of the product are you using on what operating system pysheng on linux mint note pysheng is working fine for me without the gui original issue reported on code google com by brian gmail com on sep at
1
75,658
25,978,820,192
IssuesEvent
2022-12-19 16:57:36
department-of-veterans-affairs/va.gov-cms
https://api.github.com/repos/department-of-veterans-affairs/va.gov-cms
opened
Homepage modal: Using a screen reader when closing modal announces header before skip link
Defect Needs refining
## Describe the defect Using a screen reader, when the homepage modal is closed, regardless of how it's closed (X, button, ESC key), before the skip link is announced, the first header in the footer (Veterans programs and services) is announced. ## To Reproduce Steps to reproduce the behavior: 1. Turn on your screen reader (i.e. NVDA) 2. Go to (staging homepage) 3. Close the modal by using the ESC key, the X in the corner or the "Not today..." button 4. Note that the screen reader announces "Veterans programs and services" then announces "Skip to content" 5. However, visually the Skip link is shown as focused immediately ## AC / Expected behavior - [ ] When the modal is closed (using the X, the button or the ESC), the SR should announce the same element as what is visually focused - in this case the Skip to content link ## Additional Context @jtmst mentioned he thought he knew what was going on here and what would need to be looked at to resolve it: > there was an issue with set-focus not working properly when closing the modal, a solution ive used for similar bugs is adding a 50ms delay before changing focus. I didnt anticipate it affecting screen readers this way. ### CMS Team Please check the team(s) that will do this work. - [ ] `Program` - [ ] `Platform CMS Team` - [ ] `Sitewide Crew` - [ ] `⭐️ Sitewide CMS` - [x] `⭐️ Public Websites` - [ ] `⭐️ Facilities` - [ ] `⭐️ User support`
1.0
Homepage modal: Using a screen reader when closing modal announces header before skip link - ## Describe the defect Using a screen reader, when the homepage modal is closed, regardless of how it's closed (X, button, ESC key), before the skip link is announced, the first header in the footer (Veterans programs and services) is announced. ## To Reproduce Steps to reproduce the behavior: 1. Turn on your screen reader (i.e. NVDA) 2. Go to (staging homepage) 3. Close the modal by using the ESC key, the X in the corner or the "Not today..." button 4. Note that the screen reader announces "Veterans programs and services" then announces "Skip to content" 5. However, visually the Skip link is shown as focused immediately ## AC / Expected behavior - [ ] When the modal is closed (using the X, the button or the ESC), the SR should announce the same element as what is visually focused - in this case the Skip to content link ## Additional Context @jtmst mentioned he thought he knew what was going on here and what would need to be looked at to resolve it: > there was an issue with set-focus not working properly when closing the modal, a solution ive used for similar bugs is adding a 50ms delay before changing focus. I didnt anticipate it affecting screen readers this way. ### CMS Team Please check the team(s) that will do this work. - [ ] `Program` - [ ] `Platform CMS Team` - [ ] `Sitewide Crew` - [ ] `⭐️ Sitewide CMS` - [x] `⭐️ Public Websites` - [ ] `⭐️ Facilities` - [ ] `⭐️ User support`
defect
homepage modal using a screen reader when closing modal announces header before skip link describe the defect using a screen reader when the homepage modal is closed regardless of how it s closed x button esc key before the skip link is announced the first header in the footer veterans programs and services is announced to reproduce steps to reproduce the behavior turn on your screen reader i e nvda go to staging homepage close the modal by using the esc key the x in the corner or the not today button note that the screen reader announces veterans programs and services then announces skip to content however visually the skip link is shown as focused immediately ac expected behavior when the modal is closed using the x the button or the esc the sr should announce the same element as what is visually focused in this case the skip to content link additional context jtmst mentioned he thought he knew what was going on here and what would need to be looked at to resolve it there was an issue with set focus not working properly when closing the modal a solution ive used for similar bugs is adding a delay before changing focus i didnt anticipate it affecting screen readers this way cms team please check the team s that will do this work program platform cms team sitewide crew ⭐️ sitewide cms ⭐️ public websites ⭐️ facilities ⭐️ user support
1
76,071
21,155,787,576
IssuesEvent
2022-04-07 02:58:21
BoomingTech/Pilot
https://api.github.com/repos/BoomingTech/Pilot
closed
Intel Mac build error caused by meta_parser
build macOS
I got build errors for both Xcode and CMake builds. The problem is triggered from **_meta_parser_**. However, it's still malfunction after adding permission with `chmod +x meta_parser`. The **_meta_parser_** crashed because `dyld: Library not loaded: @rpath/libclang.dylib` macOS Bigsur 11.6.5 Xcode 13.2.1 CMake 3.23
1.0
Intel Mac build error caused by meta_parser - I got build errors for both Xcode and CMake builds. The problem is triggered from **_meta_parser_**. However, it's still malfunction after adding permission with `chmod +x meta_parser`. The **_meta_parser_** crashed because `dyld: Library not loaded: @rpath/libclang.dylib` macOS Bigsur 11.6.5 Xcode 13.2.1 CMake 3.23
non_defect
intel mac build error caused by meta parser i got build errors for both xcode and cmake builds the problem is triggered from meta parser however it s still malfunction after adding permission with chmod x meta parser the meta parser crashed because dyld library not loaded rpath libclang dylib macos bigsur xcode cmake
0
35,286
7,680,641,053
IssuesEvent
2018-05-16 02:51:50
stevespringett/dependency-track
https://api.github.com/repos/stevespringett/dependency-track
closed
Error when delete not empty project in 3.1
defect
when I delete a not empty project, i have this error: ``` 2018-05-15 10:01:54,261 [] WARN [org.eclipse.jetty.server.HttpChannel] /api/v1/project/50b9b927-c92e-469f-bd7d-4dfe968fd810 javax.servlet.ServletException: javax.jdo.JDODataStoreException: Exception thrown flushing changes to datastore NestedThrowables: java.sql.BatchUpdateException: Cannot delete or update a parent row: a foreign key constraint fails (`dtrack`.`DEPENDENCYMETRICS`, CONSTRAINT `DEPENDENCYMETRICS_FK2` FOREIGN KEY (`PROJECT_ID`) REFERENCES `PROJECT` (`ID`)) at org.glassfish.jersey.servlet.WebComponent.serviceImpl(WebComponent.java:432) at org.glassfish.jersey.servlet.WebComponent.service(WebComponent.java:370) at org.glassfish.jersey.servlet.ServletContainer.service(ServletContainer.java:389) at org.glassfish.jersey.servlet.ServletContainer.service(ServletContainer.java:342) at org.glassfish.jersey.servlet.ServletContainer.service(ServletContainer.java:229) at org.eclipse.jetty.servlet.ServletHolder.handle(ServletHolder.java:860) at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1650) at alpine.filters.ContentSecurityPolicyFilter.doFilter(ContentSecurityPolicyFilter.java:223) at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1637) ```
1.0
Error when delete not empty project in 3.1 - when I delete a not empty project, i have this error: ``` 2018-05-15 10:01:54,261 [] WARN [org.eclipse.jetty.server.HttpChannel] /api/v1/project/50b9b927-c92e-469f-bd7d-4dfe968fd810 javax.servlet.ServletException: javax.jdo.JDODataStoreException: Exception thrown flushing changes to datastore NestedThrowables: java.sql.BatchUpdateException: Cannot delete or update a parent row: a foreign key constraint fails (`dtrack`.`DEPENDENCYMETRICS`, CONSTRAINT `DEPENDENCYMETRICS_FK2` FOREIGN KEY (`PROJECT_ID`) REFERENCES `PROJECT` (`ID`)) at org.glassfish.jersey.servlet.WebComponent.serviceImpl(WebComponent.java:432) at org.glassfish.jersey.servlet.WebComponent.service(WebComponent.java:370) at org.glassfish.jersey.servlet.ServletContainer.service(ServletContainer.java:389) at org.glassfish.jersey.servlet.ServletContainer.service(ServletContainer.java:342) at org.glassfish.jersey.servlet.ServletContainer.service(ServletContainer.java:229) at org.eclipse.jetty.servlet.ServletHolder.handle(ServletHolder.java:860) at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1650) at alpine.filters.ContentSecurityPolicyFilter.doFilter(ContentSecurityPolicyFilter.java:223) at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1637) ```
defect
error when delete not empty project in when i delete a not empty project i have this error warn api project javax servlet servletexception javax jdo jdodatastoreexception exception thrown flushing changes to datastore nestedthrowables java sql batchupdateexception cannot delete or update a parent row a foreign key constraint fails dtrack dependencymetrics constraint dependencymetrics foreign key project id references project id at org glassfish jersey servlet webcomponent serviceimpl webcomponent java at org glassfish jersey servlet webcomponent service webcomponent java at org glassfish jersey servlet servletcontainer service servletcontainer java at org glassfish jersey servlet servletcontainer service servletcontainer java at org glassfish jersey servlet servletcontainer service servletcontainer java at org eclipse jetty servlet servletholder handle servletholder java at org eclipse jetty servlet servlethandler cachedchain dofilter servlethandler java at alpine filters contentsecuritypolicyfilter dofilter contentsecuritypolicyfilter java at org eclipse jetty servlet servlethandler cachedchain dofilter servlethandler java
1
366,931
10,832,258,689
IssuesEvent
2019-11-11 10:12:40
stefanopini/simple-HRNet
https://api.github.com/repos/stefanopini/simple-HRNet
closed
Loss Implementation - II
priority question
Just a followup from the last issue("Loss Implementation") which was closed. I just checked the saved weights of the HR Net models but it turns out that they have the batchnorm parameters as well (running_mean, etc). Also, the adam parameters are available in the yaml files on the actual repo (the lr's 1e-5, etc). But, continuing retraining from the saved model still seems to drop the accuracy to 0. Any idea why that may be happening?
1.0
Loss Implementation - II - Just a followup from the last issue("Loss Implementation") which was closed. I just checked the saved weights of the HR Net models but it turns out that they have the batchnorm parameters as well (running_mean, etc). Also, the adam parameters are available in the yaml files on the actual repo (the lr's 1e-5, etc). But, continuing retraining from the saved model still seems to drop the accuracy to 0. Any idea why that may be happening?
non_defect
loss implementation ii just a followup from the last issue loss implementation which was closed i just checked the saved weights of the hr net models but it turns out that they have the batchnorm parameters as well running mean etc also the adam parameters are available in the yaml files on the actual repo the lr s etc but continuing retraining from the saved model still seems to drop the accuracy to any idea why that may be happening
0
13,872
2,789,430,267
IssuesEvent
2015-05-08 19:21:10
orwant/google-visualization-issues
https://api.github.com/repos/orwant/google-visualization-issues
closed
In IE* clicking on geomap region gives javascript error
Priority-Medium Type-Defect
Original [issue 38](https://code.google.com/p/google-visualization-api-issues/issues/detail?id=38) created by orwant on 2009-08-25T18:42:26.000Z: <b>What steps will reproduce the problem? Please provide a link to a</b> <b>demonstration page if at all possible, or attach code.</b> 1. In IE8 go to http://code.google.com/apis/visualization/documentation/gallery/geomap.html #Example 2. Click on any region on the map a javascript error is displayed in status bar. The error is as follows ========================= START ============================== Webpage error details User Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.5.30729; .NET CLR 3.0.30618) Timestamp: Tue, 25 Aug 2009 18:41:47 UTC Message: Expected ';' Line: 1 Char: 43 Code: 0 URI: http://code.google.com/apis/visualization/documentation/gallery/geomap.html Message: Expected ';' Line: 1 Char: 43 Code: 0 URI: http://code.google.com/apis/visualization/documentation/gallery/geomap.html ========================= END ============================== <b>What component is this issue related to (PieChart, LineChart, DataTable,</b> <b>Query, etc)?</b> Geomap <b>Are you using the test environment (version 1.1)?</b> <b>(If you are not sure, answer NO)</b> NO <b>What operating system and browser are you using?</b> Vista <b>*********************************************************</b> <b>For developers viewing this issue: please click the 'star' icon to be</b> <b>notified of future changes, and to let us know how many of you are</b> <b>interested in seeing it resolved.</b> <b>*********************************************************</b>
1.0
In IE* clicking on geomap region gives javascript error - Original [issue 38](https://code.google.com/p/google-visualization-api-issues/issues/detail?id=38) created by orwant on 2009-08-25T18:42:26.000Z: <b>What steps will reproduce the problem? Please provide a link to a</b> <b>demonstration page if at all possible, or attach code.</b> 1. In IE8 go to http://code.google.com/apis/visualization/documentation/gallery/geomap.html #Example 2. Click on any region on the map a javascript error is displayed in status bar. The error is as follows ========================= START ============================== Webpage error details User Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.5.30729; .NET CLR 3.0.30618) Timestamp: Tue, 25 Aug 2009 18:41:47 UTC Message: Expected ';' Line: 1 Char: 43 Code: 0 URI: http://code.google.com/apis/visualization/documentation/gallery/geomap.html Message: Expected ';' Line: 1 Char: 43 Code: 0 URI: http://code.google.com/apis/visualization/documentation/gallery/geomap.html ========================= END ============================== <b>What component is this issue related to (PieChart, LineChart, DataTable,</b> <b>Query, etc)?</b> Geomap <b>Are you using the test environment (version 1.1)?</b> <b>(If you are not sure, answer NO)</b> NO <b>What operating system and browser are you using?</b> Vista <b>*********************************************************</b> <b>For developers viewing this issue: please click the 'star' icon to be</b> <b>notified of future changes, and to let us know how many of you are</b> <b>interested in seeing it resolved.</b> <b>*********************************************************</b>
defect
in ie clicking on geomap region gives javascript error original created by orwant on what steps will reproduce the problem please provide a link to a demonstration page if at all possible or attach code in go to example click on any region on the map a javascript error is displayed in status bar the error is as follows start webpage error details user agent mozilla compatible msie windows nt trident net clr media center pc net clr net clr timestamp tue aug utc message expected line char code uri message expected line char code uri end what component is this issue related to piechart linechart datatable query etc geomap are you using the test environment version if you are not sure answer no no what operating system and browser are you using vista for developers viewing this issue please click the star icon to be notified of future changes and to let us know how many of you are interested in seeing it resolved
1
24,616
4,047,613,232
IssuesEvent
2016-05-23 06:45:13
hazelcast/hazelcast
https://api.github.com/repos/hazelcast/hazelcast
closed
Deserialization of dynamic proxy instances ignores configured ClassLoader
Team: Core Type: Defect
This is a bug in the method `public static ObjectInputStream newObjectInputStream(final ClassLoader classLoader, final InputStream in) throws IOException` of the class [com.hazelcast.nio.IOUtil](https://github.com/hazelcast/hazelcast/blob/master/hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java). The current implementation is: ``` public static ObjectInputStream newObjectInputStream(final ClassLoader classLoader, final InputStream in) throws IOException { return new ObjectInputStream(in) { protected Class<?> resolveClass(final ObjectStreamClass desc) throws ClassNotFoundException { return ClassLoaderUtil.loadClass(classLoader, desc.getName()); } }; } ``` The method `protected Class<?> resolveProxyClass(String[] interfaces) throws IOException, ClassNotFoundException` of the ObjectInputStream must be overridden as well. This bug affects all versions of hazelcast.
1.0
Deserialization of dynamic proxy instances ignores configured ClassLoader - This is a bug in the method `public static ObjectInputStream newObjectInputStream(final ClassLoader classLoader, final InputStream in) throws IOException` of the class [com.hazelcast.nio.IOUtil](https://github.com/hazelcast/hazelcast/blob/master/hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java). The current implementation is: ``` public static ObjectInputStream newObjectInputStream(final ClassLoader classLoader, final InputStream in) throws IOException { return new ObjectInputStream(in) { protected Class<?> resolveClass(final ObjectStreamClass desc) throws ClassNotFoundException { return ClassLoaderUtil.loadClass(classLoader, desc.getName()); } }; } ``` The method `protected Class<?> resolveProxyClass(String[] interfaces) throws IOException, ClassNotFoundException` of the ObjectInputStream must be overridden as well. This bug affects all versions of hazelcast.
defect
deserialization of dynamic proxy instances ignores configured classloader this is a bug in the method public static objectinputstream newobjectinputstream final classloader classloader final inputstream in throws ioexception of the class the current implementation is public static objectinputstream newobjectinputstream final classloader classloader final inputstream in throws ioexception return new objectinputstream in protected class resolveclass final objectstreamclass desc throws classnotfoundexception return classloaderutil loadclass classloader desc getname the method protected class resolveproxyclass string interfaces throws ioexception classnotfoundexception of the objectinputstream must be overridden as well this bug affects all versions of hazelcast
1
789,038
27,776,510,005
IssuesEvent
2023-03-16 17:35:36
TheKye/Eco-WorldEdit
https://api.github.com/repos/TheKye/Eco-WorldEdit
opened
Room recalculation after paste creation
Type: Bug Priority: Medium
Need to dig into that problem as now rooms not recalculate after paste building in the world
1.0
Room recalculation after paste creation - Need to dig into that problem as now rooms not recalculate after paste building in the world
non_defect
room recalculation after paste creation need to dig into that problem as now rooms not recalculate after paste building in the world
0
54,388
13,638,476,612
IssuesEvent
2020-09-25 09:26:24
hazelcast/hazelcast
https://api.github.com/repos/hazelcast/hazelcast
closed
Caller stacktrace is missing on RuntimeExceptions thrown from ExceptionUtil.rethrow
Priority: High Source: Internal Team: Client Team: Core Type: Defect
After the fix https://github.com/hazelcast/hazelcast/pull/15441 we have removed exception stack trace rewrite on the server. Since the client proxies do not use correct method (which seems to be `invocationFuture.joinInternal`), the exceptions that come from the remote are thrown with the stack trace on the remote. This makes it hard to follow the stack trace. ~~The solution is already available on the member side. This issue is to address the problems on the client-side.~~ See next comment.
1.0
Caller stacktrace is missing on RuntimeExceptions thrown from ExceptionUtil.rethrow - After the fix https://github.com/hazelcast/hazelcast/pull/15441 we have removed exception stack trace rewrite on the server. Since the client proxies do not use correct method (which seems to be `invocationFuture.joinInternal`), the exceptions that come from the remote are thrown with the stack trace on the remote. This makes it hard to follow the stack trace. ~~The solution is already available on the member side. This issue is to address the problems on the client-side.~~ See next comment.
defect
caller stacktrace is missing on runtimeexceptions thrown from exceptionutil rethrow after the fix we have removed exception stack trace rewrite on the server since the client proxies do not use correct method which seems to be invocationfuture joininternal the exceptions that come from the remote are thrown with the stack trace on the remote this makes it hard to follow the stack trace the solution is already available on the member side this issue is to address the problems on the client side see next comment
1
81,188
30,748,319,032
IssuesEvent
2023-07-28 16:50:22
department-of-veterans-affairs/va.gov-team
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
closed
[Other - Accessibility] - Text overlap at 175% zoom on Safari under certain conditions (00.00.3)
Public Websites accessibility a11y-defect-4 collab-cycle-feedback Staging CCIssue00.00 CC-Dashboard VA.gov homepage
### General Information #### VFS team name Sitewide #### VFS product name VA.gov Homepage #### VFS feature name Redesigned homepage #### Point of Contact/Reviewers Brian DeConinck - @briandeconinck - Accessibility *For more information on how to interpret this ticket, please refer to the [Anatomy of a Staging Review issue ticket](https://depo-platform-documentation.scrollhelp.site/collaboration-cycle/Anatomy-of-a-Staging-Review-Issue-ticket.2060320997.html) guidance on Platform Website. --- ### Platform Issue <!-- The Issue column from the [VA.gov Experience Standards](https://depo-platform-documentation.scrollhelp.site/collaboration-cycle/VA.gov-experience-standards.1683980311.html) --> ### Issue Details <!-- Include specific details about the product and why this is an issue. --> ### Link, screenshot or steps to recreate 1. On a Mac in Safari, navigate to https://staging.va.gov. 2. Adjust the browser width to the narrowest width allowed (looks like 575px). 3. Press CMD + to increase zoom up to 175% and higher. 4. Note that the action link chevron icon overlaps with the text of the link, obscuring some of the text. See screenshot below. <img width="435" alt="Try the new home page action link with the word new obscured by the chevron icon." src="https://user-images.githubusercontent.com/6844775/209196334-82d6e09f-f2eb-4d77-a206-33bf718e5f7e.png"> ### VA.gov Experience Standard [Category Number 00, Issue Number 00](https://depo-platform-documentation.scrollhelp.site/collaboration-cycle/va-gov-experience-standards) ### Other References <!-- WCAG, Design System, Content Style Guide, a previous gh ticket, etc. --> ### Platform Recommendation This appears to be limited to Safari, and only happens when the browser window is resized before zooming in. That's very... weird. It may be a CSS quirk for action links across all instances that we just happened to run into this time. Definitely a low-severity issue but it's worth investigating and either fixing here or reporting back to the Design System team. --- ### VFS Guidance - Close the ticket when the issue has been resolved or validated by your Product Owner - If your team has additional questions or needs Platform help validating the issue, please comment on the ticket - Some feedback provided may be out of scope for your iteration of the product, however, Platform's OCTO leadership has stated that all identified issues need to be documented and it is still your responsibility to resolve the issue. - If you do not believe that this Staging Review issue ticket is the responsibility of your team, comment below providing an explanation and who you believe is responsible. Please tag the Point of Contact/Reviewers. Governance team will research and will follow up. ## Platform directions - Update "Issue Title" - Link to Collaboration Cycle Request epic - Add the VFS team and product name - Add your name and practice area under Point of Contact(Practice Area) - Add the Platform Issue. The Issue column from the [VA.gov Experience Standards](https://depo-platform-documentation.scrollhelp.site/collaboration-cycle/VA.gov-experience-standards.1683980311.html) - Add the Issue Details and any links, screenshots or steps to recreate - Add the [VA.gov Experience Standard](https://depo-platform-documentation.scrollhelp.site/collaboration-cycle/VA.gov-experience-standards.1683980311.html) number - Add assignees: VFS PM - Add labels: - VFS team label - VA.gov Experience Standard Issue number (CCIssueXX.YY) where XX is the category number and YY is the issue number, per the VA.gov Experience Standards - Practice area labels (508/accessibility, IA, content, design) per the VA.gov Experience Standards - 508 defect label, if applicable (508-defect-0, 508-defect-1, 508-defect-2, 508-defect-3, 508-defect-4) - Launch-blocking label, if applicable
1.0
[Other - Accessibility] - Text overlap at 175% zoom on Safari under certain conditions (00.00.3) - ### General Information #### VFS team name Sitewide #### VFS product name VA.gov Homepage #### VFS feature name Redesigned homepage #### Point of Contact/Reviewers Brian DeConinck - @briandeconinck - Accessibility *For more information on how to interpret this ticket, please refer to the [Anatomy of a Staging Review issue ticket](https://depo-platform-documentation.scrollhelp.site/collaboration-cycle/Anatomy-of-a-Staging-Review-Issue-ticket.2060320997.html) guidance on Platform Website. --- ### Platform Issue <!-- The Issue column from the [VA.gov Experience Standards](https://depo-platform-documentation.scrollhelp.site/collaboration-cycle/VA.gov-experience-standards.1683980311.html) --> ### Issue Details <!-- Include specific details about the product and why this is an issue. --> ### Link, screenshot or steps to recreate 1. On a Mac in Safari, navigate to https://staging.va.gov. 2. Adjust the browser width to the narrowest width allowed (looks like 575px). 3. Press CMD + to increase zoom up to 175% and higher. 4. Note that the action link chevron icon overlaps with the text of the link, obscuring some of the text. See screenshot below. <img width="435" alt="Try the new home page action link with the word new obscured by the chevron icon." src="https://user-images.githubusercontent.com/6844775/209196334-82d6e09f-f2eb-4d77-a206-33bf718e5f7e.png"> ### VA.gov Experience Standard [Category Number 00, Issue Number 00](https://depo-platform-documentation.scrollhelp.site/collaboration-cycle/va-gov-experience-standards) ### Other References <!-- WCAG, Design System, Content Style Guide, a previous gh ticket, etc. --> ### Platform Recommendation This appears to be limited to Safari, and only happens when the browser window is resized before zooming in. That's very... weird. It may be a CSS quirk for action links across all instances that we just happened to run into this time. Definitely a low-severity issue but it's worth investigating and either fixing here or reporting back to the Design System team. --- ### VFS Guidance - Close the ticket when the issue has been resolved or validated by your Product Owner - If your team has additional questions or needs Platform help validating the issue, please comment on the ticket - Some feedback provided may be out of scope for your iteration of the product, however, Platform's OCTO leadership has stated that all identified issues need to be documented and it is still your responsibility to resolve the issue. - If you do not believe that this Staging Review issue ticket is the responsibility of your team, comment below providing an explanation and who you believe is responsible. Please tag the Point of Contact/Reviewers. Governance team will research and will follow up. ## Platform directions - Update "Issue Title" - Link to Collaboration Cycle Request epic - Add the VFS team and product name - Add your name and practice area under Point of Contact(Practice Area) - Add the Platform Issue. The Issue column from the [VA.gov Experience Standards](https://depo-platform-documentation.scrollhelp.site/collaboration-cycle/VA.gov-experience-standards.1683980311.html) - Add the Issue Details and any links, screenshots or steps to recreate - Add the [VA.gov Experience Standard](https://depo-platform-documentation.scrollhelp.site/collaboration-cycle/VA.gov-experience-standards.1683980311.html) number - Add assignees: VFS PM - Add labels: - VFS team label - VA.gov Experience Standard Issue number (CCIssueXX.YY) where XX is the category number and YY is the issue number, per the VA.gov Experience Standards - Practice area labels (508/accessibility, IA, content, design) per the VA.gov Experience Standards - 508 defect label, if applicable (508-defect-0, 508-defect-1, 508-defect-2, 508-defect-3, 508-defect-4) - Launch-blocking label, if applicable
defect
text overlap at zoom on safari under certain conditions general information vfs team name sitewide vfs product name va gov homepage vfs feature name redesigned homepage point of contact reviewers brian deconinck briandeconinck accessibility for more information on how to interpret this ticket please refer to the guidance on platform website platform issue the issue column from the issue details include specific details about the product and why this is an issue link screenshot or steps to recreate on a mac in safari navigate to adjust the browser width to the narrowest width allowed looks like press cmd to increase zoom up to and higher note that the action link chevron icon overlaps with the text of the link obscuring some of the text see screenshot below img width alt try the new home page action link with the word new obscured by the chevron icon src va gov experience standard other references wcag design system content style guide a previous gh ticket etc platform recommendation this appears to be limited to safari and only happens when the browser window is resized before zooming in that s very weird it may be a css quirk for action links across all instances that we just happened to run into this time definitely a low severity issue but it s worth investigating and either fixing here or reporting back to the design system team vfs guidance close the ticket when the issue has been resolved or validated by your product owner if your team has additional questions or needs platform help validating the issue please comment on the ticket some feedback provided may be out of scope for your iteration of the product however platform s octo leadership has stated that all identified issues need to be documented and it is still your responsibility to resolve the issue if you do not believe that this staging review issue ticket is the responsibility of your team comment below providing an explanation and who you believe is responsible please tag the point of contact reviewers governance team will research and will follow up platform directions update issue title link to collaboration cycle request epic add the vfs team and product name add your name and practice area under point of contact practice area add the platform issue the issue column from the add the issue details and any links screenshots or steps to recreate add the number add assignees vfs pm add labels vfs team label va gov experience standard issue number ccissuexx yy where xx is the category number and yy is the issue number per the va gov experience standards practice area labels accessibility ia content design per the va gov experience standards defect label if applicable defect defect defect defect defect launch blocking label if applicable
1
127,908
10,499,348,387
IssuesEvent
2019-09-26 08:11:45
GSG-G7/lang-mate
https://api.github.com/repos/GSG-G7/lang-mate
closed
GET /api/v1/channels/:username
Backend Routes T6h helpers query testing validation
- [ ] **Route** * ` api/v1/channels/:username` to get the channels by user name - we will using this route on the home page #14 ---- - [ ] **Request body** ```js /* the get method does not have body */ ``` --- - [ ] **Request Validation** - the `username` param should be string --- - [ ] **Queries** ```js getChannels(username) ``` --- - [ ] **Helpers** --- - [ ] **Testing** * [ ] testing the route * [ ] testing the query
1.0
GET /api/v1/channels/:username - - [ ] **Route** * ` api/v1/channels/:username` to get the channels by user name - we will using this route on the home page #14 ---- - [ ] **Request body** ```js /* the get method does not have body */ ``` --- - [ ] **Request Validation** - the `username` param should be string --- - [ ] **Queries** ```js getChannels(username) ``` --- - [ ] **Helpers** --- - [ ] **Testing** * [ ] testing the route * [ ] testing the query
non_defect
get api channels username route api channels username to get the channels by user name we will using this route on the home page request body js the get method does not have body request validation the username param should be string queries js getchannels username helpers testing testing the route testing the query
0
325,689
27,954,393,364
IssuesEvent
2023-03-24 11:14:45
elastic/kibana
https://api.github.com/repos/elastic/kibana
opened
[Security Solution] Audit existing test coverage for the Alerts area
test test_ui_functional test-api-integration test-coverage Team:Detections and Resp Team: SecuritySolution Team:Detection Alerts 8.8 candidate
**Epic:** https://github.com/elastic/kibana/issues/153633 ## Summary - Create a list of all features of the Detection Engine that are owned by the Alerts area. - Review existing test coverage and see how it matches the list of features. - For each feature: - evaluate the coverage at each level (E2E, integration, unit; e.g. full, some, none) - determine gaps (e.g. this use case is covered, but that one is not; integration tests exist but e2e tests are missing) Document and share the results of the audit with the other 2 area teams. Based on the results, create as many GitHub issues as needed, titled `[Security Solution] Increase test coverage for <Feature X>`. In general, the goals of each of these issues should be: - Write a test plan for <Feature X>. - Write missing tests. - Fix and improve existing tests: make them less flaky and brittle (reduce false negatives), more isolated from each other, etc. Feel free to add any other goals specific to the feature. Finally, please add all these issues to the epic, to the task list called `Increase test coverage for the Alerts area`.
