Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1 value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3 values | title stringlengths 1 844 | labels stringlengths 4 721 | body stringlengths 1 261k | index stringclasses 12 values | text_combine stringlengths 96 261k | label stringclasses 2 values | text stringlengths 96 248k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
167,896 | 13,047,723,980 | IssuesEvent | 2020-07-29 11:14:36 | urapadmin/kiosk | https://api.github.com/repos/urapadmin/kiosk | closed | "none" instead of "nope" when turning off simple excavation | bug filemaker small test-stage | We're back to Luiza's picky notes, hello and welcome.
Just turning off simple excavation to test the pinboard and I know the instructions should say "nope" but they say that one should write "none" to turn that off instead:

| 1.0 | "none" instead of "nope" when turning off simple excavation - We're back to Luiza's picky notes, hello and welcome.
Just turning off simple excavation to test the pinboard and I know the instructions should say "nope" but they say that one should write "none" to turn that off instead:

| non_priority | none instead of nope when turning off simple excavation we re back to luiza s picky notes hello and welcome just turning off simple excavation to test the pinboard and i know the instructions should say nope but they say that one should write none to turn that off instead | 0 |
70,081 | 13,424,994,446 | IssuesEvent | 2020-09-06 08:14:05 | e4exp/paper_manager_abstract | https://api.github.com/repos/e4exp/paper_manager_abstract | opened | Dynamic Web with Automatic Code Generation Using Deep Learning | 2020 Code Generation GAN Pix2code Prototyping UI Design _read_later | * https://link.springer.com/chapter/10.1007/978-981-15-1286-5_61
* International Conference on Innovative Computing and Communications pp 687-697
デザイナーによって作成されたデザインのために開発者に割り当てられた典型的なタスクは、それがどのようなソフトウェアを構築することになると非常に重要です。
このプロセスでは、急速に変化するクライアントの要件に適応し、その結果、プロトタイプにそれらの変更を適応させるという退屈で反復的な手順が含まれます。
これがソフトウェア開発プロセスの障害となっています。
この問題の解決策として、ディープラーニング技術を活用して、手描きのワイヤーフレームからフロントエンドコードを生成するプロセスを自動化するモデルを紹介する。
モデルに入力されたGUIモックアップの画像特徴を抽出し、マークアップタグをトークンとして生成し、再利用可能なコンポーネントの形でレンダリングすることで、BLEUスコアは0.92を達成した。
| 2.0 | Dynamic Web with Automatic Code Generation Using Deep Learning - * https://link.springer.com/chapter/10.1007/978-981-15-1286-5_61
* International Conference on Innovative Computing and Communications pp 687-697
デザイナーによって作成されたデザインのために開発者に割り当てられた典型的なタスクは、それがどのようなソフトウェアを構築することになると非常に重要です。
このプロセスでは、急速に変化するクライアントの要件に適応し、その結果、プロトタイプにそれらの変更を適応させるという退屈で反復的な手順が含まれます。
これがソフトウェア開発プロセスの障害となっています。
この問題の解決策として、ディープラーニング技術を活用して、手描きのワイヤーフレームからフロントエンドコードを生成するプロセスを自動化するモデルを紹介する。
モデルに入力されたGUIモックアップの画像特徴を抽出し、マークアップタグをトークンとして生成し、再利用可能なコンポーネントの形でレンダリングすることで、BLEUスコアは0.92を達成した。
| non_priority | dynamic web with automatic code generation using deep learning international conference on innovative computing and communications pp デザイナーによって作成されたデザインのために開発者に割り当てられた典型的なタスクは、それがどのようなソフトウェアを構築することになると非常に重要です。 このプロセスでは、急速に変化するクライアントの要件に適応し、その結果、プロトタイプにそれらの変更を適応させるという退屈で反復的な手順が含まれます。 これがソフトウェア開発プロセスの障害となっています。 この問題の解決策として、ディープラーニング技術を活用して、手描きのワイヤーフレームからフロントエンドコードを生成するプロセスを自動化するモデルを紹介する。 モデルに入力されたguiモックアップの画像特徴を抽出し、マークアップタグをトークンとして生成し、再利用可能なコンポーネントの形でレンダリングすることで、 。 | 0 |
100,532 | 16,489,898,921 | IssuesEvent | 2021-05-25 01:07:35 | billmcchesney1/debug | https://api.github.com/repos/billmcchesney1/debug | opened | CVE-2020-28502 (High) detected in xmlhttprequest-ssl-1.5.5.tgz | security vulnerability | ## CVE-2020-28502 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xmlhttprequest-ssl-1.5.5.tgz</b></p></summary>
<p>XMLHttpRequest for Node</p>
<p>Library home page: <a href="https://registry.npmjs.org/xmlhttprequest-ssl/-/xmlhttprequest-ssl-1.5.5.tgz">https://registry.npmjs.org/xmlhttprequest-ssl/-/xmlhttprequest-ssl-1.5.5.tgz</a></p>
<p>Path to dependency file: debug/package.json</p>
<p>Path to vulnerable library: debug/node_modules/xmlhttprequest-ssl/package.json</p>
<p>
Dependency Hierarchy:
- karma-3.1.4.tgz (Root Library)
- socket.io-2.1.1.tgz
- socket.io-client-2.1.1.tgz
- engine.io-client-3.2.1.tgz
- :x: **xmlhttprequest-ssl-1.5.5.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.
<p>Publish Date: 2021-03-05
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28502>CVE-2020-28502</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-h4j5-c7cj-74xg">https://github.com/advisories/GHSA-h4j5-c7cj-74xg</a></p>
<p>Release Date: 2021-03-05</p>
<p>Fix Resolution: xmlhttprequest - 1.7.0,xmlhttprequest-ssl - 1.6.2</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"xmlhttprequest-ssl","packageVersion":"1.5.5","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"karma:3.1.4;socket.io:2.1.1;socket.io-client:2.1.1;engine.io-client:3.2.1;xmlhttprequest-ssl:1.5.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"xmlhttprequest - 1.7.0,xmlhttprequest-ssl - 1.6.2"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28502","vulnerabilityDetails":"This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async\u003dFalse on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28502","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-28502 (High) detected in xmlhttprequest-ssl-1.5.5.tgz - ## CVE-2020-28502 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xmlhttprequest-ssl-1.5.5.tgz</b></p></summary>
<p>XMLHttpRequest for Node</p>
<p>Library home page: <a href="https://registry.npmjs.org/xmlhttprequest-ssl/-/xmlhttprequest-ssl-1.5.5.tgz">https://registry.npmjs.org/xmlhttprequest-ssl/-/xmlhttprequest-ssl-1.5.5.tgz</a></p>
<p>Path to dependency file: debug/package.json</p>
<p>Path to vulnerable library: debug/node_modules/xmlhttprequest-ssl/package.json</p>
<p>
Dependency Hierarchy:
- karma-3.1.4.tgz (Root Library)
- socket.io-2.1.1.tgz
- socket.io-client-2.1.1.tgz
- engine.io-client-3.2.1.tgz
- :x: **xmlhttprequest-ssl-1.5.5.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.
<p>Publish Date: 2021-03-05
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28502>CVE-2020-28502</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-h4j5-c7cj-74xg">https://github.com/advisories/GHSA-h4j5-c7cj-74xg</a></p>
<p>Release Date: 2021-03-05</p>
<p>Fix Resolution: xmlhttprequest - 1.7.0,xmlhttprequest-ssl - 1.6.2</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"xmlhttprequest-ssl","packageVersion":"1.5.5","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"karma:3.1.4;socket.io:2.1.1;socket.io-client:2.1.1;engine.io-client:3.2.1;xmlhttprequest-ssl:1.5.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"xmlhttprequest - 1.7.0,xmlhttprequest-ssl - 1.6.2"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28502","vulnerabilityDetails":"This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async\u003dFalse on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28502","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in xmlhttprequest ssl tgz cve high severity vulnerability vulnerable library xmlhttprequest ssl tgz xmlhttprequest for node library home page a href path to dependency file debug package json path to vulnerable library debug node modules xmlhttprequest ssl package json dependency hierarchy karma tgz root library socket io tgz socket io client tgz engine io client tgz x xmlhttprequest ssl tgz vulnerable library found in base branch master vulnerability details this affects the package xmlhttprequest before all versions of package xmlhttprequest ssl provided requests are sent synchronously async false on xhr open malicious user input flowing into xhr send could result in arbitrary code being injected and run publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution xmlhttprequest xmlhttprequest ssl isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree karma socket io socket io client engine io client xmlhttprequest ssl isminimumfixversionavailable true minimumfixversion xmlhttprequest xmlhttprequest ssl basebranches vulnerabilityidentifier cve vulnerabilitydetails this affects the package xmlhttprequest before all versions of package xmlhttprequest ssl provided requests are sent synchronously async on xhr open malicious user input flowing into xhr send could result in arbitrary code being injected and run vulnerabilityurl | 0 |
20,886 | 10,556,689,872 | IssuesEvent | 2019-10-04 03:01:36 | istio/istio | https://api.github.com/repos/istio/istio | closed | Secure coding & testing practices that affect all new work -code-mauve style | area/security kind/need more info | (NOTE: This is used to report product bugs:
To report a security vulnerability, please visit <https://istio.io/about/security-vulnerabilities/>
To ask questions about how to use Istio, please visit <https://discuss.istio.io>
)
**Bug description**
This task is a spin off of #13618 , the goal here might be to verify the state of golangci linter, see if we're using the latest linters, and if all codebase (including older) passes through linting without errors.
Also we might want to investigate possible secure coding practice not covered by existing linting.
As for the testing, this is TBD (was not explicitly described in original issue).
**Affected product area (please put an X in all that apply)**
[ ] Configuration Infrastructure
[ ] Docs
[ ] Installation
[ ] Networking
[ ] Performance and Scalability
[ ] Policies and Telemetry
[X] Security
[X] Test and Release
[ ] User Experience
[ ] Developer Infrastructure
**Expected behavior**
**Steps to reproduce the bug**
**Version (include the output of `istioctl version --remote` and `kubectl version`)**
**How was Istio installed?**
**Environment where bug was observed (cloud vendor, OS, etc)**
Additionally, please consider attaching a [cluster state archive](http://istio.io/help/bugs/#generating-a-cluster-state-archive) by attaching
the dump file to this issue.
| True | Secure coding & testing practices that affect all new work -code-mauve style - (NOTE: This is used to report product bugs:
To report a security vulnerability, please visit <https://istio.io/about/security-vulnerabilities/>
To ask questions about how to use Istio, please visit <https://discuss.istio.io>
)
**Bug description**
This task is a spin off of #13618 , the goal here might be to verify the state of golangci linter, see if we're using the latest linters, and if all codebase (including older) passes through linting without errors.
Also we might want to investigate possible secure coding practice not covered by existing linting.
As for the testing, this is TBD (was not explicitly described in original issue).
**Affected product area (please put an X in all that apply)**
[ ] Configuration Infrastructure
[ ] Docs
[ ] Installation
[ ] Networking
[ ] Performance and Scalability
[ ] Policies and Telemetry
[X] Security
[X] Test and Release
[ ] User Experience
[ ] Developer Infrastructure
**Expected behavior**
**Steps to reproduce the bug**
**Version (include the output of `istioctl version --remote` and `kubectl version`)**
**How was Istio installed?**
**Environment where bug was observed (cloud vendor, OS, etc)**
Additionally, please consider attaching a [cluster state archive](http://istio.io/help/bugs/#generating-a-cluster-state-archive) by attaching
the dump file to this issue.
| non_priority | secure coding testing practices that affect all new work code mauve style note this is used to report product bugs to report a security vulnerability please visit to ask questions about how to use istio please visit bug description this task is a spin off of the goal here might be to verify the state of golangci linter see if we re using the latest linters and if all codebase including older passes through linting without errors also we might want to investigate possible secure coding practice not covered by existing linting as for the testing this is tbd was not explicitly described in original issue affected product area please put an x in all that apply configuration infrastructure docs installation networking performance and scalability policies and telemetry security test and release user experience developer infrastructure expected behavior steps to reproduce the bug version include the output of istioctl version remote and kubectl version how was istio installed environment where bug was observed cloud vendor os etc additionally please consider attaching a by attaching the dump file to this issue | 0 |
115,179 | 24,730,445,780 | IssuesEvent | 2022-10-20 17:06:42 | sourcegraph/sourcegraph | https://api.github.com/repos/sourcegraph/sourcegraph | closed | insights: Document how we can use the scale testing environment | spike team/code-insights backend strategic strategic-testing | Relating to this [scale testing effort](https://docs.google.com/document/d/1f9GcEpqJ5KA3YvfsOy48mdhILkvJZrqD9SfpZoNlQTg/edit#heading=h.egbxrewbg3nl), figure out how we can use this to test code insights at scale. Coordinate with people in the #wg-test-at-scale to figure out how this is all going to work and how we can use it.
The outcome of this ticket will be some documentation or a plan for how we can use that environment in particular, and/or work that will need to be done to enable it.
/cc @joelkw @felixfbecker @vovakulikov | 1.0 | insights: Document how we can use the scale testing environment - Relating to this [scale testing effort](https://docs.google.com/document/d/1f9GcEpqJ5KA3YvfsOy48mdhILkvJZrqD9SfpZoNlQTg/edit#heading=h.egbxrewbg3nl), figure out how we can use this to test code insights at scale. Coordinate with people in the #wg-test-at-scale to figure out how this is all going to work and how we can use it.
The outcome of this ticket will be some documentation or a plan for how we can use that environment in particular, and/or work that will need to be done to enable it.
/cc @joelkw @felixfbecker @vovakulikov | non_priority | insights document how we can use the scale testing environment relating to this figure out how we can use this to test code insights at scale coordinate with people in the wg test at scale to figure out how this is all going to work and how we can use it the outcome of this ticket will be some documentation or a plan for how we can use that environment in particular and or work that will need to be done to enable it cc joelkw felixfbecker vovakulikov | 0 |
107,850 | 9,231,747,128 | IssuesEvent | 2019-03-13 03:51:11 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | closed | teamcity: failed test: TestCleanupTxnIntentsOnGCAsync | C-test-failure O-robot | The following tests appear to have failed on master (test): TestCleanupTxnIntentsOnGCAsync, TestCleanupTxnIntentsOnGCAsync/#01, TestCleanupTxnIntentsOnGCAsync/#00, TestCleanupTxnIntentsOnGCAsync/#03, TestCleanupTxnIntentsOnGCAsync/#02
You may want to check [for open issues](https://github.com/cockroachdb/cockroach/issues?q=is%3Aissue+is%3Aopen+TestCleanupTxnIntentsOnGCAsync).
[#1160310](https://teamcity.cockroachdb.com/viewLog.html?buildId=1160310):
```
TestCleanupTxnIntentsOnGCAsync/#02
--- FAIL: test/TestCleanupTxnIntentsOnGCAsync/#02 (0.000s)
Test ended in panic.
------- Stdout: -------
W190303 18:44:35.806826 49 storage/intentresolver/intent_resolver.go:729 failed to cleanup transaction intents: failed to resolve intents: boom
TestCleanupTxnIntentsOnGCAsync
--- FAIL: testrace/TestCleanupTxnIntentsOnGCAsync (0.040s)
Test ended in panic.
TestCleanupTxnIntentsOnGCAsync/#00
--- FAIL: test/TestCleanupTxnIntentsOnGCAsync/#00 (0.000s)
Test ended in panic.
TestCleanupTxnIntentsOnGCAsync
--- FAIL: test/TestCleanupTxnIntentsOnGCAsync (0.000s)
Test ended in panic.
TestCleanupTxnIntentsOnGCAsync/#03
...
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:190 +0x3e
github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask.func1(0xc000504120, 0x11034c0, 0xc0000ba010, 0xc000343050, 0x22, 0x0, 0x0, 0xc00052a0f0)
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:325 +0xe6
created by github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:320 +0x134
goroutine 47 [select]:
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run(0xc00052ea90, 0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:373 +0x2fa
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run-fm(0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:190 +0x3e
github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask.func1(0xc000504120, 0x11034c0, 0xc0000ba010, 0xc000343110, 0x22, 0x0, 0x0, 0xc00052a170)
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:325 +0xe6
created by github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:320 +0x134
goroutine 48 [select]:
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run(0xc00052eb60, 0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:373 +0x2fa
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run-fm(0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:190 +0x3e
github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask.func1(0xc000504120, 0x11034c0, 0xc0000ba010, 0xc0003431a0, 0x22, 0x0, 0x0, 0xc00052a180)
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:325 +0xe6
created by github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:320 +0x134
goroutine 59 [select]:
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run(0xc0000b48f0, 0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:373 +0x2fa
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run-fm(0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:190 +0x3e
github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask.func1(0xc000504120, 0x11034c0, 0xc0000ba010, 0xc0005a4030, 0x22, 0x0, 0x0, 0xc00049c0c0)
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:325 +0xe6
created by github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:320 +0x134
goroutine 60 [select]:
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run(0xc0000b4d00, 0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:373 +0x2fa
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run-fm(0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:190 +0x3e
github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask.func1(0xc000504120, 0x11034c0, 0xc0000ba010, 0xc0005a4060, 0x22, 0x0, 0x0, 0xc00049c0d0)
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:325 +0xe6
created by github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:320 +0x134
TestCleanupTxnIntentsOnGCAsync/#01
--- FAIL: test/TestCleanupTxnIntentsOnGCAsync/#01 (0.000s)
Test ended in panic.
```
Please assign, take a look and update the issue accordingly.
| 1.0 | teamcity: failed test: TestCleanupTxnIntentsOnGCAsync - The following tests appear to have failed on master (test): TestCleanupTxnIntentsOnGCAsync, TestCleanupTxnIntentsOnGCAsync/#01, TestCleanupTxnIntentsOnGCAsync/#00, TestCleanupTxnIntentsOnGCAsync/#03, TestCleanupTxnIntentsOnGCAsync/#02
You may want to check [for open issues](https://github.com/cockroachdb/cockroach/issues?q=is%3Aissue+is%3Aopen+TestCleanupTxnIntentsOnGCAsync).
[#1160310](https://teamcity.cockroachdb.com/viewLog.html?buildId=1160310):
```
TestCleanupTxnIntentsOnGCAsync/#02
--- FAIL: test/TestCleanupTxnIntentsOnGCAsync/#02 (0.000s)
Test ended in panic.
------- Stdout: -------
W190303 18:44:35.806826 49 storage/intentresolver/intent_resolver.go:729 failed to cleanup transaction intents: failed to resolve intents: boom
TestCleanupTxnIntentsOnGCAsync
--- FAIL: testrace/TestCleanupTxnIntentsOnGCAsync (0.040s)
Test ended in panic.
TestCleanupTxnIntentsOnGCAsync/#00
--- FAIL: test/TestCleanupTxnIntentsOnGCAsync/#00 (0.000s)
Test ended in panic.
TestCleanupTxnIntentsOnGCAsync
--- FAIL: test/TestCleanupTxnIntentsOnGCAsync (0.000s)
Test ended in panic.
TestCleanupTxnIntentsOnGCAsync/#03
...
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:190 +0x3e
github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask.func1(0xc000504120, 0x11034c0, 0xc0000ba010, 0xc000343050, 0x22, 0x0, 0x0, 0xc00052a0f0)
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:325 +0xe6
created by github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:320 +0x134
goroutine 47 [select]:
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run(0xc00052ea90, 0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:373 +0x2fa
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run-fm(0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:190 +0x3e
github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask.func1(0xc000504120, 0x11034c0, 0xc0000ba010, 0xc000343110, 0x22, 0x0, 0x0, 0xc00052a170)
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:325 +0xe6
created by github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:320 +0x134
goroutine 48 [select]:
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run(0xc00052eb60, 0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:373 +0x2fa
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run-fm(0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:190 +0x3e
github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask.func1(0xc000504120, 0x11034c0, 0xc0000ba010, 0xc0003431a0, 0x22, 0x0, 0x0, 0xc00052a180)
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:325 +0xe6
created by github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:320 +0x134
goroutine 59 [select]:
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run(0xc0000b48f0, 0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:373 +0x2fa
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run-fm(0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:190 +0x3e
github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask.func1(0xc000504120, 0x11034c0, 0xc0000ba010, 0xc0005a4030, 0x22, 0x0, 0x0, 0xc00049c0c0)
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:325 +0xe6
created by github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:320 +0x134
goroutine 60 [select]:
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run(0xc0000b4d00, 0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:373 +0x2fa
github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher.(*RequestBatcher).run-fm(0x11034c0, 0xc0000ba010)
/go/src/github.com/cockroachdb/cockroach/pkg/internal/client/requestbatcher/batcher.go:190 +0x3e
github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask.func1(0xc000504120, 0x11034c0, 0xc0000ba010, 0xc0005a4060, 0x22, 0x0, 0x0, 0xc00049c0d0)
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:325 +0xe6
created by github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTask
/go/src/github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:320 +0x134
TestCleanupTxnIntentsOnGCAsync/#01
--- FAIL: test/TestCleanupTxnIntentsOnGCAsync/#01 (0.000s)
Test ended in panic.
```
Please assign, take a look and update the issue accordingly.
| non_priority | teamcity failed test testcleanuptxnintentsongcasync the following tests appear to have failed on master test testcleanuptxnintentsongcasync testcleanuptxnintentsongcasync testcleanuptxnintentsongcasync testcleanuptxnintentsongcasync testcleanuptxnintentsongcasync you may want to check testcleanuptxnintentsongcasync fail test testcleanuptxnintentsongcasync test ended in panic stdout storage intentresolver intent resolver go failed to cleanup transaction intents failed to resolve intents boom testcleanuptxnintentsongcasync fail testrace testcleanuptxnintentsongcasync test ended in panic testcleanuptxnintentsongcasync fail test testcleanuptxnintentsongcasync test ended in panic testcleanuptxnintentsongcasync fail test testcleanuptxnintentsongcasync test ended in panic testcleanuptxnintentsongcasync go src github com cockroachdb cockroach pkg internal client requestbatcher batcher go github com cockroachdb cockroach pkg util stop stopper runasynctask go src github com cockroachdb cockroach pkg util stop stopper go created by github com cockroachdb cockroach pkg util stop stopper runasynctask go src github com cockroachdb cockroach pkg util stop stopper go goroutine github com cockroachdb cockroach pkg internal client requestbatcher requestbatcher run go src github com cockroachdb cockroach pkg internal client requestbatcher batcher go github com cockroachdb cockroach pkg internal client requestbatcher requestbatcher run fm go src github com cockroachdb cockroach pkg internal client requestbatcher batcher go github com cockroachdb cockroach pkg util stop stopper runasynctask go src github com cockroachdb cockroach pkg util stop stopper go created by github com cockroachdb cockroach pkg util stop stopper runasynctask go src github com cockroachdb cockroach pkg util stop stopper go goroutine github com cockroachdb cockroach pkg internal client requestbatcher requestbatcher run go src github com cockroachdb cockroach pkg internal client requestbatcher batcher go github com cockroachdb cockroach pkg internal client requestbatcher requestbatcher run fm go src github com cockroachdb cockroach pkg internal client requestbatcher batcher go github com cockroachdb cockroach pkg util stop stopper runasynctask go src github com cockroachdb cockroach pkg util stop stopper go created by github com cockroachdb cockroach pkg util stop stopper runasynctask go src github com cockroachdb cockroach pkg util stop stopper go goroutine github com cockroachdb cockroach pkg internal client requestbatcher requestbatcher run go src github com cockroachdb cockroach pkg internal client requestbatcher batcher go github com cockroachdb cockroach pkg internal client requestbatcher requestbatcher run fm go src github com cockroachdb cockroach pkg internal client requestbatcher batcher go github com cockroachdb cockroach pkg util stop stopper runasynctask go src github com cockroachdb cockroach pkg util stop stopper go created by github com cockroachdb cockroach pkg util stop stopper runasynctask go src github com cockroachdb cockroach pkg util stop stopper go goroutine github com cockroachdb cockroach pkg internal client requestbatcher requestbatcher run go src github com cockroachdb cockroach pkg internal client requestbatcher batcher go github com cockroachdb cockroach pkg internal client requestbatcher requestbatcher run fm go src github com cockroachdb cockroach pkg internal client requestbatcher batcher go github com cockroachdb cockroach pkg util stop stopper runasynctask go src github com cockroachdb cockroach pkg util stop stopper go created by github com cockroachdb cockroach pkg util stop stopper runasynctask go src github com cockroachdb cockroach pkg util stop stopper go testcleanuptxnintentsongcasync fail test testcleanuptxnintentsongcasync test ended in panic please assign take a look and update the issue accordingly | 0 |
105,228 | 13,170,472,541 | IssuesEvent | 2020-08-11 15:12:52 | dotnet/efcore | https://api.github.com/repos/dotnet/efcore | reopened | Suggestion: Add pragma disabled CS1591 to migration files | closed-by-design | It would be nice if `dotnet ef migrations add` would automatically add
```
#pragma warning disable CS1591 // Missing XML comment for publicly visible type or member
```
to the beginning of generated file and
```
#pragma warning restore CS1591 // Missing XML comment for publicly visible type or member
```
at the end of file.
I mean both (migrations and designer).
For example:
```
#pragma warning disable CS1591 // Missing XML comment for publicly visible type or member
using Microsoft.EntityFrameworkCore.Migrations;
using System;
using System.Collections.Generic;
namespace OpPIS.Web.Hosting.Migrations
{
public partial class Fix5 : Migration
{
protected override void Up(MigrationBuilder migrationBuilder)
{
migrationBuilder.AddColumn<int>(
name: "ParentAnchorX",
table: "VarDesign_Parameter-ImageManipulations",
nullable: true);
}
protected override void Down(MigrationBuilder migrationBuilder)
{
migrationBuilder.DropColumn(
name: "ParentAnchorX",
table: "VarDesign_Parameter-ImageManipulations");
}
}
}
#pragma warning restore CS1591 // Missing XML comment for publicly visible type or member
``` | 1.0 | Suggestion: Add pragma disabled CS1591 to migration files - It would be nice if `dotnet ef migrations add` would automatically add
```
#pragma warning disable CS1591 // Missing XML comment for publicly visible type or member
```
to the beginning of generated file and
```
#pragma warning restore CS1591 // Missing XML comment for publicly visible type or member
```
at the end of file.
I mean both (migrations and designer).
For example:
```
#pragma warning disable CS1591 // Missing XML comment for publicly visible type or member
using Microsoft.EntityFrameworkCore.Migrations;
using System;
using System.Collections.Generic;
namespace OpPIS.Web.Hosting.Migrations
{
public partial class Fix5 : Migration
{
protected override void Up(MigrationBuilder migrationBuilder)
{
migrationBuilder.AddColumn<int>(
name: "ParentAnchorX",
table: "VarDesign_Parameter-ImageManipulations",
nullable: true);
}
protected override void Down(MigrationBuilder migrationBuilder)
{
migrationBuilder.DropColumn(
name: "ParentAnchorX",
table: "VarDesign_Parameter-ImageManipulations");
}
}
}
#pragma warning restore CS1591 // Missing XML comment for publicly visible type or member
``` | non_priority | suggestion add pragma disabled to migration files it would be nice if dotnet ef migrations add would automatically add pragma warning disable missing xml comment for publicly visible type or member to the beginning of generated file and pragma warning restore missing xml comment for publicly visible type or member at the end of file i mean both migrations and designer for example pragma warning disable missing xml comment for publicly visible type or member using microsoft entityframeworkcore migrations using system using system collections generic namespace oppis web hosting migrations public partial class migration protected override void up migrationbuilder migrationbuilder migrationbuilder addcolumn name parentanchorx table vardesign parameter imagemanipulations nullable true protected override void down migrationbuilder migrationbuilder migrationbuilder dropcolumn name parentanchorx table vardesign parameter imagemanipulations pragma warning restore missing xml comment for publicly visible type or member | 0 |
260,464 | 22,622,965,341 | IssuesEvent | 2022-06-30 08:13:05 | filecoin-project/venus | https://api.github.com/repos/filecoin-project/venus | closed | Write a short flow for 1 behavior | Bloxico System Test Matrix Sprint 1 | _YAML catalog, annotations in the test file, running crawler and so on_ | 1.0 | Write a short flow for 1 behavior - _YAML catalog, annotations in the test file, running crawler and so on_ | non_priority | write a short flow for behavior yaml catalog annotations in the test file running crawler and so on | 0 |
221,388 | 24,621,513,548 | IssuesEvent | 2022-10-16 01:03:44 | Baneeishaque/spring_store_thymeleaf | https://api.github.com/repos/Baneeishaque/spring_store_thymeleaf | closed | CVE-2018-11695 (High) detected in node-sass-3.13.1.tgz, node-sass15fe42ed92dea8e086e7837e53ecd8190c0179b9 - autoclosed | security vulnerability | ## CVE-2018-11695 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-3.13.1.tgz</b>, <b>node-sass15fe42ed92dea8e086e7837e53ecd8190c0179b9</b></p></summary>
<p>
<details><summary><b>node-sass-3.13.1.tgz</b></p></summary>
<p>Wrapper around libsass</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-3.13.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-3.13.1.tgz</a></p>
<p>Path to dependency file: /html_site_template_customer/fashi/Source/jquery-nice-select-1.1.0/jquery-nice-select-1.1.0/jquery-nice-select-1.1.0/package.json</p>
<p>Path to vulnerable library: /html_site_template_customer/fashi/Source/SlickNav-master/SlickNav-master/node_modules/node-sass/package.json,/html_site_template_customer/fashi/Source/SlickNav-master/SlickNav-master/node_modules/node-sass/package.json,/html_site_template_customer/fashi/Source/SlickNav-master/SlickNav-master/node_modules/node-sass/package.json,/html_site_template_customer/fashi/Source/SlickNav-master/SlickNav-master/node_modules/node-sass/package.json,/html_site_template_customer/fashi/Source/SlickNav-master/SlickNav-master/node_modules/node-sass/package.json</p>
<p>
Dependency Hierarchy:
- gulp-sass-2.3.2.tgz (Root Library)
- :x: **node-sass-3.13.1.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/Baneeishaque/spring_store_thymeleaf/commit/08ba0922f3668b139df2a365e01b4d3e57faef86">08ba0922f3668b139df2a365e01b4d3e57faef86</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in LibSass <3.5.3. A NULL pointer dereference was found in the function Sass::Expand::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact.