4.0
[Security Solution] Audit existing test coverage for the Alerts area - **Epic:** https://github.com/elastic/kibana/issues/153633 ## Summary - Create a list of all features of the Detection Engine that are owned by the Alerts area. - Review existing test coverage and see how it matches the list of features. - For each feature: - evaluate the coverage at each level (E2E, integration, unit; e.g. full, some, none) - determine gaps (e.g. this use case is covered, but that one is not; integration tests exist but e2e tests are missing) Document and share the results of the audit with the other 2 area teams. Based on the results, create as many GitHub issues as needed, titled `[Security Solution] Increase test coverage for <Feature X>`. In general, the goals of each of these issues should be: - Write a test plan for <Feature X>. - Write missing tests. - Fix and improve existing tests: make them less flaky and brittle (reduce false negatives), more isolated from each other, etc. Feel free to add any other goals specific to the feature. Finally, please add all these issues to the epic, to the task list called `Increase test coverage for the Alerts area`.
non_defect
audit existing test coverage for the alerts area epic summary create a list of all features of the detection engine that are owned by the alerts area review existing test coverage and see how it matches the list of features for each feature evaluate the coverage at each level integration unit e g full some none determine gaps e g this use case is covered but that one is not integration tests exist but tests are missing document and share the results of the audit with the other area teams based on the results create as many github issues as needed titled increase test coverage for in general the goals of each of these issues should be write a test plan for write missing tests fix and improve existing tests make them less flaky and brittle reduce false negatives more isolated from each other etc feel free to add any other goals specific to the feature finally please add all these issues to the epic to the task list called increase test coverage for the alerts area
0
42,989
11,415,873,935
IssuesEvent
2020-02-02 13:57:17
nanopb/nanopb
https://api.github.com/repos/nanopb/nanopb
closed
PB_FIELDINFO_WIDTH doesn't actually override width for all messages
Component-Design FixedInGit Priority-Medium Type-Defect
The documentation for `PB_FIELDINFO_WIDTH` compilation option claims that it will override descriptor width for all fields. However, in reality it only overrides it for messages using automatic field width determination. The generator automatically expands descriptor size to 2 or 4 for messages that have large data or tag number sizes. These don't get overridden by the compilation option, which is misleading. It may be best to remove PB_FIELDINFO_WIDTH option, as it is mostly redundant with `descriptorsize` option available in `.proto` files.
1.0
PB_FIELDINFO_WIDTH doesn't actually override width for all messages - The documentation for `PB_FIELDINFO_WIDTH` compilation option claims that it will override descriptor width for all fields. However, in reality it only overrides it for messages using automatic field width determination. The generator automatically expands descriptor size to 2 or 4 for messages that have large data or tag number sizes. These don't get overridden by the compilation option, which is misleading. It may be best to remove PB_FIELDINFO_WIDTH option, as it is mostly redundant with `descriptorsize` option available in `.proto` files.
defect
pb fieldinfo width doesn t actually override width for all messages the documentation for pb fieldinfo width compilation option claims that it will override descriptor width for all fields however in reality it only overrides it for messages using automatic field width determination the generator automatically expands descriptor size to or for messages that have large data or tag number sizes these don t get overridden by the compilation option which is misleading it may be best to remove pb fieldinfo width option as it is mostly redundant with descriptorsize option available in proto files
1
68,338
28,364,322,254
IssuesEvent
2023-04-12 12:58:54
ministryofjustice/operations-engineering
https://api.github.com/repos/ministryofjustice/operations-engineering
closed
Support Request
Support MoJ Analytical Services GitHub Organisation
## Support Request A default label of `Support` will be added to the issue. Also add a second label for service associated to support request. Then close issue. valid service label options are: - `Pingdom` - `PagerDuty` - `LastPass` - `Sentry` - `OS Data Hub APIs` - `SSL Certificate Management` - `Domains Management` - `MoJ GitHub Organisation` - `MoJ Analytical Services GitHub Organisation` - `Docker` - `MoJ Acronyms` - `CircleCI` - `SonarCloud.io` - `Other Support Request`
1.0
Support Request - ## Support Request A default label of `Support` will be added to the issue. Also add a second label for service associated to support request. Then close issue. valid service label options are: - `Pingdom` - `PagerDuty` - `LastPass` - `Sentry` - `OS Data Hub APIs` - `SSL Certificate Management` - `Domains Management` - `MoJ GitHub Organisation` - `MoJ Analytical Services GitHub Organisation` - `Docker` - `MoJ Acronyms` - `CircleCI` - `SonarCloud.io` - `Other Support Request`
non_defect
support request support request a default label of support will be added to the issue also add a second label for service associated to support request then close issue valid service label options are pingdom pagerduty lastpass sentry os data hub apis ssl certificate management domains management moj github organisation moj analytical services github organisation docker moj acronyms circleci sonarcloud io other support request
0
26,394
6,767,156,408
IssuesEvent
2017-10-26 01:28:37
ahmedahamid/temp-third
https://api.github.com/repos/ahmedahamid/temp-third
closed
Create Example: CppHeapCorruption
All-In-One Code Framework 2009-5-10 CodePlexMigrationInitiated Diagnostics Impact: Medium Task
CppHeapCorruption demonstrates the typical situations, symptoms, causes, fixes, detections and debugging methods of heap corruption in a VC++ application. #### This work item was migrated from CodePlex CodePlex work item ID: '3008' Vote count: '1'
2.0
Create Example: CppHeapCorruption - CppHeapCorruption demonstrates the typical situations, symptoms, causes, fixes, detections and debugging methods of heap corruption in a VC++ application. #### This work item was migrated from CodePlex CodePlex work item ID: '3008' Vote count: '1'
non_defect
create example cppheapcorruption cppheapcorruption demonstrates the typical situations symptoms causes fixes detections and debugging methods of heap corruption in a vc application this work item was migrated from codeplex codeplex work item id vote count
0
28,985
5,468,942,459
IssuesEvent
2017-03-10 08:21:14
akvo/akvo-flow
https://api.github.com/repos/akvo/akvo-flow
closed
Form names are no longer visible when many forms are present in a monitoring survey group
Defect
When there is a large number of forms in a monitoring group, it is no longer possible to view the form names, making it impossible to identify which form one wants to edit. See the screen shot for an example ![screen shot 2015-01-12 at 14 44 38](https://cloud.githubusercontent.com/assets/533336/5703651/9fb80036-9a69-11e4-9e5b-563faeba645e.png)
1.0
Form names are no longer visible when many forms are present in a monitoring survey group - When there is a large number of forms in a monitoring group, it is no longer possible to view the form names, making it impossible to identify which form one wants to edit. See the screen shot for an example ![screen shot 2015-01-12 at 14 44 38](https://cloud.githubusercontent.com/assets/533336/5703651/9fb80036-9a69-11e4-9e5b-563faeba645e.png)
defect
form names are no longer visible when many forms are present in a monitoring survey group when there is a large number of forms in a monitoring group it is no longer possible to view the form names making it impossible to identify which form one wants to edit see the screen shot for an example
1
33,511
7,137,006,857
IssuesEvent
2018-01-23 09:30:49
primefaces/primeng
https://api.github.com/repos/primefaces/primeng
closed
TurboTable columns cannot be resized when columnResizeMode="expand" and scrollable="true"
confirmed defect
**I'm submitting a ...** (check one with "x") ``` [X] bug report => Search github for a similar issue or PR before submitting [ ] feature request => Please check if request is not on the roadmap already https://github.com/primefaces/primeng/wiki/Roadmap [ ] support request => Please do not submit support request here, instead see http://forum.primefaces.org/viewforum.php?f=35 ``` **Plunkr Case (Bug Reports)** http://plnkr.co/edit/tDKCcQHBIMGprgnllR6D?p=preview (Resize a column) **Current behavior** If a TurboTable has set the following properties, resizing a column does not work and throws an error. If set: resizableColumns="true" columnResizeMode="expand" scrollable="true" Error thrown: Cannot read property 'nativeElement' of undefined at Table.onColumnResizeEnd (table.js:789) at ResizableColumn.onDocumentMouseUp (table.js:1624) ... **Please tell us about your environment:** See the Plunkr.
1.0
TurboTable columns cannot be resized when columnResizeMode="expand" and scrollable="true" - **I'm submitting a ...** (check one with "x") ``` [X] bug report => Search github for a similar issue or PR before submitting [ ] feature request => Please check if request is not on the roadmap already https://github.com/primefaces/primeng/wiki/Roadmap [ ] support request => Please do not submit support request here, instead see http://forum.primefaces.org/viewforum.php?f=35 ``` **Plunkr Case (Bug Reports)** http://plnkr.co/edit/tDKCcQHBIMGprgnllR6D?p=preview (Resize a column) **Current behavior** If a TurboTable has set the following properties, resizing a column does not work and throws an error. If set: resizableColumns="true" columnResizeMode="expand" scrollable="true" Error thrown: Cannot read property 'nativeElement' of undefined at Table.onColumnResizeEnd (table.js:789) at ResizableColumn.onDocumentMouseUp (table.js:1624) ... **Please tell us about your environment:** See the Plunkr.
defect
turbotable columns cannot be resized when columnresizemode expand and scrollable true i m submitting a check one with x bug report search github for a similar issue or pr before submitting feature request please check if request is not on the roadmap already support request please do not submit support request here instead see plunkr case bug reports resize a column current behavior if a turbotable has set the following properties resizing a column does not work and throws an error if set resizablecolumns true columnresizemode expand scrollable true error thrown cannot read property nativeelement of undefined at table oncolumnresizeend table js at resizablecolumn ondocumentmouseup table js please tell us about your environment see the plunkr
1
19,920
3,275,416,550
IssuesEvent
2015-10-26 15:30:24
nikcross/open-forum
https://api.github.com/repos/nikcross/open-forum
closed
Headings not rendering correctly in preview mode
auto-migrated Type-Defect
``` What steps will reproduce the problem? 1. Edit a page 2. Add a heading '!! A Heading' 3. Add lines of text to follow 4. Select preview What is the expected output? A heading with following text should be displayed What do you see instead? All text is shown as a heading ``` Original issue reported on code.google.com by `nicholas...@gmail.com` on 2 Dec 2008 at 1:40
1.0
Headings not rendering correctly in preview mode - ``` What steps will reproduce the problem? 1. Edit a page 2. Add a heading '!! A Heading' 3. Add lines of text to follow 4. Select preview What is the expected output? A heading with following text should be displayed What do you see instead? All text is shown as a heading ``` Original issue reported on code.google.com by `nicholas...@gmail.com` on 2 Dec 2008 at 1:40
defect
headings not rendering correctly in preview mode what steps will reproduce the problem edit a page add a heading a heading add lines of text to follow select preview what is the expected output a heading with following text should be displayed what do you see instead all text is shown as a heading original issue reported on code google com by nicholas gmail com on dec at
1
93,868
15,946,429,485
IssuesEvent
2021-04-15 01:02:54
jgeraigery/core
https://api.github.com/repos/jgeraigery/core
opened
CVE-2020-28502 (High) detected in xmlhttprequest-ssl-1.5.5.tgz
security vulnerability
## CVE-2020-28502 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xmlhttprequest-ssl-1.5.5.tgz</b></p></summary> <p>XMLHttpRequest for Node</p> <p>Library home page: <a href="https://registry.npmjs.org/xmlhttprequest-ssl/-/xmlhttprequest-ssl-1.5.5.tgz">https://registry.npmjs.org/xmlhttprequest-ssl/-/xmlhttprequest-ssl-1.5.5.tgz</a></p> <p>Path to dependency file: core/nimbus-ui/nimbusui/package.json</p> <p>Path to vulnerable library: core/nimbus-ui/nimbusui/node_modules/xmlhttprequest-ssl/package.json</p> <p> Dependency Hierarchy: - karma-3.0.0.tgz (Root Library) - socket.io-2.1.1.tgz - socket.io-client-2.1.1.tgz - engine.io-client-3.2.1.tgz - :x: **xmlhttprequest-ssl-1.5.5.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run. <p>Publish Date: 2021-03-05 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28502>CVE-2020-28502</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28502">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28502</a></p> <p>Release Date: 2021-03-05</p> <p>Fix Resolution: xmlhttprequest - 1.7.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"xmlhttprequest-ssl","packageVersion":"1.5.5","packageFilePaths":["/nimbus-ui/nimbusui/package.json"],"isTransitiveDependency":true,"dependencyTree":"karma:3.0.0;socket.io:2.1.1;socket.io-client:2.1.1;engine.io-client:3.2.1;xmlhttprequest-ssl:1.5.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"xmlhttprequest - 1.7.0"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28502","vulnerabilityDetails":"This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async\u003dFalse on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28502","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-28502 (High) detected in xmlhttprequest-ssl-1.5.5.tgz - ## CVE-2020-28502 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xmlhttprequest-ssl-1.5.5.tgz</b></p></summary> <p>XMLHttpRequest for Node</p> <p>Library home page: <a href="https://registry.npmjs.org/xmlhttprequest-ssl/-/xmlhttprequest-ssl-1.5.5.tgz">https://registry.npmjs.org/xmlhttprequest-ssl/-/xmlhttprequest-ssl-1.5.5.tgz</a></p> <p>Path to dependency file: core/nimbus-ui/nimbusui/package.json</p> <p>Path to vulnerable library: core/nimbus-ui/nimbusui/node_modules/xmlhttprequest-ssl/package.json</p> <p> Dependency Hierarchy: - karma-3.0.0.tgz (Root Library) - socket.io-2.1.1.tgz - socket.io-client-2.1.1.tgz - engine.io-client-3.2.1.tgz - :x: **xmlhttprequest-ssl-1.5.5.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run. <p>Publish Date: 2021-03-05 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28502>CVE-2020-28502</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28502">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28502</a></p> <p>Release Date: 2021-03-05</p> <p>Fix Resolution: xmlhttprequest - 1.7.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"xmlhttprequest-ssl","packageVersion":"1.5.5","packageFilePaths":["/nimbus-ui/nimbusui/package.json"],"isTransitiveDependency":true,"dependencyTree":"karma:3.0.0;socket.io:2.1.1;socket.io-client:2.1.1;engine.io-client:3.2.1;xmlhttprequest-ssl:1.5.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"xmlhttprequest - 1.7.0"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28502","vulnerabilityDetails":"This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async\u003dFalse on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28502","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_defect
cve high detected in xmlhttprequest ssl tgz cve high severity vulnerability vulnerable library xmlhttprequest ssl tgz xmlhttprequest for node library home page a href path to dependency file core nimbus ui nimbusui package json path to vulnerable library core nimbus ui nimbusui node modules xmlhttprequest ssl package json dependency hierarchy karma tgz root library socket io tgz socket io client tgz engine io client tgz x xmlhttprequest ssl tgz vulnerable library found in base branch master vulnerability details this affects the package xmlhttprequest before all versions of package xmlhttprequest ssl provided requests are sent synchronously async false on xhr open malicious user input flowing into xhr send could result in arbitrary code being injected and run publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution xmlhttprequest isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree karma socket io socket io client engine io client xmlhttprequest ssl isminimumfixversionavailable true minimumfixversion xmlhttprequest basebranches vulnerabilityidentifier cve vulnerabilitydetails this affects the package xmlhttprequest before all versions of package xmlhttprequest ssl provided requests are sent synchronously async on xhr open malicious user input flowing into xhr send could result in arbitrary code being injected and run vulnerabilityurl
0
77,787
15,569,880,231
IssuesEvent
2021-03-17 01:12:29
tlkh/mini-dlperf
https://api.github.com/repos/tlkh/mini-dlperf
opened
CVE-2021-25291 (Medium) detected in Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl
security vulnerability
## CVE-2021-25291 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary> <p>Python Imaging Library (Fork)</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/12/ad/61f8dfba88c4e56196bf6d056cdbba64dc9c5dfdfbc97d02e6472feed913/Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/12/ad/61f8dfba88c4e56196bf6d056cdbba64dc9c5dfdfbc97d02e6472feed913/Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: mini-dlperf/requirements.txt</p> <p>Path to vulnerable library: mini-dlperf/requirements.txt,mini-dlperf/NVStatsRecorder,mini-dlperf/NVStatsRecorder/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A security issue was found in python-pillow before version 8.1.1. In TiffDecode.c, invalid tile boundaries could lead to an out of bounds read in TiffReadRGBATile. <p>Publish Date: 2021-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-25291>CVE-2021-25291</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html">https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html</a></p> <p>Release Date: 2021-01-18</p> <p>Fix Resolution: 8.1.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-25291 (Medium) detected in Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl - ## CVE-2021-25291 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary> <p>Python Imaging Library (Fork)</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/12/ad/61f8dfba88c4e56196bf6d056cdbba64dc9c5dfdfbc97d02e6472feed913/Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/12/ad/61f8dfba88c4e56196bf6d056cdbba64dc9c5dfdfbc97d02e6472feed913/Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: mini-dlperf/requirements.txt</p> <p>Path to vulnerable library: mini-dlperf/requirements.txt,mini-dlperf/NVStatsRecorder,mini-dlperf/NVStatsRecorder/requirements.txt</p> <p> Dependency Hierarchy: - :x: **Pillow-6.2.2-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A security issue was found in python-pillow before version 8.1.1. In TiffDecode.c, invalid tile boundaries could lead to an out of bounds read in TiffReadRGBATile. <p>Publish Date: 2021-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-25291>CVE-2021-25291</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html">https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html</a></p> <p>Release Date: 2021-01-18</p> <p>Fix Resolution: 8.1.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve medium detected in pillow whl cve medium severity vulnerability vulnerable library pillow whl python imaging library fork library home page a href path to dependency file mini dlperf requirements txt path to vulnerable library mini dlperf requirements txt mini dlperf nvstatsrecorder mini dlperf nvstatsrecorder requirements txt dependency hierarchy x pillow whl vulnerable library found in base branch master vulnerability details a security issue was found in python pillow before version in tiffdecode c invalid tile boundaries could lead to an out of bounds read in tiffreadrgbatile publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
24,242
3,933,423,462
IssuesEvent
2016-04-25 19:04:25
STEllAR-GROUP/hpx
https://api.github.com/repos/STEllAR-GROUP/hpx
opened
Premature unwrapping of boost::ref'ed arguments
affecting: LSU category: core type: defect
The following test case demonstrates the issue: ``` // Copyright (c) 2016 Hartmut Kaiser // // Distributed under the Boost Software License, Version 1.0. (See accompanying // file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) // This test case demonstrates premature unwrapping of boost::ref'ed arguments . #include <hpx/hpx_main.hpp> #include <hpx/hpx.hpp> struct non_copyable { HPX_NON_COPYABLE(non_copyable); non_copyable() {} }; void test(hpx::future<void>&&, non_copyable& o) { } struct test_obj { template <typename F, typename ... Ts> void operator()(F && f, Ts &&... ts) const { hpx::async(std::forward<F>(f), std::forward<Ts>(ts)...); } }; template <typename F, typename ... Ts> hpx::future<void> rebind(F && f, Ts &&... ts) { hpx::make_ready_future().then( hpx::util::bind( hpx::util::one_shot(test_obj()), hpx::util::protect(std::forward<F>(f)), hpx::util::placeholders::_1, std::forward<Ts>(ts)... ) ); } int main() { non_copyable o; rebind(&test, boost::ref(o)).get(); return 0; } ```
1.0
Premature unwrapping of boost::ref'ed arguments - The following test case demonstrates the issue: ``` // Copyright (c) 2016 Hartmut Kaiser // // Distributed under the Boost Software License, Version 1.0. (See accompanying // file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) // This test case demonstrates premature unwrapping of boost::ref'ed arguments . #include <hpx/hpx_main.hpp> #include <hpx/hpx.hpp> struct non_copyable { HPX_NON_COPYABLE(non_copyable); non_copyable() {} }; void test(hpx::future<void>&&, non_copyable& o) { } struct test_obj { template <typename F, typename ... Ts> void operator()(F && f, Ts &&... ts) const { hpx::async(std::forward<F>(f), std::forward<Ts>(ts)...); } }; template <typename F, typename ... Ts> hpx::future<void> rebind(F && f, Ts &&... ts) { hpx::make_ready_future().then( hpx::util::bind( hpx::util::one_shot(test_obj()), hpx::util::protect(std::forward<F>(f)), hpx::util::placeholders::_1, std::forward<Ts>(ts)... ) ); } int main() { non_copyable o; rebind(&test, boost::ref(o)).get(); return 0; } ```
defect
premature unwrapping of boost ref ed arguments the following test case demonstrates the issue copyright c hartmut kaiser distributed under the boost software license version see accompanying file license txt or copy at this test case demonstrates premature unwrapping of boost ref ed arguments include include struct non copyable hpx non copyable non copyable non copyable void test hpx future non copyable o struct test obj template void operator f f ts ts const hpx async std forward f std forward ts template hpx future rebind f f ts ts hpx make ready future then hpx util bind hpx util one shot test obj hpx util protect std forward f hpx util placeholders std forward ts int main non copyable o rebind test boost ref o get return
1
16,388
2,889,972,154
IssuesEvent
2015-06-13 23:05:14
STEllAR-GROUP/hpx
https://api.github.com/repos/STEllAR-GROUP/hpx
closed
Disconnecting a locality results in segfault using heartbeat example
affecting: CSCS category: examples category: parcel transport compiler: msvc platform: Windows type: defect
The attached stacktrace comes from running the heartbeat worker example. When it disconnects from the console process,, it shuts down the parcelport and a mutex deep inside boost:asio is accessed seemingly after it has been destroyed. The mutex is locked during win_iocp_socket_service_base::destroy but it appears to have unitialized memory contents. On windows, console started using ``` heartbeat_console.exe --hpx:threads=2 --runfor=100 -Ihpx.parcel.port=7910 \ --hpx:attach-debugger=exception -Ihpx.agas.port=7911 ``` Worker started using ``` heartbeat.exe --hpx:threads=2 --hpx:agas=127.0.0.1:7910 --runfor=2 \ --hpx:attach-debugger=exception ``` This has been reproduced with boost_1_55 and boost_1_58 (in the hope that it was a boost error that had been fixed in a more recent version) ---stacktrace--- ``` ntdll.dll!00007ffa9aceb2de() Unknown hpxd.dll!boost::asio::detail::win_mutex::lock() Line 51 C++ hpxd.dll!boost::asio::detail::scoped_lock<boost::asio::detail::win_mutex>::scoped_lock<boost::asio::detail::win_mutex>(boost::asio::detail::win_mutex & m) Line 47 C++ hpxd.dll!boost::asio::detail::win_iocp_socket_service_base::destroy(boost::asio::detail::win_iocp_socket_service_base::base_implementation_type & impl) Line 154 C++ hpxd.dll!boost::asio::stream_socket_service<boost::asio::ip::tcp>::destroy(boost::asio::detail::win_iocp_socket_service<boost::asio::ip::tcp>::implementation_type & impl) Line 139 C++ hpxd.dll!boost::asio::basic_io_object<boost::asio::stream_socket_service<boost::asio::ip::tcp>,1>::~basic_io_object<boost::asio::stream_socket_service<boost::asio::ip::tcp>,1>() Line 196 C++ hpxd.dll!boost::asio::basic_socket<boost::asio::ip::tcp,boost::asio::stream_socket_service<boost::asio::ip::tcp> >::~basic_socket<boost::asio::ip::tcp,boost::asio::stream_socket_service<boost::asio::ip::tcp> >() Line 1512 C++ [External Code] hpxd.dll!hpx::parcelset::policies::tcp::receiver::~receiver() Line 56 C++ [External Code] hpxd.dll!boost::checked_delete<hpx::parcelset::policies::tcp::receiver>(hpx::parcelset::policies::tcp::receiver * x) Line 34 C++ hpxd.dll!boost::detail::sp_counted_impl_p<hpx::parcelset::policies::tcp::receiver>::dispose() Line 79 C++ hpxd.dll!boost::detail::sp_counted_base::release() Line 104 C++ hpxd.dll!boost::detail::shared_count::~shared_count() Line 447 C++ [External Code] hpxd.dll!boost::asio::detail::win_iocp_socket_accept_op<boost::asio::basic_socket<boost::asio::ip::tcp,boost::asio::stream_socket_service<boost::asio::ip::tcp> >,boost::asio::ip::tcp,boost::_bi::bind_t<void,boost::_mfi::mf2<void,hpx::parcelset::policies::tcp::connection_handler,boost::system::error_code const & __ptr64,boost::shared_ptr<hpx::parcelset::policies::tcp::receiver> >,boost::_bi::list3<boost::_bi::value<hpx::parcelset::policies::tcp::connection_handler * __ptr64>,boost::arg<1>,boost::_bi::value<boost::shared_ptr<hpx::parcelset::policies::tcp::receiver> > > > >::do_complete(boost::asio::detail::win_iocp_io_service * owner, boost::asio::detail::win_iocp_operation * base, const boost::system::error_code & result_ec, unsigned __int64 __formal) Line 145 C++ hpxd.dll!boost::asio::detail::win_iocp_operation::destroy() Line 52 C++ hpxd.dll!boost::asio::detail::win_iocp_io_service::shutdown_service() Line 126 C++ hpxd.dll!boost::asio::detail::service_registry::~service_registry() Line 38 C++ [External Code] hpxd.dll!boost::asio::io_service::~io_service() Line 53 C++ [External Code] hpxd.dll!boost::checked_delete<boost::asio::io_service>(boost::asio::io_service * x) Line 34 C++ hpxd.dll!boost::detail::sp_counted_impl_p<boost::asio::io_service>::dispose() Line 79 C++ hpxd.dll!boost::detail::sp_counted_base::release() Line 104 C++ hpxd.dll!boost::detail::shared_count::~shared_count() Line 447 C++ [External Code] hpxd.dll!hpx::util::io_service_pool::clear_locked() Line 194 C++ hpxd.dll!hpx::util::io_service_pool::clear() Line 183 C++ hpxd.dll!hpx::parcelset::parcelport_impl<hpx::parcelset::policies::tcp::connection_handler>::stop(bool blocking) Line 167 C++ > hpxd.dll!hpx::parcelset::parcelhandler::stop(bool blocking) Line 291 C++ hpxd.dll!hpx::runtime_impl<hpx::threads::policies::local_priority_queue_scheduler<boost::mutex,hpx::threads::policies::lockfree_fifo,hpx::threads::policies::lockfree_fifo,hpx::threads::policies::lockfree_lifo>,hpx::threads::policies::callback_notifier>::stop(bool blocking) Line 419 C++ hpxd.dll!hpx::runtime_impl<hpx::threads::policies::local_priority_queue_scheduler<boost::mutex,hpx::threads::policies::lockfree_fifo,hpx::threads::policies::lockfree_fifo,hpx::threads::policies::lockfree_lifo>,hpx::threads::policies::callback_notifier>::run(const hpx::util::function<int __cdecl(void),void,void> & func) Line 525 C++ hpxd.dll!hpx::detail::run(hpx::runtime & rt, const hpx::util::function<int __cdecl(boost::program_options::variables_map &),void,void> & f, boost::program_options::variables_map & vm, hpx::runtime_mode mode, const hpx::util::function<void __cdecl(void),void,void> & startup, const hpx::util::function<void __cdecl(void),void,void> & shutdown) Line 523 C++ hpxd.dll!hpx::detail::run_priority_local(const hpx::util::function<void __cdecl(void),void,void> & startup, const hpx::util::function<void __cdecl(void),void,void> & shutdown, hpx::util::command_line_handling & cfg, bool blocking) Line 857 C++ hpxd.dll!hpx::detail::run_or_start(const hpx::util::function<int __cdecl(boost::program_options::variables_map &),void,void> & f, const boost::program_options::options_description & desc_cmdline, int argc, char * * argv, const std::vector<std::basic_string<char,std::char_traits<char>,std::allocator<char> >,std::allocator<std::basic_string<char,std::char_traits<char>,std::allocator<char> > > > & ini_config, const hpx::util::function<void __cdecl(void),void,void> & startup, const hpx::util::function<void __cdecl(void),void,void> & shutdown, hpx::runtime_mode mode, bool blocking) Line 1080 C++ heartbeat.exe!hpx::init(const hpx::util::function<int __cdecl(boost::program_options::variables_map &),void,void> & f, const boost::program_options::options_description & desc_cmdline, int argc, char * * argv, const std::vector<std::basic_string<char,std::char_traits<char>,std::allocator<char> >,std::allocator<std::basic_string<char,std::char_traits<char>,std::allocator<char> > > > & cfg, const hpx::util::function<void __cdecl(void),void,void> & startup, const hpx::util::function<void __cdecl(void),void,void> & shutdown, hpx::runtime_mode mode) Line 49 C++ heartbeat.exe!hpx::init(const boost::program_options::options_description & desc_cmdline, int argc, char * * argv, const std::vector<std::basic_string<char,std::char_traits<char>,std::allocator<char> >,std::allocator<std::basic_string<char,std::char_traits<char>,std::allocator<char> > > > & cfg, const hpx::util::function<void __cdecl(void),void,void> & startup, const hpx::util::function<void __cdecl(void),void,void> & shutdown, hpx::runtime_mode mode) Line 99 C++ heartbeat.exe!main(int argc, char * * argv) Line 141 C++ [External Code] ```
1.0