<p>Publish Date: 2018-06-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11695>CVE-2018-11695</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2018-06-04</p>
<p>Fix Resolution (node-sass): 4.9.0</p>
<p>Direct dependency fix Resolution (gulp-sass): 3.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-11695 (High) detected in node-sass-3.13.1.tgz, node-sass15fe42ed92dea8e086e7837e53ecd8190c0179b9 - autoclosed - ## CVE-2018-11695 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-3.13.1.tgz</b>, <b>node-sass15fe42ed92dea8e086e7837e53ecd8190c0179b9</b></p></summary>
<p>
<details><summary><b>node-sass-3.13.1.tgz</b></p></summary>
<p>Wrapper around libsass</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-3.13.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-3.13.1.tgz</a></p>
<p>Path to dependency file: /html_site_template_customer/fashi/Source/jquery-nice-select-1.1.0/jquery-nice-select-1.1.0/jquery-nice-select-1.1.0/package.json</p>
<p>Path to vulnerable library: /html_site_template_customer/fashi/Source/SlickNav-master/SlickNav-master/node_modules/node-sass/package.json,/html_site_template_customer/fashi/Source/SlickNav-master/SlickNav-master/node_modules/node-sass/package.json,/html_site_template_customer/fashi/Source/SlickNav-master/SlickNav-master/node_modules/node-sass/package.json,/html_site_template_customer/fashi/Source/SlickNav-master/SlickNav-master/node_modules/node-sass/package.json,/html_site_template_customer/fashi/Source/SlickNav-master/SlickNav-master/node_modules/node-sass/package.json</p>
<p>
Dependency Hierarchy:
- gulp-sass-2.3.2.tgz (Root Library)
- :x: **node-sass-3.13.1.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/Baneeishaque/spring_store_thymeleaf/commit/08ba0922f3668b139df2a365e01b4d3e57faef86">08ba0922f3668b139df2a365e01b4d3e57faef86</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in LibSass <3.5.3. A NULL pointer dereference was found in the function Sass::Expand::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact.
<p>Publish Date: 2018-06-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11695>CVE-2018-11695</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2018-06-04</p>
<p>Fix Resolution (node-sass): 4.9.0</p>
<p>Direct dependency fix Resolution (gulp-sass): 3.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in node sass tgz node autoclosed cve high severity vulnerability vulnerable libraries node sass tgz node node sass tgz wrapper around libsass library home page a href path to dependency file html site template customer fashi source jquery nice select jquery nice select jquery nice select package json path to vulnerable library html site template customer fashi source slicknav master slicknav master node modules node sass package json html site template customer fashi source slicknav master slicknav master node modules node sass package json html site template customer fashi source slicknav master slicknav master node modules node sass package json html site template customer fashi source slicknav master slicknav master node modules node sass package json html site template customer fashi source slicknav master slicknav master node modules node sass package json dependency hierarchy gulp sass tgz root library x node sass tgz vulnerable library found in head commit a href vulnerability details an issue was discovered in libsass a null pointer dereference was found in the function sass expand operator which could be leveraged by an attacker to cause a denial of service application crash or possibly have unspecified other impact publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution node sass direct dependency fix resolution gulp sass step up your open source security game with mend | 0 |
28,971 | 11,706,039,707 | IssuesEvent | 2020-03-07 19:32:38 | vlaship/spark-streaming | https://api.github.com/repos/vlaship/spark-streaming | opened | CVE-2018-8012 (High) detected in zookeeper-3.4.6.jar | security vulnerability | ## CVE-2018-8012 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>zookeeper-3.4.6.jar</b></p></summary>
<p></p>
<p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/org.apache.zookeeper/zookeeper/3.4.6/1b2502e29da1ebaade2357cd1de35a855fa3755/zookeeper-3.4.6.jar,/root/.gradle/caches/modules-2/files-2.1/org.apache.zookeeper/zookeeper/3.4.6/1b2502e29da1ebaade2357cd1de35a855fa3755/zookeeper-3.4.6.jar</p>
<p>
Dependency Hierarchy:
- spark-streaming_2.11-2.2.0.jar (Root Library)
- spark-core_2.11-2.2.0.jar
- hadoop-client-2.6.5.jar
- hadoop-mapreduce-client-app-2.6.5.jar
- hadoop-mapreduce-client-common-2.6.5.jar
- hadoop-yarn-server-common-2.6.5.jar
- :x: **zookeeper-3.4.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/vlaship/spark-streaming/commit/8193fe8b5a8089e67347f5851a02c41ea5056fb0">8193fe8b5a8089e67347f5851a02c41ea5056fb0</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
No authentication/authorization is enforced when a server attempts to join a quorum in Apache ZooKeeper before 3.4.10, and 3.5.0-alpha through 3.5.3-beta. As a result an arbitrary end point could join the cluster and begin propagating counterfeit changes to the leader.
<p>Publish Date: 2018-05-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-8012>CVE-2018-8012</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8012">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8012</a></p>
<p>Release Date: 2018-05-21</p>
<p>Fix Resolution: 3.4.10,3.5.4-beta</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-8012 (High) detected in zookeeper-3.4.6.jar - ## CVE-2018-8012 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>zookeeper-3.4.6.jar</b></p></summary>
<p></p>
<p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/org.apache.zookeeper/zookeeper/3.4.6/1b2502e29da1ebaade2357cd1de35a855fa3755/zookeeper-3.4.6.jar,/root/.gradle/caches/modules-2/files-2.1/org.apache.zookeeper/zookeeper/3.4.6/1b2502e29da1ebaade2357cd1de35a855fa3755/zookeeper-3.4.6.jar</p>
<p>
Dependency Hierarchy:
- spark-streaming_2.11-2.2.0.jar (Root Library)
- spark-core_2.11-2.2.0.jar
- hadoop-client-2.6.5.jar
- hadoop-mapreduce-client-app-2.6.5.jar
- hadoop-mapreduce-client-common-2.6.5.jar
- hadoop-yarn-server-common-2.6.5.jar
- :x: **zookeeper-3.4.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/vlaship/spark-streaming/commit/8193fe8b5a8089e67347f5851a02c41ea5056fb0">8193fe8b5a8089e67347f5851a02c41ea5056fb0</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
No authentication/authorization is enforced when a server attempts to join a quorum in Apache ZooKeeper before 3.4.10, and 3.5.0-alpha through 3.5.3-beta. As a result an arbitrary end point could join the cluster and begin propagating counterfeit changes to the leader.
<p>Publish Date: 2018-05-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-8012>CVE-2018-8012</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8012">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8012</a></p>
<p>Release Date: 2018-05-21</p>
<p>Fix Resolution: 3.4.10,3.5.4-beta</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in zookeeper jar cve high severity vulnerability vulnerable library zookeeper jar path to vulnerable library root gradle caches modules files org apache zookeeper zookeeper zookeeper jar root gradle caches modules files org apache zookeeper zookeeper zookeeper jar dependency hierarchy spark streaming jar root library spark core jar hadoop client jar hadoop mapreduce client app jar hadoop mapreduce client common jar hadoop yarn server common jar x zookeeper jar vulnerable library found in head commit a href vulnerability details no authentication authorization is enforced when a server attempts to join a quorum in apache zookeeper before and alpha through beta as a result an arbitrary end point could join the cluster and begin propagating counterfeit changes to the leader publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution beta step up your open source security game with whitesource | 0 |
81,385 | 30,827,989,257 | IssuesEvent | 2023-08-01 21:52:37 | dotCMS/core | https://api.github.com/repos/dotCMS/core | closed | PageAPI not working for non-default URLMapped language content | Type : Defect Merged QA : Passed Internal Team : Falcon Next Release | ### Problem Statement
The preview action from edit content and the new Pages portlet is not functioning correctly for URL Mapped contents when they are in a non-default language. Instead of displaying the preview, an error message stating "This URL does not exist" is shown.


LOG: https://gist.github.com/bryanboza/5aaed4bfb9f57a11677c06f476e8f6a0
### Steps to Reproduce
- Login as admin
- Create a Blog, Event, or Activities content in the chosen non-default language.
- Attempt to preview the content by using the preview action.
### Acceptance Criteria
- When using the preview action on a Blog, Event, or Activities content in a non-default language, the content should be displayed correctly in the preview mode.
- The error message "This URL does not exist" should not be shown.
### dotCMS Version
Tested on master // Docker // FF
### Proposed Objective
Quality Assurance
### Proposed Priority
Priority 2 - Important
| 1.0 | PageAPI not working for non-default URLMapped language content - ### Problem Statement
The preview action from edit content and the new Pages portlet is not functioning correctly for URL Mapped contents when they are in a non-default language. Instead of displaying the preview, an error message stating "This URL does not exist" is shown.


LOG: https://gist.github.com/bryanboza/5aaed4bfb9f57a11677c06f476e8f6a0
### Steps to Reproduce
- Login as admin
- Create a Blog, Event, or Activities content in the chosen non-default language.
- Attempt to preview the content by using the preview action.
### Acceptance Criteria
- When using the preview action on a Blog, Event, or Activities content in a non-default language, the content should be displayed correctly in the preview mode.
- The error message "This URL does not exist" should not be shown.
### dotCMS Version
Tested on master // Docker // FF
### Proposed Objective
Quality Assurance
### Proposed Priority
Priority 2 - Important
| non_priority | pageapi not working for non default urlmapped language content problem statement the preview action from edit content and the new pages portlet is not functioning correctly for url mapped contents when they are in a non default language instead of displaying the preview an error message stating this url does not exist is shown log steps to reproduce login as admin create a blog event or activities content in the chosen non default language attempt to preview the content by using the preview action acceptance criteria when using the preview action on a blog event or activities content in a non default language the content should be displayed correctly in the preview mode the error message this url does not exist should not be shown dotcms version tested on master docker ff proposed objective quality assurance proposed priority priority important | 0 |
69,438 | 9,303,550,490 | IssuesEvent | 2019-03-24 18:18:48 | Arquisoft/dechat_en2b | https://api.github.com/repos/Arquisoft/dechat_en2b | closed | Frontend: generate HTML from documentation | TODO documentation | Generate again the html files from the documentation | 1.0 | Frontend: generate HTML from documentation - Generate again the html files from the documentation | non_priority | frontend generate html from documentation generate again the html files from the documentation | 0 |
96,964 | 10,968,404,677 | IssuesEvent | 2019-11-28 11:33:25 | novnc/websockify | https://api.github.com/repos/novnc/websockify | closed | Update Wiki to Reflect Windows Not Supported | Windows documentation | This project (websockify) is the second result when googling for "websocket proxy windows", and Windows isn't supported. The wiki really ought to be updated to reflect this, specifically this page[1] needs to be removed. Indeed, all Windows references should be removed except to say Windows isn't supported. Wasted my afternoon, and many others have as well I wager.
[1] https://github.com/novnc/websockify/wiki/Compiling-Websockify-as-Windows-Executable | 1.0 | Update Wiki to Reflect Windows Not Supported - This project (websockify) is the second result when googling for "websocket proxy windows", and Windows isn't supported. The wiki really ought to be updated to reflect this, specifically this page[1] needs to be removed. Indeed, all Windows references should be removed except to say Windows isn't supported. Wasted my afternoon, and many others have as well I wager.
[1] https://github.com/novnc/websockify/wiki/Compiling-Websockify-as-Windows-Executable | non_priority | update wiki to reflect windows not supported this project websockify is the second result when googling for websocket proxy windows and windows isn t supported the wiki really ought to be updated to reflect this specifically this page needs to be removed indeed all windows references should be removed except to say windows isn t supported wasted my afternoon and many others have as well i wager | 0 |
160,768 | 20,118,449,370 | IssuesEvent | 2022-02-07 22:19:10 | sureng-ws-ibm/t1 | https://api.github.com/repos/sureng-ws-ibm/t1 | opened | mongodb-2.2.36.tgz: 2 vulnerabilities (highest severity is: 9.8) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mongodb-2.2.36.tgz</b></p></summary>
<p>The official MongoDB driver for Node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/mongodb/-/mongodb-2.2.36.tgz">https://registry.npmjs.org/mongodb/-/mongodb-2.2.36.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/mongodb/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2020-7610](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7610) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | bson-1.0.9.tgz | Transitive | 3.1.3 | ✅ |
| [WS-2019-0311](https://github.com/mongodb/node-mongodb-native/commit/210c71dccd8d8fdeadd9b4d1571e5fdb93e0f02f) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | mongodb-2.2.36.tgz | Direct | 3.1.13 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7610</summary>
### Vulnerable Library - <b>bson-1.0.9.tgz</b></p>
<p>A bson parser for node.js and the browser</p>
<p>Library home page: <a href="https://registry.npmjs.org/bson/-/bson-1.0.9.tgz">https://registry.npmjs.org/bson/-/bson-1.0.9.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/bson/package.json</p>
<p>
Dependency Hierarchy:
- mongodb-2.2.36.tgz (Root Library)
- mongodb-core-2.1.20.tgz
- :x: **bson-1.0.9.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
All versions of bson before 1.1.4 are vulnerable to Deserialization of Untrusted Data. The package will ignore an unknown value for an object's _bsotype, leading to cases where an object is serialized as a document rather than the intended BSON type.
<p>Publish Date: 2020-03-30
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7610>CVE-2020-7610</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/mongodb/js-bson/releases/tag/v1.1.4">https://github.com/mongodb/js-bson/releases/tag/v1.1.4</a></p>
<p>Release Date: 2020-04-01</p>
<p>Fix Resolution (bson): 1.1.4</p>
<p>Direct dependency fix Resolution (mongodb): 3.1.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0311</summary>
### Vulnerable Library - <b>mongodb-2.2.36.tgz</b></p>
<p>The official MongoDB driver for Node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/mongodb/-/mongodb-2.2.36.tgz">https://registry.npmjs.org/mongodb/-/mongodb-2.2.36.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/mongodb/package.json</p>
<p>
Dependency Hierarchy:
- :x: **mongodb-2.2.36.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In 'node-mongodb-native', versions prior to v3.1.13 are vulnerable against DOS as a result of a potential crash when a collection name is invalid and the DB doesn't exist.