Disconnecting a locality results in segfault using heartbeat example - The attached stacktrace comes from running the heartbeat worker example. When it disconnects from the console process,, it shuts down the parcelport and a mutex deep inside boost:asio is accessed seemingly after it has been destroyed. The mutex is locked during win_iocp_socket_service_base::destroy but it appears to have unitialized memory contents. On windows, console started using ``` heartbeat_console.exe --hpx:threads=2 --runfor=100 -Ihpx.parcel.port=7910 \ --hpx:attach-debugger=exception -Ihpx.agas.port=7911 ``` Worker started using ``` heartbeat.exe --hpx:threads=2 --hpx:agas=127.0.0.1:7910 --runfor=2 \ --hpx:attach-debugger=exception ``` This has been reproduced with boost_1_55 and boost_1_58 (in the hope that it was a boost error that had been fixed in a more recent version) ---stacktrace--- ``` ntdll.dll!00007ffa9aceb2de() Unknown hpxd.dll!boost::asio::detail::win_mutex::lock() Line 51 C++ hpxd.dll!boost::asio::detail::scoped_lock<boost::asio::detail::win_mutex>::scoped_lock<boost::asio::detail::win_mutex>(boost::asio::detail::win_mutex & m) Line 47 C++ hpxd.dll!boost::asio::detail::win_iocp_socket_service_base::destroy(boost::asio::detail::win_iocp_socket_service_base::base_implementation_type & impl) Line 154 C++ hpxd.dll!boost::asio::stream_socket_service<boost::asio::ip::tcp>::destroy(boost::asio::detail::win_iocp_socket_service<boost::asio::ip::tcp>::implementation_type & impl) Line 139 C++ hpxd.dll!boost::asio::basic_io_object<boost::asio::stream_socket_service<boost::asio::ip::tcp>,1>::~basic_io_object<boost::asio::stream_socket_service<boost::asio::ip::tcp>,1>() Line 196 C++ hpxd.dll!boost::asio::basic_socket<boost::asio::ip::tcp,boost::asio::stream_socket_service<boost::asio::ip::tcp> >::~basic_socket<boost::asio::ip::tcp,boost::asio::stream_socket_service<boost::asio::ip::tcp> >() Line 1512 C++ [External Code] hpxd.dll!hpx::parcelset::policies::tcp::receiver::~receiver() Line 56 C++ [External Code] hpxd.dll!boost::checked_delete<hpx::parcelset::policies::tcp::receiver>(hpx::parcelset::policies::tcp::receiver * x) Line 34 C++ hpxd.dll!boost::detail::sp_counted_impl_p<hpx::parcelset::policies::tcp::receiver>::dispose() Line 79 C++ hpxd.dll!boost::detail::sp_counted_base::release() Line 104 C++ hpxd.dll!boost::detail::shared_count::~shared_count() Line 447 C++ [External Code] hpxd.dll!boost::asio::detail::win_iocp_socket_accept_op<boost::asio::basic_socket<boost::asio::ip::tcp,boost::asio::stream_socket_service<boost::asio::ip::tcp> >,boost::asio::ip::tcp,boost::_bi::bind_t<void,boost::_mfi::mf2<void,hpx::parcelset::policies::tcp::connection_handler,boost::system::error_code const & __ptr64,boost::shared_ptr<hpx::parcelset::policies::tcp::receiver> >,boost::_bi::list3<boost::_bi::value<hpx::parcelset::policies::tcp::connection_handler * __ptr64>,boost::arg<1>,boost::_bi::value<boost::shared_ptr<hpx::parcelset::policies::tcp::receiver> > > > >::do_complete(boost::asio::detail::win_iocp_io_service * owner, boost::asio::detail::win_iocp_operation * base, const boost::system::error_code & result_ec, unsigned __int64 __formal) Line 145 C++ hpxd.dll!boost::asio::detail::win_iocp_operation::destroy() Line 52 C++ hpxd.dll!boost::asio::detail::win_iocp_io_service::shutdown_service() Line 126 C++ hpxd.dll!boost::asio::detail::service_registry::~service_registry() Line 38 C++ [External Code] hpxd.dll!boost::asio::io_service::~io_service() Line 53 C++ [External Code] hpxd.dll!boost::checked_delete<boost::asio::io_service>(boost::asio::io_service * x) Line 34 C++ hpxd.dll!boost::detail::sp_counted_impl_p<boost::asio::io_service>::dispose() Line 79 C++ hpxd.dll!boost::detail::sp_counted_base::release() Line 104 C++ hpxd.dll!boost::detail::shared_count::~shared_count() Line 447 C++ [External Code] hpxd.dll!hpx::util::io_service_pool::clear_locked() Line 194 C++ hpxd.dll!hpx::util::io_service_pool::clear() Line 183 C++ hpxd.dll!hpx::parcelset::parcelport_impl<hpx::parcelset::policies::tcp::connection_handler>::stop(bool blocking) Line 167 C++ > hpxd.dll!hpx::parcelset::parcelhandler::stop(bool blocking) Line 291 C++ hpxd.dll!hpx::runtime_impl<hpx::threads::policies::local_priority_queue_scheduler<boost::mutex,hpx::threads::policies::lockfree_fifo,hpx::threads::policies::lockfree_fifo,hpx::threads::policies::lockfree_lifo>,hpx::threads::policies::callback_notifier>::stop(bool blocking) Line 419 C++ hpxd.dll!hpx::runtime_impl<hpx::threads::policies::local_priority_queue_scheduler<boost::mutex,hpx::threads::policies::lockfree_fifo,hpx::threads::policies::lockfree_fifo,hpx::threads::policies::lockfree_lifo>,hpx::threads::policies::callback_notifier>::run(const hpx::util::function<int __cdecl(void),void,void> & func) Line 525 C++ hpxd.dll!hpx::detail::run(hpx::runtime & rt, const hpx::util::function<int __cdecl(boost::program_options::variables_map &),void,void> & f, boost::program_options::variables_map & vm, hpx::runtime_mode mode, const hpx::util::function<void __cdecl(void),void,void> & startup, const hpx::util::function<void __cdecl(void),void,void> & shutdown) Line 523 C++ hpxd.dll!hpx::detail::run_priority_local(const hpx::util::function<void __cdecl(void),void,void> & startup, const hpx::util::function<void __cdecl(void),void,void> & shutdown, hpx::util::command_line_handling & cfg, bool blocking) Line 857 C++ hpxd.dll!hpx::detail::run_or_start(const hpx::util::function<int __cdecl(boost::program_options::variables_map &),void,void> & f, const boost::program_options::options_description & desc_cmdline, int argc, char * * argv, const std::vector<std::basic_string<char,std::char_traits<char>,std::allocator<char> >,std::allocator<std::basic_string<char,std::char_traits<char>,std::allocator<char> > > > & ini_config, const hpx::util::function<void __cdecl(void),void,void> & startup, const hpx::util::function<void __cdecl(void),void,void> & shutdown, hpx::runtime_mode mode, bool blocking) Line 1080 C++ heartbeat.exe!hpx::init(const hpx::util::function<int __cdecl(boost::program_options::variables_map &),void,void> & f, const boost::program_options::options_description & desc_cmdline, int argc, char * * argv, const std::vector<std::basic_string<char,std::char_traits<char>,std::allocator<char> >,std::allocator<std::basic_string<char,std::char_traits<char>,std::allocator<char> > > > & cfg, const hpx::util::function<void __cdecl(void),void,void> & startup, const hpx::util::function<void __cdecl(void),void,void> & shutdown, hpx::runtime_mode mode) Line 49 C++ heartbeat.exe!hpx::init(const boost::program_options::options_description & desc_cmdline, int argc, char * * argv, const std::vector<std::basic_string<char,std::char_traits<char>,std::allocator<char> >,std::allocator<std::basic_string<char,std::char_traits<char>,std::allocator<char> > > > & cfg, const hpx::util::function<void __cdecl(void),void,void> & startup, const hpx::util::function<void __cdecl(void),void,void> & shutdown, hpx::runtime_mode mode) Line 99 C++ heartbeat.exe!main(int argc, char * * argv) Line 141 C++ [External Code] ```
defect
disconnecting a locality results in segfault using heartbeat example the attached stacktrace comes from running the heartbeat worker example when it disconnects from the console process it shuts down the parcelport and a mutex deep inside boost asio is accessed seemingly after it has been destroyed the mutex is locked during win iocp socket service base destroy but it appears to have unitialized memory contents on windows console started using heartbeat console exe hpx threads runfor ihpx parcel port hpx attach debugger exception ihpx agas port worker started using heartbeat exe hpx threads hpx agas runfor hpx attach debugger exception this has been reproduced with boost and boost in the hope that it was a boost error that had been fixed in a more recent version stacktrace ntdll dll unknown hpxd dll boost asio detail win mutex lock line c hpxd dll boost asio detail scoped lock scoped lock boost asio detail win mutex m line c hpxd dll boost asio detail win iocp socket service base destroy boost asio detail win iocp socket service base base implementation type impl line c hpxd dll boost asio stream socket service destroy boost asio detail win iocp socket service implementation type impl line c hpxd dll boost asio basic io object basic io object line c hpxd dll boost asio basic socket basic socket line c hpxd dll hpx parcelset policies tcp receiver receiver line c hpxd dll boost checked delete hpx parcelset policies tcp receiver x line c hpxd dll boost detail sp counted impl p dispose line c hpxd dll boost detail sp counted base release line c hpxd dll boost detail shared count shared count line c hpxd dll boost asio detail win iocp socket accept op boost asio ip tcp boost bi bind t boost bi boost arg boost bi value do complete boost asio detail win iocp io service owner boost asio detail win iocp operation base const boost system error code result ec unsigned formal line c hpxd dll boost asio detail win iocp operation destroy line c hpxd dll boost asio detail win iocp io service shutdown service line c hpxd dll boost asio detail service registry service registry line c hpxd dll boost asio io service io service line c hpxd dll boost checked delete boost asio io service x line c hpxd dll boost detail sp counted impl p dispose line c hpxd dll boost detail sp counted base release line c hpxd dll boost detail shared count shared count line c hpxd dll hpx util io service pool clear locked line c hpxd dll hpx util io service pool clear line c hpxd dll hpx parcelset parcelport impl stop bool blocking line c hpxd dll hpx parcelset parcelhandler stop bool blocking line c hpxd dll hpx runtime impl hpx threads policies callback notifier stop bool blocking line c hpxd dll hpx runtime impl hpx threads policies callback notifier run const hpx util function func line c hpxd dll hpx detail run hpx runtime rt const hpx util function f boost program options variables map vm hpx runtime mode mode const hpx util function startup const hpx util function shutdown line c hpxd dll hpx detail run priority local const hpx util function startup const hpx util function shutdown hpx util command line handling cfg bool blocking line c hpxd dll hpx detail run or start const hpx util function f const boost program options options description desc cmdline int argc char argv const std vector std allocator std allocator std allocator ini config const hpx util function startup const hpx util function shutdown hpx runtime mode mode bool blocking line c heartbeat exe hpx init const hpx util function f const boost program options options description desc cmdline int argc char argv const std vector std allocator std allocator std allocator cfg const hpx util function startup const hpx util function shutdown hpx runtime mode mode line c heartbeat exe hpx init const boost program options options description desc cmdline int argc char argv const std vector std allocator std allocator std allocator cfg const hpx util function startup const hpx util function shutdown hpx runtime mode mode line c heartbeat exe main int argc char argv line c
1
169,567
6,404,557,779
IssuesEvent
2017-08-07 03:45:08
ChrisALee/twitch-stocks
https://api.github.com/repos/ChrisALee/twitch-stocks
closed
Fix and improve Travis CI
Bug Help Wanted Priority: Maximum Project Setup
I've added a temporary fix that does a `cd` to `/client` before installing. The goal is for Travis CI to be able to do all three directories (`/client` ,`/server`, `/twitch`) and also have the added features (like only testing commited files) from #45.
1.0
Fix and improve Travis CI - I've added a temporary fix that does a `cd` to `/client` before installing. The goal is for Travis CI to be able to do all three directories (`/client` ,`/server`, `/twitch`) and also have the added features (like only testing commited files) from #45.
non_defect
fix and improve travis ci i ve added a temporary fix that does a cd to client before installing the goal is for travis ci to be able to do all three directories client server twitch and also have the added features like only testing commited files from
0
204,339
7,087,022,329
IssuesEvent
2018-01-11 16:30:02
carbon-design-system/carbon-components-react
https://api.github.com/repos/carbon-design-system/carbon-components-react
closed
[OverflowMenu]: Menu always in DOM even when not open
bug grooming help wanted priority: low
## Detailed description The OverflowMenu always puts the menu in the DOM even when the menu is closed. This is true for both normal and floating menu. This causes performance issues when OverflowMenu is used multiple times. > Is this issue related to a specific component? OverflowMenu > What did you expect to happen? What happened instead? What would you like to see changed? The menu should only be put in the DOM when the open. > What browser are you working in? Chrome > What version of the Carbon Design System are you using? carbon-components 8.1.8 carbon-components-react 4.2.0 > What offering/product do you work on? Any pressing ship or release dates we should be aware of? IBM Watson Conversation ## Steps to reproduce the issue 1. Use an OverflowMenu 2. Use the browser debugger to inspect the DOM, and notice that the menu is always there
1.0
[OverflowMenu]: Menu always in DOM even when not open - ## Detailed description The OverflowMenu always puts the menu in the DOM even when the menu is closed. This is true for both normal and floating menu. This causes performance issues when OverflowMenu is used multiple times. > Is this issue related to a specific component? OverflowMenu > What did you expect to happen? What happened instead? What would you like to see changed? The menu should only be put in the DOM when the open. > What browser are you working in? Chrome > What version of the Carbon Design System are you using? carbon-components 8.1.8 carbon-components-react 4.2.0 > What offering/product do you work on? Any pressing ship or release dates we should be aware of? IBM Watson Conversation ## Steps to reproduce the issue 1. Use an OverflowMenu 2. Use the browser debugger to inspect the DOM, and notice that the menu is always there
non_defect
menu always in dom even when not open detailed description the overflowmenu always puts the menu in the dom even when the menu is closed this is true for both normal and floating menu this causes performance issues when overflowmenu is used multiple times is this issue related to a specific component overflowmenu what did you expect to happen what happened instead what would you like to see changed the menu should only be put in the dom when the open what browser are you working in chrome what version of the carbon design system are you using carbon components carbon components react what offering product do you work on any pressing ship or release dates we should be aware of ibm watson conversation steps to reproduce the issue use an overflowmenu use the browser debugger to inspect the dom and notice that the menu is always there
0
114,554
24,616,742,300
IssuesEvent
2022-10-15 12:14:06
creativecommons/search
https://api.github.com/repos/creativecommons/search
opened
[Feature] Add an external source for movie downloads
🟩 priority: low 🚦 status: awaiting triage ✨ goal: improvement 💻 aspect: code
## Problem Seeing that there’s already an external source for music, adding an external source for movies will give the users an extra variety of options. ![AA8E239C-9D1D-41E0-A0EE-16FB1E01CE3C](https://user-images.githubusercontent.com/104203890/195985746-65210c4a-87ad-4bdf-a33c-59c5cd73d5af.jpeg) ## Description This is feature is aimed towards adding [Fzmovies](https://fzmovies.net/) as an external source for movies. ## Alternatives <!-- Describe any alternative solutions or features you have considered. How is this feature better? --> ## Additional context <!-- Add any other context about the feature here; or delete the section entirely. --> ## Implementation <!-- Replace the [ ] with [x] to check the box. --> I will add this as an additional search source for movies - [ ] I would be interested in implementing this feature.
1.0
[Feature] Add an external source for movie downloads - ## Problem Seeing that there’s already an external source for music, adding an external source for movies will give the users an extra variety of options. ![AA8E239C-9D1D-41E0-A0EE-16FB1E01CE3C](https://user-images.githubusercontent.com/104203890/195985746-65210c4a-87ad-4bdf-a33c-59c5cd73d5af.jpeg) ## Description This is feature is aimed towards adding [Fzmovies](https://fzmovies.net/) as an external source for movies. ## Alternatives <!-- Describe any alternative solutions or features you have considered. How is this feature better? --> ## Additional context <!-- Add any other context about the feature here; or delete the section entirely. --> ## Implementation <!-- Replace the [ ] with [x] to check the box. --> I will add this as an additional search source for movies - [ ] I would be interested in implementing this feature.
non_defect
add an external source for movie downloads problem seeing that there’s already an external source for music adding an external source for movies will give the users an extra variety of options description this is feature is aimed towards adding as an external source for movies alternatives additional context implementation i will add this as an additional search source for movies i would be interested in implementing this feature
0
62,895
14,656,646,157
IssuesEvent
2020-12-28 13:53:28
fu1771695yongxie/uni-app
https://api.github.com/repos/fu1771695yongxie/uni-app
opened
CVE-2020-7598 (Medium) detected in multiple libraries
security vulnerability
## CVE-2020-7598 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.10.tgz</b>, <b>minimist-0.0.8.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary> <p> <details><summary><b>minimist-0.0.10.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p> <p>Path to dependency file: uni-app/packages/vue-cli-plugin-uni/packages/webpack-preprocess-loader/preprocess/node_modules/minimist/package.json</p> <p>Path to vulnerable library: uni-app/packages/vue-cli-plugin-uni/packages/webpack-preprocess-loader/preprocess/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/app-vue-style-loader/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/h5-vue-style-loader/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - jest-22.1.4.tgz (Root Library) - jest-cli-22.1.4.tgz - istanbul-api-1.2.1.tgz - istanbul-reports-1.1.3.tgz - handlebars-4.0.11.tgz - optimist-0.6.1.tgz - :x: **minimist-0.0.10.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: uni-app/packages/vue-cli-plugin-uni/packages/@intervolga/optimize-cssnano-plugin/node_modules/minimist/package.json</p> <p>Path to vulnerable library: uni-app/packages/vue-cli-plugin-uni/packages/@intervolga/optimize-cssnano-plugin/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/app-vue-style-loader/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/webpack-preprocess-loader/preprocess/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/h5-vue-style-loader/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/wrap-loader/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-hbuilderx/packages/weex-styler/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - mocha-2.5.3.tgz (Root Library) - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-1.2.0.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p> <p>Path to dependency file: uni-app/packages/vue-cli-plugin-uni/packages/h5-vue-style-loader/node_modules/minimist/package.json</p> <p>Path to vulnerable library: uni-app/packages/vue-cli-plugin-uni/packages/h5-vue-style-loader/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/webpack-preprocess-loader/preprocess/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/app-vue-style-loader/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/wrap-loader/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - grunt-coveralls-1.0.1.tgz (Root Library) - coveralls-2.13.3.tgz - :x: **minimist-1.2.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/fu1771695yongxie/uni-app/commit/49d3dd1020e7b9b0a47700866658384836bf7529">49d3dd1020e7b9b0a47700866658384836bf7529</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. <p>Publish Date: 2020-03-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p> <p>Release Date: 2020-03-11</p> <p>Fix Resolution: minimist - 0.2.1,1.2.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-7598 (Medium) detected in multiple libraries - ## CVE-2020-7598 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.10.tgz</b>, <b>minimist-0.0.8.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary> <p> <details><summary><b>minimist-0.0.10.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p> <p>Path to dependency file: uni-app/packages/vue-cli-plugin-uni/packages/webpack-preprocess-loader/preprocess/node_modules/minimist/package.json</p> <p>Path to vulnerable library: uni-app/packages/vue-cli-plugin-uni/packages/webpack-preprocess-loader/preprocess/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/app-vue-style-loader/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/h5-vue-style-loader/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - jest-22.1.4.tgz (Root Library) - jest-cli-22.1.4.tgz - istanbul-api-1.2.1.tgz - istanbul-reports-1.1.3.tgz - handlebars-4.0.11.tgz - optimist-0.6.1.tgz - :x: **minimist-0.0.10.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: uni-app/packages/vue-cli-plugin-uni/packages/@intervolga/optimize-cssnano-plugin/node_modules/minimist/package.json</p> <p>Path to vulnerable library: uni-app/packages/vue-cli-plugin-uni/packages/@intervolga/optimize-cssnano-plugin/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/app-vue-style-loader/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/webpack-preprocess-loader/preprocess/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/h5-vue-style-loader/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/wrap-loader/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-hbuilderx/packages/weex-styler/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - mocha-2.5.3.tgz (Root Library) - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-1.2.0.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p> <p>Path to dependency file: uni-app/packages/vue-cli-plugin-uni/packages/h5-vue-style-loader/node_modules/minimist/package.json</p> <p>Path to vulnerable library: uni-app/packages/vue-cli-plugin-uni/packages/h5-vue-style-loader/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/webpack-preprocess-loader/preprocess/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/app-vue-style-loader/node_modules/minimist/package.json,uni-app/packages/vue-cli-plugin-uni/packages/wrap-loader/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - grunt-coveralls-1.0.1.tgz (Root Library) - coveralls-2.13.3.tgz - :x: **minimist-1.2.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/fu1771695yongxie/uni-app/commit/49d3dd1020e7b9b0a47700866658384836bf7529">49d3dd1020e7b9b0a47700866658384836bf7529</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. <p>Publish Date: 2020-03-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p> <p>Release Date: 2020-03-11</p> <p>Fix Resolution: minimist - 0.2.1,1.2.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries minimist tgz minimist tgz minimist tgz minimist tgz parse argument options library home page a href path to dependency file uni app packages vue cli plugin uni packages webpack preprocess loader preprocess node modules minimist package json path to vulnerable library uni app packages vue cli plugin uni packages webpack preprocess loader preprocess node modules minimist package json uni app packages vue cli plugin uni packages app vue style loader node modules minimist package json uni app packages vue cli plugin uni packages vue style loader node modules minimist package json dependency hierarchy jest tgz root library jest cli tgz istanbul api tgz istanbul reports tgz handlebars tgz optimist tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file uni app packages vue cli plugin uni packages intervolga optimize cssnano plugin node modules minimist package json path to vulnerable library uni app packages vue cli plugin uni packages intervolga optimize cssnano plugin node modules minimist package json uni app packages vue cli plugin uni packages app vue style loader node modules minimist package json uni app packages vue cli plugin uni packages webpack preprocess loader preprocess node modules minimist package json uni app packages vue cli plugin uni packages vue style loader node modules minimist package json uni app packages vue cli plugin uni packages wrap loader node modules minimist package json uni app packages vue cli plugin hbuilderx packages weex styler node modules minimist package json dependency hierarchy mocha tgz root library mkdirp tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file uni app packages vue cli plugin uni packages vue style loader node modules minimist package json path to vulnerable library uni app packages vue cli plugin uni packages vue style loader node modules minimist package json uni app packages vue cli plugin uni packages webpack preprocess loader preprocess node modules minimist package json uni app packages vue cli plugin uni packages app vue style loader node modules minimist package json uni app packages vue cli plugin uni packages wrap loader node modules minimist package json dependency hierarchy grunt coveralls tgz root library coveralls tgz x minimist tgz vulnerable library found in head commit a href found in base branch master vulnerability details minimist before could be tricked into adding or modifying properties of object prototype using a constructor or proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution minimist step up your open source security game with whitesource
0
280,354
24,298,025,644
IssuesEvent
2022-09-29 11:45:46
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
roachtest: import/tpcc/warehouses=4000/geo failed
C-test-failure O-robot O-roachtest T-disaster-recovery branch-release-22.1
roachtest.import/tpcc/warehouses=4000/geo [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=5190053&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=5190053&tab=artifacts#/import/tpcc/warehouses=4000/geo) on release-22.1 @ [8cebdd75e0916d3826689c5913e43407d42a265a](https://github.com/cockroachdb/cockroach/commits/8cebdd75e0916d3826689c5913e43407d42a265a): ``` Wraps: (2) output in run_091428.556003874_n1_cockroach_workload_fixtures_import_tpcc Wraps: (3) ./cockroach workload fixtures import tpcc --warehouses=4000 --csv-server='http://localhost:8081' returned | stderr: | I220518 09:14:30.364706 1 ccl/workloadccl/fixture.go:318 [-] 1 starting import of 9 tables | I220518 09:14:33.822245 28 ccl/workloadccl/fixture.go:483 [-] 2 imported 213 KiB in warehouse table (4000 rows, 0 index entries, took 3.207710973s, 0.06 MiB/s) | I220518 09:14:34.056706 29 ccl/workloadccl/fixture.go:483 [-] 3 imported 3.9 MiB in district table (40000 rows, 0 index entries, took 3.44216812s, 1.14 MiB/s) | I220518 09:14:34.282938 114 ccl/workloadccl/fixture.go:483 [-] 4 imported 7.9 MiB in item table (100000 rows, 0 index entries, took 3.668188178s, 2.15 MiB/s) | I220518 09:15:43.843549 33 ccl/workloadccl/fixture.go:483 [-] 5 imported 546 MiB in new_order table (36000000 rows, 0 index entries, took 1m13.228834984s, 7.46 MiB/s) | Error: importing fixture: importing table stock: pq: job 762822233073811457: could not mark as reverting: job 762822233073811457: with status running: expected session "caa8ac4006d54e9fa588575351cbf817" but found NULL | | stdout: Wraps: (4) COMMAND_PROBLEM Wraps: (5) Node 1. Command with error: | `````` | ./cockroach workload fixtures import tpcc --warehouses=4000 --csv-server='http://localhost:8081' | `````` Wraps: (6) exit status 1 Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *cluster.WithCommandDetails (4) errors.Cmd (5) *hintdetail.withDetail (6) *exec.ExitError monitor.go:127,import.go:154,import.go:181,test_runner.go:875: monitor failure: monitor task failed: t.Fatal() was called (1) attached stack trace -- stack trace: | main.(*monitorImpl).WaitE | main/pkg/cmd/roachtest/monitor.go:115 | main.(*monitorImpl).Wait | main/pkg/cmd/roachtest/monitor.go:123 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.registerImportTPCC.func1 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/import.go:154 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.registerImportTPCC.func3 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/import.go:181 | main.(*testRunner).runTest.func2 | main/pkg/cmd/roachtest/test_runner.go:875 Wraps: (2) monitor failure Wraps: (3) attached stack trace -- stack trace: | main.(*monitorImpl).wait.func2 | main/pkg/cmd/roachtest/monitor.go:171 Wraps: (4) monitor task failed Wraps: (5) attached stack trace -- stack trace: | main.init | main/pkg/cmd/roachtest/monitor.go:80 | runtime.doInit | GOROOT/src/runtime/proc.go:6498 | runtime.main | GOROOT/src/runtime/proc.go:238 | runtime.goexit | GOROOT/src/runtime/asm_amd64.s:1581 Wraps: (6) t.Fatal() was called Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *withstack.withStack (4) *errutil.withPrefix (5) *withstack.withStack (6) *errutil.leafError ``` <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> <details><summary>Same failure on other branches</summary> <p> - #81186 roachtest: import/tpcc/warehouses=4000/geo failed [A-bulkio C-test-failure O-roachtest O-robot T-bulkio T-kv branch-master] - #76824 roachtest: import/tpcc/warehouses=4000/geo failed [raft sideload oom] [C-test-failure O-roachtest O-robot T-kv-replication X-nostale branch-release-21.2 no-test-failure-activity] </p> </details> /cc @cockroachdb/bulk-io <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*import/tpcc/warehouses=4000/geo.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub> Jira issue: CRDB-15191 Epic CRDB-13428
2.0
roachtest: import/tpcc/warehouses=4000/geo failed - roachtest.import/tpcc/warehouses=4000/geo [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=5190053&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=5190053&tab=artifacts#/import/tpcc/warehouses=4000/geo) on release-22.1 @ [8cebdd75e0916d3826689c5913e43407d42a265a](https://github.com/cockroachdb/cockroach/commits/8cebdd75e0916d3826689c5913e43407d42a265a): ``` Wraps: (2) output in run_091428.556003874_n1_cockroach_workload_fixtures_import_tpcc Wraps: (3) ./cockroach workload fixtures import tpcc --warehouses=4000 --csv-server='http://localhost:8081' returned | stderr: | I220518 09:14:30.364706 1 ccl/workloadccl/fixture.go:318 [-] 1 starting import of 9 tables | I220518 09:14:33.822245 28 ccl/workloadccl/fixture.go:483 [-] 2 imported 213 KiB in warehouse table (4000 rows, 0 index entries, took 3.207710973s, 0.06 MiB/s) | I220518 09:14:34.056706 29 ccl/workloadccl/fixture.go:483 [-] 3 imported 3.9 MiB in district table (40000 rows, 0 index entries, took 3.44216812s, 1.14 MiB/s) | I220518 09:14:34.282938 114 ccl/workloadccl/fixture.go:483 [-] 4 imported 7.9 MiB in item table (100000 rows, 0 index entries, took 3.668188178s, 2.15 MiB/s) | I220518 09:15:43.843549 33 ccl/workloadccl/fixture.go:483 [-] 5 imported 546 MiB in new_order table (36000000 rows, 0 index entries, took 1m13.228834984s, 7.46 MiB/s) | Error: importing fixture: importing table stock: pq: job 762822233073811457: could not mark as reverting: job 762822233073811457: with status running: expected session "caa8ac4006d54e9fa588575351cbf817" but found NULL | | stdout: Wraps: (4) COMMAND_PROBLEM Wraps: (5) Node 1. Command with error: | `````` | ./cockroach workload fixtures import tpcc --warehouses=4000 --csv-server='http://localhost:8081' | `````` Wraps: (6) exit status 1 Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *cluster.WithCommandDetails (4) errors.Cmd (5) *hintdetail.withDetail (6) *exec.ExitError monitor.go:127,import.go:154,import.go:181,test_runner.go:875: monitor failure: monitor task failed: t.Fatal() was called (1) attached stack trace -- stack trace: | main.(*monitorImpl).WaitE | main/pkg/cmd/roachtest/monitor.go:115 | main.(*monitorImpl).Wait | main/pkg/cmd/roachtest/monitor.go:123 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.registerImportTPCC.func1 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/import.go:154 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.registerImportTPCC.func3 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/import.go:181 | main.(*testRunner).runTest.func2 | main/pkg/cmd/roachtest/test_runner.go:875 Wraps: (2) monitor failure Wraps: (3) attached stack trace -- stack trace: | main.(*monitorImpl).wait.func2 | main/pkg/cmd/roachtest/monitor.go:171 Wraps: (4) monitor task failed Wraps: (5) attached stack trace -- stack trace: | main.init | main/pkg/cmd/roachtest/monitor.go:80 | runtime.doInit | GOROOT/src/runtime/proc.go:6498 | runtime.main | GOROOT/src/runtime/proc.go:238 | runtime.goexit | GOROOT/src/runtime/asm_amd64.s:1581 Wraps: (6) t.Fatal() was called Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *withstack.withStack (4) *errutil.withPrefix (5) *withstack.withStack (6) *errutil.leafError ``` <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> <details><summary>Same failure on other branches</summary> <p> - #81186 roachtest: import/tpcc/warehouses=4000/geo failed [A-bulkio C-test-failure O-roachtest O-robot T-bulkio T-kv branch-master] - #76824 roachtest: import/tpcc/warehouses=4000/geo failed [raft sideload oom] [C-test-failure O-roachtest O-robot T-kv-replication X-nostale branch-release-21.2 no-test-failure-activity] </p> </details> /cc @cockroachdb/bulk-io <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*import/tpcc/warehouses=4000/geo.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub> Jira issue: CRDB-15191 Epic CRDB-13428
non_defect
roachtest import tpcc warehouses geo failed roachtest import tpcc warehouses geo with on release wraps output in run cockroach workload fixtures import tpcc wraps cockroach workload fixtures import tpcc warehouses csv server returned stderr ccl workloadccl fixture go starting import of tables ccl workloadccl fixture go imported kib in warehouse table rows index entries took mib s ccl workloadccl fixture go imported mib in district table rows index entries took mib s ccl workloadccl fixture go imported mib in item table rows index entries took mib s ccl workloadccl fixture go imported mib in new order table rows index entries took mib s error importing fixture importing table stock pq job could not mark as reverting job with status running expected session but found null stdout wraps command problem wraps node command with error cockroach workload fixtures import tpcc warehouses csv server wraps exit status error types withstack withstack errutil withprefix cluster withcommanddetails errors cmd hintdetail withdetail exec exiterror monitor go import go import go test runner go monitor failure monitor task failed t fatal was called attached stack trace stack trace main monitorimpl waite main pkg cmd roachtest monitor go main monitorimpl wait main pkg cmd roachtest monitor go github com cockroachdb cockroach pkg cmd roachtest tests registerimporttpcc github com cockroachdb cockroach pkg cmd roachtest tests import go github com cockroachdb cockroach pkg cmd roachtest tests registerimporttpcc github com cockroachdb cockroach pkg cmd roachtest tests import go main testrunner runtest main pkg cmd roachtest test runner go wraps monitor failure wraps attached stack trace stack trace main monitorimpl wait main pkg cmd roachtest monitor go wraps monitor task failed wraps attached stack trace stack trace main init main pkg cmd roachtest monitor go runtime doinit goroot src runtime proc go runtime main goroot src runtime proc go runtime goexit goroot src runtime asm s wraps t fatal was called error types withstack withstack errutil withprefix withstack withstack errutil withprefix withstack withstack errutil leaferror help see see same failure on other branches roachtest import tpcc warehouses geo failed roachtest import tpcc warehouses geo failed cc cockroachdb bulk io jira issue crdb epic crdb
0
438,690
12,643,139,212
IssuesEvent
2020-06-16 09:18:57
MireilleBF/FromMLWFConfigurationToBPMN
https://api.github.com/repos/MireilleBF/FromMLWFConfigurationToBPMN
closed
Process references
Closed by next Merge enhancement priority
Include **references** to improve FM **quality** : - [x] reference data (1st line of instantiated feature description) - [x] reference author/article (2nd line of instantiated feature description) ref : #64
1.0
Process references - Include **references** to improve FM **quality** : - [x] reference data (1st line of instantiated feature description) - [x] reference author/article (2nd line of instantiated feature description) ref : #64
non_defect
process references include references to improve fm quality reference data line of instantiated feature description reference author article line of instantiated feature description ref
0
124,875
17,783,976,019
IssuesEvent
2021-08-31 08:50:36
elastic/kibana
https://api.github.com/repos/elastic/kibana
opened
[Endpoint] Incorrect name shows for Memory Manipulation Protection in Policy status.
bug Team: SecuritySolution Team:Onboarding and Lifecycle Mgt v7.15.0
**Describe the bug:** Incorrect name shows for Memory Manipulation Protection in Policy status. **Build Details:** VERSION: 7.15.0-BC3 BUILD: 43818 COMMIT: 6f7562b1906dcfad65809da8fdec15df353d0252 ARTIFACT: https://staging.elastic.co/7.15.0-642a73fa/summary-7.15.0.html **Preconditions:** Elastic 7.15.0-BC3 environment should be deployed. **Steps to Reproduce:** 1. Log in to Kibana. 2. Navigate to Endpoints tab under security app. 3. Go to Policy status. 4. Observe that incorrect name shows for Memory Manipulation Protection in Policy status. **Test data:** N/A **Impacted Test case(s):** N/A **Actual Result:** In policy status for 'Memory Manipulation Protection' it shows as 'Memory Protection'. **Expected Result:** In policy status it should show as 'Memory Manipulation Protection'. **What's Working:** N/A **What's Not Working:** N/A **Screenshot:** https://user-images.githubusercontent.com/84007952/131454589-7acdb689-80d2-4d0f-8abc-c67ce354ffe5.mp4 **Logs:** N/A
True
[Endpoint] Incorrect name shows for Memory Manipulation Protection in Policy status. - **Describe the bug:** Incorrect name shows for Memory Manipulation Protection in Policy status. **Build Details:** VERSION: 7.15.0-BC3 BUILD: 43818 COMMIT: 6f7562b1906dcfad65809da8fdec15df353d0252 ARTIFACT: https://staging.elastic.co/7.15.0-642a73fa/summary-7.15.0.html **Preconditions:** Elastic 7.15.0-BC3 environment should be deployed. **Steps to Reproduce:** 1. Log in to Kibana. 2. Navigate to Endpoints tab under security app. 3. Go to Policy status. 4. Observe that incorrect name shows for Memory Manipulation Protection in Policy status. **Test data:** N/A **Impacted Test case(s):** N/A **Actual Result:** In policy status for 'Memory Manipulation Protection' it shows as 'Memory Protection'. **Expected Result:** In policy status it should show as 'Memory Manipulation Protection'. **What's Working:** N/A **What's Not Working:** N/A **Screenshot:** https://user-images.githubusercontent.com/84007952/131454589-7acdb689-80d2-4d0f-8abc-c67ce354ffe5.mp4 **Logs:** N/A
non_defect
incorrect name shows for memory manipulation protection in policy status describe the bug incorrect name shows for memory manipulation protection in policy status build details version build commit artifact preconditions elastic environment should be deployed steps to reproduce log in to kibana navigate to endpoints tab under security app go to policy status observe that incorrect name shows for memory manipulation protection in policy status test data n a impacted test case s n a actual result in policy status for memory manipulation protection it shows as memory protection expected result in policy status it should show as memory manipulation protection what s working n a what s not working n a screenshot logs n a
0
59,815
17,023,254,240
IssuesEvent
2021-07-03 01:04:30
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
closed
The search pointer marker has disappeared
Component: website Priority: minor Resolution: invalid Type: defect
**[Submitted to the original trac issue database at 6.04pm, Wednesday, 28th May 2008]** We seem to have los the marker that used to point at a search result.
1.0
The search pointer marker has disappeared - **[Submitted to the original trac issue database at 6.04pm, Wednesday, 28th May 2008]** We seem to have los the marker that used to point at a search result.
defect
the search pointer marker has disappeared we seem to have los the marker that used to point at a search result
1
6,014
8,822,150,609
IssuesEvent
2019-01-02 07:56:53
linnovate/root
https://api.github.com/repos/linnovate/root
closed
Need to click twice to open the tasks filtering in my tasks page
Fixed Process bug bug
open a few tasks with different names. click on ICU. click on some filter(tasks due today, tasks due this week. watched tasks or overdue tasks). in the first time nothing shows up in the list. in the second time the tasks show up.
1.0
Need to click twice to open the tasks filtering in my tasks page - open a few tasks with different names. click on ICU. click on some filter(tasks due today, tasks due this week. watched tasks or overdue tasks). in the first time nothing shows up in the list. in the second time the tasks show up.
non_defect
need to click twice to open the tasks filtering in my tasks page open a few tasks with different names click on icu click on some filter tasks due today tasks due this week watched tasks or overdue tasks in the first time nothing shows up in the list in the second time the tasks show up
0
22,844
3,711,620,345
IssuesEvent
2016-03-02 11:07:04
Samanthalyn/google-opt-out-plugin
https://api.github.com/repos/Samanthalyn/google-opt-out-plugin
closed
enter recipient name & address
auto-migrated Priority-Medium Type-Defect
``` What steps will reproduce the problem? 1. 2. 3. What is the expected output? What do you see instead? What version of the product are you using? On what operating system? Please provide any additional information below. ``` Original issue reported on code.google.com by `hingalin...@gmail.com` on 9 Mar 2015 at 8:12
1.0
enter recipient name & address - ``` What steps will reproduce the problem? 1. 2. 3. What is the expected output? What do you see instead? What version of the product are you using? On what operating system? Please provide any additional information below. ``` Original issue reported on code.google.com by `hingalin...@gmail.com` on 9 Mar 2015 at 8:12
defect
enter recipient name address what steps will reproduce the problem what is the expected output what do you see instead what version of the product are you using on what operating system please provide any additional information below original issue reported on code google com by hingalin gmail com on mar at
1
38,725
8,952,727,346
IssuesEvent
2019-01-25 17:19:08
svigerske/ipopt-donotuse
https://api.github.com/repos/svigerske/ipopt-donotuse
closed
Ipopt completely broken in Visual Studio 2008
Ipopt Ipopt compile errors Visual Studio defect
Issue created by migration from Trac. Original creator: davewilk Original creation time: 2011-10-01 14:04:30 Assignee: ipopt-team Version: 3.9 CC: xyz-coin@effisols.com I received my Ipopt with Bonmin, for which the docs say Ipopt version 3.10, but I do not see that version listed on this page. Anyway, when I try to compile Ipopt in Ipopt\MSVisualStudio\v9\libIpopt\libIpopt.vcproj I get numerous compile errors, most of which I have no idea how to fix. I would attach the build log, but I do not seem to have attachment privileges. But most notable errors are 1. 'Ipopt::SlackBasedTSymScalingMethod' : cannot instantiate abstract class 2. Various errors resulting from undefined quantities in updated content in Common\IpTypes.hpp I have had trouble getting a clean Visual Studio complilation (no warnings) in the past, but never problems like this. Am I missing something?
1.0
Ipopt completely broken in Visual Studio 2008 - Issue created by migration from Trac. Original creator: davewilk Original creation time: 2011-10-01 14:04:30 Assignee: ipopt-team Version: 3.9 CC: xyz-coin@effisols.com I received my Ipopt with Bonmin, for which the docs say Ipopt version 3.10, but I do not see that version listed on this page. Anyway, when I try to compile Ipopt in Ipopt\MSVisualStudio\v9\libIpopt\libIpopt.vcproj I get numerous compile errors, most of which I have no idea how to fix. I would attach the build log, but I do not seem to have attachment privileges. But most notable errors are 1. 'Ipopt::SlackBasedTSymScalingMethod' : cannot instantiate abstract class 2. Various errors resulting from undefined quantities in updated content in Common\IpTypes.hpp I have had trouble getting a clean Visual Studio complilation (no warnings) in the past, but never problems like this. Am I missing something?
defect
ipopt completely broken in visual studio issue created by migration from trac original creator davewilk original creation time assignee ipopt team version cc xyz coin effisols com i received my ipopt with bonmin for which the docs say ipopt version but i do not see that version listed on this page anyway when i try to compile ipopt in ipopt msvisualstudio libipopt libipopt vcproj i get numerous compile errors most of which i have no idea how to fix i would attach the build log but i do not seem to have attachment privileges but most notable errors are ipopt slackbasedtsymscalingmethod cannot instantiate abstract class various errors resulting from undefined quantities in updated content in common iptypes hpp i have had trouble getting a clean visual studio complilation no warnings in the past but never problems like this am i missing something
1
48,676
5,966,537,340
IssuesEvent
2017-05-30 14:13:05
sciserver/SkyServer
https://api.github.com/repos/sciserver/SkyServer
closed
SQL Search tool: Write to MyDB fails for a simple query
bug fixed needstest pre-sciserver-v1.9.4
Testing the new "MyDB" output option on preprod SkyServer. For a fairly simple query of DR12 - "select top 10 \* from specobj" - the query fails with the error message Failed to upload table data: Expected 190 column[s], found 182 Screnshot below. I suspect that the CasJobs upload is choking on some empty columns. Screenshot of bug: ![specobj_to_mydb_bug](https://cloud.githubusercontent.com/assets/1709156/14956552/62a0dc52-104e-11e6-85f3-6801b03cc665.png)
1.0
SQL Search tool: Write to MyDB fails for a simple query - Testing the new "MyDB" output option on preprod SkyServer. For a fairly simple query of DR12 - "select top 10 \* from specobj" - the query fails with the error message Failed to upload table data: Expected 190 column[s], found 182 Screnshot below. I suspect that the CasJobs upload is choking on some empty columns. Screenshot of bug: ![specobj_to_mydb_bug](https://cloud.githubusercontent.com/assets/1709156/14956552/62a0dc52-104e-11e6-85f3-6801b03cc665.png)
non_defect
sql search tool write to mydb fails for a simple query testing the new mydb output option on preprod skyserver for a fairly simple query of select top from specobj the query fails with the error message failed to upload table data expected column found screnshot below i suspect that the casjobs upload is choking on some empty columns screenshot of bug
0
31,091
6,423,853,943
IssuesEvent
2017-08-09 12:10:41
wooowooo/phpsocks5
https://api.github.com/repos/wooowooo/phpsocks5
closed
Http 500 error
auto-migrated Priority-Medium Type-Defect
``` 启动java客户端报Http 500 异常 Sun Nov 10 16:14:37 GMT 2013 Exception in background: {encrypt= 34 1b 1b 5b 49 42 49 17 76 5c 42 16 55 8 7 40 17 9 1 5e 9 3 5c 5 0 18 19 58 5b 54 5b 61 d 19 c b 11 17 1b f 6 4b 1 18 1a b 14(4..[IBI.v\B.U..@...^..\....X[T[a.........K.....), decrypt= 53 75 6e 2c 20 31 30 20 4e 6f 76 20 32 30 31 33 20 31 37 3a 31 34 3a 33 37 20 2b 30 31 30 30 9 66 73 6f 63 6b 6f 70 65 6e 20 65 72 72 6f 72(Sun, 10 Nov 2013 17:14:37 +0100.fsockopen error)} java.io.IOException: Server returned HTTP response code: 500 for URL: http://gsde.funpic.de/tunnel/socks5.php at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) at sun.reflect.NativeConstructorAccessorImpl.newInstance(Unknown Source) at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(Unknown Source) at java.lang.reflect.Constructor.newInstance(Unknown Source) at sun.net.www.protocol.http.HttpURLConnection$6.run(Unknown Source) at sun.net.www.protocol.http.HttpURLConnection$6.run(Unknown Source) at java.security.AccessController.doPrivileged(Native Method) at sun.net.www.protocol.http.HttpURLConnection.getChainedException(Unknown Source) at sun.net.www.protocol.http.HttpURLConnection.getInputStream(Unknown Source) at phpsocks5.Utils.getURLInput(PhpSocks5.java:95) at phpsocks5.Utils.background(PhpSocks5.java:146) at phpsocks5.PhpSocks5.run(PhpSocks5.java:481) at java.lang.Thread.run(Unknown Source) Caused by: java.io.IOException: Server returned HTTP response code: 500 for URL: gsde.funpic.de/tunnel/socks5.php at sun.net.www.protocol.http.HttpURLConnection.getInputStream(Unknown Source) at sun.net.www.protocol.http.HttpURLConnection.getHeaderField(Unknown Source) at phpsocks5.Utils.getURLInput(PhpSocks5.java:92) ... 3 more ``` Original issue reported on code.google.com by `gwm...@gmail.com` on 10 Nov 2013 at 4:21
1.0
Http 500 error - ``` 启动java客户端报Http 500 异常 Sun Nov 10 16:14:37 GMT 2013 Exception in background: {encrypt= 34 1b 1b 5b 49 42 49 17 76 5c 42 16 55 8 7 40 17 9 1 5e 9 3 5c 5 0 18 19 58 5b 54 5b 61 d 19 c b 11 17 1b f 6 4b 1 18 1a b 14(4..[IBI.v\B.U..@...^..\....X[T[a.........K.....), decrypt= 53 75 6e 2c 20 31 30 20 4e 6f 76 20 32 30 31 33 20 31 37 3a 31 34 3a 33 37 20 2b 30 31 30 30 9 66 73 6f 63 6b 6f 70 65 6e 20 65 72 72 6f 72(Sun, 10 Nov 2013 17:14:37 +0100.fsockopen error)} java.io.IOException: Server returned HTTP response code: 500 for URL: http://gsde.funpic.de/tunnel/socks5.php at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) at sun.reflect.NativeConstructorAccessorImpl.newInstance(Unknown Source) at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(Unknown Source) at java.lang.reflect.Constructor.newInstance(Unknown Source) at sun.net.www.protocol.http.HttpURLConnection$6.run(Unknown Source) at sun.net.www.protocol.http.HttpURLConnection$6.run(Unknown Source) at java.security.AccessController.doPrivileged(Native Method) at sun.net.www.protocol.http.HttpURLConnection.getChainedException(Unknown Source) at sun.net.www.protocol.http.HttpURLConnection.getInputStream(Unknown Source) at phpsocks5.Utils.getURLInput(PhpSocks5.java:95) at phpsocks5.Utils.background(PhpSocks5.java:146) at phpsocks5.PhpSocks5.run(PhpSocks5.java:481) at java.lang.Thread.run(Unknown Source) Caused by: java.io.IOException: Server returned HTTP response code: 500 for URL: gsde.funpic.de/tunnel/socks5.php at sun.net.www.protocol.http.HttpURLConnection.getInputStream(Unknown Source) at sun.net.www.protocol.http.HttpURLConnection.getHeaderField(Unknown Source) at phpsocks5.Utils.getURLInput(PhpSocks5.java:92) ... 3 more ``` Original issue reported on code.google.com by `gwm...@gmail.com` on 10 Nov 2013 at 4:21
defect
http error 启动java客户端报http 异常 sun nov gmt exception in background encrypt d c b f b ibi v b u x t a k decrypt sun nov fsockopen error java io ioexception server returned http response code for url at sun reflect nativeconstructoraccessorimpl native method at sun reflect nativeconstructoraccessorimpl newinstance unknown source at sun reflect delegatingconstructoraccessorimpl newinstance unknown source at java lang reflect constructor newinstance unknown source at sun net source at sun net source at java security accesscontroller doprivileged native method at sun net source at sun net source at utils geturlinput java at utils background java at run java at java lang thread run unknown source caused by java io ioexception server returned http response code for url gsde funpic de tunnel php at sun net source at sun net source at utils geturlinput java more original issue reported on code google com by gwm gmail com on nov at
1
1,560
2,603,967,614
IssuesEvent
2015-02-24 18:59:25
chrsmith/nishazi6
https://api.github.com/repos/chrsmith/nishazi6
opened
沈阳疱疹治疗要多长时间
auto-migrated Priority-Medium Type-Defect
``` 沈阳疱疹治疗要多长时间〓沈陽軍區政治部醫院性病〓TEL:02 4-31023308〓成立于1946年,68年專注于性傳播疾病的研究和治療� ��位于沈陽市沈河區二緯路32號。是一所與新中國同建立共輝� ��的歷史悠久、設備精良、技術權威、專家云集,是預防、保 健、醫療、科研康復為一體的綜合性醫院。是國家首批公立�� �等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學� ��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍 空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集�� �二等功。 ``` ----- Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 7:11
1.0
沈阳疱疹治疗要多长时间 - ``` 沈阳疱疹治疗要多长时间〓沈陽軍區政治部醫院性病〓TEL:02 4-31023308〓成立于1946年,68年專注于性傳播疾病的研究和治療� ��位于沈陽市沈河區二緯路32號。是一所與新中國同建立共輝� ��的歷史悠久、設備精良、技術權威、專家云集,是預防、保 健、醫療、科研康復為一體的綜合性醫院。是國家首批公立�� �等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學� ��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍 空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集�� �二等功。 ``` ----- Original issue reported on code.google.com by `q964105...@gmail.com` on 4 Jun 2014 at 7:11
defect
沈阳疱疹治疗要多长时间 沈阳疱疹治疗要多长时间〓沈陽軍區政治部醫院性病〓tel: 〓 , � �� 。是一所與新中國同建立共輝� ��的歷史悠久、設備精良、技術權威、專家云集,是預防、保 健、醫療、科研康復為一體的綜合性醫院。是國家首批公立�� �等部隊醫院、全國首批醫療規范定點單位,是第四軍醫大學� ��東南大學等知名高等院校的教學醫院。曾被中國人民解放軍 空軍后勤部衛生部評為衛生工作先進單位,先后兩次榮立集�� �二等功。 original issue reported on code google com by gmail com on jun at
1
53,369
13,261,472,359
IssuesEvent
2020-08-20 19:57:48
icecube-trac/tix4
https://api.github.com/repos/icecube-trac/tix4
closed
DomTools documentation (Trac #1244)
Migrated from Trac combo reconstruction defect
no documentation other than release notes, no maintainer listed <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1244">https://code.icecube.wisc.edu/projects/icecube/ticket/1244</a>, reported by kjmeagherand owned by olivas</em></summary> <p> ```json { "status": "closed", "changetime": "2019-02-13T14:11:57", "_ts": "1550067117911749", "description": "no documentation other than release notes, no maintainer listed", "reporter": "kjmeagher", "cc": "", "resolution": "fixed", "time": "2015-08-20T08:49:36", "component": "combo reconstruction", "summary": "DomTools documentation", "priority": "blocker", "keywords": "", "milestone": "", "owner": "olivas", "type": "defect" } ``` </p> </details>
1.0
DomTools documentation (Trac #1244) - no documentation other than release notes, no maintainer listed <details> <summary><em>Migrated from <a href="https://code.icecube.wisc.edu/projects/icecube/ticket/1244">https://code.icecube.wisc.edu/projects/icecube/ticket/1244</a>, reported by kjmeagherand owned by olivas</em></summary> <p> ```json { "status": "closed", "changetime": "2019-02-13T14:11:57", "_ts": "1550067117911749", "description": "no documentation other than release notes, no maintainer listed", "reporter": "kjmeagher", "cc": "", "resolution": "fixed", "time": "2015-08-20T08:49:36", "component": "combo reconstruction", "summary": "DomTools documentation", "priority": "blocker", "keywords": "", "milestone": "", "owner": "olivas", "type": "defect" } ``` </p> </details>
defect
domtools documentation trac no documentation other than release notes no maintainer listed migrated from json status closed changetime ts description no documentation other than release notes no maintainer listed reporter kjmeagher cc resolution fixed time component combo reconstruction summary domtools documentation priority blocker keywords milestone owner olivas type defect
1
48,241
13,067,560,375
IssuesEvent
2020-07-31 00:51:12
icecube-trac/tix2
https://api.github.com/repos/icecube-trac/tix2
closed
[steamshovel] Duplicated screenshot implementation (Trac #2043)
Migrated from Trac combo core defect
The python api provides a way to take a screenshot, but this is out of sync with the menu-based screenshot. Specifically for IceTop, the menu-based screenshot captures all the IceTop widgets while the python api version only does the main opengl window. Migrated from https://code.icecube.wisc.edu/ticket/2043 ```json { "status": "closed", "changetime": "2019-02-13T14:14:03", "description": "The python api provides a way to take a screenshot, but this is out of sync with the menu-based screenshot.\n\nSpecifically for IceTop, the menu-based screenshot captures all the IceTop widgets while the python api version only does the main opengl window.", "reporter": "david.schultz", "cc": "", "resolution": "fixed", "_ts": "1550067243750755", "component": "combo core", "summary": "[steamshovel] Duplicated screenshot implementation", "priority": "major", "keywords": "steamshovel", "time": "2017-06-23T20:37:41", "milestone": "", "owner": "sander.vanheule", "type": "defect" } ```
1.0
[steamshovel] Duplicated screenshot implementation (Trac #2043) - The python api provides a way to take a screenshot, but this is out of sync with the menu-based screenshot. Specifically for IceTop, the menu-based screenshot captures all the IceTop widgets while the python api version only does the main opengl window. Migrated from https://code.icecube.wisc.edu/ticket/2043 ```json { "status": "closed", "changetime": "2019-02-13T14:14:03", "description": "The python api provides a way to take a screenshot, but this is out of sync with the menu-based screenshot.\n\nSpecifically for IceTop, the menu-based screenshot captures all the IceTop widgets while the python api version only does the main opengl window.", "reporter": "david.schultz", "cc": "", "resolution": "fixed", "_ts": "1550067243750755", "component": "combo core", "summary": "[steamshovel] Duplicated screenshot implementation", "priority": "major", "keywords": "steamshovel", "time": "2017-06-23T20:37:41", "milestone": "", "owner": "sander.vanheule", "type": "defect" } ```
defect
duplicated screenshot implementation trac the python api provides a way to take a screenshot but this is out of sync with the menu based screenshot specifically for icetop the menu based screenshot captures all the icetop widgets while the python api version only does the main opengl window migrated from json status closed changetime description the python api provides a way to take a screenshot but this is out of sync with the menu based screenshot n nspecifically for icetop the menu based screenshot captures all the icetop widgets while the python api version only does the main opengl window reporter david schultz cc resolution fixed ts component combo core summary duplicated screenshot implementation priority major keywords steamshovel time milestone owner sander vanheule type defect
1
99,394
8,699,406,838
IssuesEvent
2018-12-05 04:02:01
astropy/astropy
https://api.github.com/repos/astropy/astropy
closed
Tests are not picked up for pytest >=3.7 on LTS
:fire: testing
For some yet unknown reason the tests are not picked up by the test collection only the rst files from the narrative documentation on the LTS branch when using pytest 3.7+ I think at least understanding, preferable fixing, this is critical for the release. ``` ================================================= test session starts ================================================== platform darwin -- Python 3.7.0, pytest-3.7.4, py-1.6.0, pluggy-0.7.1 Running tests with Astropy version 2.0.10.dev19739. Running tests in astropy docs. Date: 2018-11-24T13:44:00 Platform: Darwin-17.7.0-x86_64-i386-64bit Executable: /usr/local/opt/python/bin/python3.7 Full Python Version: 3.7.0 (default, Sep 18 2018, 18:47:22) [Clang 9.1.0 (clang-902.0.39.2)] encodings: sys: utf-8, locale: UTF-8, filesystem: utf-8 byteorder: little float info: dig: 15, mant_dig: 15 Numpy: 1.15.4 Scipy: 1.1.0 Matplotlib: 3.0.2 h5py: 2.8.0 Pandas: 0.23.4 Cython: 0.28.5 astropy_helpers: 3.1rc1 Using Astropy options: remote_data: none. rootdir: /private/var/folders/dc/hsm7tqpx2d57n7vb3k1l81xw0000gq/T/astropy-test-l155hvv3/lib/python3.7/site-packages, inifile: setup.cfg plugins: cov-2.6.0, arraydiff-0.2 collected 168 items docs/changelog.rst . [ 0%] docs/credits.rst . [ 1%] docs/getting_started.rst . [ 1%] docs/importing_astropy.rst . [ 2%] ... ... docs/whatsnew/2.0.rst . [ 99%] docs/whatsnew/index.rst . [100%] ============================================== 168 passed in 8.68 seconds ============================================== ``` cc @dan @eteq @astrofrog
1.0
Tests are not picked up for pytest >=3.7 on LTS - For some yet unknown reason the tests are not picked up by the test collection only the rst files from the narrative documentation on the LTS branch when using pytest 3.7+ I think at least understanding, preferable fixing, this is critical for the release. ``` ================================================= test session starts ================================================== platform darwin -- Python 3.7.0, pytest-3.7.4, py-1.6.0, pluggy-0.7.1 Running tests with Astropy version 2.0.10.dev19739. Running tests in astropy docs. Date: 2018-11-24T13:44:00 Platform: Darwin-17.7.0-x86_64-i386-64bit Executable: /usr/local/opt/python/bin/python3.7 Full Python Version: 3.7.0 (default, Sep 18 2018, 18:47:22) [Clang 9.1.0 (clang-902.0.39.2)] encodings: sys: utf-8, locale: UTF-8, filesystem: utf-8 byteorder: little float info: dig: 15, mant_dig: 15 Numpy: 1.15.4 Scipy: 1.1.0 Matplotlib: 3.0.2 h5py: 2.8.0 Pandas: 0.23.4 Cython: 0.28.5 astropy_helpers: 3.1rc1 Using Astropy options: remote_data: none. rootdir: /private/var/folders/dc/hsm7tqpx2d57n7vb3k1l81xw0000gq/T/astropy-test-l155hvv3/lib/python3.7/site-packages, inifile: setup.cfg plugins: cov-2.6.0, arraydiff-0.2 collected 168 items docs/changelog.rst . [ 0%] docs/credits.rst . [ 1%] docs/getting_started.rst . [ 1%] docs/importing_astropy.rst . [ 2%] ... ... docs/whatsnew/2.0.rst . [ 99%] docs/whatsnew/index.rst . [100%] ============================================== 168 passed in 8.68 seconds ============================================== ``` cc @dan @eteq @astrofrog
non_defect
tests are not picked up for pytest on lts for some yet unknown reason the tests are not picked up by the test collection only the rst files from the narrative documentation on the lts branch when using pytest i think at least understanding preferable fixing this is critical for the release test session starts platform darwin python pytest py pluggy running tests with astropy version running tests in astropy docs date platform darwin executable usr local opt python bin full python version default sep encodings sys utf locale utf filesystem utf byteorder little float info dig mant dig numpy scipy matplotlib pandas cython astropy helpers using astropy options remote data none rootdir private var folders dc t astropy test lib site packages inifile setup cfg plugins cov arraydiff collected items docs changelog rst docs credits rst docs getting started rst docs importing astropy rst docs whatsnew rst docs whatsnew index rst passed in seconds cc dan eteq astrofrog
0
306,436
26,467,853,782
IssuesEvent
2023-01-17 02:51:16
systemd/systemd
https://api.github.com/repos/systemd/systemd
closed
The fuzz targets no longer cover some corner cases
tests fuzzing
It appears there have been a few PRs like https://github.com/systemd/systemd/pull/23358 where arbitrary limits were introduced without scaling down constants and stuff like that, which prevents the fuzz targets from covering corner cases. It's not ideal because the point of fuzz targets among other things is to hit corner cases because they aren't tested that well normally and corner cases are where buffer overflows are usually lurking.