<p>Publish Date: 2019-01-23
<p>URL: <a href=https://github.com/mongodb/node-mongodb-native/commit/210c71dccd8d8fdeadd9b4d1571e5fdb93e0f02f>WS-2019-0311</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1203">https://www.npmjs.com/advisories/1203</a></p>
<p>Release Date: 2019-01-23</p>
<p>Fix Resolution: 3.1.13</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
<!-- <REMEDIATE>[{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"mongodb","packageVersion":"2.2.36","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"mongodb:2.2.36","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.1.3","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-7610","vulnerabilityDetails":"All versions of bson before 1.1.4 are vulnerable to Deserialization of Untrusted Data. The package will ignore an unknown value for an object\u0027s _bsotype, leading to cases where an object is serialized as a document rather than the intended BSON type.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7610","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"mongodb","packageVersion":"2.2.36","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"mongodb:2.2.36","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.1.13","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"WS-2019-0311","vulnerabilityDetails":"In \u0027node-mongodb-native\u0027, versions prior to v3.1.13 are vulnerable against DOS as a result of a potential crash when a collection name is invalid and the DB doesn\u0027t exist.","vulnerabilityUrl":"https://github.com/mongodb/node-mongodb-native/commit/210c71dccd8d8fdeadd9b4d1571e5fdb93e0f02f","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}}]</REMEDIATE> --> | True | mongodb-2.2.36.tgz: 2 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mongodb-2.2.36.tgz</b></p></summary>
<p>The official MongoDB driver for Node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/mongodb/-/mongodb-2.2.36.tgz">https://registry.npmjs.org/mongodb/-/mongodb-2.2.36.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/mongodb/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2020-7610](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7610) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | bson-1.0.9.tgz | Transitive | 3.1.3 | ✅ |
| [WS-2019-0311](https://github.com/mongodb/node-mongodb-native/commit/210c71dccd8d8fdeadd9b4d1571e5fdb93e0f02f) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | mongodb-2.2.36.tgz | Direct | 3.1.13 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7610</summary>
### Vulnerable Library - <b>bson-1.0.9.tgz</b></p>
<p>A bson parser for node.js and the browser</p>
<p>Library home page: <a href="https://registry.npmjs.org/bson/-/bson-1.0.9.tgz">https://registry.npmjs.org/bson/-/bson-1.0.9.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/bson/package.json</p>
<p>
Dependency Hierarchy:
- mongodb-2.2.36.tgz (Root Library)
- mongodb-core-2.1.20.tgz
- :x: **bson-1.0.9.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
All versions of bson before 1.1.4 are vulnerable to Deserialization of Untrusted Data. The package will ignore an unknown value for an object's _bsotype, leading to cases where an object is serialized as a document rather than the intended BSON type.
<p>Publish Date: 2020-03-30
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7610>CVE-2020-7610</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/mongodb/js-bson/releases/tag/v1.1.4">https://github.com/mongodb/js-bson/releases/tag/v1.1.4</a></p>
<p>Release Date: 2020-04-01</p>
<p>Fix Resolution (bson): 1.1.4</p>
<p>Direct dependency fix Resolution (mongodb): 3.1.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0311</summary>
### Vulnerable Library - <b>mongodb-2.2.36.tgz</b></p>
<p>The official MongoDB driver for Node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/mongodb/-/mongodb-2.2.36.tgz">https://registry.npmjs.org/mongodb/-/mongodb-2.2.36.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/mongodb/package.json</p>
<p>
Dependency Hierarchy:
- :x: **mongodb-2.2.36.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In 'node-mongodb-native', versions prior to v3.1.13 are vulnerable against DOS as a result of a potential crash when a collection name is invalid and the DB doesn't exist.
<p>Publish Date: 2019-01-23
<p>URL: <a href=https://github.com/mongodb/node-mongodb-native/commit/210c71dccd8d8fdeadd9b4d1571e5fdb93e0f02f>WS-2019-0311</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1203">https://www.npmjs.com/advisories/1203</a></p>
<p>Release Date: 2019-01-23</p>
<p>Fix Resolution: 3.1.13</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
<!-- <REMEDIATE>[{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"mongodb","packageVersion":"2.2.36","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"mongodb:2.2.36","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.1.3","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-7610","vulnerabilityDetails":"All versions of bson before 1.1.4 are vulnerable to Deserialization of Untrusted Data. The package will ignore an unknown value for an object\u0027s _bsotype, leading to cases where an object is serialized as a document rather than the intended BSON type.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7610","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"mongodb","packageVersion":"2.2.36","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"mongodb:2.2.36","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.1.13","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"WS-2019-0311","vulnerabilityDetails":"In \u0027node-mongodb-native\u0027, versions prior to v3.1.13 are vulnerable against DOS as a result of a potential crash when a collection name is invalid and the DB doesn\u0027t exist.","vulnerabilityUrl":"https://github.com/mongodb/node-mongodb-native/commit/210c71dccd8d8fdeadd9b4d1571e5fdb93e0f02f","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}}]</REMEDIATE> --> | non_priority | mongodb tgz vulnerabilities highest severity is vulnerable library mongodb tgz the official mongodb driver for node js library home page a href path to dependency file package json path to vulnerable library node modules mongodb package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high bson tgz transitive ✅ medium mongodb tgz direct ✅ details cve vulnerable library bson tgz a bson parser for node js and the browser library home page a href path to dependency file package json path to vulnerable library node modules bson package json dependency hierarchy mongodb tgz root library mongodb core tgz x bson tgz vulnerable library found in head commit a href found in base branch develop vulnerability details all versions of bson before are vulnerable to deserialization of untrusted data the package will ignore an unknown value for an object s bsotype leading to cases where an object is serialized as a document rather than the intended bson type publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bson direct dependency fix resolution mongodb rescue worker helmet automatic remediation is available for this issue ws vulnerable library mongodb tgz the official mongodb driver for node js library home page a href path to dependency file package json path to vulnerable library node modules mongodb package json dependency hierarchy x mongodb tgz vulnerable library found in head commit a href found in base branch develop vulnerability details in node mongodb native versions prior to are vulnerable against dos as a result of a potential crash when a collection name is invalid and the db doesn t exist publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue istransitivedependency false dependencytree mongodb isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails all versions of bson before are vulnerable to deserialization of untrusted data the package will ignore an unknown value for an object bsotype leading to cases where an object is serialized as a document rather than the intended bson type vulnerabilityurl istransitivedependency false dependencytree mongodb isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails in mongodb native versions prior to are vulnerable against dos as a result of a potential crash when a collection name is invalid and the db doesn exist vulnerabilityurl | 0 |
143,897 | 13,087,890,659 | IssuesEvent | 2020-08-02 14:39:00 | mkavana/docs-v2-DEV | https://api.github.com/repos/mkavana/docs-v2-DEV | opened | Add 'Quickstart' guide | documentation | Add feature to automatically generate the post **Quickstart**.
## Notes
- consider automatically generating content for the post **Quickstart** from existing posts, where the value of the front matter var `include-in-quickstart` is `true`. | 1.0 | Add 'Quickstart' guide - Add feature to automatically generate the post **Quickstart**.
## Notes
- consider automatically generating content for the post **Quickstart** from existing posts, where the value of the front matter var `include-in-quickstart` is `true`. | non_priority | add quickstart guide add feature to automatically generate the post quickstart notes consider automatically generating content for the post quickstart from existing posts where the value of the front matter var include in quickstart is true | 0 |
272,763 | 29,795,084,567 | IssuesEvent | 2023-06-16 01:09:43 | billmcchesney1/flowgate | https://api.github.com/repos/billmcchesney1/flowgate | closed | CVE-2017-7536 (High) detected in hibernate-validator-5.2.5.Final.jar - autoclosed | Mend: dependency security vulnerability | ## CVE-2017-7536 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>hibernate-validator-5.2.5.Final.jar</b></p></summary>
<p>Hibernate's Bean Validation (JSR-303) reference implementation.</p>
<p>Library home page: <a href="http://hibernate.org/validator">http://hibernate.org/validator</a></p>
<p>Path to dependency file: /operation-expert/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/hibernate/hibernate-validator/5.2.5.Final/hibernate-validator-5.2.5.Final.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-hateoas-1.4.7.RELEASE.jar (Root Library)
- spring-boot-starter-web-1.4.7.RELEASE.jar
- :x: **hibernate-validator-5.2.5.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/billmcchesney1/flowgate/commit/dd01a1d4381c7a3b94ba25748c015a094c33088e">dd01a1d4381c7a3b94ba25748c015a094c33088e</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue().
<p>Publish Date: 2018-01-10
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-7536>CVE-2017-7536</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.0</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7536">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7536</a></p>
<p>Release Date: 2017-06-27</p>
<p>Fix Resolution: org.hibernate:hibernate-validator:5.3.6.Final,5.4.2.Final</p>
</p>
</details>
<p></p>
| True | CVE-2017-7536 (High) detected in hibernate-validator-5.2.5.Final.jar - autoclosed - ## CVE-2017-7536 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>hibernate-validator-5.2.5.Final.jar</b></p></summary>
<p>Hibernate's Bean Validation (JSR-303) reference implementation.</p>
<p>Library home page: <a href="http://hibernate.org/validator">http://hibernate.org/validator</a></p>
<p>Path to dependency file: /operation-expert/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/hibernate/hibernate-validator/5.2.5.Final/hibernate-validator-5.2.5.Final.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-hateoas-1.4.7.RELEASE.jar (Root Library)
- spring-boot-starter-web-1.4.7.RELEASE.jar
- :x: **hibernate-validator-5.2.5.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/billmcchesney1/flowgate/commit/dd01a1d4381c7a3b94ba25748c015a094c33088e">dd01a1d4381c7a3b94ba25748c015a094c33088e</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue().
<p>Publish Date: 2018-01-10
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-7536>CVE-2017-7536</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.0</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7536">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7536</a></p>
<p>Release Date: 2017-06-27</p>
<p>Fix Resolution: org.hibernate:hibernate-validator:5.3.6.Final,5.4.2.Final</p>
</p>
</details>
<p></p>
| non_priority | cve high detected in hibernate validator final jar autoclosed cve high severity vulnerability vulnerable library hibernate validator final jar hibernate s bean validation jsr reference implementation library home page a href path to dependency file operation expert pom xml path to vulnerable library home wss scanner repository org hibernate hibernate validator final hibernate validator final jar dependency hierarchy spring boot starter hateoas release jar root library spring boot starter web release jar x hibernate validator final jar vulnerable library found in head commit a href found in base branch master vulnerability details in hibernate validator x before final x and x it was found that when the security manager s reflective permissions which allows it to access the private members of the class are granted to hibernate validator a potential privilege escalation can occur by allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via constraintviolation getinvalidvalue publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org hibernate hibernate validator final final | 0 |
287,983 | 24,879,595,820 | IssuesEvent | 2022-10-27 22:52:03 | elastic/kibana | https://api.github.com/repos/elastic/kibana | closed | Failing test: Chrome Elastic Synthetics Integration UI Functional Tests.x-pack/test/functional_synthetics/apps/uptime/synthetics_integration·ts - Uptime app with generated data When on the Synthetics Integration Policy Create Page create new policy allows configuring tls | failed-test needs-team | A test failed on a tracked branch
```
Error: expected { id: 'synthetics/http-synthetics-59afcbea-29ac-426c-a74f-b107a464f2c6',
revision: 1,
name: 'Sample Synthetics integration',
type: 'synthetics/http',
data_stream: { namespace: 'default' },
use_output: 'default',
package_policy_id: '59afcbea-29ac-426c-a74f-b107a464f2c6',
streams:
[ { id: 'synthetics/http-http-59afcbea-29ac-426c-a74f-b107a464f2c6',
data_stream: [Object],
__ui: [Object],
type: 'http',
name: 'Sample Synthetics integration',
enabled: true,
urls: 'http://elastic.co',
'service.name': 'Sample APM Service',
schedule: '@every 3m',
timeout: '16s',
max_redirects: 0,
tags: [Object],
'response.include_headers': true,
'response.include_body': 'on_error',
'check.request.method': 'GET',
'ssl.certificate': 'cert',
'ssl.certificate_authorities': 'ca',
'ssl.key': 'certKey',
'ssl.key_passphrase': 'certKeyPassphrase',
'ssl.verification_mode': 'strict',
'ssl.supported_protocols': [Object],
processors: [Object] } ],
meta: { package: { name: 'synthetics', version: '0.11.1' } } } to sort of equal { data_stream: { namespace: 'default' },
id: 'synthetics/http-synthetics-59afcbea-29ac-426c-a74f-b107a464f2c6',
meta: { package: { name: 'synthetics', version: '0.11.1' } },
name: 'Sample Synthetics integration',
package_policy_id: '59afcbea-29ac-426c-a74f-b107a464f2c6',
revision: 1,
streams:
[ { data_stream: [Object],
id: 'synthetics/http-http-59afcbea-29ac-426c-a74f-b107a464f2c6',
name: 'Sample Synthetics integration',
type: 'http',
enabled: true,
processors: [Object],
max_redirects: 0,
'check.request.method': 'GET',
'response.include_body': 'on_error',
'response.include_headers': true,
schedule: '@every 3m',
'ssl.supported_protocols': [Object],
'ssl.verification_mode': 'strict',
'ssl.certificate': 'cert',
'ssl.certificate_authorities': 'ca',
'ssl.key': 'certKey',
'ssl.key_passphrase': 'certKeyPassphrase',
timeout: '16s',
urls: 'http://elastic.co',
'service.name': 'Sample APM Service',
tags: [Object],
__ui: [Object] } ],
type: 'synthetics/http',
use_output: 'default' }
at Assertion.assert (node_modules/@kbn/expect/expect.js:100:11)
at Assertion.eql (node_modules/@kbn/expect/expect.js:244:8)
at Context.<anonymous> (x-pack/test/functional_synthetics/apps/uptime/synthetics_integration.ts:252:71)
at runMicrotasks (<anonymous>)
at processTicksAndRejections (node:internal/process/task_queues:96:5)
at Object.apply (node_modules/@kbn/test/target_node/src/functional_test_runner/lib/mocha/wrap_function.js:78:16) {
actual: '{\n' +
' "data_stream": {\n' +
' "namespace": "default"\n' +
' }\n' +
' "id": "synthetics/http-synthetics-59afcbea-29ac-426c-a74f-b107a464f2c6"\n' +
' "meta": {\n' +
' "package": {\n' +
' "name": "synthetics"\n' +
' "version": "0.11.1"\n' +
' }\n' +
' }\n' +
' "name": "Sample Synthetics integration"\n' +
' "package_policy_id": "59afcbea-29ac-426c-a74f-b107a464f2c6"\n' +
' "revision": 1\n' +
' "streams": [\n' +
' {\n' +
' "__ui": {\n' +
' "is_tls_enabled": true\n' +
' "is_zip_url_tls_enabled": false\n' +
' }\n' +
' "check.request.method": "GET"\n' +
' "data_stream": {\n' +
' "dataset": "http"\n' +
' "elasticsearch": {\n' +
' "privileges": {\n' +
' "indices": [\n' +
' "auto_configure"\n' +
' "create_doc"\n' +
' "read"\n' +
' ]\n' +
' }\n' +
' }\n' +
' "type": "synthetics"\n' +
' }\n' +
' "enabled": true\n' +
' "id": "synthetics/http-http-59afcbea-29ac-426c-a74f-b107a464f2c6"\n' +
' "max_redirects": 0\n' +
' "name": "Sample Synthetics integration"\n' +
' "processors": [\n' +
' {\n' +
' "add_observer_metadata": {\n' +
' "geo": {\n' +
' "name": "Fleet managed"\n' +
' }\n' +
' }\n' +
' }\n' +
' {\n' +
' "add_fields": {\n' +
' "fields": {\n' +
' "monitor.fleet_managed": true\n' +
' }\n' +
' "target": ""\n' +
' }\n' +
' }\n' +
' ]\n' +
' "response.include_body": "on_error"\n' +
' "response.include_headers": true\n' +
' "schedule": "@every 3m"\n' +
' "service.name": "Sample APM Service"\n' +
' "ssl.certificate": "cert"\n' +
' "ssl.certificate_authorities": "ca"\n' +
' "ssl.key": "certKey"\n' +
' "ssl.key_passphrase": "certKeyPassphrase"\n' +
' "ssl.supported_protocols": [\n' +
' "TLSv1.1"\n' +
' "TLSv1.2"\n' +
' "TLSv1.3"\n' +
' ]\n' +
' "ssl.verification_mode": "strict"\n' +
' "tags": [\n' +
' "sample tag"\n' +
' ]\n' +
' "timeout": "16s"\n' +
' "type": "http"\n' +
' "urls": "http://elastic.co"\n' +
' }\n' +
' ]\n' +
' "type": "synthetics/http"\n' +
' "use_output": "default"\n' +
'}',
expected: '{\n' +
' "data_stream": {\n' +
' "namespace": "default"\n' +
' }\n' +
' "id": "synthetics/http-synthetics-59afcbea-29ac-426c-a74f-b107a464f2c6"\n' +
' "meta": {\n' +
' "package": {\n' +
' "name": "synthetics"\n' +
' "version": "0.11.1"\n' +
' }\n' +
' }\n' +
' "name": "Sample Synthetics integration"\n' +
' "package_policy_id": "59afcbea-29ac-426c-a74f-b107a464f2c6"\n' +
' "revision": 1\n' +
' "streams": [\n' +
' {\n' +
' "__ui": {\n' +
' "is_tls_enabled": true\n' +
' "is_zip_url_tls_enabled": false\n' +
' }\n' +
' "check.request.method": "GET"\n' +
' "data_stream": {\n' +
' "dataset": "http"\n' +
' "type": "synthetics"\n' +
' }\n' +
' "enabled": true\n' +
' "id": "synthetics/http-http-59afcbea-29ac-426c-a74f-b107a464f2c6"\n' +
' "max_redirects": 0\n' +
' "name": "Sample Synthetics integration"\n' +
' "processors": [\n' +
' {\n' +
' "add_observer_metadata": {\n' +
' "geo": {\n' +
' "name": "Fleet managed"\n' +
' }\n' +
' }\n' +
' }\n' +
' {\n' +
' "add_fields": {\n' +
' "fields": {\n' +
' "monitor.fleet_managed": true\n' +
' }\n' +
' "target": ""\n' +
' }\n' +
' }\n' +
' ]\n' +
' "response.include_body": "on_error"\n' +
' "response.include_headers": true\n' +
' "schedule": "@every 3m"\n' +
' "service.name": "Sample APM Service"\n' +
' "ssl.certificate": "cert"\n' +
' "ssl.certificate_authorities": "ca"\n' +
' "ssl.key": "certKey"\n' +
' "ssl.key_passphrase": "certKeyPassphrase"\n' +
' "ssl.supported_protocols": [\n' +
' "TLSv1.1"\n' +
' "TLSv1.2"\n' +
' "TLSv1.3"\n' +
' ]\n' +
' "ssl.verification_mode": "strict"\n' +
' "tags": [\n' +
' "sample tag"\n' +
' ]\n' +
' "timeout": "16s"\n' +
' "type": "http"\n' +
' "urls": "http://elastic.co"\n' +
' }\n' +
' ]\n' +
' "type": "synthetics/http"\n' +
' "use_output": "default"\n' +
'}',
showDiff: true
}
```
First failure: [CI Build - main](https://buildkite.com/elastic/kibana-on-merge/builds/22895#01841b3c-0cd7-4a77-b46c-cbb9240553e6)
<!-- kibanaCiData = {"failed-test":{"test.class":"Chrome Elastic Synthetics Integration UI Functional Tests.x-pack/test/functional_synthetics/apps/uptime/synthetics_integration·ts","test.name":"Uptime app with generated data When on the Synthetics Integration Policy Create Page create new policy allows configuring tls","test.failCount":2}} --> | 1.0 | Failing test: Chrome Elastic Synthetics Integration UI Functional Tests.x-pack/test/functional_synthetics/apps/uptime/synthetics_integration·ts - Uptime app with generated data When on the Synthetics Integration Policy Create Page create new policy allows configuring tls - A test failed on a tracked branch
```
Error: expected { id: 'synthetics/http-synthetics-59afcbea-29ac-426c-a74f-b107a464f2c6',
revision: 1,
name: 'Sample Synthetics integration',
type: 'synthetics/http',
data_stream: { namespace: 'default' },
use_output: 'default',
package_policy_id: '59afcbea-29ac-426c-a74f-b107a464f2c6',
streams:
[ { id: 'synthetics/http-http-59afcbea-29ac-426c-a74f-b107a464f2c6',
data_stream: [Object],
__ui: [Object],
type: 'http',
name: 'Sample Synthetics integration',
enabled: true,
urls: 'http://elastic.co',
'service.name': 'Sample APM Service',
schedule: '@every 3m',
timeout: '16s',
max_redirects: 0,
tags: [Object],
'response.include_headers': true,
'response.include_body': 'on_error',
'check.request.method': 'GET',
'ssl.certificate': 'cert',
'ssl.certificate_authorities': 'ca',
'ssl.key': 'certKey',
'ssl.key_passphrase': 'certKeyPassphrase',
'ssl.verification_mode': 'strict',
'ssl.supported_protocols': [Object],
processors: [Object] } ],
meta: { package: { name: 'synthetics', version: '0.11.1' } } } to sort of equal { data_stream: { namespace: 'default' },
id: 'synthetics/http-synthetics-59afcbea-29ac-426c-a74f-b107a464f2c6',
meta: { package: { name: 'synthetics', version: '0.11.1' } },
name: 'Sample Synthetics integration',
package_policy_id: '59afcbea-29ac-426c-a74f-b107a464f2c6',
revision: 1,
streams:
[ { data_stream: [Object],
id: 'synthetics/http-http-59afcbea-29ac-426c-a74f-b107a464f2c6',
name: 'Sample Synthetics integration',
type: 'http',
enabled: true,
processors: [Object],
max_redirects: 0,
'check.request.method': 'GET',
'response.include_body': 'on_error',
'response.include_headers': true,
schedule: '@every 3m',
'ssl.supported_protocols': [Object],
'ssl.verification_mode': 'strict',
'ssl.certificate': 'cert',
'ssl.certificate_authorities': 'ca',
'ssl.key': 'certKey',
'ssl.key_passphrase': 'certKeyPassphrase',
timeout: '16s',
urls: 'http://elastic.co',
'service.name': 'Sample APM Service',
tags: [Object],
__ui: [Object] } ],
type: 'synthetics/http',
use_output: 'default' }
at Assertion.assert (node_modules/@kbn/expect/expect.js:100:11)
at Assertion.eql (node_modules/@kbn/expect/expect.js:244:8)
at Context.<anonymous> (x-pack/test/functional_synthetics/apps/uptime/synthetics_integration.ts:252:71)
at runMicrotasks (<anonymous>)
at processTicksAndRejections (node:internal/process/task_queues:96:5)
at Object.apply (node_modules/@kbn/test/target_node/src/functional_test_runner/lib/mocha/wrap_function.js:78:16) {
actual: '{\n' +
' "data_stream": {\n' +
' "namespace": "default"\n' +
' }\n' +
' "id": "synthetics/http-synthetics-59afcbea-29ac-426c-a74f-b107a464f2c6"\n' +
' "meta": {\n' +
' "package": {\n' +
' "name": "synthetics"\n' +
' "version": "0.11.1"\n' +
' }\n' +
' }\n' +
' "name": "Sample Synthetics integration"\n' +
' "package_policy_id": "59afcbea-29ac-426c-a74f-b107a464f2c6"\n' +
' "revision": 1\n' +
' "streams": [\n' +
' {\n' +
' "__ui": {\n' +
' "is_tls_enabled": true\n' +
' "is_zip_url_tls_enabled": false\n' +
' }\n' +
' "check.request.method": "GET"\n' +
' "data_stream": {\n' +
' "dataset": "http"\n' +
' "elasticsearch": {\n' +
' "privileges": {\n' +
' "indices": [\n' +
' "auto_configure"\n' +
' "create_doc"\n' +
' "read"\n' +
' ]\n' +
' }\n' +
' }\n' +
' "type": "synthetics"\n' +
' }\n' +
' "enabled": true\n' +
' "id": "synthetics/http-http-59afcbea-29ac-426c-a74f-b107a464f2c6"\n' +
' "max_redirects": 0\n' +
' "name": "Sample Synthetics integration"\n' +
' "processors": [\n' +
' {\n' +
' "add_observer_metadata": {\n' +
' "geo": {\n' +
' "name": "Fleet managed"\n' +
' }\n' +
' }\n' +
' }\n' +
' {\n' +
' "add_fields": {\n' +
' "fields": {\n' +
' "monitor.fleet_managed": true\n' +
' }\n' +
' "target": ""\n' +
' }\n' +
' }\n' +
' ]\n' +
' "response.include_body": "on_error"\n' +
' "response.include_headers": true\n' +
' "schedule": "@every 3m"\n' +
' "service.name": "Sample APM Service"\n' +
' "ssl.certificate": "cert"\n' +
' "ssl.certificate_authorities": "ca"\n' +
' "ssl.key": "certKey"\n' +
' "ssl.key_passphrase": "certKeyPassphrase"\n' +
' "ssl.supported_protocols": [\n' +
' "TLSv1.1"\n' +
' "TLSv1.2"\n' +
' "TLSv1.3"\n' +
' ]\n' +
' "ssl.verification_mode": "strict"\n' +
' "tags": [\n' +
' "sample tag"\n' +
' ]\n' +
' "timeout": "16s"\n' +
' "type": "http"\n' +
' "urls": "http://elastic.co"\n' +
' }\n' +
' ]\n' +
' "type": "synthetics/http"\n' +
' "use_output": "default"\n' +
'}',
expected: '{\n' +
' "data_stream": {\n' +
' "namespace": "default"\n' +
' }\n' +
' "id": "synthetics/http-synthetics-59afcbea-29ac-426c-a74f-b107a464f2c6"\n' +
' "meta": {\n' +
' "package": {\n' +
' "name": "synthetics"\n' +
' "version": "0.11.1"\n' +
' }\n' +
' }\n' +
' "name": "Sample Synthetics integration"\n' +
' "package_policy_id": "59afcbea-29ac-426c-a74f-b107a464f2c6"\n' +
' "revision": 1\n' +
' "streams": [\n' +
' {\n' +
' "__ui": {\n' +
' "is_tls_enabled": true\n' +
' "is_zip_url_tls_enabled": false\n' +
' }\n' +
' "check.request.method": "GET"\n' +
' "data_stream": {\n' +
' "dataset": "http"\n' +
' "type": "synthetics"\n' +
' }\n' +
' "enabled": true\n' +
' "id": "synthetics/http-http-59afcbea-29ac-426c-a74f-b107a464f2c6"\n' +
' "max_redirects": 0\n' +
' "name": "Sample Synthetics integration"\n' +
' "processors": [\n' +
' {\n' +
' "add_observer_metadata": {\n' +
' "geo": {\n' +
' "name": "Fleet managed"\n' +
' }\n' +
' }\n' +
' }\n' +
' {\n' +
' "add_fields": {\n' +
' "fields": {\n' +
' "monitor.fleet_managed": true\n' +
' }\n' +
' "target": ""\n' +
' }\n' +
' }\n' +
' ]\n' +
' "response.include_body": "on_error"\n' +
' "response.include_headers": true\n' +
' "schedule": "@every 3m"\n' +
' "service.name": "Sample APM Service"\n' +
' "ssl.certificate": "cert"\n' +
' "ssl.certificate_authorities": "ca"\n' +
' "ssl.key": "certKey"\n' +
' "ssl.key_passphrase": "certKeyPassphrase"\n' +
' "ssl.supported_protocols": [\n' +
' "TLSv1.1"\n' +
' "TLSv1.2"\n' +
' "TLSv1.3"\n' +
' ]\n' +
' "ssl.verification_mode": "strict"\n' +
' "tags": [\n' +
' "sample tag"\n' +
' ]\n' +
' "timeout": "16s"\n' +
' "type": "http"\n' +
' "urls": "http://elastic.co"\n' +
' }\n' +
' ]\n' +
' "type": "synthetics/http"\n' +
' "use_output": "default"\n' +
'}',
showDiff: true
}
```
First failure: [CI Build - main](https://buildkite.com/elastic/kibana-on-merge/builds/22895#01841b3c-0cd7-4a77-b46c-cbb9240553e6)
<!-- kibanaCiData = {"failed-test":{"test.class":"Chrome Elastic Synthetics Integration UI Functional Tests.x-pack/test/functional_synthetics/apps/uptime/synthetics_integration·ts","test.name":"Uptime app with generated data When on the Synthetics Integration Policy Create Page create new policy allows configuring tls","test.failCount":2}} --> | non_priority | failing test chrome elastic synthetics integration ui functional tests x pack test functional synthetics apps uptime synthetics integration·ts uptime app with generated data when on the synthetics integration policy create page create new policy allows configuring tls a test failed on a tracked branch error expected id synthetics http synthetics revision name sample synthetics integration type synthetics http data stream namespace default use output default package policy id streams id synthetics http http data stream ui type http name sample synthetics integration enabled true urls service name sample apm service schedule every timeout max redirects tags response include headers true response include body on error check request method get ssl certificate cert ssl certificate authorities ca ssl key certkey ssl key passphrase certkeypassphrase ssl verification mode strict ssl supported protocols processors meta package name synthetics version to sort of equal data stream namespace default id synthetics http synthetics meta package name synthetics version name sample synthetics integration package policy id revision streams id synthetics http http name sample synthetics integration type http enabled true processors max redirects check request method get response include body on error response include headers true schedule every ssl supported protocols ssl verification mode strict ssl certificate cert ssl certificate authorities ca ssl key certkey ssl key passphrase certkeypassphrase timeout urls service name sample apm service tags ui type synthetics http use output default at assertion assert node modules kbn expect expect js at assertion eql node modules kbn expect expect js at context x pack test functional synthetics apps uptime synthetics integration ts at runmicrotasks at processticksandrejections node internal process task queues at object apply node modules kbn test target node src functional test runner lib mocha wrap function js actual n data stream n namespace default n n id synthetics http synthetics n meta n package n name synthetics n version n n n name sample synthetics integration n package policy id n revision n streams n n ui n is tls enabled true n is zip url tls enabled false n n check request method get n data stream n dataset http n elasticsearch n privileges n indices n auto configure n create doc n read n n n n type synthetics n n enabled true n id synthetics http http n max redirects n name sample synthetics integration n processors n n add observer metadata n geo n name fleet managed n n n n n add fields n fields n monitor fleet managed true n n target n n n n response include body on error n response include headers true n schedule every n service name sample apm service n ssl certificate cert n ssl certificate authorities ca n ssl key certkey n ssl key passphrase certkeypassphrase n ssl supported protocols n n n n n ssl verification mode strict n tags n sample tag n n timeout n type http n urls n n type synthetics http n use output default n expected n data stream n namespace default n n id synthetics http synthetics n meta n package n name synthetics n version n n n name sample synthetics integration n package policy id n revision n streams n n ui n is tls enabled true n is zip url tls enabled false n n check request method get n data stream n dataset http n type synthetics n n enabled true n id synthetics http http n max redirects n name sample synthetics integration n processors n n add observer metadata n geo n name fleet managed n n n n n add fields n fields n monitor fleet managed true n n target n n n n response include body on error n response include headers true n schedule every n service name sample apm service n ssl certificate cert n ssl certificate authorities ca n ssl key certkey n ssl key passphrase certkeypassphrase n ssl supported protocols n n n n n ssl verification mode strict n tags n sample tag n n timeout n type http n urls n n type synthetics http n use output default n showdiff true first failure | 0 |
151,288 | 23,793,498,429 | IssuesEvent | 2022-09-02 16:48:34 | microsoft/pyright | https://api.github.com/repos/microsoft/pyright | closed | Nested `TypedDict` with `NotRequired` key failing to satisfy key-existence check | as designed | **Describe the bug**
When nesting a `TypeDict` inside another `TypeDict`, where the child one has a `NotRequired` key, Pyright keeps showing an error even after ensuring the existence of the key.