1.0
The fuzz targets no longer cover some corner cases - It appears there have been a few PRs like https://github.com/systemd/systemd/pull/23358 where arbitrary limits were introduced without scaling down constants and stuff like that, which prevents the fuzz targets from covering corner cases. It's not ideal because the point of fuzz targets among other things is to hit corner cases because they aren't tested that well normally and corner cases are where buffer overflows are usually lurking.
non_defect
the fuzz targets no longer cover some corner cases it appears there have been a few prs like where arbitrary limits were introduced without scaling down constants and stuff like that which prevents the fuzz targets from covering corner cases it s not ideal because the point of fuzz targets among other things is to hit corner cases because they aren t tested that well normally and corner cases are where buffer overflows are usually lurking
0
71,551
23,690,499,387
IssuesEvent
2022-08-29 10:19:51
pymc-devs/pymc
https://api.github.com/repos/pymc-devs/pymc
closed
Implied dimensions of RVs are not broadcasted by dims or observed
defects shape problem
The dims argument is not respected when a random variable is created with parameters that broadcast to the desired output dimensions: ```python coords = { "dim1": pd.RangeIndex(10), "dim2": pd.RangeIndex(7) } with pm.Model(coords=coords) as model: mu = np.zeros((10, 1)) x = pm.Normal("x", mu=mu, dims=("dim1", "dim2")) y = pm.Normal("y", mu=mu, dims=("dim1", "dim2"), shape=(10, 7)) x.eval().shape # Returns (10, 1), when it should be (10, 7) y.eval().shape # Correctly returns (10, 7) ``` * PyMC/PyMC3 Version: latest release 4.1.3 * Aesara/Theano Version: * Python Version: * Operating system: * How did you install PyMC/PyMC3: conda
1.0
Implied dimensions of RVs are not broadcasted by dims or observed - The dims argument is not respected when a random variable is created with parameters that broadcast to the desired output dimensions: ```python coords = { "dim1": pd.RangeIndex(10), "dim2": pd.RangeIndex(7) } with pm.Model(coords=coords) as model: mu = np.zeros((10, 1)) x = pm.Normal("x", mu=mu, dims=("dim1", "dim2")) y = pm.Normal("y", mu=mu, dims=("dim1", "dim2"), shape=(10, 7)) x.eval().shape # Returns (10, 1), when it should be (10, 7) y.eval().shape # Correctly returns (10, 7) ``` * PyMC/PyMC3 Version: latest release 4.1.3 * Aesara/Theano Version: * Python Version: * Operating system: * How did you install PyMC/PyMC3: conda
defect
implied dimensions of rvs are not broadcasted by dims or observed the dims argument is not respected when a random variable is created with parameters that broadcast to the desired output dimensions python coords pd rangeindex pd rangeindex with pm model coords coords as model mu np zeros x pm normal x mu mu dims y pm normal y mu mu dims shape x eval shape returns when it should be y eval shape correctly returns pymc version latest release aesara theano version python version operating system how did you install pymc conda
1
104,017
8,958,291,104
IssuesEvent
2019-01-27 13:07:36
SunwellWoW/Sunwell-TBC-Bugtracker
https://api.github.com/repos/SunwellWoW/Sunwell-TBC-Bugtracker
reopened
[NPC] Venomhide Ravasaur
Pathfinding/AI/NPC Issue Resolved - fix NOT live yet Resolved - retest required
Description: Venomhide Ravasaur casts Venomhide Poison at itself instead of its target. How it works: How it should work: Should cast Venomhide Poison on its target. Source (you should point out proofs of your report, please give us some source):
1.0
[NPC] Venomhide Ravasaur - Description: Venomhide Ravasaur casts Venomhide Poison at itself instead of its target. How it works: How it should work: Should cast Venomhide Poison on its target. Source (you should point out proofs of your report, please give us some source):
non_defect
venomhide ravasaur description venomhide ravasaur casts venomhide poison at itself instead of its target how it works how it should work should cast venomhide poison on its target source you should point out proofs of your report please give us some source
0
544,806
15,897,451,307
IssuesEvent
2021-04-11 21:08:00
ita-social-projects/TeachUA
https://api.github.com/repos/ita-social-projects/TeachUA
opened
[Affected functionality] Clear and concise summary, e.g. "[Create news] 'Publish' button is not displayed on the 'Preview' page"
Priority: High bug
**Environment:** macOS Big Sur 11.1, Google Chrome 89.0.4 **Reproducible:** always **Build found:** last commit from https://speak-ukrainian.org.ua/dev/ **Preconditions** 1. Go to https://speak-ukrainian.org.ua/dev/ 2. Log in as admin (e.g. email: admin@gmail.com, password: admin). **Steps to reproduce** 1. Hover on the login item. 2. Take a look at the "Адмін" label. **Actual result** The "Адмін" label is not aligned. <img width="630" alt="Знімок екрана 2021-04-11 о 23 55 13" src="https://user-images.githubusercontent.com/78917926/114321317-f534be80-9b22-11eb-9100-0a494c6eef6b.png"> **Expected result** The "Адмін" label is aligned relative to other menu's items. **User story and test case links** E.g.: "User story #108 #166 **Labels to be added** "Bug", Priority ("pri: high"), Severity ("severity: minor"), Type ("UI")
1.0
[Affected functionality] Clear and concise summary, e.g. "[Create news] 'Publish' button is not displayed on the 'Preview' page" - **Environment:** macOS Big Sur 11.1, Google Chrome 89.0.4 **Reproducible:** always **Build found:** last commit from https://speak-ukrainian.org.ua/dev/ **Preconditions** 1. Go to https://speak-ukrainian.org.ua/dev/ 2. Log in as admin (e.g. email: admin@gmail.com, password: admin). **Steps to reproduce** 1. Hover on the login item. 2. Take a look at the "Адмін" label. **Actual result** The "Адмін" label is not aligned. <img width="630" alt="Знімок екрана 2021-04-11 о 23 55 13" src="https://user-images.githubusercontent.com/78917926/114321317-f534be80-9b22-11eb-9100-0a494c6eef6b.png"> **Expected result** The "Адмін" label is aligned relative to other menu's items. **User story and test case links** E.g.: "User story #108 #166 **Labels to be added** "Bug", Priority ("pri: high"), Severity ("severity: minor"), Type ("UI")
non_defect
clear and concise summary e g publish button is not displayed on the preview page environment macos big sur google chrome reproducible always build found last commit from preconditions go to log in as admin e g email admin gmail com password admin steps to reproduce hover on the login item take a look at the адмін label actual result the адмін label is not aligned img width alt знімок екрана о src expected result the адмін label is aligned relative to other menu s items user story and test case links e g user story labels to be added bug priority pri high severity severity minor type ui
0
77,975
27,261,037,744
IssuesEvent
2023-02-22 14:55:01
matrix-org/synapse
https://api.github.com/repos/matrix-org/synapse
opened
Waiting for streams to catch up when processing HTTP replication can get stuck timing out
A-Workers S-Major T-Defect O-Uncommon
https://github.com/matrix-org/synapse/pull/14820 added code to wait for streams to catch up when receiving HTTP replication responses. We've seen that code hit a failure mode where all waits on the `backfill` stream start timing out, on a deployment where backfill is very rare. It's not clear how Synapse entered that state or how to reproduce it yet.
1.0
Waiting for streams to catch up when processing HTTP replication can get stuck timing out - https://github.com/matrix-org/synapse/pull/14820 added code to wait for streams to catch up when receiving HTTP replication responses. We've seen that code hit a failure mode where all waits on the `backfill` stream start timing out, on a deployment where backfill is very rare. It's not clear how Synapse entered that state or how to reproduce it yet.
defect
waiting for streams to catch up when processing http replication can get stuck timing out added code to wait for streams to catch up when receiving http replication responses we ve seen that code hit a failure mode where all waits on the backfill stream start timing out on a deployment where backfill is very rare it s not clear how synapse entered that state or how to reproduce it yet
1
1,163
2,599,627,375
IssuesEvent
2015-02-23 10:22:24
v-l-m/vlm
https://api.github.com/repos/v-l-m/vlm
closed
Fixer l'encodage des fichiers source
C: site P: major R: fixed T: defect
**Reported by paparazzia on 29 Nov 2008 13:19 UTC** L'historique du projet conduit les fichiers contenir des encodages multiples (Windows/latin1, iso-8859-1, utf-8)... il faudrait nettoyer et se mettre d'accord sur une convention !
1.0
Fixer l'encodage des fichiers source - **Reported by paparazzia on 29 Nov 2008 13:19 UTC** L'historique du projet conduit les fichiers contenir des encodages multiples (Windows/latin1, iso-8859-1, utf-8)... il faudrait nettoyer et se mettre d'accord sur une convention !
defect
fixer l encodage des fichiers source reported by paparazzia on nov utc l historique du projet conduit les fichiers contenir des encodages multiples windows iso utf il faudrait nettoyer et se mettre d accord sur une convention
1
255,357
27,484,918,816
IssuesEvent
2023-03-04 01:34:39
panasalap/linux-4.1.15
https://api.github.com/repos/panasalap/linux-4.1.15
closed
CVE-2020-29368 (High) detected in linux-yocto-devv4.2.8 - autoclosed
security vulnerability
## CVE-2020-29368 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-devv4.2.8</b></p></summary> <p> <p>Linux Embedded Kernel - tracks the next mainline release</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto-dev>https://git.yoctoproject.org/git/linux-yocto-dev</a></p> <p>Found in HEAD commit: <a href="https://github.com/panasalap/linux-4.1.15/commit/aae4c2fa46027fd4c477372871df090c6b94f3f1">aae4c2fa46027fd4c477372871df090c6b94f3f1</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/mm/huge_memory.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1. <p>Publish Date: 2020-11-28 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-29368>CVE-2020-29368</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29368</a></p> <p>Release Date: 2020-11-28</p> <p>Fix Resolution: v5.8-rc1,v5.7.5,v5.4.48</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-29368 (High) detected in linux-yocto-devv4.2.8 - autoclosed - ## CVE-2020-29368 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-devv4.2.8</b></p></summary> <p> <p>Linux Embedded Kernel - tracks the next mainline release</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto-dev>https://git.yoctoproject.org/git/linux-yocto-dev</a></p> <p>Found in HEAD commit: <a href="https://github.com/panasalap/linux-4.1.15/commit/aae4c2fa46027fd4c477372871df090c6b94f3f1">aae4c2fa46027fd4c477372871df090c6b94f3f1</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/mm/huge_memory.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1. <p>Publish Date: 2020-11-28 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-29368>CVE-2020-29368</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29368">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29368</a></p> <p>Release Date: 2020-11-28</p> <p>Fix Resolution: v5.8-rc1,v5.7.5,v5.4.48</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve high detected in linux yocto autoclosed cve high severity vulnerability vulnerable library linux yocto linux embedded kernel tracks the next mainline release library home page a href found in head commit a href found in base branch master vulnerable source files mm huge memory c vulnerability details an issue was discovered in split huge pmd in mm huge memory c in the linux kernel before the copy on write implementation can grant unintended write access because of a race condition in a thp mapcount check aka cid publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
18,026
3,020,332,951
IssuesEvent
2015-07-31 06:58:41
laurentpetit/ccw
https://api.github.com/repos/laurentpetit/ccw
closed
clj file parsing stops when encounters datomic's #db/id
defect outline Priority-Medium
Original [issue 509](https://code.google.com/p/counterclockwise/issues/detail?id=509) created by laurentpetit on 2013-01-20T18:07:38.000Z: When a CLJ file contains Datomic's #db/id reader function, CCW stops parsing with the following error: eclipse.buildId=M20120208-0800 java.version=1.7.0_11 java.vendor=Oracle Corporation BootLoader constants: OS=win32, ARCH=x86_64, WS=win32, NL=en_US Framework arguments: -product org.eclipse.epp.package.rcp.product Command-line arguments: -os win32 -ws win32 -arch x86_64 -product org.eclipse.epp.package.rcp.product Warning Sun Jan 20 10:04:53 PST 2013 Failed to read file core.clj (java.lang.RuntimeException: No reader function for tag db/id)
1.0
clj file parsing stops when encounters datomic's #db/id - Original [issue 509](https://code.google.com/p/counterclockwise/issues/detail?id=509) created by laurentpetit on 2013-01-20T18:07:38.000Z: When a CLJ file contains Datomic's #db/id reader function, CCW stops parsing with the following error: eclipse.buildId=M20120208-0800 java.version=1.7.0_11 java.vendor=Oracle Corporation BootLoader constants: OS=win32, ARCH=x86_64, WS=win32, NL=en_US Framework arguments: -product org.eclipse.epp.package.rcp.product Command-line arguments: -os win32 -ws win32 -arch x86_64 -product org.eclipse.epp.package.rcp.product Warning Sun Jan 20 10:04:53 PST 2013 Failed to read file core.clj (java.lang.RuntimeException: No reader function for tag db/id)
defect
clj file parsing stops when encounters datomic s db id original created by laurentpetit on when a clj file contains datomic s db id reader function ccw stops parsing with the following error eclipse buildid java version java vendor oracle corporation bootloader constants os arch ws nl en us framework arguments product org eclipse epp package rcp product command line arguments os ws arch product org eclipse epp package rcp product warning sun jan pst failed to read file core clj java lang runtimeexception no reader function for tag db id
1
46,470
13,170,446,905
IssuesEvent
2020-08-11 15:10:46
shaundmorris/ddf
https://api.github.com/repos/shaundmorris/ddf
closed
CVE-2018-20190 Medium Severity Vulnerability detected by WhiteSource
security vulnerability wontfix
## CVE-2018-20190 - Medium Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sassv4.9.4</b></p></summary> <p> <p>:rainbow: Node.js bindings to libsass</p> <p>Library home page: <a href=https://github.com/sass/node-sass.git>https://github.com/sass/node-sass.git</a></p> </p> </details> </p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Library Source Files (121)</summary> <p></p> <p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p> <p> - /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/output.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/output.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/bind.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_node.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/constants.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/eval.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/base.h - /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/extend.cpp - /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.cpp - /ddf/ui/node_modules/node-sass/src/libsass/contrib/plugin.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_superselector.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cencode.c - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/file.cpp - /ddf/ui/node_modules/node-sass/src/callback_bridge.h - /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass2scss.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/environment.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/paths.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/expand.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/listize.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_unification.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/list.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/json.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/position.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/listize.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/string.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/eval.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/environment.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/boolean.h - /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/extend.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/functions.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/debugger.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/factory.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/color.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/operation.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/constants.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/boolean.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/context.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/value.h - /ddf/ui/node_modules/node-sass/src/libsass/src/units.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/parser.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/functions.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/position.hpp - /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/node.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.cpp - /ddf/ui/node_modules/node-sass/src/binding.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/list.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/functions.h - /ddf/ui/node_modules/node-sass/src/custom_function_bridge.cpp - /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.h - /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/sass_value_wrapper.h - /ddf/ui/node_modules/node-sass/src/libsass/src/ast.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/values.cpp - /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.h - /ddf/ui/node_modules/node-sass/src/libsass/src/b64/encode.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/base64vlq.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/number.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/c99func.c - /ddf/ui/node_modules/node-sass/src/libsass/src/node.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/util.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/backtrace.hpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/values.h - /ddf/ui/node_modules/node-sass/src/libsass/test/test_subset_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass2scss.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/null.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/expand.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/context.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/context.h - /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.hpp - /ddf/ui/node_modules/node-sass/src/libsass/script/test-leaks.pl - /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/util.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/file.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/units.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/color.h - /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/debug.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/parser.hpp </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In LibSass 3.5.5, a NULL Pointer Dereference in the function Sass::Eval::operator()(Sass::Supports_Operator*) in eval.cpp may cause a Denial of Service (application crash) via a crafted sass input file. <p>Publish Date: 2018-12-17 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20190>CVE-2018-20190</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-20190 Medium Severity Vulnerability detected by WhiteSource - ## CVE-2018-20190 - Medium Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sassv4.9.4</b></p></summary> <p> <p>:rainbow: Node.js bindings to libsass</p> <p>Library home page: <a href=https://github.com/sass/node-sass.git>https://github.com/sass/node-sass.git</a></p> </p> </details> </p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Library Source Files (121)</summary> <p></p> <p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p> <p> - /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/output.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/output.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/bind.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_node.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/constants.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/eval.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/base.h - /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/extend.cpp - /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.cpp - /ddf/ui/node_modules/node-sass/src/libsass/contrib/plugin.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_superselector.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cencode.c - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/file.cpp - /ddf/ui/node_modules/node-sass/src/callback_bridge.h - /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass2scss.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/environment.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/paths.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/expand.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/listize.cpp - /ddf/ui/node_modules/node-sass/src/libsass/test/test_unification.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/list.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/json.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/position.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/listize.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/string.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/eval.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/environment.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/boolean.h - /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/extend.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/functions.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/debugger.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/factory.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/color.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/operation.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/constants.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/boolean.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/context.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/value.h - /ddf/ui/node_modules/node-sass/src/libsass/src/units.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/parser.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/functions.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/position.hpp - /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/node.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.cpp - /ddf/ui/node_modules/node-sass/src/binding.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/list.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/functions.h - /ddf/ui/node_modules/node-sass/src/custom_function_bridge.cpp - /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.h - /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/sass_value_wrapper.h - /ddf/ui/node_modules/node-sass/src/libsass/src/ast.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/values.cpp - /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.h - /ddf/ui/node_modules/node-sass/src/libsass/src/b64/encode.h - /ddf/ui/node_modules/node-sass/src/libsass/src/sass.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/base64vlq.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/number.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/c99func.c - /ddf/ui/node_modules/node-sass/src/libsass/src/node.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/util.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/backtrace.hpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/values.h - /ddf/ui/node_modules/node-sass/src/libsass/test/test_subset_map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass2scss.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.cpp - /ddf/ui/node_modules/node-sass/src/sass_types/null.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/expand.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/context.cpp - /ddf/ui/node_modules/node-sass/src/libsass/include/sass/context.h - /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.hpp - /ddf/ui/node_modules/node-sass/src/libsass/script/test-leaks.pl - /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/util.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/map.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/file.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/units.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.hpp - /ddf/ui/node_modules/node-sass/src/sass_types/color.h - /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.cpp - /ddf/ui/node_modules/node-sass/src/libsass/src/debug.hpp - /ddf/ui/node_modules/node-sass/src/libsass/src/parser.hpp </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In LibSass 3.5.5, a NULL Pointer Dereference in the function Sass::Eval::operator()(Sass::Supports_Operator*) in eval.cpp may cause a Denial of Service (application crash) via a crafted sass input file. <p>Publish Date: 2018-12-17 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20190>CVE-2018-20190</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_defect
cve medium severity vulnerability detected by whitesource cve medium severity vulnerability vulnerable library node rainbow node js bindings to libsass library home page a href library source files the source files were matched to this source library based on a best effort match source libraries are selected from a list of probable public libraries ddf ui node modules node sass src libsass src error handling cpp ddf ui node modules node sass src libsass src output cpp ddf ui node modules node sass src libsass src output hpp ddf ui node modules node sass src libsass src check nesting cpp ddf ui node modules node sass src libsass src sass values hpp ddf ui node modules node sass src libsass src check nesting hpp ddf ui node modules node sass src libsass src bind cpp ddf ui node modules node sass src libsass test test node cpp ddf ui node modules node sass src libsass src constants cpp ddf ui node modules node sass src libsass src eval hpp ddf ui node modules node sass src libsass src plugins cpp ddf ui node modules node sass src libsass include sass base h ddf ui node modules node sass src libsass src prelexer hpp ddf ui node modules node sass src libsass src subset map hpp ddf ui node modules node sass src libsass src extend cpp ddf ui node modules node sass src custom importer bridge cpp ddf ui node modules node sass src libsass contrib plugin cpp ddf ui node modules node sass src libsass src lexer hpp ddf ui node modules node sass src libsass src sass util cpp ddf ui node modules node sass src libsass test test superselector cpp ddf ui node modules node sass src libsass src cencode c ddf ui node modules node sass src libsass src ast fwd decl hpp ddf ui node modules node sass src libsass src string hpp ddf ui node modules node sass src libsass src file cpp ddf ui node modules node sass src callback bridge h ddf ui node modules node sass src libsass src subset map cpp ddf ui node modules node sass src libsass include h ddf ui node modules node sass src libsass src sass functions hpp ddf ui node modules node sass src libsass src emitter cpp ddf ui node modules node sass src libsass src environment cpp ddf ui node modules node sass src libsass src ast def macros hpp ddf ui node modules node sass src libsass src paths hpp ddf ui node modules node sass src libsass src expand cpp ddf ui node modules node sass src libsass src listize cpp ddf ui node modules node sass src libsass test test unification cpp ddf ui node modules node sass src libsass src source map cpp ddf ui node modules node sass src libsass src inspect cpp ddf ui node modules node sass src libsass src source map hpp ddf ui node modules node sass src sass types list h ddf ui node modules node sass src libsass src sass functions cpp ddf ui node modules node sass src libsass src json cpp ddf ui node modules node sass src libsass src sass util hpp ddf ui node modules node sass src libsass src position cpp ddf ui node modules node sass src libsass src listize hpp ddf ui node modules node sass src libsass src error handling hpp ddf ui node modules node sass src sass types string cpp ddf ui node modules node sass src libsass src eval cpp ddf ui node modules node sass src libsass src environment hpp ddf ui node modules node sass src sass types boolean h ddf ui node modules node sass src libsass src emitter hpp ddf ui node modules node sass src libsass src extend hpp ddf ui node modules node sass src libsass src lexer cpp ddf ui node modules node sass src libsass src functions cpp ddf ui node modules node sass src libsass src debugger hpp ddf ui node modules node sass src sass types factory cpp ddf ui node modules node sass src libsass src prelexer cpp ddf ui node modules node sass src sass types color cpp ddf ui node modules node sass src libsass src operation hpp ddf ui node modules node sass src libsass src ast cpp ddf ui node modules node sass src libsass src sass hpp ddf ui node modules node sass src libsass src constants hpp ddf ui node modules node sass src sass types boolean cpp ddf ui node modules node sass src libsass src context hpp ddf ui node modules node sass src sass types value h ddf ui node modules node sass src libsass src units cpp ddf ui node modules node sass src libsass src cssize hpp ddf ui node modules node sass src libsass src parser cpp ddf ui node modules node sass src libsass src functions hpp ddf ui node modules node sass src libsass src position hpp ddf ui node modules node sass src sass context wrapper cpp ddf ui node modules node sass src libsass src sass context hpp ddf ui node modules node sass src libsass src node cpp ddf ui node modules node sass src libsass src ast fwd decl cpp ddf ui node modules node sass src libsass src cssize cpp ddf ui node modules node sass src libsass src remove placeholders cpp ddf ui node modules node sass src binding cpp ddf ui node modules node sass src sass types list cpp ddf ui node modules node sass src libsass include sass functions h ddf ui node modules node sass src custom function bridge cpp ddf ui node modules node sass src custom importer bridge h ddf ui node modules node sass src libsass src color maps cpp ddf ui node modules node sass src libsass src string cpp ddf ui node modules node sass src sass types sass value wrapper h ddf ui node modules node sass src libsass src ast hpp ddf ui node modules node sass src libsass src values cpp ddf ui node modules node sass src sass context wrapper h ddf ui node modules node sass src libsass src encode h ddf ui node modules node sass src libsass src sass cpp ddf ui node modules node sass src libsass src cpp ddf ui node modules node sass src sass types number cpp ddf ui node modules node sass src libsass src c ddf ui node modules node sass src libsass src node hpp ddf ui node modules node sass src libsass src remove placeholders hpp ddf ui node modules node sass src libsass src util cpp ddf ui node modules node sass src libsass src memory sharedptr hpp ddf ui node modules node sass src libsass src backtrace hpp ddf ui node modules node sass src libsass include sass values h ddf ui node modules node sass src libsass test test subset map cpp ddf ui node modules node sass src libsass src cpp ddf ui node modules node sass src libsass src sass context cpp ddf ui node modules node sass src libsass src memory sharedptr cpp ddf ui node modules node sass src sass types null cpp ddf ui node modules node sass src libsass src expand hpp ddf ui node modules node sass src libsass src to value hpp ddf ui node modules node sass src libsass src context cpp ddf ui node modules node sass src libsass include sass context h ddf ui node modules node sass src libsass src to c cpp ddf ui node modules node sass src libsass src sass values cpp ddf ui node modules node sass src libsass src color maps hpp ddf ui node modules node sass src libsass src inspect hpp ddf ui node modules node sass src libsass script test leaks pl ddf ui node modules node sass src libsass src to c hpp ddf ui node modules node sass src libsass src util hpp ddf ui node modules node sass src sass types map cpp ddf ui node modules node sass src libsass src file hpp ddf ui node modules node sass src libsass src units hpp ddf ui node modules node sass src libsass src plugins hpp ddf ui node modules node sass src sass types color h ddf ui node modules node sass src libsass src to value cpp ddf ui node modules node sass src libsass src debug hpp ddf ui node modules node sass src libsass src parser hpp vulnerability details in libsass a null pointer dereference in the function sass eval operator sass supports operator in eval cpp may cause a denial of service application crash via a crafted sass input file publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with whitesource
0
38,900
9,011,468,353
IssuesEvent
2019-02-05 14:46:15
hazelcast/hazelcast-jet
https://api.github.com/repos/hazelcast/hazelcast-jet
closed
Corrupted snapshot when adding a new instance?