**To Reproduce**
The code snippet below reproduces the error using the specified version of Pylance extension in VSCode.
The second check fails with the error:
```
Could not access item in TypedDict
"k" is not a required key in "A", so access may result in runtime exception
```
**Expected behavior**
Only the first check should fail, all the rest should pass.
**Screenshots or Code**
```python
from typing import Final, Literal, TypedDict
from typing_extensions import NotRequired
class A(TypedDict):
k: NotRequired[int]
class B(TypedDict):
a: A
b: B = B(a=A())
k: Final[Literal["k"]] = "k"
if b["a"][k] == 0: # This properly shows an error
...
if k in b["a"] and b["a"][k] == 0: # This shows an error but should pass
...
a: A = A()
if k in a and a[k] == 0: # It also passes without the external TypedDict
...
a2: A = b["a"]
if k in a2 and a2[k] == 0: # Assigning the nested TypedDict to a variable makes it pass too
...
```
**VS Code extension or command-line**
Pylance: v2022.8.50
**Additional context**
Python: 3.9.7
pyrightconfig.json:
```json
{
"useLibraryCodeForTypes": true,
"typeCheckingMode": "basic",
}
```
| 1.0 | Nested `TypedDict` with `NotRequired` key failing to satisfy key-existence check - **Describe the bug**
When nesting a `TypeDict` inside another `TypeDict`, where the child one has a `NotRequired` key, Pyright keeps showing an error even after ensuring the existence of the key.
**To Reproduce**
The code snippet below reproduces the error using the specified version of Pylance extension in VSCode.
The second check fails with the error:
```
Could not access item in TypedDict
"k" is not a required key in "A", so access may result in runtime exception
```
**Expected behavior**
Only the first check should fail, all the rest should pass.
**Screenshots or Code**
```python
from typing import Final, Literal, TypedDict
from typing_extensions import NotRequired
class A(TypedDict):
k: NotRequired[int]
class B(TypedDict):
a: A
b: B = B(a=A())
k: Final[Literal["k"]] = "k"
if b["a"][k] == 0: # This properly shows an error
...
if k in b["a"] and b["a"][k] == 0: # This shows an error but should pass
...
a: A = A()
if k in a and a[k] == 0: # It also passes without the external TypedDict
...
a2: A = b["a"]
if k in a2 and a2[k] == 0: # Assigning the nested TypedDict to a variable makes it pass too
...
```
**VS Code extension or command-line**
Pylance: v2022.8.50
**Additional context**
Python: 3.9.7
pyrightconfig.json:
```json
{
"useLibraryCodeForTypes": true,
"typeCheckingMode": "basic",
}
```
| non_priority | nested typeddict with notrequired key failing to satisfy key existence check describe the bug when nesting a typedict inside another typedict where the child one has a notrequired key pyright keeps showing an error even after ensuring the existence of the key to reproduce the code snippet below reproduces the error using the specified version of pylance extension in vscode the second check fails with the error could not access item in typeddict k is not a required key in a so access may result in runtime exception expected behavior only the first check should fail all the rest should pass screenshots or code python from typing import final literal typeddict from typing extensions import notrequired class a typeddict k notrequired class b typeddict a a b b b a a k final k if b this properly shows an error if k in b and b this shows an error but should pass a a a if k in a and a it also passes without the external typeddict a b if k in and assigning the nested typeddict to a variable makes it pass too vs code extension or command line pylance additional context python pyrightconfig json json uselibrarycodefortypes true typecheckingmode basic | 0 |
145,190 | 19,339,184,861 | IssuesEvent | 2021-12-15 01:03:58 | billmcchesney1/hadoop | https://api.github.com/repos/billmcchesney1/hadoop | opened | CVE-2021-3777 (High) detected in tmpl-1.0.4.tgz | security vulnerability | ## CVE-2021-3777 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tmpl-1.0.4.tgz</b></p></summary>
<p>JavaScript micro templates.</p>
<p>Library home page: <a href="https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz">https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz</a></p>
<p>Path to dependency file: hadoop/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-ui/src/main/webapp/package.json</p>
<p>Path to vulnerable library: hadoop/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-ui/src/main/webapp/node_modules/tmpl/package.json</p>
<p>
Dependency Hierarchy:
- ember-cli-1.13.14.tgz (Root Library)
- sane-1.7.0.tgz
- walker-1.0.7.tgz
- makeerror-1.0.11.tgz
- :x: **tmpl-1.0.4.tgz** (Vulnerable Library)
<p>Found in base branch: <b>trunk</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity
<p>Publish Date: 2021-09-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3777>CVE-2021-3777</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/daaku/nodejs-tmpl/releases/tag/v1.0.5">https://github.com/daaku/nodejs-tmpl/releases/tag/v1.0.5</a></p>
<p>Release Date: 2021-09-15</p>
<p>Fix Resolution: tmpl - 1.0.5</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"tmpl","packageVersion":"1.0.4","packageFilePaths":["/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-ui/src/main/webapp/package.json"],"isTransitiveDependency":true,"dependencyTree":"ember-cli:1.13.14;sane:1.7.0;walker:1.0.7;makeerror:1.0.11;tmpl:1.0.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"tmpl - 1.0.5","isBinary":false}],"baseBranches":["trunk"],"vulnerabilityIdentifier":"CVE-2021-3777","vulnerabilityDetails":"nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3777","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-3777 (High) detected in tmpl-1.0.4.tgz - ## CVE-2021-3777 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tmpl-1.0.4.tgz</b></p></summary>
<p>JavaScript micro templates.</p>
<p>Library home page: <a href="https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz">https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz</a></p>
<p>Path to dependency file: hadoop/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-ui/src/main/webapp/package.json</p>
<p>Path to vulnerable library: hadoop/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-ui/src/main/webapp/node_modules/tmpl/package.json</p>
<p>
Dependency Hierarchy:
- ember-cli-1.13.14.tgz (Root Library)
- sane-1.7.0.tgz
- walker-1.0.7.tgz
- makeerror-1.0.11.tgz
- :x: **tmpl-1.0.4.tgz** (Vulnerable Library)
<p>Found in base branch: <b>trunk</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity
<p>Publish Date: 2021-09-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3777>CVE-2021-3777</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/daaku/nodejs-tmpl/releases/tag/v1.0.5">https://github.com/daaku/nodejs-tmpl/releases/tag/v1.0.5</a></p>
<p>Release Date: 2021-09-15</p>
<p>Fix Resolution: tmpl - 1.0.5</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"tmpl","packageVersion":"1.0.4","packageFilePaths":["/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-ui/src/main/webapp/package.json"],"isTransitiveDependency":true,"dependencyTree":"ember-cli:1.13.14;sane:1.7.0;walker:1.0.7;makeerror:1.0.11;tmpl:1.0.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"tmpl - 1.0.5","isBinary":false}],"baseBranches":["trunk"],"vulnerabilityIdentifier":"CVE-2021-3777","vulnerabilityDetails":"nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3777","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in tmpl tgz cve high severity vulnerability vulnerable library tmpl tgz javascript micro templates library home page a href path to dependency file hadoop hadoop yarn project hadoop yarn hadoop yarn ui src main webapp package json path to vulnerable library hadoop hadoop yarn project hadoop yarn hadoop yarn ui src main webapp node modules tmpl package json dependency hierarchy ember cli tgz root library sane tgz walker tgz makeerror tgz x tmpl tgz vulnerable library found in base branch trunk vulnerability details nodejs tmpl is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tmpl isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree ember cli sane walker makeerror tmpl isminimumfixversionavailable true minimumfixversion tmpl isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails nodejs tmpl is vulnerable to inefficient regular expression complexity vulnerabilityurl | 0 |
210,119 | 23,731,358,413 | IssuesEvent | 2022-08-31 02:13:38 | project-chip/connectedhomeip | https://api.github.com/repos/project-chip/connectedhomeip | closed | Commissioner/Controller init on Android may fail or crash due to use-after-free | android V1.0 security crash v1.0 master patch acceptable | #### Problem
Use-after-free of JNI references in `AndroidDeviceControllerWrapper` can cause failure to init or crashes
Some JNI references, the ones for operational certs and IPK, have incorrect scoping when initializing the controller wrapper. Depending on system state, use after-free can arise and was observed.
This problem was found during testing with non-default Operational Credentials Issuer.
Behavior varied between versions of Android and platform. In the best case, it was an error on init, other times it was crashes.
In some cases, no crash or error occured, but certificates were subtly wrong, and found out only at time of use.
In large scale testing, this was seen during ~3% of commissioning runs.
#### Proposed Solution
- Fix the lifetime issue found by code audit
| True | Commissioner/Controller init on Android may fail or crash due to use-after-free - #### Problem
Use-after-free of JNI references in `AndroidDeviceControllerWrapper` can cause failure to init or crashes
Some JNI references, the ones for operational certs and IPK, have incorrect scoping when initializing the controller wrapper. Depending on system state, use after-free can arise and was observed.
This problem was found during testing with non-default Operational Credentials Issuer.
Behavior varied between versions of Android and platform. In the best case, it was an error on init, other times it was crashes.
In some cases, no crash or error occured, but certificates were subtly wrong, and found out only at time of use.
In large scale testing, this was seen during ~3% of commissioning runs.
#### Proposed Solution
- Fix the lifetime issue found by code audit
| non_priority | commissioner controller init on android may fail or crash due to use after free problem use after free of jni references in androiddevicecontrollerwrapper can cause failure to init or crashes some jni references the ones for operational certs and ipk have incorrect scoping when initializing the controller wrapper depending on system state use after free can arise and was observed this problem was found during testing with non default operational credentials issuer behavior varied between versions of android and platform in the best case it was an error on init other times it was crashes in some cases no crash or error occured but certificates were subtly wrong and found out only at time of use in large scale testing this was seen during of commissioning runs proposed solution fix the lifetime issue found by code audit | 0 |
28,876 | 13,879,734,908 | IssuesEvent | 2020-10-17 15:43:19 | tensorflow/tensorflow | https://api.github.com/repos/tensorflow/tensorflow | closed | Expensive decompression in JPEG GetImageInfo | TF 2.3 type:performance | **System information**
- Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device:
- TensorFlow installed from (source or binary): source
- TensorFlow version (use command below): 2.3
- Python version: 3.7
- Bazel version (if compiling from source):
- GCC/Compiler version (if compiling from source):
- CUDA/cuDNN version:
- GPU model and memory:
**Describe the current behavior**
ExtractJpegShape is as expensive to evaluate as full JPEG decompression on non-baseline JPEGs.
**Describe the expected behavior**
ExtractJpegShape is much cheaper than full JPEG decompression.
**Fix and Code To Reproduce**
https://github.com/tensorflow/tensorflow/pull/44066
| True | Expensive decompression in JPEG GetImageInfo - **System information**
- Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device:
- TensorFlow installed from (source or binary): source
- TensorFlow version (use command below): 2.3
- Python version: 3.7
- Bazel version (if compiling from source):
- GCC/Compiler version (if compiling from source):
- CUDA/cuDNN version:
- GPU model and memory:
**Describe the current behavior**
ExtractJpegShape is as expensive to evaluate as full JPEG decompression on non-baseline JPEGs.
**Describe the expected behavior**
ExtractJpegShape is much cheaper than full JPEG decompression.
**Fix and Code To Reproduce**
https://github.com/tensorflow/tensorflow/pull/44066
| non_priority | expensive decompression in jpeg getimageinfo system information have i written custom code as opposed to using a stock example script provided in tensorflow no os platform and distribution e g linux ubuntu linux ubuntu mobile device e g iphone pixel samsung galaxy if the issue happens on mobile device tensorflow installed from source or binary source tensorflow version use command below python version bazel version if compiling from source gcc compiler version if compiling from source cuda cudnn version gpu model and memory describe the current behavior extractjpegshape is as expensive to evaluate as full jpeg decompression on non baseline jpegs describe the expected behavior extractjpegshape is much cheaper than full jpeg decompression fix and code to reproduce | 0 |
14,972 | 18,763,606,046 | IssuesEvent | 2021-11-05 19:44:56 | ElfFriend-DnD/FVTT-Minimal-Rolling-Enhancements-DND5E | https://api.github.com/repos/ElfFriend-DnD/FVTT-Minimal-Rolling-Enhancements-DND5E | opened | PopOut! and Keyboard Shortcuts | compatibility enhancement | The keyboard shortcuts for advantage etc. do not work with actor sheets popped out by popout.
This is because of the janky global keyboard modifier listener we have on the page. | True | PopOut! and Keyboard Shortcuts - The keyboard shortcuts for advantage etc. do not work with actor sheets popped out by popout.
This is because of the janky global keyboard modifier listener we have on the page. | non_priority | popout and keyboard shortcuts the keyboard shortcuts for advantage etc do not work with actor sheets popped out by popout this is because of the janky global keyboard modifier listener we have on the page | 0 |
135,799 | 11,017,918,506 | IssuesEvent | 2019-12-05 09:29:32 | dzhw/SLC-IntEr | https://api.github.com/repos/dzhw/SLC-IntEr | closed | Scrolling auf mobilen Endgeräten | Hohe Priorität layout modul-übergreifend testing | Sehr viel Whitespace auf einigen Seiten (ab emaa33 bis Schluss). Ist das noch ein Effekt der Header und wird noch behoben?


| 1.0 | Scrolling auf mobilen Endgeräten - Sehr viel Whitespace auf einigen Seiten (ab emaa33 bis Schluss). Ist das noch ein Effekt der Header und wird noch behoben?


| non_priority | scrolling auf mobilen endgeräten sehr viel whitespace auf einigen seiten ab bis schluss ist das noch ein effekt der header und wird noch behoben | 0 |
147,295 | 19,512,763,995 | IssuesEvent | 2021-12-29 03:12:50 | props-sh/props | https://api.github.com/repos/props-sh/props | opened | CVE-2021-29425 (Medium) detected in commons-io-2.6.jar | security vulnerability | ## CVE-2021-29425 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-io-2.6.jar</b></p></summary>
<p>The Apache Commons IO library contains utility classes, stream implementations, file filters,
file comparators, endian transformation classes, and much more.</p>
<p>Library home page: <a href="http://commons.apache.org/proper/commons-io/">http://commons.apache.org/proper/commons-io/</a></p>
<p>
Dependency Hierarchy:
- pmd-java-6.36.0.jar (Root Library)
- :x: **commons-io-2.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/props-sh/props/commit/37fa2bf561fa08d2d179ab57c07267c793a6c1af">37fa2bf561fa08d2d179ab57c07267c793a6c1af</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
<p>Publish Date: 2021-04-13
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29425>CVE-2021-29425</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425</a></p>
<p>Release Date: 2021-04-13</p>
<p>Fix Resolution: commons-io:commons-io:2.7</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-29425 (Medium) detected in commons-io-2.6.jar - ## CVE-2021-29425 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-io-2.6.jar</b></p></summary>
<p>The Apache Commons IO library contains utility classes, stream implementations, file filters,
file comparators, endian transformation classes, and much more.</p>
<p>Library home page: <a href="http://commons.apache.org/proper/commons-io/">http://commons.apache.org/proper/commons-io/</a></p>
<p>
Dependency Hierarchy:
- pmd-java-6.36.0.jar (Root Library)
- :x: **commons-io-2.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/props-sh/props/commit/37fa2bf561fa08d2d179ab57c07267c793a6c1af">37fa2bf561fa08d2d179ab57c07267c793a6c1af</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
<p>Publish Date: 2021-04-13
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29425>CVE-2021-29425</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425</a></p>
<p>Release Date: 2021-04-13</p>
<p>Fix Resolution: commons-io:commons-io:2.7</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in commons io jar cve medium severity vulnerability vulnerable library commons io jar the apache commons io library contains utility classes stream implementations file filters file comparators endian transformation classes and much more library home page a href dependency hierarchy pmd java jar root library x commons io jar vulnerable library found in head commit a href found in base branch main vulnerability details in apache commons io before when invoking the method filenameutils normalize with an improper input string like foo or foo the result would be the same value thus possibly providing access to files in the parent directory but not further above thus limited path traversal if the calling code would use the result to construct a path value publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons io commons io step up your open source security game with whitesource | 0 |
211,032 | 16,415,976,500 | IssuesEvent | 2021-05-19 06:47:06 | druxt/druxt.js | https://api.github.com/repos/druxt/druxt.js | opened | Provide better documentation for the DruxtStore. | documentation | **Is your feature request related to a problem? Please describe.**
The DruxtStore documentation is sparse and doesn't clearly show how or why to use the store.
**Describe the solution you'd like**
Better examples and documentation.
**Describe alternatives you've considered**
N/A
**Additional context**
N/A
| 1.0 | Provide better documentation for the DruxtStore. - **Is your feature request related to a problem? Please describe.**
The DruxtStore documentation is sparse and doesn't clearly show how or why to use the store.
**Describe the solution you'd like**
Better examples and documentation.
**Describe alternatives you've considered**
N/A
**Additional context**
N/A
| non_priority | provide better documentation for the druxtstore is your feature request related to a problem please describe the druxtstore documentation is sparse and doesn t clearly show how or why to use the store describe the solution you d like better examples and documentation describe alternatives you ve considered n a additional context n a | 0 |
337,455 | 30,248,167,444 | IssuesEvent | 2023-07-06 18:11:10 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | opened | roachtest: ycsb/A/nodes=3/cpu=32/mvcc-range-keys=global failed | C-test-failure O-robot O-roachtest release-blocker branch-release-23.1 | roachtest.ycsb/A/nodes=3/cpu=32/mvcc-range-keys=global [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/10797189?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/10797189?buildTab=artifacts#/ycsb/A/nodes=3/cpu=32/mvcc-range-keys=global) on release-23.1 @ [fa2d7f7c9894d701ac4a393f058aa84552957087](https://github.com/cockroachdb/cockroach/commits/fa2d7f7c9894d701ac4a393f058aa84552957087):
```
(cluster.go:2247).Run: output in run_174531.816560464_n4_workload-run-ycsb-in: ./workload run ycsb --init --insert-count=1000000 --workload=A --concurrency=144 --splits=3 --histograms=perf/stats.json --select-for-update=true --ramp=2m --duration=30m {pgurl:1-3} returned: COMMAND_PROBLEM: exit status 1
(monitor.go:137).Wait: monitor failure: monitor task failed: t.Fatal() was called
test artifacts and logs in: /artifacts/ycsb/A/nodes=3/cpu=32/mvcc-range-keys=global/run_1
```
<p>Parameters: <code>ROACHTEST_arch=amd64</code>
, <code>ROACHTEST_cloud=gce</code>
, <code>ROACHTEST_cpu=32</code>
, <code>ROACHTEST_encrypted=false</code>
, <code>ROACHTEST_fs=ext4</code>
, <code>ROACHTEST_localSSD=true</code>
, <code>ROACHTEST_ssd=0</code>
</p>
<details><summary>Help</summary>
<p>
See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md)
See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7)
</p>
</details>
/cc @cockroachdb/test-eng
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*ycsb/A/nodes=3/cpu=32/mvcc-range-keys=global.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
| 2.0 | roachtest: ycsb/A/nodes=3/cpu=32/mvcc-range-keys=global failed - roachtest.ycsb/A/nodes=3/cpu=32/mvcc-range-keys=global [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/10797189?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/10797189?buildTab=artifacts#/ycsb/A/nodes=3/cpu=32/mvcc-range-keys=global) on release-23.1 @ [fa2d7f7c9894d701ac4a393f058aa84552957087](https://github.com/cockroachdb/cockroach/commits/fa2d7f7c9894d701ac4a393f058aa84552957087):
```
(cluster.go:2247).Run: output in run_174531.816560464_n4_workload-run-ycsb-in: ./workload run ycsb --init --insert-count=1000000 --workload=A --concurrency=144 --splits=3 --histograms=perf/stats.json --select-for-update=true --ramp=2m --duration=30m {pgurl:1-3} returned: COMMAND_PROBLEM: exit status 1
(monitor.go:137).Wait: monitor failure: monitor task failed: t.Fatal() was called
test artifacts and logs in: /artifacts/ycsb/A/nodes=3/cpu=32/mvcc-range-keys=global/run_1
```
<p>Parameters: <code>ROACHTEST_arch=amd64</code>
, <code>ROACHTEST_cloud=gce</code>
, <code>ROACHTEST_cpu=32</code>
, <code>ROACHTEST_encrypted=false</code>
, <code>ROACHTEST_fs=ext4</code>
, <code>ROACHTEST_localSSD=true</code>
, <code>ROACHTEST_ssd=0</code>
</p>
<details><summary>Help</summary>
<p>
See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md)
See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7)
</p>
</details>
/cc @cockroachdb/test-eng
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*ycsb/A/nodes=3/cpu=32/mvcc-range-keys=global.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
| non_priority | roachtest ycsb a nodes cpu mvcc range keys global failed roachtest ycsb a nodes cpu mvcc range keys global with on release cluster go run output in run workload run ycsb in workload run ycsb init insert count workload a concurrency splits histograms perf stats json select for update true ramp duration pgurl returned command problem exit status monitor go wait monitor failure monitor task failed t fatal was called test artifacts and logs in artifacts ycsb a nodes cpu mvcc range keys global run parameters roachtest arch roachtest cloud gce roachtest cpu roachtest encrypted false roachtest fs roachtest localssd true roachtest ssd help see see cc cockroachdb test eng | 0 |
88,548 | 15,803,030,408 | IssuesEvent | 2021-04-03 12:33:53 | atlslscsrv-app/upgraded-fiesta | https://api.github.com/repos/atlslscsrv-app/upgraded-fiesta | closed | CVE-2020-7598 (Medium) detected in minimist-0.0.8.tgz, minimist-1.2.0.tgz - autoclosed | security vulnerability | ## CVE-2020-7598 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary>
<p>
<details><summary><b>minimist-0.0.8.tgz</b></p></summary>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p>
<p>Path to dependency file: upgraded-fiesta/package.json</p>
<p>Path to vulnerable library: upgraded-fiesta/node_modules/mkdirp/node_modules/minimist/package.json</p>
<p>
Dependency Hierarchy:
- tar-4.4.4.tgz (Root Library)
- mkdirp-0.5.1.tgz
- :x: **minimist-0.0.8.tgz** (Vulnerable Library)
</details>
<details><summary><b>minimist-1.2.0.tgz</b></p></summary>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p>
<p>Path to dependency file: upgraded-fiesta/package.json</p>
<p>Path to vulnerable library: upgraded-fiesta/node_modules/minimist/package.json</p>
<p>
Dependency Hierarchy:
- serve-9.6.0.tgz (Root Library)
- update-check-1.5.2.tgz
- registry-auth-token-3.3.2.tgz
- rc-1.2.8.tgz
- :x: **minimist-1.2.0.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/atlslscsrv-app/upgraded-fiesta/commit/ec68291ce25200691b7a48431969b7c8021b35e2">ec68291ce25200691b7a48431969b7c8021b35e2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.
<p>Publish Date: 2020-03-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p>
<p>Release Date: 2020-03-11</p>
<p>Fix Resolution: minimist - 0.2.1,1.2.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-7598 (Medium) detected in minimist-0.0.8.tgz, minimist-1.2.0.tgz - autoclosed - ## CVE-2020-7598 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary>
<p>
<details><summary><b>minimist-0.0.8.tgz</b></p></summary>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p>
<p>Path to dependency file: upgraded-fiesta/package.json</p>
<p>Path to vulnerable library: upgraded-fiesta/node_modules/mkdirp/node_modules/minimist/package.json</p>
<p>
Dependency Hierarchy:
- tar-4.4.4.tgz (Root Library)
- mkdirp-0.5.1.tgz
- :x: **minimist-0.0.8.tgz** (Vulnerable Library)
</details>
<details><summary><b>minimist-1.2.0.tgz</b></p></summary>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p>
<p>Path to dependency file: upgraded-fiesta/package.json</p>
<p>Path to vulnerable library: upgraded-fiesta/node_modules/minimist/package.json</p>
<p>
Dependency Hierarchy:
- serve-9.6.0.tgz (Root Library)
- update-check-1.5.2.tgz
- registry-auth-token-3.3.2.tgz
- rc-1.2.8.tgz
- :x: **minimist-1.2.0.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/atlslscsrv-app/upgraded-fiesta/commit/ec68291ce25200691b7a48431969b7c8021b35e2">ec68291ce25200691b7a48431969b7c8021b35e2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.
<p>Publish Date: 2020-03-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p>
<p>Release Date: 2020-03-11</p>
<p>Fix Resolution: minimist - 0.2.1,1.2.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in minimist tgz minimist tgz autoclosed cve medium severity vulnerability vulnerable libraries minimist tgz minimist tgz minimist tgz parse argument options library home page a href path to dependency file upgraded fiesta package json path to vulnerable library upgraded fiesta node modules mkdirp node modules minimist package json dependency hierarchy tar tgz root library mkdirp tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file upgraded fiesta package json path to vulnerable library upgraded fiesta node modules minimist package json dependency hierarchy serve tgz root library update check tgz registry auth token tgz rc tgz x minimist tgz vulnerable library found in head commit a href found in base branch master vulnerability details minimist before could be tricked into adding or modifying properties of object prototype using a constructor or proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution minimist step up your open source security game with whitesource | 0 |
66,974 | 8,065,743,079 | IssuesEvent | 2018-08-04 05:59:48 | NUmeroAndDev/iTube-android | https://api.github.com/repos/NUmeroAndDev/iTube-android | closed | DarkTheme の追加 | Design New Function WIP | DarkTheme の機能を追加する
ただ、Material Components で DarkTheme ぽいものが出るらしいからそれまで独自の実装
### 必要なパラメータ
* surface (CardView 系のbackground)
* onSurface (CardView 系のテキスト)
* stroke (CardView 系の Stroke) dividerにする?
### 問題点
* FAB の背景はどの色?
* Toolbar のアイコンカラーはどうする?
→ DrawableCompat で頑張る
* 検索欄の stroke にノイズが入る
→ TextInputLayout を使う?ただし、clearボタンに effect がつけれない | 1.0 | DarkTheme の追加 - DarkTheme の機能を追加する
ただ、Material Components で DarkTheme ぽいものが出るらしいからそれまで独自の実装
### 必要なパラメータ
* surface (CardView 系のbackground)
* onSurface (CardView 系のテキスト)
* stroke (CardView 系の Stroke) dividerにする?
### 問題点
* FAB の背景はどの色?
* Toolbar のアイコンカラーはどうする?