core defect
[This code](https://github.com/jerrinot/jetexper/blob/master/src/main/java/info/jerrinot/jetexper/Main.java) reliably fails with: ``` Exception in thread "main" java.util.concurrent.CompletionException: com.hazelcast.jet.JetException: State for job 'myJob', execution d9fa-ce2c-9188-f677 in '__jet.snapshot.c03f-1517-ca24-b017.1' corrupted: it should have 3 entries, but has 10 entries at java.base/java.util.concurrent.CompletableFuture.reportJoin(CompletableFuture.java:412) at java.base/java.util.concurrent.CompletableFuture.join(CompletableFuture.java:2044) at com.hazelcast.jet.Job.join(Job.java:104) at info.jerrinot.jetexper.Main.main(Main.java:78) Caused by: com.hazelcast.jet.JetException: State for job 'myJob', execution d9fa-ce2c-9188-f677 in '__jet.snapshot.c03f-1517-ca24-b017.1' corrupted: it should have 3 entries, but has 10 entries at com.hazelcast.jet.impl.SnapshotValidator.validateSnapshot(SnapshotValidator.java:52) at com.hazelcast.jet.impl.MasterContext.rewriteDagWithSnapshotRestore(MasterContext.java:510) at com.hazelcast.jet.impl.MasterContext.tryStartJob(MasterContext.java:474) at com.hazelcast.jet.impl.JobCoordinationService.tryStartJob(JobCoordinationService.java:711) at com.hazelcast.jet.impl.JobCoordinationService.restartJob(JobCoordinationService.java:557) at com.hazelcast.jet.impl.MasterContext.lambda$finalizeJob$16(MasterContext.java:937) at com.hazelcast.jet.impl.MasterContext.finalizeJob(MasterContext.java:970) at com.hazelcast.jet.impl.MasterContext.lambda$onCompleteExecutionCompleted$14(MasterContext.java:901) at com.hazelcast.jet.impl.util.ExceptionUtil.lambda$withTryCatch$0(ExceptionUtil.java:176) at java.base/java.util.concurrent.CompletableFuture.uniWhenComplete(CompletableFuture.java:859) at java.base/java.util.concurrent.CompletableFuture$UniWhenComplete.tryFire(CompletableFuture.java:837) at java.base/java.util.concurrent.CompletableFuture$Completion.exec(CompletableFuture.java:479) at java.base/java.util.concurrent.ForkJoinTask.doExec(ForkJoinTask.java:290) at java.base/java.util.concurrent.ForkJoinPool.runWorker(ForkJoinPool.java:1603) at java.base/java.util.concurrent.ForkJoinWorkerThread.run(ForkJoinWorkerThread.java:177) at ------ submitted from ------.(Unknown Source) at com.hazelcast.spi.impl.operationservice.impl.InvocationFuture.resolve(InvocationFuture.java:127) at com.hazelcast.spi.impl.AbstractInvocationFuture$1.run(AbstractInvocationFuture.java:250) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1135) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) at java.base/java.lang.Thread.run(Thread.java:844) at com.hazelcast.util.executor.HazelcastManagedThread.executeRun(HazelcastManagedThread.java:64) at com.hazelcast.util.executor.HazelcastManagedThread.run(HazelcastManagedThread.java:80) ``` I am aware sources created via `SourceBuilder` do not provide any processing guarantees, but still I would not expect this. I am on c268f2dced
1.0
Corrupted snapshot when adding a new instance? - [This code](https://github.com/jerrinot/jetexper/blob/master/src/main/java/info/jerrinot/jetexper/Main.java) reliably fails with: ``` Exception in thread "main" java.util.concurrent.CompletionException: com.hazelcast.jet.JetException: State for job 'myJob', execution d9fa-ce2c-9188-f677 in '__jet.snapshot.c03f-1517-ca24-b017.1' corrupted: it should have 3 entries, but has 10 entries at java.base/java.util.concurrent.CompletableFuture.reportJoin(CompletableFuture.java:412) at java.base/java.util.concurrent.CompletableFuture.join(CompletableFuture.java:2044) at com.hazelcast.jet.Job.join(Job.java:104) at info.jerrinot.jetexper.Main.main(Main.java:78) Caused by: com.hazelcast.jet.JetException: State for job 'myJob', execution d9fa-ce2c-9188-f677 in '__jet.snapshot.c03f-1517-ca24-b017.1' corrupted: it should have 3 entries, but has 10 entries at com.hazelcast.jet.impl.SnapshotValidator.validateSnapshot(SnapshotValidator.java:52) at com.hazelcast.jet.impl.MasterContext.rewriteDagWithSnapshotRestore(MasterContext.java:510) at com.hazelcast.jet.impl.MasterContext.tryStartJob(MasterContext.java:474) at com.hazelcast.jet.impl.JobCoordinationService.tryStartJob(JobCoordinationService.java:711) at com.hazelcast.jet.impl.JobCoordinationService.restartJob(JobCoordinationService.java:557) at com.hazelcast.jet.impl.MasterContext.lambda$finalizeJob$16(MasterContext.java:937) at com.hazelcast.jet.impl.MasterContext.finalizeJob(MasterContext.java:970) at com.hazelcast.jet.impl.MasterContext.lambda$onCompleteExecutionCompleted$14(MasterContext.java:901) at com.hazelcast.jet.impl.util.ExceptionUtil.lambda$withTryCatch$0(ExceptionUtil.java:176) at java.base/java.util.concurrent.CompletableFuture.uniWhenComplete(CompletableFuture.java:859) at java.base/java.util.concurrent.CompletableFuture$UniWhenComplete.tryFire(CompletableFuture.java:837) at java.base/java.util.concurrent.CompletableFuture$Completion.exec(CompletableFuture.java:479) at java.base/java.util.concurrent.ForkJoinTask.doExec(ForkJoinTask.java:290) at java.base/java.util.concurrent.ForkJoinPool.runWorker(ForkJoinPool.java:1603) at java.base/java.util.concurrent.ForkJoinWorkerThread.run(ForkJoinWorkerThread.java:177) at ------ submitted from ------.(Unknown Source) at com.hazelcast.spi.impl.operationservice.impl.InvocationFuture.resolve(InvocationFuture.java:127) at com.hazelcast.spi.impl.AbstractInvocationFuture$1.run(AbstractInvocationFuture.java:250) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1135) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:635) at java.base/java.lang.Thread.run(Thread.java:844) at com.hazelcast.util.executor.HazelcastManagedThread.executeRun(HazelcastManagedThread.java:64) at com.hazelcast.util.executor.HazelcastManagedThread.run(HazelcastManagedThread.java:80) ``` I am aware sources created via `SourceBuilder` do not provide any processing guarantees, but still I would not expect this. I am on c268f2dced
defect
corrupted snapshot when adding a new instance reliably fails with exception in thread main java util concurrent completionexception com hazelcast jet jetexception state for job myjob execution in jet snapshot corrupted it should have entries but has entries at java base java util concurrent completablefuture reportjoin completablefuture java at java base java util concurrent completablefuture join completablefuture java at com hazelcast jet job join job java at info jerrinot jetexper main main main java caused by com hazelcast jet jetexception state for job myjob execution in jet snapshot corrupted it should have entries but has entries at com hazelcast jet impl snapshotvalidator validatesnapshot snapshotvalidator java at com hazelcast jet impl mastercontext rewritedagwithsnapshotrestore mastercontext java at com hazelcast jet impl mastercontext trystartjob mastercontext java at com hazelcast jet impl jobcoordinationservice trystartjob jobcoordinationservice java at com hazelcast jet impl jobcoordinationservice restartjob jobcoordinationservice java at com hazelcast jet impl mastercontext lambda finalizejob mastercontext java at com hazelcast jet impl mastercontext finalizejob mastercontext java at com hazelcast jet impl mastercontext lambda oncompleteexecutioncompleted mastercontext java at com hazelcast jet impl util exceptionutil lambda withtrycatch exceptionutil java at java base java util concurrent completablefuture uniwhencomplete completablefuture java at java base java util concurrent completablefuture uniwhencomplete tryfire completablefuture java at java base java util concurrent completablefuture completion exec completablefuture java at java base java util concurrent forkjointask doexec forkjointask java at java base java util concurrent forkjoinpool runworker forkjoinpool java at java base java util concurrent forkjoinworkerthread run forkjoinworkerthread java at submitted from unknown source at com hazelcast spi impl operationservice impl invocationfuture resolve invocationfuture java at com hazelcast spi impl abstractinvocationfuture run abstractinvocationfuture java at java base java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java base java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java base java lang thread run thread java at com hazelcast util executor hazelcastmanagedthread executerun hazelcastmanagedthread java at com hazelcast util executor hazelcastmanagedthread run hazelcastmanagedthread java i am aware sources created via sourcebuilder do not provide any processing guarantees but still i would not expect this i am on
1
64,836
18,945,169,250
IssuesEvent
2021-11-18 09:24:28
line/armeria
https://api.github.com/repos/line/armeria
closed
Fail to :examples:static-files:test in uncommon case
defect good first issue
I had failed to build in my first try at the target ":examples:static-files:test". After several attempt, I discovered the cause. There is the file "index.html" at my home directory already. And I found out that "index.html" recognized earlier than autoIndex. After the file was removed, the build succeeded. I think this is very trivial case, but failure is failure. Ref1: [example.armeria.server.files.MainTest.java:50](https://github.com/line/armeria/blob/master/examples/static-files/src/test/java/example/armeria/server/files/MainTest.java#L50) Ref2: [com.linecorp.armeria.server.file.HttpFileService.java:201](https://github.com/line/armeria/blob/master/core/src/main/java/com/linecorp/armeria/server/file/HttpFileService.java#L201)
1.0
Fail to :examples:static-files:test in uncommon case - I had failed to build in my first try at the target ":examples:static-files:test". After several attempt, I discovered the cause. There is the file "index.html" at my home directory already. And I found out that "index.html" recognized earlier than autoIndex. After the file was removed, the build succeeded. I think this is very trivial case, but failure is failure. Ref1: [example.armeria.server.files.MainTest.java:50](https://github.com/line/armeria/blob/master/examples/static-files/src/test/java/example/armeria/server/files/MainTest.java#L50) Ref2: [com.linecorp.armeria.server.file.HttpFileService.java:201](https://github.com/line/armeria/blob/master/core/src/main/java/com/linecorp/armeria/server/file/HttpFileService.java#L201)
defect
fail to examples static files test in uncommon case i had failed to build in my first try at the target examples static files test after several attempt i discovered the cause there is the file index html at my home directory already and i found out that index html recognized earlier than autoindex after the file was removed the build succeeded i think this is very trivial case but failure is failure
1
247,874
20,988,431,359
IssuesEvent
2022-03-29 06:59:07
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
roachtest: schemachange/index/tpcc/w=1000 failed
C-test-failure O-robot O-roachtest branch-master release-blocker T-sql-schema
roachtest.schemachange/index/tpcc/w=1000 [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=4713654&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=4713654&tab=artifacts#/schemachange/index/tpcc/w=1000) on master @ [29716850b181718594663889ddb5f479fef7a305](https://github.com/cockroachdb/cockroach/commits/29716850b181718594663889ddb5f479fef7a305): ``` The test failed on branch=master, cloud=gce: test artifacts and logs in: /artifacts/schemachange/index/tpcc/w=1000/run_1 cluster.go:1868,tpcc.go:141,tpcc.go:146,tpcc.go:176,tpcc.go:223,schemachange.go:313,test_runner.go:875: one or more parallel execution failure (1) attached stack trace -- stack trace: | github.com/cockroachdb/cockroach/pkg/roachprod/install.(*SyncedCluster).ParallelE | github.com/cockroachdb/cockroach/pkg/roachprod/install/cluster_synced.go:2042 | github.com/cockroachdb/cockroach/pkg/roachprod/install.(*SyncedCluster).Parallel | github.com/cockroachdb/cockroach/pkg/roachprod/install/cluster_synced.go:1923 | github.com/cockroachdb/cockroach/pkg/roachprod/install.(*SyncedCluster).Start | github.com/cockroachdb/cockroach/pkg/roachprod/install/cockroach.go:167 | github.com/cockroachdb/cockroach/pkg/roachprod.Start | github.com/cockroachdb/cockroach/pkg/roachprod/roachprod.go:660 | main.(*clusterImpl).StartE | main/pkg/cmd/roachtest/cluster.go:1826 | main.(*clusterImpl).Start | main/pkg/cmd/roachtest/cluster.go:1867 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.setupTPCC.func1 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/tpcc.go:141 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.setupTPCC.func2 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/tpcc.go:146 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.setupTPCC | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/tpcc.go:176 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.runTPCC | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/tpcc.go:223 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.makeIndexAddTpccTest.func1 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/schemachange.go:313 | main.(*testRunner).runTest.func2 | main/pkg/cmd/roachtest/test_runner.go:875 | runtime.goexit | GOROOT/src/runtime/asm_amd64.s:1581 Wraps: (2) one or more parallel execution failure Error types: (1) *withstack.withStack (2) *errutil.leafError ``` <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> /cc @cockroachdb/sql-schema <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*schemachange/index/tpcc/w=1000.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub> Jira issue: CRDB-14384
2.0
roachtest: schemachange/index/tpcc/w=1000 failed - roachtest.schemachange/index/tpcc/w=1000 [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=4713654&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=4713654&tab=artifacts#/schemachange/index/tpcc/w=1000) on master @ [29716850b181718594663889ddb5f479fef7a305](https://github.com/cockroachdb/cockroach/commits/29716850b181718594663889ddb5f479fef7a305): ``` The test failed on branch=master, cloud=gce: test artifacts and logs in: /artifacts/schemachange/index/tpcc/w=1000/run_1 cluster.go:1868,tpcc.go:141,tpcc.go:146,tpcc.go:176,tpcc.go:223,schemachange.go:313,test_runner.go:875: one or more parallel execution failure (1) attached stack trace -- stack trace: | github.com/cockroachdb/cockroach/pkg/roachprod/install.(*SyncedCluster).ParallelE | github.com/cockroachdb/cockroach/pkg/roachprod/install/cluster_synced.go:2042 | github.com/cockroachdb/cockroach/pkg/roachprod/install.(*SyncedCluster).Parallel | github.com/cockroachdb/cockroach/pkg/roachprod/install/cluster_synced.go:1923 | github.com/cockroachdb/cockroach/pkg/roachprod/install.(*SyncedCluster).Start | github.com/cockroachdb/cockroach/pkg/roachprod/install/cockroach.go:167 | github.com/cockroachdb/cockroach/pkg/roachprod.Start | github.com/cockroachdb/cockroach/pkg/roachprod/roachprod.go:660 | main.(*clusterImpl).StartE | main/pkg/cmd/roachtest/cluster.go:1826 | main.(*clusterImpl).Start | main/pkg/cmd/roachtest/cluster.go:1867 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.setupTPCC.func1 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/tpcc.go:141 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.setupTPCC.func2 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/tpcc.go:146 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.setupTPCC | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/tpcc.go:176 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.runTPCC | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/tpcc.go:223 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.makeIndexAddTpccTest.func1 | github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/schemachange.go:313 | main.(*testRunner).runTest.func2 | main/pkg/cmd/roachtest/test_runner.go:875 | runtime.goexit | GOROOT/src/runtime/asm_amd64.s:1581 Wraps: (2) one or more parallel execution failure Error types: (1) *withstack.withStack (2) *errutil.leafError ``` <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> /cc @cockroachdb/sql-schema <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*schemachange/index/tpcc/w=1000.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub> Jira issue: CRDB-14384
non_defect
roachtest schemachange index tpcc w failed roachtest schemachange index tpcc w with on master the test failed on branch master cloud gce test artifacts and logs in artifacts schemachange index tpcc w run cluster go tpcc go tpcc go tpcc go tpcc go schemachange go test runner go one or more parallel execution failure attached stack trace stack trace github com cockroachdb cockroach pkg roachprod install syncedcluster parallele github com cockroachdb cockroach pkg roachprod install cluster synced go github com cockroachdb cockroach pkg roachprod install syncedcluster parallel github com cockroachdb cockroach pkg roachprod install cluster synced go github com cockroachdb cockroach pkg roachprod install syncedcluster start github com cockroachdb cockroach pkg roachprod install cockroach go github com cockroachdb cockroach pkg roachprod start github com cockroachdb cockroach pkg roachprod roachprod go main clusterimpl starte main pkg cmd roachtest cluster go main clusterimpl start main pkg cmd roachtest cluster go github com cockroachdb cockroach pkg cmd roachtest tests setuptpcc github com cockroachdb cockroach pkg cmd roachtest tests tpcc go github com cockroachdb cockroach pkg cmd roachtest tests setuptpcc github com cockroachdb cockroach pkg cmd roachtest tests tpcc go github com cockroachdb cockroach pkg cmd roachtest tests setuptpcc github com cockroachdb cockroach pkg cmd roachtest tests tpcc go github com cockroachdb cockroach pkg cmd roachtest tests runtpcc github com cockroachdb cockroach pkg cmd roachtest tests tpcc go github com cockroachdb cockroach pkg cmd roachtest tests makeindexaddtpcctest github com cockroachdb cockroach pkg cmd roachtest tests schemachange go main testrunner runtest main pkg cmd roachtest test runner go runtime goexit goroot src runtime asm s wraps one or more parallel execution failure error types withstack withstack errutil leaferror help see see cc cockroachdb sql schema jira issue crdb
0
205,456
7,098,246,853
IssuesEvent
2018-01-15 03:30:21
sagesharp/outreachy-django-wagtail
https://api.github.com/repos/sagesharp/outreachy-django-wagtail
closed
Implement "Notify me" when community says they're participating
Python medium priority
When a community that has participated in the past hasn't said whether they will be participating in the current round, we have a "Notify Me" button. This currently does nothing! Create a new through-table with a one-to-one relationship between a Comrade and a Community. Make the "Notify Me" button create an account. Associate the Comrade with the Community. When a new Participation is added for that Community, send an automated email to the Comrades that have signed up. Maybe then delete the through table?
1.0
Implement "Notify me" when community says they're participating - When a community that has participated in the past hasn't said whether they will be participating in the current round, we have a "Notify Me" button. This currently does nothing! Create a new through-table with a one-to-one relationship between a Comrade and a Community. Make the "Notify Me" button create an account. Associate the Comrade with the Community. When a new Participation is added for that Community, send an automated email to the Comrades that have signed up. Maybe then delete the through table?
non_defect
implement notify me when community says they re participating when a community that has participated in the past hasn t said whether they will be participating in the current round we have a notify me button this currently does nothing create a new through table with a one to one relationship between a comrade and a community make the notify me button create an account associate the comrade with the community when a new participation is added for that community send an automated email to the comrades that have signed up maybe then delete the through table
0
77,821
14,920,609,601
IssuesEvent
2021-01-23 05:45:13
4Moyede/HexatonClass-01
https://api.github.com/repos/4Moyede/HexatonClass-01
closed
[Python] Python File의 오류
Python Code
**Content** : 질문 내용에 대해서 서술하시오 https://github.com/4Moyede/HexatonClass-01/blob/S_JB/Mentee/HJB/02/HW_Calculator.py 파일을 보시면 지금 코드가 바로 안보이는데 왜 이렇게 보일까요? 답글로 한 번 의견을 내주시길 바랍니다. @JaebeomHan 멘티님 혹시 코드 변환할 때 어떻게 하셨을까요?
1.0
[Python] Python File의 오류 - **Content** : 질문 내용에 대해서 서술하시오 https://github.com/4Moyede/HexatonClass-01/blob/S_JB/Mentee/HJB/02/HW_Calculator.py 파일을 보시면 지금 코드가 바로 안보이는데 왜 이렇게 보일까요? 답글로 한 번 의견을 내주시길 바랍니다. @JaebeomHan 멘티님 혹시 코드 변환할 때 어떻게 하셨을까요?
non_defect
python file의 오류 content 질문 내용에 대해서 서술하시오 파일을 보시면 지금 코드가 바로 안보이는데 왜 이렇게 보일까요 답글로 한 번 의견을 내주시길 바랍니다 jaebeomhan 멘티님 혹시 코드 변환할 때 어떻게 하셨을까요
0
26,247
3,993,603,830
IssuesEvent
2016-05-10 09:01:14
vikilabs-code/hombot-issues
https://api.github.com/repos/vikilabs-code/hombot-issues
closed
Make edits to Pitch
Akash design high-priority
Changes discussed with @twice-the-mantis for required changes in Pitch pdf.
1.0
Make edits to Pitch - Changes discussed with @twice-the-mantis for required changes in Pitch pdf.
non_defect
make edits to pitch changes discussed with twice the mantis for required changes in pitch pdf
0
122,592
12,156,024,658
IssuesEvent
2020-04-25 15:36:34
jorenrui/create-project
https://api.github.com/repos/jorenrui/create-project
closed
Task: Update README
documentation
# Task Title Task: Update README ## Tasks Description Update the following: - [x] Description - [x] Usage - [x] Badges - [x] Installations - [x] License ## Resources [README badges](https://gist.github.com/tterb/982ae14a9307b80117dbf49f624ce0e8) [Shields](https://shields.io/)
1.0
Task: Update README - # Task Title Task: Update README ## Tasks Description Update the following: - [x] Description - [x] Usage - [x] Badges - [x] Installations - [x] License ## Resources [README badges](https://gist.github.com/tterb/982ae14a9307b80117dbf49f624ce0e8) [Shields](https://shields.io/)
non_defect
task update readme task title task update readme tasks description update the following description usage badges installations license resources
0
8,460
2,611,506,662
IssuesEvent
2015-02-27 05:43:46
chrsmith/reaver-wps
https://api.github.com/repos/chrsmith/reaver-wps
opened
Reaver Pro USB
auto-migrated Priority-Triage Type-Defect
``` I've tried to boot from the usb provided by Tactical Network Solution, from Hak5, on 3 dell desktops and 1 dell notebook. the results are: On 2 of the desktops it freezes on the first Tactical Network Logo Screen. on the 3rd desktop I get a message of an invalid boot system. On the notebook, after the screen I get a message : Parser error "/lib/plymouth/themes/TNS/TNS.script" L:8 C:0 : Expected ';' after an expression Please I need support and advice. Thanks, FB ``` Original issue reported on code.google.com by `Fabiano....@gmail.com` on 19 May 2012 at 5:54
1.0
Reaver Pro USB - ``` I've tried to boot from the usb provided by Tactical Network Solution, from Hak5, on 3 dell desktops and 1 dell notebook. the results are: On 2 of the desktops it freezes on the first Tactical Network Logo Screen. on the 3rd desktop I get a message of an invalid boot system. On the notebook, after the screen I get a message : Parser error "/lib/plymouth/themes/TNS/TNS.script" L:8 C:0 : Expected ';' after an expression Please I need support and advice. Thanks, FB ``` Original issue reported on code.google.com by `Fabiano....@gmail.com` on 19 May 2012 at 5:54
defect
reaver pro usb i ve tried to boot from the usb provided by tactical network solution from on dell desktops and dell notebook the results are on of the desktops it freezes on the first tactical network logo screen on the desktop i get a message of an invalid boot system on the notebook after the screen i get a message parser error lib plymouth themes tns tns script l c expected after an expression please i need support and advice thanks fb original issue reported on code google com by fabiano gmail com on may at
1
21,370
11,646,831,920
IssuesEvent
2020-03-01 11:42:57
yuanshenjian/yuanshenjian.github.io
https://api.github.com/repos/yuanshenjian/yuanshenjian.github.io
closed
微服务Workshop启动
/microservice-workshop-starup/ Gitalk
https://xp-bootcamp.org/microservice-workshop-starup/ 袁慎建, Yuan Shenjian, eXtreme Programming, 极限编程, , , 微服务Workshop启动, , Workshop@Micro Service, 袁慎建的博客, ThoughtWorks, 文章, 博客, 袁慎建的博客, 背景 目标 内容 团队 讲师团 学员团 志愿者...
1.0
微服务Workshop启动 - https://xp-bootcamp.org/microservice-workshop-starup/ 袁慎建, Yuan Shenjian, eXtreme Programming, 极限编程, , , 微服务Workshop启动, , Workshop@Micro Service, 袁慎建的博客, ThoughtWorks, 文章, 博客, 袁慎建的博客, 背景 目标 内容 团队 讲师团 学员团 志愿者...
non_defect
微服务workshop启动 袁慎建 yuan shenjian extreme programming 极限编程 微服务workshop启动 workshop micro service 袁慎建的博客 thoughtworks 文章 博客 袁慎建的博客 背景 目标 内容 团队 讲师团 学员团 志愿者
0
40,002
9,790,459,745
IssuesEvent
2019-06-10 12:48:57
autodesk-forks/MaterialX
https://api.github.com/repos/autodesk-forks/MaterialX
closed
GLSL address modes not found if image name contains more than one "_"
Defect Render ShaderGen
Lookup for additional uniforms needs to be fixed up.
1.0
GLSL address modes not found if image name contains more than one "_" - Lookup for additional uniforms needs to be fixed up.
defect
glsl address modes not found if image name contains more than one lookup for additional uniforms needs to be fixed up
1
127,445
10,470,470,711
IssuesEvent
2019-09-23 03:51:52
PatPeter/FriendlyFireAutoban
https://api.github.com/repos/PatPeter/FriendlyFireAutoban
closed
.tks does not support names with spaces
bug ready for testing successfully tested
The `quotedArgs` variable doesn't seem to be being used correctly. I'll need to test this.
2.0
.tks does not support names with spaces - The `quotedArgs` variable doesn't seem to be being used correctly. I'll need to test this.
non_defect
tks does not support names with spaces the quotedargs variable doesn t seem to be being used correctly i ll need to test this
0
65,127
19,122,395,921
IssuesEvent
2021-12-01 00:58:29
vector-im/element-android
https://api.github.com/repos/vector-im/element-android
opened
Call Ring screen hangs despite being picked up on Desktop
T-Defect
### Steps to reproduce 1. Make sure you are signed in on desktop and mobile 2. receive a call from your desktop app 3. Answer the call ### Outcome #### What did you expect? To answer the call on desktop and for the screen on mobile to go away instantly #### What happened instead? After I picked up the call my phone kept vibrating with the "calling" screen still appear after a few seconds ### Your phone model Samsung S10 ### Operating system version Android 11 ### Application version and app store Element Version 1.3.8 [40103082] (G-b4480) ### Homeserver matrix.org ### Will you send logs? No
1.0
Call Ring screen hangs despite being picked up on Desktop - ### Steps to reproduce 1. Make sure you are signed in on desktop and mobile 2. receive a call from your desktop app 3. Answer the call ### Outcome #### What did you expect? To answer the call on desktop and for the screen on mobile to go away instantly #### What happened instead? After I picked up the call my phone kept vibrating with the "calling" screen still appear after a few seconds ### Your phone model Samsung S10 ### Operating system version Android 11 ### Application version and app store Element Version 1.3.8 [40103082] (G-b4480) ### Homeserver matrix.org ### Will you send logs? No
defect
call ring screen hangs despite being picked up on desktop steps to reproduce make sure you are signed in on desktop and mobile receive a call from your desktop app answer the call outcome what did you expect to answer the call on desktop and for the screen on mobile to go away instantly what happened instead after i picked up the call my phone kept vibrating with the calling screen still appear after a few seconds your phone model samsung operating system version android application version and app store element version g homeserver matrix org will you send logs no
1
38,408
8,799,188,295
IssuesEvent
2018-12-24 12:34:13
primefaces/primereact
https://api.github.com/repos/primefaces/primereact
closed
Datatable horizontal scroll trigger onVirtualScroll
defect
**I'm submitting a ...** (check one with "x") ``` [x] bug report [ ] feature request [ ] support request => Please do not submit support request here, instead see https://forum.primefaces.org/viewforum.php?f=57 ``` **Plunkr Case (Bug Reports)** Please fork the plunkr below and create a case demonstrating your bug report. Issues without a plunkr have much less possibility to be reviewed. https://plnkr.co/edit/KraY9bXmw7epZOyQIXsa?p=preview **Current behavior** When there is data some data which is smaller then expected scrollHeight (Lets say there is only 1 row and scrollHeight is 200px), Datatable's onVirtualScroll function trigger when i scrolling horizontally. You can check it on Plunkr. **Expected behavior** Datatable's onVirtualScroll function shouldn't trigger when i scrolling horizontal **Fix idea** When I check onBodyScroll function of ScrollableView, I found out you are not exclude scroll height of the scroll panel while you calculating viewport. It causes trouble. We shouldn't take offsetHeight, we should take clientHeight **Minimal reproduction of the problem with instructions** Please check Plunker **Please tell us about your environment:** Win-10(64bit),VS-Code, npm:6.4.1 node: v8.12.0 <!-- Operating system, IDE, package manager, HTTP server, ... --> * **React version:** React 16.4.2 * **PrimeReact version:** Primereact 2.0.1 * **Browser:** Chrome Latest, Firefox Latest * **Language:** all
1.0
Datatable horizontal scroll trigger onVirtualScroll - **I'm submitting a ...** (check one with "x") ``` [x] bug report [ ] feature request [ ] support request => Please do not submit support request here, instead see https://forum.primefaces.org/viewforum.php?f=57 ``` **Plunkr Case (Bug Reports)** Please fork the plunkr below and create a case demonstrating your bug report. Issues without a plunkr have much less possibility to be reviewed. https://plnkr.co/edit/KraY9bXmw7epZOyQIXsa?p=preview **Current behavior** When there is data some data which is smaller then expected scrollHeight (Lets say there is only 1 row and scrollHeight is 200px), Datatable's onVirtualScroll function trigger when i scrolling horizontally. You can check it on Plunkr. **Expected behavior** Datatable's onVirtualScroll function shouldn't trigger when i scrolling horizontal **Fix idea** When I check onBodyScroll function of ScrollableView, I found out you are not exclude scroll height of the scroll panel while you calculating viewport. It causes trouble. We shouldn't take offsetHeight, we should take clientHeight **Minimal reproduction of the problem with instructions** Please check Plunker **Please tell us about your environment:** Win-10(64bit),VS-Code, npm:6.4.1 node: v8.12.0 <!-- Operating system, IDE, package manager, HTTP server, ... --> * **React version:** React 16.4.2 * **PrimeReact version:** Primereact 2.0.1 * **Browser:** Chrome Latest, Firefox Latest * **Language:** all
defect
datatable horizontal scroll trigger onvirtualscroll i m submitting a check one with x bug report feature request support request please do not submit support request here instead see plunkr case bug reports please fork the plunkr below and create a case demonstrating your bug report issues without a plunkr have much less possibility to be reviewed current behavior when there is data some data which is smaller then expected scrollheight lets say there is only row and scrollheight is datatable s onvirtualscroll function trigger when i scrolling horizontally you can check it on plunkr expected behavior datatable s onvirtualscroll function shouldn t trigger when i scrolling horizontal fix idea when i check onbodyscroll function of scrollableview i found out you are not exclude scroll height of the scroll panel while you calculating viewport it causes trouble we shouldn t take offsetheight we should take clientheight minimal reproduction of the problem with instructions please check plunker please tell us about your environment win vs code npm node react version react primereact version primereact browser chrome latest firefox latest language all
1
145,216
22,627,729,670
IssuesEvent
2022-06-30 12:14:07
TencentBlueKing/bk-nodeman
https://api.github.com/repos/TencentBlueKing/bk-nodeman
opened
[FEATURE] 部署策略的「关联主机数」有歧义
kind/optimization priority/middle model/design
这里展示的关联主机数其实是「正在影响」的主机,并不是选中的「目标主机」数量 与其展示这样一个有歧义的数字,不如把各种情况的数字都展示出来 例如,策略范围内本应该有20台主机,其中有15台正在被该策略管控,3台正在被其它优先级更高的策略抑制,2台主机因网络问题管控失败 管控中 / 被抑制 / 失败 / 总计 15 / 3 / 2 / 20 ![image](https://user-images.githubusercontent.com/4710858/176673020-217c4427-028d-4a1e-bfad-9cff8a7c7004.png)
1.0
[FEATURE] 部署策略的「关联主机数」有歧义 - 这里展示的关联主机数其实是「正在影响」的主机,并不是选中的「目标主机」数量 与其展示这样一个有歧义的数字,不如把各种情况的数字都展示出来 例如,策略范围内本应该有20台主机,其中有15台正在被该策略管控,3台正在被其它优先级更高的策略抑制,2台主机因网络问题管控失败 管控中 / 被抑制 / 失败 / 总计 15 / 3 / 2 / 20 ![image](https://user-images.githubusercontent.com/4710858/176673020-217c4427-028d-4a1e-bfad-9cff8a7c7004.png)
non_defect
部署策略的「关联主机数」有歧义 这里展示的关联主机数其实是「正在影响」的主机,并不是选中的「目标主机」数量 与其展示这样一个有歧义的数字,不如把各种情况的数字都展示出来 例如, , , , 管控中 被抑制 失败 总计
0
72,964
15,252,051,227
IssuesEvent
2021-02-20 01:20:46
mrcelewis/flink
https://api.github.com/repos/mrcelewis/flink
closed
WS-2014-0005 (High) detected in qs-0.6.6.tgz - autoclosed
security vulnerability
## WS-2014-0005 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>qs-0.6.6.tgz</b></p></summary> <p>querystring parser</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.6.6.tgz">https://registry.npmjs.org/qs/-/qs-0.6.6.tgz</a></p> <p>Path to dependency file: flink/flink-runtime-web/web-dashboard/package.json</p> <p>Path to vulnerable library: flink/flink-runtime-web/web-dashboard/node_modules/connect/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - gulp-serve-0.3.1.tgz (Root Library) - connect-2.12.0.tgz - :x: **qs-0.6.6.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Denial-of-Service Extended Event Loop Blocking.The qs module does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time <p>Publish Date: 2014-07-31 <p>URL: <a href=https://github.com/ljharb/qs/commit/6667340dd3c7deaa0eb1c27f175faaaf71f19823>WS-2014-0005</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/qs_dos_extended_event_loop_blocking">https://nodesecurity.io/advisories/qs_dos_extended_event_loop_blocking</a></p> <p>Release Date: 2014-08-06</p> <p>Fix Resolution: Update qs to version 1.0.0 or greater</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"qs","packageVersion":"0.6.6","packageFilePaths":["/flink-runtime-web/web-dashboard/package.json"],"isTransitiveDependency":true,"dependencyTree":"gulp-serve:0.3.1;connect:2.12.0;qs:0.6.6","isMinimumFixVersionAvailable":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2014-0005","vulnerabilityDetails":"Denial-of-Service Extended Event Loop Blocking.The qs module does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time","vulnerabilityUrl":"https://github.com/ljharb/qs/commit/6667340dd3c7deaa0eb1c27f175faaaf71f19823","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
WS-2014-0005 (High) detected in qs-0.6.6.tgz - autoclosed - ## WS-2014-0005 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>qs-0.6.6.tgz</b></p></summary> <p>querystring parser</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.6.6.tgz">https://registry.npmjs.org/qs/-/qs-0.6.6.tgz</a></p> <p>Path to dependency file: flink/flink-runtime-web/web-dashboard/package.json</p> <p>Path to vulnerable library: flink/flink-runtime-web/web-dashboard/node_modules/connect/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - gulp-serve-0.3.1.tgz (Root Library) - connect-2.12.0.tgz - :x: **qs-0.6.6.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Denial-of-Service Extended Event Loop Blocking.The qs module does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time <p>Publish Date: 2014-07-31 <p>URL: <a href=https://github.com/ljharb/qs/commit/6667340dd3c7deaa0eb1c27f175faaaf71f19823>WS-2014-0005</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/qs_dos_extended_event_loop_blocking">https://nodesecurity.io/advisories/qs_dos_extended_event_loop_blocking</a></p> <p>Release Date: 2014-08-06</p> <p>Fix Resolution: Update qs to version 1.0.0 or greater</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"qs","packageVersion":"0.6.6","packageFilePaths":["/flink-runtime-web/web-dashboard/package.json"],"isTransitiveDependency":true,"dependencyTree":"gulp-serve:0.3.1;connect:2.12.0;qs:0.6.6","isMinimumFixVersionAvailable":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2014-0005","vulnerabilityDetails":"Denial-of-Service Extended Event Loop Blocking.The qs module does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time","vulnerabilityUrl":"https://github.com/ljharb/qs/commit/6667340dd3c7deaa0eb1c27f175faaaf71f19823","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_defect
ws high detected in qs tgz autoclosed ws high severity vulnerability vulnerable library qs tgz querystring parser library home page a href path to dependency file flink flink runtime web web dashboard package json path to vulnerable library flink flink runtime web web dashboard node modules connect node modules qs package json dependency hierarchy gulp serve tgz root library connect tgz x qs tgz vulnerable library found in base branch master vulnerability details denial of service extended event loop blocking the qs module does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution update qs to version or greater isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree gulp serve connect qs isminimumfixversionavailable false basebranches vulnerabilityidentifier ws vulnerabilitydetails denial of service extended event loop blocking the qs module does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time vulnerabilityurl
0
23,954
12,157,752,342
IssuesEvent
2020-04-25 23:48:29
SPGoding/datapack-language-server
https://api.github.com/repos/SPGoding/datapack-language-server
closed
Suspend with unclosed NBT int array tags
:ambulance: critical :bug: bug :zap: performance
To reproduce: 1. `summon armor_stand ~ ~ ~ {UUID: [I;}` * :x: The language server suspends
True
Suspend with unclosed NBT int array tags - To reproduce: 1. `summon armor_stand ~ ~ ~ {UUID: [I;}` * :x: The language server suspends
non_defect
suspend with unclosed nbt int array tags to reproduce summon armor stand uuid i x the language server suspends
0
140,589
21,161,558,470
IssuesEvent
2022-04-07 09:49:00
bounswe/bounswe2022group2
https://api.github.com/repos/bounswe/bounswe2022group2
closed
Software Design: Sequence Diagram - Login
priority-medium status-completed diagrams type-system design
### Issue Description As the next part of the software design process, we will provide a sequence diagram for our project moving from the class and use-case diagram phases. Sequence diagram will be completed with a collective effort and I will be preparing the **login** sub-section of the diagram. * This issue is a sub-issue of #107. * **Login** part of the sequence diagram will be formed, using the following sections of the use-case and class diagram as basis. Use-Case Diagram ![Screen Shot 2022-04-04 at 12 07 07](https://user-images.githubusercontent.com/60237280/161521721-dde5d707-1a57-436c-899c-25f376c63ff1.png) Class Diagram ![Screen Shot 2022-04-04 at 13 03 15](https://user-images.githubusercontent.com/60237280/161545718-9051f582-cbfd-408d-8a0d-4c3c2830402a.png) * The sequence diagram will be generated using the Lucidchart app, and the diagram can be viewed [here](https://lucid.app/lucidchart/12990ace-9701-4be5-8ec5-cd83aebead91/edit?invitationId=inv_b9ba75d9-be43-49fd-9fcc-08c90d5c7fd8). ### Step Details Steps that will be performed: - [x] Check the corresponding parts of the use-case diagram. - [x] Check the corresponding parts of the class diagram. - [x] Create the diagram in our project page in [Lucidchart](https://lucid.app/lucidchart/12990ace-9701-4be5-8ec5-cd83aebead91/edit?invitationId=inv_b9ba75d9-be43-49fd-9fcc-08c90d5c7fd8). - [x] Attach a final comment and screenshot of the diagram. ### Final Actions * After login part of the sequence diagram is implemented, it will be merged into the main sequence diagram project provided in this [link](https://lucid.app/lucidchart/12990ace-9701-4be5-8ec5-cd83aebead91/edit?invitationId=inv_b9ba75d9-be43-49fd-9fcc-08c90d5c7fd8). * After completion, this issue will be reviewed and evaluated by the reviewed and other team members upon closing the issue. ### Deadline of the Issue 06.04.2022 - Wednesday - 10.00 ### Reviewer Hasan Can Erol ### Deadline for the Review 06.04.2022 - Wednesday - 11.00
1.0
Software Design: Sequence Diagram - Login - ### Issue Description As the next part of the software design process, we will provide a sequence diagram for our project moving from the class and use-case diagram phases. Sequence diagram will be completed with a collective effort and I will be preparing the **login** sub-section of the diagram. * This issue is a sub-issue of #107. * **Login** part of the sequence diagram will be formed, using the following sections of the use-case and class diagram as basis. Use-Case Diagram ![Screen Shot 2022-04-04 at 12 07 07](https://user-images.githubusercontent.com/60237280/161521721-dde5d707-1a57-436c-899c-25f376c63ff1.png) Class Diagram ![Screen Shot 2022-04-04 at 13 03 15](https://user-images.githubusercontent.com/60237280/161545718-9051f582-cbfd-408d-8a0d-4c3c2830402a.png) * The sequence diagram will be generated using the Lucidchart app, and the diagram can be viewed [here](https://lucid.app/lucidchart/12990ace-9701-4be5-8ec5-cd83aebead91/edit?invitationId=inv_b9ba75d9-be43-49fd-9fcc-08c90d5c7fd8). ### Step Details Steps that will be performed: - [x] Check the corresponding parts of the use-case diagram. - [x] Check the corresponding parts of the class diagram. - [x] Create the diagram in our project page in [Lucidchart](https://lucid.app/lucidchart/12990ace-9701-4be5-8ec5-cd83aebead91/edit?invitationId=inv_b9ba75d9-be43-49fd-9fcc-08c90d5c7fd8). - [x] Attach a final comment and screenshot of the diagram. ### Final Actions * After login part of the sequence diagram is implemented, it will be merged into the main sequence diagram project provided in this [link](https://lucid.app/lucidchart/12990ace-9701-4be5-8ec5-cd83aebead91/edit?invitationId=inv_b9ba75d9-be43-49fd-9fcc-08c90d5c7fd8). * After completion, this issue will be reviewed and evaluated by the reviewed and other team members upon closing the issue. ### Deadline of the Issue 06.04.2022 - Wednesday - 10.00 ### Reviewer Hasan Can Erol ### Deadline for the Review 06.04.2022 - Wednesday - 11.00
non_defect
software design sequence diagram login issue description as the next part of the software design process we will provide a sequence diagram for our project moving from the class and use case diagram phases sequence diagram will be completed with a collective effort and i will be preparing the login sub section of the diagram this issue is a sub issue of login part of the sequence diagram will be formed using the following sections of the use case and class diagram as basis use case diagram class diagram the sequence diagram will be generated using the lucidchart app and the diagram can be viewed step details steps that will be performed check the corresponding parts of the use case diagram check the corresponding parts of the class diagram create the diagram in our project page in attach a final comment and screenshot of the diagram final actions after login part of the sequence diagram is implemented it will be merged into the main sequence diagram project provided in this after completion this issue will be reviewed and evaluated by the reviewed and other team members upon closing the issue deadline of the issue wednesday reviewer hasan can erol deadline for the review wednesday
0
42,257
10,918,780,940
IssuesEvent
2019-11-21 17:34:41
department-of-veterans-affairs/va.gov-team
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
closed
[COGNITION]: GIBCT Section 116 - Add screen reader only text for the benefit breakdowns by time
508-defect-3 508/Accessibility bah-comparisontool
## Description <!-- This is a detailed description of the issue. It should include a restatement of the title, and provide more background information. --> The VET TEC benefits that VA pays upon enrollment, upon completion, and upon employment could include some screen reader only text for assistive technology users. As I was listening to the read outs this morning, it wasn't clear to me what the 25%, 25%, and 50% were referring to. I had to go back and figure out the VA pays out amount above was the entire amount, and these were the breakouts. Screen shot attached below. ## Point of Contact <!-- If this issue is being opened by a VFS team member, please add a point of contact. Usually this is the same person who enters the issue ticket. --> **VFS Point of Contact:** _Trevor_ ## Acceptance Criteria <!-- As a keyboard user, I want to open the Level of Coverage widget by pressing Spacebar or pressing Enter. These keypress actions should not interfere with the mouse click event also opening the widget. --> * As a screen reader user, I want to hear a more descriptive label read aloud. This could be: * Upon enrollment in program, VA pays to provider (25%): * Upon completion of program, VA pays to provider (25%): * Upon employment, VA pays to provider (50%): * This text should not adjust or modify the visual display ## Screenshots or Trace Logs <!-- Drop any screenshots or error logs that might be useful for debugging --> ![Screen Shot 2019-11-18 at 11.51.49 AM.png](https://images.zenhubusercontent.com/5ac217b74b5806bc2bcd3fc8/62f62b4c-be05-4f9e-8580-ceb2d9e44e28)
1.0
[COGNITION]: GIBCT Section 116 - Add screen reader only text for the benefit breakdowns by time - ## Description <!-- This is a detailed description of the issue. It should include a restatement of the title, and provide more background information. --> The VET TEC benefits that VA pays upon enrollment, upon completion, and upon employment could include some screen reader only text for assistive technology users. As I was listening to the read outs this morning, it wasn't clear to me what the 25%, 25%, and 50% were referring to. I had to go back and figure out the VA pays out amount above was the entire amount, and these were the breakouts. Screen shot attached below. ## Point of Contact <!-- If this issue is being opened by a VFS team member, please add a point of contact. Usually this is the same person who enters the issue ticket. --> **VFS Point of Contact:** _Trevor_ ## Acceptance Criteria <!-- As a keyboard user, I want to open the Level of Coverage widget by pressing Spacebar or pressing Enter. These keypress actions should not interfere with the mouse click event also opening the widget. --> * As a screen reader user, I want to hear a more descriptive label read aloud. This could be: * Upon enrollment in program, VA pays to provider (25%): * Upon completion of program, VA pays to provider (25%): * Upon employment, VA pays to provider (50%): * This text should not adjust or modify the visual display ## Screenshots or Trace Logs <!-- Drop any screenshots or error logs that might be useful for debugging --> ![Screen Shot 2019-11-18 at 11.51.49 AM.png](https://images.zenhubusercontent.com/5ac217b74b5806bc2bcd3fc8/62f62b4c-be05-4f9e-8580-ceb2d9e44e28)
defect
gibct section add screen reader only text for the benefit breakdowns by time description the vet tec benefits that va pays upon enrollment upon completion and upon employment could include some screen reader only text for assistive technology users as i was listening to the read outs this morning it wasn t clear to me what the and were referring to i had to go back and figure out the va pays out amount above was the entire amount and these were the breakouts screen shot attached below point of contact if this issue is being opened by a vfs team member please add a point of contact usually this is the same person who enters the issue ticket vfs point of contact trevor acceptance criteria as a screen reader user i want to hear a more descriptive label read aloud this could be upon enrollment in program va pays to provider upon completion of program va pays to provider upon employment va pays to provider this text should not adjust or modify the visual display screenshots or trace logs
1
67,940
21,329,858,286
IssuesEvent
2022-04-18 06:45:16
klubcoin/lcn-mobile
https://api.github.com/repos/klubcoin/lcn-mobile
opened
[Onboarding][Import Wallet] Fix must have unrecognized QR Code handler when user scanned a QR Code with domain URL on import wallet SEED Phrase QR Scanner.
Onboarding and Authentication Services Defect Must Have Critical
### **Description:** Must have unrecognized QR Code handler when user scanned a QR Code with domain URL on import wallet SEED Phrase QR Scanner. **Build Environment:** Prod Candidate Environment **Affects Version:** 1.0.0.prod.4 **Device Platform:** Android **Device OS:** 11 **Test Device:** OnePlus 7T Pro ### **Pre-condition:** 1. User successfully installed Klubcoin App 2. User successfully launched Klubcoin App ### **Steps to Reproduce:** 1. Tap Get Started Button 2. Tap Import Thru SEED Phrase Recovery 3. Tap SEED Phrase QR Scanner 4. Scan unrecognized QR Code with domain URL ### **Expected Result:** Display unrecognized QR Code message ### **Actual Result:** Klubcoin app became a browser application and leads to broken application with crash and stack trace errors ### **Attachment/s:** https://drive.google.com/file/d/1KqIeJFpFbNX_KGgMsVtopZ6IphiJax9P/view
1.0
[Onboarding][Import Wallet] Fix must have unrecognized QR Code handler when user scanned a QR Code with domain URL on import wallet SEED Phrase QR Scanner. - ### **Description:** Must have unrecognized QR Code handler when user scanned a QR Code with domain URL on import wallet SEED Phrase QR Scanner. **Build Environment:** Prod Candidate Environment **Affects Version:** 1.0.0.prod.4 **Device Platform:** Android **Device OS:** 11 **Test Device:** OnePlus 7T Pro ### **Pre-condition:** 1. User successfully installed Klubcoin App 2. User successfully launched Klubcoin App ### **Steps to Reproduce:** 1. Tap Get Started Button 2. Tap Import Thru SEED Phrase Recovery 3. Tap SEED Phrase QR Scanner 4. Scan unrecognized QR Code with domain URL ### **Expected Result:** Display unrecognized QR Code message ### **Actual Result:** Klubcoin app became a browser application and leads to broken application with crash and stack trace errors ### **Attachment/s:** https://drive.google.com/file/d/1KqIeJFpFbNX_KGgMsVtopZ6IphiJax9P/view
defect
fix must have unrecognized qr code handler when user scanned a qr code with domain url on import wallet seed phrase qr scanner description must have unrecognized qr code handler when user scanned a qr code with domain url on import wallet seed phrase qr scanner build environment prod candidate environment affects version prod device platform android device os test device oneplus pro pre condition user successfully installed klubcoin app user successfully launched klubcoin app steps to reproduce tap get started button tap import thru seed phrase recovery tap seed phrase qr scanner scan unrecognized qr code with domain url expected result display unrecognized qr code message actual result klubcoin app became a browser application and leads to broken application with crash and stack trace errors attachment s
1
27,511
7,976,159,079
IssuesEvent
2018-07-17 11:46:03
xamarin/xamarin-android
https://api.github.com/repos/xamarin/xamarin-android
closed
MSB4018: The "XamarinBuildAndroidAarProguardConfigs" task failed unexpectedly.
Area: App+Library Build
### Steps to Reproduce 1. Clone http://github.com/naxam/accountkit-android-binding 2. Build the solution ### Expected Behavior Build successfully ### Actual Behavior Build failed ``` Xamarin.Build.Download.targets(135,3): error MSB4018: The "XamarinBuildAndroidAarProguardConfigs" task failed unexpectedly. Xamarin.Build.Download.targets(135,3): error MSB4018: System.IO.InvalidDataException: Central Directory corrupt. ---> System.IO.IOException: Attempted to Seek before the beginning of the stream Xamarin.Build.Download.targets(135,3): error MSB4018: at System.IO.FileStream.Seek (System.Int64 offset, System.IO.SeekOrigin origin) [0x000be] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/mono-x64/mcs/class/corlib/System.IO/FileStream.cs:782 Xamarin.Build.Download.targets(135,3): error MSB4018: at System.IO.Compression.ZipArchive.ReadEndOfCentralDirectory () [0x00000] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/mono-x64/external/corefx/src/System.IO.Compression/src/System/IO/Compression/ZipArchive.cs:553 Xamarin.Build.Download.targets(135,3): error MSB4018: --- End of inner exception stack trace --- Xamarin.Build.Download.targets(135,3): error MSB4018: at System.IO.Compression.ZipArchive.ReadEndOfCentralDirectory () [0x00207] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/mono-x64/external/corefx/src/System.IO.Compression/src/System/IO/Compression/ZipArchive.cs:631 Xamarin.Build.Download.targets(135,3): error MSB4018: at System.IO.Compression.ZipArchive.Init (System.IO.Stream stream, System.IO.Compression.ZipArchiveMode mode, System.Boolean leaveOpen) [0x001c8] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/mono-x64/external/corefx/src/System.IO.Compression/src/System/IO/Compression/ZipArchive.cs:511 Xamarin.Build.Download.targets(135,3): error MSB4018: at System.IO.Compression.ZipArchive..ctor (System.IO.Stream stream, System.IO.Compression.ZipArchiveMode mode, System.Boolean leaveOpen, System.Text.Encoding entryNameEncoding) [0x0001c] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/mono-x64/external/corefx/src/System.IO.Compression/src/System/IO/Compression/ZipArchive.cs:129 Xamarin.Build.Download.targets(135,3): error MSB4018: at System.IO.Compression.ZipArchive..ctor (System.IO.Stream stream, System.IO.Compression.ZipArchiveMode mode) [0x00000] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/mono-x64/external/corefx/src/System.IO.Compression/src/System/IO/Compression/ZipArchive.cs:57 Xamarin.Build.Download.targets(135,3): error MSB4018: at Xamarin.Build.Download.XamarinBuildAndroidAarProguardConfigs.Execute () [0x00105] in <dc3c3cbb6f924684ab0c214189899b4c>:0 Xamarin.Build.Download.targets(135,3): error MSB4018: at Microsoft.Build.BackEnd.TaskExecutionHost.Microsoft.Build.BackEnd.ITaskExecutionHost.Execute () [0x00023] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/msbuild-15.4/src/Build/BackEnd/TaskExecutionHost/TaskExecutionHost.cs:631 Xamarin.Build.Download.targets(135,3): error MSB4018: at Microsoft.Build.BackEnd.TaskBuilder+<ExecuteInstantiatedTask>d__26.MoveNext () [0x0022d] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/msbuild-15.4/src/Build/BackEnd/Components/RequestBuilder/TaskBuilder.cs:787 ``` ### Version Information === Visual Studio Enterprise 2017 for Mac === Version 7.3.3 (build 5) Installation UUID: a9ca3c9c-8010-48fc-9c68-07250cac8c03 Runtime: Mono 5.4.1.7 (2017-06/e66d9abbb27) (64-bit) GTK+ 2.24.23 (Raleigh theme) Package version: 504010007 === NuGet === Version: 4.3.1.4445 === .NET Core === Runtime: /usr/local/share/dotnet/dotnet Runtime Version: 2.0.0 SDK: /usr/local/share/dotnet/sdk/2.0.2/Sdks SDK Versions: 2.0.2 2.0.0 MSBuild SDKs: /Library/Frameworks/Mono.framework/Versions/5.4.1/lib/mono/msbuild/15.0/bin/Sdks === Xamarin.Profiler === Version: 1.6.0 Location: /Applications/Xamarin Profiler.app/Contents/MacOS/Xamarin Profiler === Xamarin.Android === Version: 8.1.3.0 (Visual Studio Enterprise) Android SDK: /Users/tuyen/Library/Android/sdk Supported Android versions: 4.4.87 (API level 20) 6.0 (API level 23) 7.0 (API level 24) 7.1 (API level 25) 8.0 (API level 26) SDK Tools Version: 26.1.1 SDK Platform Tools Version: 26.0.2 SDK Build Tools Version: 27.0.0 Java SDK: /usr java version "1.8.0_131" Java(TM) SE Runtime Environment (build 1.8.0_131-b11) Java HotSpot(TM) 64-Bit Server VM (build 25.131-b11, mixed mode) Android Designer EPL code available here: https://github.com/xamarin/AndroidDesigner.EPL === Apple Developer Tools === Xcode 9.2 (13772) Build 9C40b === Xamarin.iOS === Version: 11.6.1.3 (Visual Studio Enterprise) Hash: f70a1348 Branch: xcode9.2 Build date: 2017-12-18 14:47:16-0500 === Xamarin.Mac === Version: 4.0.0.215 (Visual Studio Enterprise) === Xamarin Inspector === Version: 1.3.2 Hash: 461f09a Branch: 1.3-release Build date: Tue, 03 Oct 2017 18:26:57 GMT Client compatibility: 1 === Build Information === Release ID: 703030005 Git revision: b1c2982e201e71ef758866c9ade05f253a8c6f47 Build date: 2017-12-21 11:04:40-05 Xamarin addins: f397ddfbacfb39e60c9cc8d9e410f73faf8c2cbc Build lane: monodevelop-lion-d15-5 === Operating System === Mac OS X 10.13.2 Darwin 17.3.0 Darwin Kernel Version 17.3.0 Thu Nov 9 18:09:22 PST 2017 root:xnu-4570.31.3~1/RELEASE_X86_64 x86_64 === Enabled user installed addins === LiveXAML 1.3.31 Internet of Things (IoT) development (Preview) 7.1
1.0
MSB4018: The "XamarinBuildAndroidAarProguardConfigs" task failed unexpectedly. - ### Steps to Reproduce 1. Clone http://github.com/naxam/accountkit-android-binding 2. Build the solution ### Expected Behavior Build successfully ### Actual Behavior Build failed ``` Xamarin.Build.Download.targets(135,3): error MSB4018: The "XamarinBuildAndroidAarProguardConfigs" task failed unexpectedly. Xamarin.Build.Download.targets(135,3): error MSB4018: System.IO.InvalidDataException: Central Directory corrupt. ---> System.IO.IOException: Attempted to Seek before the beginning of the stream Xamarin.Build.Download.targets(135,3): error MSB4018: at System.IO.FileStream.Seek (System.Int64 offset, System.IO.SeekOrigin origin) [0x000be] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/mono-x64/mcs/class/corlib/System.IO/FileStream.cs:782 Xamarin.Build.Download.targets(135,3): error MSB4018: at System.IO.Compression.ZipArchive.ReadEndOfCentralDirectory () [0x00000] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/mono-x64/external/corefx/src/System.IO.Compression/src/System/IO/Compression/ZipArchive.cs:553 Xamarin.Build.Download.targets(135,3): error MSB4018: --- End of inner exception stack trace --- Xamarin.Build.Download.targets(135,3): error MSB4018: at System.IO.Compression.ZipArchive.ReadEndOfCentralDirectory () [0x00207] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/mono-x64/external/corefx/src/System.IO.Compression/src/System/IO/Compression/ZipArchive.cs:631 Xamarin.Build.Download.targets(135,3): error MSB4018: at System.IO.Compression.ZipArchive.Init (System.IO.Stream stream, System.IO.Compression.ZipArchiveMode mode, System.Boolean leaveOpen) [0x001c8] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/mono-x64/external/corefx/src/System.IO.Compression/src/System/IO/Compression/ZipArchive.cs:511 Xamarin.Build.Download.targets(135,3): error MSB4018: at System.IO.Compression.ZipArchive..ctor (System.IO.Stream stream, System.IO.Compression.ZipArchiveMode mode, System.Boolean leaveOpen, System.Text.Encoding entryNameEncoding) [0x0001c] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/mono-x64/external/corefx/src/System.IO.Compression/src/System/IO/Compression/ZipArchive.cs:129 Xamarin.Build.Download.targets(135,3): error MSB4018: at System.IO.Compression.ZipArchive..ctor (System.IO.Stream stream, System.IO.Compression.ZipArchiveMode mode) [0x00000] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/mono-x64/external/corefx/src/System.IO.Compression/src/System/IO/Compression/ZipArchive.cs:57 Xamarin.Build.Download.targets(135,3): error MSB4018: at Xamarin.Build.Download.XamarinBuildAndroidAarProguardConfigs.Execute () [0x00105] in <dc3c3cbb6f924684ab0c214189899b4c>:0 Xamarin.Build.Download.targets(135,3): error MSB4018: at Microsoft.Build.BackEnd.TaskExecutionHost.Microsoft.Build.BackEnd.ITaskExecutionHost.Execute () [0x00023] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/msbuild-15.4/src/Build/BackEnd/TaskExecutionHost/TaskExecutionHost.cs:631 Xamarin.Build.Download.targets(135,3): error MSB4018: at Microsoft.Build.BackEnd.TaskBuilder+<ExecuteInstantiatedTask>d__26.MoveNext () [0x0022d] in /Users/builder/data/lanes/4992/mono-mac-sdk/external/bockbuild/builds/msbuild-15.4/src/Build/BackEnd/Components/RequestBuilder/TaskBuilder.cs:787 ``` ### Version Information === Visual Studio Enterprise 2017 for Mac === Version 7.3.3 (build 5) Installation UUID: a9ca3c9c-8010-48fc-9c68-07250cac8c03 Runtime: Mono 5.4.1.7 (2017-06/e66d9abbb27) (64-bit) GTK+ 2.24.23 (Raleigh theme) Package version: 504010007 === NuGet === Version: 4.3.1.4445 === .NET Core === Runtime: /usr/local/share/dotnet/dotnet Runtime Version: 2.0.0 SDK: /usr/local/share/dotnet/sdk/2.0.2/Sdks SDK Versions: 2.0.2 2.0.0 MSBuild SDKs: /Library/Frameworks/Mono.framework/Versions/5.4.1/lib/mono/msbuild/15.0/bin/Sdks === Xamarin.Profiler === Version: 1.6.0 Location: /Applications/Xamarin Profiler.app/Contents/MacOS/Xamarin Profiler === Xamarin.Android === Version: 8.1.3.0 (Visual Studio Enterprise) Android SDK: /Users/tuyen/Library/Android/sdk Supported Android versions: 4.4.87 (API level 20) 6.0 (API level 23) 7.0 (API level 24) 7.1 (API level 25) 8.0 (API level 26) SDK Tools Version: 26.1.1 SDK Platform Tools Version: 26.0.2 SDK Build Tools Version: 27.0.0 Java SDK: /usr java version "1.8.0_131" Java(TM) SE Runtime Environment (build 1.8.0_131-b11) Java HotSpot(TM) 64-Bit Server VM (build 25.131-b11, mixed mode) Android Designer EPL code available here: https://github.com/xamarin/AndroidDesigner.EPL === Apple Developer Tools === Xcode 9.2 (13772) Build 9C40b === Xamarin.iOS === Version: 11.6.1.3 (Visual Studio Enterprise) Hash: f70a1348 Branch: xcode9.2 Build date: 2017-12-18 14:47:16-0500 === Xamarin.Mac === Version: 4.0.0.215 (Visual Studio Enterprise) === Xamarin Inspector === Version: 1.3.2 Hash: 461f09a Branch: 1.3-release Build date: Tue, 03 Oct 2017 18:26:57 GMT Client compatibility: 1 === Build Information === Release ID: 703030005 Git revision: b1c2982e201e71ef758866c9ade05f253a8c6f47 Build date: 2017-12-21 11:04:40-05 Xamarin addins: f397ddfbacfb39e60c9cc8d9e410f73faf8c2cbc Build lane: monodevelop-lion-d15-5 === Operating System === Mac OS X 10.13.2 Darwin 17.3.0 Darwin Kernel Version 17.3.0 Thu Nov 9 18:09:22 PST 2017 root:xnu-4570.31.3~1/RELEASE_X86_64 x86_64 === Enabled user installed addins === LiveXAML 1.3.31 Internet of Things (IoT) development (Preview) 7.1
non_defect
the xamarinbuildandroidaarproguardconfigs task failed unexpectedly steps to reproduce clone build the solution expected behavior build successfully actual behavior build failed xamarin build download targets error the xamarinbuildandroidaarproguardconfigs task failed unexpectedly xamarin build download targets error system io invaliddataexception central directory corrupt system io ioexception attempted to seek before the beginning of the stream xamarin build download targets error at system io filestream seek system offset system io seekorigin origin in users builder data lanes mono mac sdk external bockbuild builds mono mcs class corlib system io filestream cs xamarin build download targets error at system io compression ziparchive readendofcentraldirectory in users builder data lanes mono mac sdk external bockbuild builds mono external corefx src system io compression src system io compression ziparchive cs xamarin build download targets error end of inner exception stack trace xamarin build download targets error at system io compression ziparchive readendofcentraldirectory in users builder data lanes mono mac sdk external bockbuild builds mono external corefx src system io compression src system io compression ziparchive cs xamarin build download targets error at system io compression ziparchive init system io stream stream system io compression ziparchivemode mode system boolean leaveopen in users builder data lanes mono mac sdk external bockbuild builds mono external corefx src system io compression src system io compression ziparchive cs xamarin build download targets error at system io compression ziparchive ctor system io stream stream system io compression ziparchivemode mode system boolean leaveopen system text encoding entrynameencoding in users builder data lanes mono mac sdk external bockbuild builds mono external corefx src system io compression src system io compression ziparchive cs xamarin build download targets error at system io compression ziparchive ctor system io stream stream system io compression ziparchivemode mode in users builder data lanes mono mac sdk external bockbuild builds mono external corefx src system io compression src system io compression ziparchive cs xamarin build download targets error at xamarin build download xamarinbuildandroidaarproguardconfigs execute in xamarin build download targets error at microsoft build backend taskexecutionhost microsoft build backend itaskexecutionhost execute in users builder data lanes mono mac sdk external bockbuild builds msbuild src build backend taskexecutionhost taskexecutionhost cs xamarin build download targets error at microsoft build backend taskbuilder d movenext in users builder data lanes mono mac sdk external bockbuild builds msbuild src build backend components requestbuilder taskbuilder cs version information visual studio enterprise for mac version build installation uuid runtime mono bit gtk raleigh theme package version nuget version net core runtime usr local share dotnet dotnet runtime version sdk usr local share dotnet sdk sdks sdk versions msbuild sdks library frameworks mono framework versions lib mono msbuild bin sdks xamarin profiler version location applications xamarin profiler app contents macos xamarin profiler xamarin android version visual studio enterprise android sdk users tuyen library android sdk supported android versions api level api level api level api level api level sdk tools version sdk platform tools version sdk build tools version java sdk usr java version java tm se runtime environment build java hotspot tm bit server vm build mixed mode android designer epl code available here apple developer tools xcode build xamarin ios version visual studio enterprise hash branch build date xamarin mac version visual studio enterprise xamarin inspector version hash branch release build date tue oct gmt client compatibility build information release id git revision build date xamarin addins build lane monodevelop lion operating system mac os x darwin darwin kernel version thu nov pst root xnu release enabled user installed addins livexaml internet of things iot development preview
0
137,956
11,171,276,664
IssuesEvent
2019-12-28 18:20:34
rootzoll/raspiblitz
https://api.github.com/repos/rootzoll/raspiblitz
closed
00infoBlitz - wrong traffic stats on wifi
enhancement final testing
When connecting the RaspiBlitz over Wifi then the traffic stats are wrong.
1.0
00infoBlitz - wrong traffic stats on wifi - When connecting the RaspiBlitz over Wifi then the traffic stats are wrong.
non_defect
wrong traffic stats on wifi when connecting the raspiblitz over wifi then the traffic stats are wrong
0
136,878
5,289,729,971
IssuesEvent
2017-02-08 18:05:10
EvokeNet/humhub
https://api.github.com/repos/EvokeNet/humhub
closed
Archive old Soacha Data
high priority
We need to archive old Soacha data and make it so that it is available (in a read only fashion) for new students
1.0
Archive old Soacha Data - We need to archive old Soacha data and make it so that it is available (in a read only fashion) for new students
non_defect
archive old soacha data we need to archive old soacha data and make it so that it is available in a read only fashion for new students
0
35,403
7,733,493,349
IssuesEvent
2018-05-26 12:32:08
petasis/tkdnd
https://api.github.com/repos/petasis/tkdnd
closed
error: garbage collection is no longer supported
Priority-Medium Type-Defect auto-migrated
``` Hello, I just tried to compile this on OSX 10.10 and I get the error: error: garbage collection is no longer supported which stops the build with error. here is the whole output: megrimm-mbpro:tkdnd-read-only megrimm$ cmake . -- The C compiler identification is AppleClang 6.0.0.6000054 -- The CXX compiler identification is AppleClang 6.0.0.6000054 -- Check for working C compiler: /usr/bin/cc -- Check for working C compiler: /usr/bin/cc -- works -- Detecting C compiler ABI info -- Detecting C compiler ABI info - done -- Check for working CXX compiler: /usr/bin/c++ -- Check for working CXX compiler: /usr/bin/c++ -- works -- Detecting CXX compiler ABI info -- Detecting CXX compiler ABI info - done -- =========================================================== -- Welcome to the tkdnd 2.7 build system! -- * Selected generator: Unix Makefiles -- * Operating System ID: Darwin-14.0.0-x86_64 -- * Installation Directory: /usr/local -- =========================================================== -- Searching for Tcl/Tk... -- Found Tclsh: /usr/bin/tclsh (found version "8.5") -- Found TCL: /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/S DKs/MacOSX10.10.sdk/System/Library/Frameworks/tcl.framework -- Found TCLTK: /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/S DKs/MacOSX10.10.sdk/System/Library/Frameworks/tcl.framework -- Found TK: /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/S DKs/MacOSX10.10.sdk/System/Library/Frameworks/tk.framework -- TCL_INCLUDE_PATH: /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/S DKs/MacOSX10.10.sdk/System/Library/Frameworks/Tcl.framework/Headers -- TCL_STUB_LIBRARY: /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/S DKs/MacOSX10.10.sdk/usr/lib/libtclstub8.5.a -- TK_INCLUDE_PATH: /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/S DKs/MacOSX10.10.sdk/System/Library/Frameworks/Tk.framework/Headers -- TK_STUB_LIBRARY: /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/S DKs/MacOSX10.10.sdk/usr/lib/libtkstub8.5.a -- + Shared Library: tkdnd -- Configuring done -- Generating done -- Build files have been written to: /Users/megrimm/Desktop/tkdnd-read-only megrimm-mbpro:tkdnd-read-only megrimm$ make Scanning dependencies of target tkdnd2.7 [100%] Building CXX object CMakeFiles/tkdnd2.7.dir/macosx/macdnd.m.o error: garbage collection is no longer supported make[2]: *** [CMakeFiles/tkdnd2.7.dir/macosx/macdnd.m.o] Error 1 make[1]: *** [CMakeFiles/tkdnd2.7.dir/all] Error 2 make: *** [all] Error 2 ``` Original issue reported on code.google.com by `megr...@gmail.com` on 19 Nov 2014 at 8:12
1.0
error: garbage collection is no longer supported - ``` Hello, I just tried to compile this on OSX 10.10 and I get the error: error: garbage collection is no longer supported which stops the build with error. here is the whole output: megrimm-mbpro:tkdnd-read-only megrimm$ cmake . -- The C compiler identification is AppleClang 6.0.0.6000054 -- The CXX compiler identification is AppleClang 6.0.0.6000054 -- Check for working C compiler: /usr/bin/cc -- Check for working C compiler: /usr/bin/cc -- works -- Detecting C compiler ABI info -- Detecting C compiler ABI info - done -- Check for working CXX compiler: /usr/bin/c++ -- Check for working CXX compiler: /usr/bin/c++ -- works -- Detecting CXX compiler ABI info -- Detecting CXX compiler ABI info - done -- =========================================================== -- Welcome to the tkdnd 2.7 build system! -- * Selected generator: Unix Makefiles -- * Operating System ID: Darwin-14.0.0-x86_64 -- * Installation Directory: /usr/local -- =========================================================== -- Searching for Tcl/Tk... -- Found Tclsh: /usr/bin/tclsh (found version "8.5") -- Found TCL: /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/S DKs/MacOSX10.10.sdk/System/Library/Frameworks/tcl.framework -- Found TCLTK: /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/S DKs/MacOSX10.10.sdk/System/Library/Frameworks/tcl.framework -- Found TK: /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/S DKs/MacOSX10.10.sdk/System/Library/Frameworks/tk.framework -- TCL_INCLUDE_PATH: /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/S DKs/MacOSX10.10.sdk/System/Library/Frameworks/Tcl.framework/Headers -- TCL_STUB_LIBRARY: /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/S DKs/MacOSX10.10.sdk/usr/lib/libtclstub8.5.a -- TK_INCLUDE_PATH: /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/S DKs/MacOSX10.10.sdk/System/Library/Frameworks/Tk.framework/Headers -- TK_STUB_LIBRARY: /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/S DKs/MacOSX10.10.sdk/usr/lib/libtkstub8.5.a -- + Shared Library: tkdnd -- Configuring done -- Generating done -- Build files have been written to: /Users/megrimm/Desktop/tkdnd-read-only megrimm-mbpro:tkdnd-read-only megrimm$ make Scanning dependencies of target tkdnd2.7 [100%] Building CXX object CMakeFiles/tkdnd2.7.dir/macosx/macdnd.m.o error: garbage collection is no longer supported make[2]: *** [CMakeFiles/tkdnd2.7.dir/macosx/macdnd.m.o] Error 1 make[1]: *** [CMakeFiles/tkdnd2.7.dir/all] Error 2 make: *** [all] Error 2 ``` Original issue reported on code.google.com by `megr...@gmail.com` on 19 Nov 2014 at 8:12
defect
error garbage collection is no longer supported hello i just tried to compile this on osx and i get the error error garbage collection is no longer supported which stops the build with error here is the whole output megrimm mbpro tkdnd read only megrimm cmake the c compiler identification is appleclang the cxx compiler identification is appleclang check for working c compiler usr bin cc check for working c compiler usr bin cc works detecting c compiler abi info detecting c compiler abi info done check for working cxx compiler usr bin c check for working cxx compiler usr bin c works detecting cxx compiler abi info detecting cxx compiler abi info done welcome to the tkdnd build system selected generator unix makefiles operating system id darwin installation directory usr local searching for tcl tk found tclsh usr bin tclsh found version found tcl applications xcode app contents developer platforms macosx platform developer s dks sdk system library frameworks tcl framework found tcltk applications xcode app contents developer platforms macosx platform developer s dks sdk system library frameworks tcl framework found tk applications xcode app contents developer platforms macosx platform developer s dks sdk system library frameworks tk framework tcl include path applications xcode app contents developer platforms macosx platform developer s dks sdk system library frameworks tcl framework headers tcl stub library applications xcode app contents developer platforms macosx platform developer s dks sdk usr lib a tk include path applications xcode app contents developer platforms macosx platform developer s dks sdk system library frameworks tk framework headers tk stub library applications xcode app contents developer platforms macosx platform developer s dks sdk usr lib a shared library tkdnd configuring done generating done build files have been written to users megrimm desktop tkdnd read only megrimm mbpro tkdnd read only megrimm make scanning dependencies of target building cxx object cmakefiles dir macosx macdnd m o error garbage collection is no longer supported make error make error make error original issue reported on code google com by megr gmail com on nov at
1
213,773
16,536,298,045
IssuesEvent
2021-05-27 12:15:55
T-F-S/tcolorbox
https://api.github.com/repos/T-F-S/tcolorbox
closed
should "empty" set coltitle to black?
documentation
If one uses the `empty` key then titles are set white on white which is easily repaired but why not set the default for `coltitle` to black in that case?
1.0
should "empty" set coltitle to black? - If one uses the `empty` key then titles are set white on white which is easily repaired but why not set the default for `coltitle` to black in that case?
non_defect
should empty set coltitle to black if one uses the empty key then titles are set white on white which is easily repaired but why not set the default for coltitle to black in that case
0
455,581
13,129,307,339
IssuesEvent
2020-08-06 13:42:45
JDesignEra/heartphoria
https://api.github.com/repos/JDesignEra/heartphoria
closed
Hospitals Location
High Priority backlog
Shows locations of various hospitals in Singapore. Acceptance Criteria: + Class attributes includes Latitude, Longtitude and Hospital Name
1.0
Hospitals Location - Shows locations of various hospitals in Singapore. Acceptance Criteria: + Class attributes includes Latitude, Longtitude and Hospital Name
non_defect
hospitals location shows locations of various hospitals in singapore acceptance criteria class attributes includes latitude longtitude and hospital name
0
106,726
11,496,132,014
IssuesEvent
2020-02-12 07:09:03
onaio/onadata
https://api.github.com/repos/onaio/onadata
closed
Update Contributing Guideline
Documentation
### Problem description The current contributing guidelines do not cover the need for commits to be verified. Would be nice if we updated them to cover how one should go about signing their commits.
1.0
Update Contributing Guideline - ### Problem description The current contributing guidelines do not cover the need for commits to be verified. Would be nice if we updated them to cover how one should go about signing their commits.
non_defect
update contributing guideline problem description the current contributing guidelines do not cover the need for commits to be verified would be nice if we updated them to cover how one should go about signing their commits
0
323,054
27,664,094,616
IssuesEvent
2023-03-12 21:11:08
IntellectualSites/FastAsyncWorldEdit
https://api.github.com/repos/IntellectualSites/FastAsyncWorldEdit
opened
Some brushes may not work with custom biomes, returning an error
Requires Testing
### Server Implementation Paper ### Server Version 1.19.3 ### Describe the bug Some brushes support custom biomes to be brushed, others don't. I am not 100% sure if only one brush doesn't work with custom biomes. I can't do //br layer 5 $volans:blue without an error code (see screenshot) ### To Reproduce 1. Have a custom biome registered on the server (for example Plugin Terra) 2. Take a tool for example a shovel in creative and have fawe / op permission 3. Use //br sphere $yourPlugin:yourbiome 4. Make //br layer 5 $yourPlugin:yourbiome 5. Compare chat messages / log ### Expected behaviour You should be able to use the brush with our biomes because it works on /br sphere $volans:blue greatly for example. ### Screenshots / Videos ![grafik](https://user-images.githubusercontent.com/77929075/224573343-9534c194-6e07-4749-9486-11f960fe7fb7.png) ![grafik](https://user-images.githubusercontent.com/77929075/224573352-1c6bccfd-b441-4a23-af85-456ad71bda30.png) ### Error log (if applicable) _No response_ ### Fawe Debugpaste https://athion.net/ISPaster/paste/view/9e3408c835654f3588226bc7672f2354 ### Fawe Version FastAsyncWorldEdit-381 ### Checklist - [X] I have included a Fawe debugpaste. - [X] I am using the newest build from https://ci.athion.net/job/FastAsyncWorldEdit/ and the issue still persists. ### Anything else? The example biome given was from Volans, which can create custom biomes in game without ressource pack, registering custom biomes while you are on the server, but it should also work with Plugins like Terra. The debugpaste done was in a later version but we also tested it with the latest version later on with no difference.
1.0
Some brushes may not work with custom biomes, returning an error - ### Server Implementation Paper ### Server Version 1.19.3 ### Describe the bug Some brushes support custom biomes to be brushed, others don't. I am not 100% sure if only one brush doesn't work with custom biomes. I can't do //br layer 5 $volans:blue without an error code (see screenshot) ### To Reproduce 1. Have a custom biome registered on the server (for example Plugin Terra) 2. Take a tool for example a shovel in creative and have fawe / op permission 3. Use //br sphere $yourPlugin:yourbiome 4. Make //br layer 5 $yourPlugin:yourbiome 5. Compare chat messages / log ### Expected behaviour You should be able to use the brush with our biomes because it works on /br sphere $volans:blue greatly for example. ### Screenshots / Videos ![grafik](https://user-images.githubusercontent.com/77929075/224573343-9534c194-6e07-4749-9486-11f960fe7fb7.png) ![grafik](https://user-images.githubusercontent.com/77929075/224573352-1c6bccfd-b441-4a23-af85-456ad71bda30.png) ### Error log (if applicable) _No response_ ### Fawe Debugpaste https://athion.net/ISPaster/paste/view/9e3408c835654f3588226bc7672f2354 ### Fawe Version FastAsyncWorldEdit-381 ### Checklist - [X] I have included a Fawe debugpaste. - [X] I am using the newest build from https://ci.athion.net/job/FastAsyncWorldEdit/ and the issue still persists. ### Anything else? The example biome given was from Volans, which can create custom biomes in game without ressource pack, registering custom biomes while you are on the server, but it should also work with Plugins like Terra. The debugpaste done was in a later version but we also tested it with the latest version later on with no difference.
non_defect
some brushes may not work with custom biomes returning an error server implementation paper server version describe the bug some brushes support custom biomes to be brushed others don t i am not sure if only one brush doesn t work with custom biomes i can t do br layer volans blue without an error code see screenshot to reproduce have a custom biome registered on the server for example plugin terra take a tool for example a shovel in creative and have fawe op permission use br sphere yourplugin yourbiome make br layer yourplugin yourbiome compare chat messages log expected behaviour you should be able to use the brush with our biomes because it works on br sphere volans blue greatly for example screenshots videos error log if applicable no response fawe debugpaste fawe version fastasyncworldedit checklist i have included a fawe debugpaste i am using the newest build from and the issue still persists anything else the example biome given was from volans which can create custom biomes in game without ressource pack registering custom biomes while you are on the server but it should also work with plugins like terra the debugpaste done was in a later version but we also tested it with the latest version later on with no difference
0
79,863
29,487,143,220
IssuesEvent
2023-06-02 10:36:28
cakephp/bake
https://api.github.com/repos/cakephp/bake
opened
Return value of Bake\Command\ModelCommand::getDisplayField() must be of the type string or null, array returned in
defect
### Description Getting error while baking a model related to mysql View. after upgrading to 4.4.14 `root@0b92294f1614:/var/www/html# ./bin/cake bake model campaign_views One moment while associations are detected. 2023-06-02 16:02:03 error: [TypeError] Return value of Bake\Command\ModelCommand::getDisplayField() must be of the type string or null, array returned in /var/www/html/vendor/cakephp/bake/src/Command/ModelCommand.php on line 485 Stack Trace: - /var/www/html/vendor/cakephp/bake/src/Command/ModelCommand.php:127 - /var/www/html/vendor/cakephp/bake/src/Command/ModelCommand.php:98 - /var/www/html/vendor/cakephp/bake/src/Command/ModelCommand.php:81 - /var/www/html/vendor/cakephp/cakephp/src/Console/BaseCommand.php:189 - /var/www/html/vendor/cakephp/cakephp/src/Console/CommandRunner.php:334 - /var/www/html/vendor/cakephp/cakephp/src/Console/CommandRunner.php:172 - /var/www/html/bin/cake.php:12` Schema. `mysql> describe campaign_views; +---------------+--------------+------+-----+---------+-------+ | Field | Type | Null | Key | Default | Extra | +---------------+--------------+------+-----+---------+-------+ | id | int | NO | | 0 | | | campaign_name | varchar(128) | NO | | NULL | | | start_date | date | NO | | NULL | | | end_date | date | NO | | NULL | | | created | datetime | NO | | NULL | | | user_id | int | NO | | NULL | | | template_id | bigint | NO | | NULL | | | template | varchar(64) | YES | | NULL | | | status | varchar(16) | YES | | NULL | | | account_id | int | YES | | NULL | | | company_name | varchar(32) | YES | | NULL | | | user | varchar(255) | YES | | NULL | | +---------------+--------------+------+-----+---------+-------+ 12 rows in set (0.00 sec)` ### Bake Version 4.4.14 ### PHP Version PHP 7.4.33 (cli) (built: Nov 15 2022 06:03:30) ( NTS )
1.0
Return value of Bake\Command\ModelCommand::getDisplayField() must be of the type string or null, array returned in - ### Description Getting error while baking a model related to mysql View. after upgrading to 4.4.14 `root@0b92294f1614:/var/www/html# ./bin/cake bake model campaign_views One moment while associations are detected. 2023-06-02 16:02:03 error: [TypeError] Return value of Bake\Command\ModelCommand::getDisplayField() must be of the type string or null, array returned in /var/www/html/vendor/cakephp/bake/src/Command/ModelCommand.php on line 485 Stack Trace: - /var/www/html/vendor/cakephp/bake/src/Command/ModelCommand.php:127 - /var/www/html/vendor/cakephp/bake/src/Command/ModelCommand.php:98 - /var/www/html/vendor/cakephp/bake/src/Command/ModelCommand.php:81 - /var/www/html/vendor/cakephp/cakephp/src/Console/BaseCommand.php:189 - /var/www/html/vendor/cakephp/cakephp/src/Console/CommandRunner.php:334 - /var/www/html/vendor/cakephp/cakephp/src/Console/CommandRunner.php:172 - /var/www/html/bin/cake.php:12` Schema. `mysql> describe campaign_views; +---------------+--------------+------+-----+---------+-------+ | Field | Type | Null | Key | Default | Extra | +---------------+--------------+------+-----+---------+-------+ | id | int | NO | | 0 | | | campaign_name | varchar(128) | NO | | NULL | | | start_date | date | NO | | NULL | | | end_date | date | NO | | NULL | | | created | datetime | NO | | NULL | | | user_id | int | NO | | NULL | | | template_id | bigint | NO | | NULL | | | template | varchar(64) | YES | | NULL | | | status | varchar(16) | YES | | NULL | | | account_id | int | YES | | NULL | | | company_name | varchar(32) | YES | | NULL | | | user | varchar(255) | YES | | NULL | | +---------------+--------------+------+-----+---------+-------+ 12 rows in set (0.00 sec)` ### Bake Version 4.4.14 ### PHP Version PHP 7.4.33 (cli) (built: Nov 15 2022 06:03:30) ( NTS )
defect
return value of bake command modelcommand getdisplayfield must be of the type string or null array returned in description getting error while baking a model related to mysql view after upgrading to root var www html bin cake bake model campaign views one moment while associations are detected error return value of bake command modelcommand getdisplayfield must be of the type string or null array returned in var www html vendor cakephp bake src command modelcommand php on line stack trace var www html vendor cakephp bake src command modelcommand php var www html vendor cakephp bake src command modelcommand php var www html vendor cakephp bake src command modelcommand php var www html vendor cakephp cakephp src console basecommand php var www html vendor cakephp cakephp src console commandrunner php var www html vendor cakephp cakephp src console commandrunner php var www html bin cake php schema mysql describe campaign views field type null key default extra id int no campaign name varchar no null start date date no null end date date no null created datetime no null user id int no null template id bigint no null template varchar yes null status varchar yes null account id int yes null company name varchar yes null user varchar yes null rows in set sec bake version php version php cli built nov nts
1
133,170
18,279,941,068
IssuesEvent
2021-10-05 01:00:55
Seagate/cortx
https://api.github.com/repos/Seagate/cortx
opened
CVE-2021-3803 (High) detected in nth-check-2.0.0.tgz, nth-check-1.0.2.tgz
security vulnerability
## CVE-2021-3803 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>nth-check-2.0.0.tgz</b>, <b>nth-check-1.0.2.tgz</b></p></summary> <p> <details><summary><b>nth-check-2.0.0.tgz</b></p></summary> <p>Parses and compiles CSS nth-checks to highly optimized functions.</p> <p>Library home page: <a href="https://registry.npmjs.org/nth-check/-/nth-check-2.0.0.tgz">https://registry.npmjs.org/nth-check/-/nth-check-2.0.0.tgz</a></p> <p>Path to dependency file: cortx/doc/integrations/myDrive/package.json</p> <p>Path to vulnerable library: cortx/doc/integrations/myDrive/node_modules/nth-check/package.json</p> <p> Dependency Hierarchy: - enzyme-3.11.0.tgz (Root Library) - cheerio-1.0.0-rc.6.tgz - cheerio-select-1.4.0.tgz - css-select-4.1.2.tgz - :x: **nth-check-2.0.0.tgz** (Vulnerable Library) </details> <details><summary><b>nth-check-1.0.2.tgz</b></p></summary> <p>performant nth-check parser & compiler</p> <p>Library home page: <a href="https://registry.npmjs.org/nth-check/-/nth-check-1.0.2.tgz">https://registry.npmjs.org/nth-check/-/nth-check-1.0.2.tgz</a></p> <p>Path to dependency file: cortx/doc/integrations/euclid/client/package.json</p> <p>Path to vulnerable library: cortx/doc/integrations/euclid/client/node_modules/nth-check/package.json,cortx/doc/integrations/edgehealth/edgehealth-chatbot/node_modules/nth-check/package.json,cortx/doc/integrations/edgehealth/edgehealth/node_modules/nth-check/package.json</p> <p> Dependency Hierarchy: - react-scripts-4.0.3.tgz (Root Library) - webpack-5.5.0.tgz - plugin-svgo-5.5.0.tgz - svgo-1.3.2.tgz - css-select-2.1.0.tgz - :x: **nth-check-1.0.2.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> nth-check is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3803>CVE-2021-3803</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/fb55/nth-check/compare/v2.0.0...v2.0.1">https://github.com/fb55/nth-check/compare/v2.0.0...v2.0.1</a></p> <p>Release Date: 2021-09-17</p> <p>Fix Resolution: nth-check - v2.0.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"nth-check","packageVersion":"2.0.0","packageFilePaths":["/doc/integrations/myDrive/package.json"],"isTransitiveDependency":true,"dependencyTree":"enzyme:3.11.0;cheerio:1.0.0-rc.6;cheerio-select:1.4.0;css-select:4.1.2;nth-check:2.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"nth-check - v2.0.1"},{"packageType":"javascript/Node.js","packageName":"nth-check","packageVersion":"1.0.2","packageFilePaths":["/doc/integrations/euclid/client/package.json","/doc/integrations/edgehealth/edgehealth-chatbot/package.json","/doc/integrations/edgehealth/edgehealth/package.json"],"isTransitiveDependency":true,"dependencyTree":"react-scripts:4.0.3;@svgr/webpack:5.5.0;@svgr/plugin-svgo:5.5.0;svgo:1.3.2;css-select:2.1.0;nth-check:1.0.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"nth-check - v2.0.1"}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-3803","vulnerabilityDetails":"nth-check is vulnerable to Inefficient Regular Expression Complexity","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3803","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-3803 (High) detected in nth-check-2.0.0.tgz, nth-check-1.0.2.tgz - ## CVE-2021-3803 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>nth-check-2.0.0.tgz</b>, <b>nth-check-1.0.2.tgz</b></p></summary> <p> <details><summary><b>nth-check-2.0.0.tgz</b></p></summary> <p>Parses and compiles CSS nth-checks to highly optimized functions.</p> <p>Library home page: <a href="https://registry.npmjs.org/nth-check/-/nth-check-2.0.0.tgz">https://registry.npmjs.org/nth-check/-/nth-check-2.0.0.tgz</a></p> <p>Path to dependency file: cortx/doc/integrations/myDrive/package.json</p> <p>Path to vulnerable library: cortx/doc/integrations/myDrive/node_modules/nth-check/package.json</p> <p> Dependency Hierarchy: - enzyme-3.11.0.tgz (Root Library) - cheerio-1.0.0-rc.6.tgz - cheerio-select-1.4.0.tgz - css-select-4.1.2.tgz - :x: **nth-check-2.0.0.tgz** (Vulnerable Library) </details> <details><summary><b>nth-check-1.0.2.tgz</b></p></summary> <p>performant nth-check parser & compiler</p> <p>Library home page: <a href="https://registry.npmjs.org/nth-check/-/nth-check-1.0.2.tgz">https://registry.npmjs.org/nth-check/-/nth-check-1.0.2.tgz</a></p> <p>Path to dependency file: cortx/doc/integrations/euclid/client/package.json</p> <p>Path to vulnerable library: cortx/doc/integrations/euclid/client/node_modules/nth-check/package.json,cortx/doc/integrations/edgehealth/edgehealth-chatbot/node_modules/nth-check/package.json,cortx/doc/integrations/edgehealth/edgehealth/node_modules/nth-check/package.json</p> <p> Dependency Hierarchy: - react-scripts-4.0.3.tgz (Root Library) - webpack-5.5.0.tgz - plugin-svgo-5.5.0.tgz - svgo-1.3.2.tgz - css-select-2.1.0.tgz - :x: **nth-check-1.0.2.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> nth-check is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3803>CVE-2021-3803</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/fb55/nth-check/compare/v2.0.0...v2.0.1">https://github.com/fb55/nth-check/compare/v2.0.0...v2.0.1</a></p> <p>Release Date: 2021-09-17</p> <p>Fix Resolution: nth-check - v2.0.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"nth-check","packageVersion":"2.0.0","packageFilePaths":["/doc/integrations/myDrive/package.json"],"isTransitiveDependency":true,"dependencyTree":"enzyme:3.11.0;cheerio:1.0.0-rc.6;cheerio-select:1.4.0;css-select:4.1.2;nth-check:2.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"nth-check - v2.0.1"},{"packageType":"javascript/Node.js","packageName":"nth-check","packageVersion":"1.0.2","packageFilePaths":["/doc/integrations/euclid/client/package.json","/doc/integrations/edgehealth/edgehealth-chatbot/package.json","/doc/integrations/edgehealth/edgehealth/package.json"],"isTransitiveDependency":true,"dependencyTree":"react-scripts:4.0.3;@svgr/webpack:5.5.0;@svgr/plugin-svgo:5.5.0;svgo:1.3.2;css-select:2.1.0;nth-check:1.0.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"nth-check - v2.0.1"}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-3803","vulnerabilityDetails":"nth-check is vulnerable to Inefficient Regular Expression Complexity","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3803","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_defect
cve high detected in nth check tgz nth check tgz cve high severity vulnerability vulnerable libraries nth check tgz nth check tgz nth check tgz parses and compiles css nth checks to highly optimized functions library home page a href path to dependency file cortx doc integrations mydrive package json path to vulnerable library cortx doc integrations mydrive node modules nth check package json dependency hierarchy enzyme tgz root library cheerio rc tgz cheerio select tgz css select tgz x nth check tgz vulnerable library nth check tgz performant nth check parser compiler library home page a href path to dependency file cortx doc integrations euclid client package json path to vulnerable library cortx doc integrations euclid client node modules nth check package json cortx doc integrations edgehealth edgehealth chatbot node modules nth check package json cortx doc integrations edgehealth edgehealth node modules nth check package json dependency hierarchy react scripts tgz root library webpack tgz plugin svgo tgz svgo tgz css select tgz x nth check tgz vulnerable library found in base branch main vulnerability details nth check is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution nth check isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree enzyme cheerio rc cheerio select css select nth check isminimumfixversionavailable true minimumfixversion nth check packagetype javascript node js packagename nth check packageversion packagefilepaths istransitivedependency true dependencytree react scripts svgr webpack svgr plugin svgo svgo css select nth check isminimumfixversionavailable true minimumfixversion nth check basebranches vulnerabilityidentifier cve vulnerabilitydetails nth check is vulnerable to inefficient regular expression complexity vulnerabilityurl
0
312,197
26,847,757,582
IssuesEvent
2023-02-03 08:39:18
powbot/issues
https://api.github.com/repos/powbot/issues
closed
[BUG] Combat.specialAttack(true) is broken in pvp
bug needs-test
**Describe the bug** Combat.specialAttack(true) uses the spec orb by the map, which is fine for 99% of cases. The only time it's disabled is when in pvp. **Expected behavior** Use the special bar from the attack tab **Screenshots** Non-wildy/pvp area ![image](https://user-images.githubusercontent.com/34009165/200570018-6054a539-e1f3-422d-aa1d-0bf6d4def615.png) Wild/pvp area ![image](https://user-images.githubusercontent.com/34009165/200570082-aa34f65a-d250-43d1-89d5-56313b59db77.png) What it should use instead ![image](https://user-images.githubusercontent.com/34009165/200570129-b7d67a81-c0c3-402d-9ff4-7a643074be55.png)
1.0
[BUG] Combat.specialAttack(true) is broken in pvp - **Describe the bug** Combat.specialAttack(true) uses the spec orb by the map, which is fine for 99% of cases. The only time it's disabled is when in pvp. **Expected behavior** Use the special bar from the attack tab **Screenshots** Non-wildy/pvp area ![image](https://user-images.githubusercontent.com/34009165/200570018-6054a539-e1f3-422d-aa1d-0bf6d4def615.png) Wild/pvp area ![image](https://user-images.githubusercontent.com/34009165/200570082-aa34f65a-d250-43d1-89d5-56313b59db77.png) What it should use instead ![image](https://user-images.githubusercontent.com/34009165/200570129-b7d67a81-c0c3-402d-9ff4-7a643074be55.png)
non_defect
combat specialattack true is broken in pvp describe the bug combat specialattack true uses the spec orb by the map which is fine for of cases the only time it s disabled is when in pvp expected behavior use the special bar from the attack tab screenshots non wildy pvp area wild pvp area what it should use instead
0