→ DrawableCompat で頑張る
* 検索欄の stroke にノイズが入る
→ TextInputLayout を使う?ただし、clearボタンに effect がつけれない | non_priority | darktheme の追加 darktheme の機能を追加する ただ、material components で darktheme ぽいものが出るらしいからそれまで独自の実装 必要なパラメータ surface cardview 系のbackground onsurface cardview 系のテキスト stroke cardview 系の stroke dividerにする 問題点 fab の背景はどの色 toolbar のアイコンカラーはどうする → drawablecompat で頑張る 検索欄の stroke にノイズが入る → textinputlayout を使う ただし、clearボタンに effect がつけれない | 0 |
73,374 | 15,253,659,286 | IssuesEvent | 2021-02-20 08:42:01 | gsylvie/madness | https://api.github.com/repos/gsylvie/madness | closed | CVE-2015-5262 Medium Severity Vulnerability detected by WhiteSource - autoclosed | security vulnerability | ## CVE-2015-5262 - Medium Severity Vulnerability
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>httpclient-4.3.5.jar</b></p></summary>
<p>null</p>
<p>path: /root/.m2/repository/org/apache/httpcomponents/httpclient/4.3.5/httpclient-4.3.5.jar</p>
<p>
Dependency Hierarchy:
- httpasyncclient-4.0.2.jar (Root Library)
- :x: **httpclient-4.3.5.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.
<p>Publish Date: 2015-10-27
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5262>CVE-2015-5262</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>4.3</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://www.securitytracker.com/id/1033743">http://www.securitytracker.com/id/1033743</a></p>
<p>Release Date: 2017-12-31</p>
<p>Fix Resolution: The vendor has issued a fix (4.3.6).
The vendor has also issued a source code fix, available at:
http://svn.apache.org/viewvc/httpcomponents/httpclient/branches/4.3.x/httpclient/src/main/java/org/apache/http/conn/ssl/SSLConnectionSocketFactory.java?r1=1560975&r2=1626784</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2015-5262 Medium Severity Vulnerability detected by WhiteSource - autoclosed - ## CVE-2015-5262 - Medium Severity Vulnerability
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>httpclient-4.3.5.jar</b></p></summary>
<p>null</p>
<p>path: /root/.m2/repository/org/apache/httpcomponents/httpclient/4.3.5/httpclient-4.3.5.jar</p>
<p>
Dependency Hierarchy:
- httpasyncclient-4.0.2.jar (Root Library)
- :x: **httpclient-4.3.5.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.
<p>Publish Date: 2015-10-27
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5262>CVE-2015-5262</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>4.3</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://www.securitytracker.com/id/1033743">http://www.securitytracker.com/id/1033743</a></p>
<p>Release Date: 2017-12-31</p>
<p>Fix Resolution: The vendor has issued a fix (4.3.6).
The vendor has also issued a source code fix, available at:
http://svn.apache.org/viewvc/httpcomponents/httpclient/branches/4.3.x/httpclient/src/main/java/org/apache/http/conn/ssl/SSLConnectionSocketFactory.java?r1=1560975&r2=1626784</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium severity vulnerability detected by whitesource autoclosed cve medium severity vulnerability vulnerable library httpclient jar null path root repository org apache httpcomponents httpclient httpclient jar dependency hierarchy httpasyncclient jar root library x httpclient jar vulnerable library vulnerability details http conn ssl sslconnectionsocketfactory java in apache httpcomponents httpclient before ignores the http socket timeout configuration setting during an ssl handshake which allows remote attackers to cause a denial of service https call hang via unspecified vectors publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution the vendor has issued a fix the vendor has also issued a source code fix available at step up your open source security game with whitesource | 0 |
89,252 | 25,721,252,191 | IssuesEvent | 2022-12-07 13:51:32 | ARM-software/armnn | https://api.github.com/repos/ARM-software/armnn | closed | ArmNN 22.11 fails to build with `error: 'istream_iterator' is not a member of 'std'` | Fixed in next release Build issue | On openSUSE Tumbleweed, ArmNN 22.11 fails to build with `error: 'istream_iterator' is not a member of 'std'`.
Log:
```
[ 1382s] /home/abuild/rpmbuild/BUILD/armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp: In function 'void CheckAccuracy(std::vector<float>*, std::vector<float>*, std::vector<float>*, std::vector<float>*, const std::vector<yolov3::Detection>&, const std::vector<std::__cxx11::basic_string<char> >&)':
[ 1382s] /home/abuild/rpmbuild/BUILD/armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp:252:30: error: 'istream_iterator' is not a member of 'std'
[ 1382s] 252 | expected.assign(std::istream_iterator<float>(pathStream), {});
[ 1382s] | ^~~~~~~~~~~~~~~~
[ 1382s] /home/abuild/rpmbuild/BUILD/armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp:24:1: note: 'std::istream_iterator' is defined in header '<iterator>'; did you forget to '#include <iterator>'?
[ 1382s] 23 | #include <cmath>
[ 1382s] +++ |+#include <iterator>
[ 1382s] 24 |
[ 1382s] /home/abuild/rpmbuild/BUILD/armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp:252:47: error: expected primary-expression before 'float'
[ 1382s] 252 | expected.assign(std::istream_iterator<float>(pathStream), {});
[ 1382s] | ^~~~~
[ 1382s] /home/abuild/rpmbuild/BUILD/armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp:288:30: error: 'istream_iterator' is not a member of 'std'
[ 1382s] 288 | expected.assign(std::istream_iterator<float>(pathStream), {});
[ 1382s] | ^~~~~~~~~~~~~~~~
[ 1382s] /home/abuild/rpmbuild/BUILD/armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp:288:30: note: 'std::istream_iterator' is defined in header '<iterator>'; did you forget to '#include <iterator>'?
[ 1382s] /home/abuild/rpmbuild/BUILD/armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp:288:47: error: expected primary-expression before 'float'
[ 1382s] 288 | expected.assign(std::istream_iterator<float>(pathStream), {});
[ 1382s] | ^~~~~
[ 1382s] make[2]: *** [tests/CMakeFiles/TfLiteYoloV3Big-Armnn.dir/build.make:93: tests/CMakeFiles/TfLiteYoloV3Big-Armnn.dir/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp.o] Error 1
```
According to GCC hints, `armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp` requires `#include <iterator>`. (I did not test it yet). | 1.0 | ArmNN 22.11 fails to build with `error: 'istream_iterator' is not a member of 'std'` - On openSUSE Tumbleweed, ArmNN 22.11 fails to build with `error: 'istream_iterator' is not a member of 'std'`.
Log:
```
[ 1382s] /home/abuild/rpmbuild/BUILD/armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp: In function 'void CheckAccuracy(std::vector<float>*, std::vector<float>*, std::vector<float>*, std::vector<float>*, const std::vector<yolov3::Detection>&, const std::vector<std::__cxx11::basic_string<char> >&)':
[ 1382s] /home/abuild/rpmbuild/BUILD/armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp:252:30: error: 'istream_iterator' is not a member of 'std'
[ 1382s] 252 | expected.assign(std::istream_iterator<float>(pathStream), {});
[ 1382s] | ^~~~~~~~~~~~~~~~
[ 1382s] /home/abuild/rpmbuild/BUILD/armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp:24:1: note: 'std::istream_iterator' is defined in header '<iterator>'; did you forget to '#include <iterator>'?
[ 1382s] 23 | #include <cmath>
[ 1382s] +++ |+#include <iterator>
[ 1382s] 24 |
[ 1382s] /home/abuild/rpmbuild/BUILD/armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp:252:47: error: expected primary-expression before 'float'
[ 1382s] 252 | expected.assign(std::istream_iterator<float>(pathStream), {});
[ 1382s] | ^~~~~
[ 1382s] /home/abuild/rpmbuild/BUILD/armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp:288:30: error: 'istream_iterator' is not a member of 'std'
[ 1382s] 288 | expected.assign(std::istream_iterator<float>(pathStream), {});
[ 1382s] | ^~~~~~~~~~~~~~~~
[ 1382s] /home/abuild/rpmbuild/BUILD/armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp:288:30: note: 'std::istream_iterator' is defined in header '<iterator>'; did you forget to '#include <iterator>'?
[ 1382s] /home/abuild/rpmbuild/BUILD/armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp:288:47: error: expected primary-expression before 'float'
[ 1382s] 288 | expected.assign(std::istream_iterator<float>(pathStream), {});
[ 1382s] | ^~~~~
[ 1382s] make[2]: *** [tests/CMakeFiles/TfLiteYoloV3Big-Armnn.dir/build.make:93: tests/CMakeFiles/TfLiteYoloV3Big-Armnn.dir/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp.o] Error 1
```
According to GCC hints, `armnn-22.11/tests/TfLiteYoloV3Big-Armnn/TfLiteYoloV3Big-Armnn.cpp` requires `#include <iterator>`. (I did not test it yet). | non_priority | armnn fails to build with error istream iterator is not a member of std on opensuse tumbleweed armnn fails to build with error istream iterator is not a member of std log home abuild rpmbuild build armnn tests armnn armnn cpp in function void checkaccuracy std vector std vector std vector std vector const std vector const std vector home abuild rpmbuild build armnn tests armnn armnn cpp error istream iterator is not a member of std expected assign std istream iterator pathstream home abuild rpmbuild build armnn tests armnn armnn cpp note std istream iterator is defined in header did you forget to include include include home abuild rpmbuild build armnn tests armnn armnn cpp error expected primary expression before float expected assign std istream iterator pathstream home abuild rpmbuild build armnn tests armnn armnn cpp error istream iterator is not a member of std expected assign std istream iterator pathstream home abuild rpmbuild build armnn tests armnn armnn cpp note std istream iterator is defined in header did you forget to include home abuild rpmbuild build armnn tests armnn armnn cpp error expected primary expression before float expected assign std istream iterator pathstream make error according to gcc hints armnn tests armnn armnn cpp requires include i did not test it yet | 0 |
332,541 | 29,482,709,066 | IssuesEvent | 2023-06-02 07:20:02 | unifyai/ivy | https://api.github.com/repos/unifyai/ivy | closed | Fix jax_numpy_manipulation.test_jax_numpy_vsplit | JAX Frontend Sub Task Failing Test | | | |
|---|---|
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/5148942480/jobs/9271313253" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/5148942480/jobs/9271313253" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/5148942480/jobs/9271313253" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/5148942480/jobs/9271313253" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|paddle|<a href="https://github.com/unifyai/ivy/actions/runs/5148942480/jobs/9271313253" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
| 1.0 | Fix jax_numpy_manipulation.test_jax_numpy_vsplit - | | |
|---|---|
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/5148942480/jobs/9271313253" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/5148942480/jobs/9271313253" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/5148942480/jobs/9271313253" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/5148942480/jobs/9271313253" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|paddle|<a href="https://github.com/unifyai/ivy/actions/runs/5148942480/jobs/9271313253" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
| non_priority | fix jax numpy manipulation test jax numpy vsplit tensorflow img src torch img src numpy img src jax img src paddle img src | 0 |
375,467 | 26,163,176,502 | IssuesEvent | 2022-12-31 22:49:35 | python/mypy | https://api.github.com/repos/python/mypy | closed | Project website is not accessible via https | documentation | **Documentation**
The project website www.mypy-lang.org is not secured via ssl/tls.
It's 2021 now, can you please provide your webserver with a certificate?
In the age of [#letsencrypt](https://letsencrypt.org) I don't see any reason not to.
Every modern browser complains about it when visiting the website.
Some browsers (Chrome) also prevent the loading/inclusion of insecure content on secured websites.
E.g. the mypy badge on [my docker hub page](https://hub.docker.com/r/djbrown/hbscorez)
... which - personally - is bugging me the most 😭
| 1.0 | Project website is not accessible via https - **Documentation**
The project website www.mypy-lang.org is not secured via ssl/tls.
It's 2021 now, can you please provide your webserver with a certificate?
In the age of [#letsencrypt](https://letsencrypt.org) I don't see any reason not to.
Every modern browser complains about it when visiting the website.
Some browsers (Chrome) also prevent the loading/inclusion of insecure content on secured websites.
E.g. the mypy badge on [my docker hub page](https://hub.docker.com/r/djbrown/hbscorez)
... which - personally - is bugging me the most 😭
| non_priority | project website is not accessible via https documentation the project website is not secured via ssl tls it s now can you please provide your webserver with a certificate in the age of i don t see any reason not to every modern browser complains about it when visiting the website some browsers chrome also prevent the loading inclusion of insecure content on secured websites e g the mypy badge on which personally is bugging me the most 😭 | 0 |
124,568 | 10,315,911,543 | IssuesEvent | 2019-08-30 08:45:50 | eclipse/openj9 | https://api.github.com/repos/eclipse/openj9 | closed | JDK13 JTReg Failure: java/util/stream/test/org/openjdk/tests/java/util/SplittableRandomTest.java | jdk13 test failure | Failure link
------------
- Test: https://github.com/ibmruntimes/openj9-openjdk-jdk13/blob/openj9/test/jdk/java/util/stream/test/org/openjdk/tests/java/util/SplittableRandomTest.java
- Build: https://ci.adoptopenjdk.net/view/Test_grinder/job/Grinder_Advanced/96/
- Test Category: openjdk
- Test Suite Name: jdk_util
- OS/Architecture: x64_windows and x64_linux
- OpenJDK Version: 13+30
- Public Build SHAs:
- OpenJ9 - `5dd23af84`
- OMR - `6e99760b`
- JCL - `2337332cb3`
Optional info
-------------
- Intermittent failure: Yes
- Regression or new test: Regression
- Fails roughly 50% of the time in the nightly testing on just linux and windows as far as i can tell. I couldn't manage to replicate the problem just targetting the test itself but could've just been bad luck.
Failure output (captured from console output)
---------------------------------------------
Too long, but has problems with testDoubles and testLong. Rougly 28/39 of the tests fail when the test itself fails.
Example error:
```
java.lang.AssertionError: 5 failure(s) for test data: DoubleTestData[new SplittableRandom().doubles(16.000000, 256.000000).limit(65536)]
14:53:47 1: java.lang.Error: PAR_STREAM_SPLITERATOR: java.lang.NullPointerException
14:53:47 java.lang.NullPointerException
14:53:47 at org.testng.Assert.assertEquals(Assert.java:118)
14:53:47 at org.testng.Assert.assertEquals(Assert.java:372)
14:53:47 at org.testng.Assert.assertEquals(Assert.java:382)
14:53:47 at org.openjdk.tests.java.util.SplittableRandomTest.lambda$randomAsserter$0(SplittableRandomTest.java:108)
14:53:47 at org.openjdk.tests.java.util.SplittableRandomTest$$Lambda$52.00000000AC0783F0.assertResult(Unknown Source)
14:53:47 at java.base/java.util.stream.OpTestCase$ExerciseDataStreamBuilder.lambda$exercise$2(OpTestCase.java:406)
14:53:47 at java.util.stream.OpTestCase$ExerciseDataStreamBuilder$$Lambda$117.00000000AC08F1E0.run(Unknown Source)
14:53:47 at java.base/java.util.stream.LambdaTestHelpers.launderAssertion(LambdaTestHelpers.java:453)
14:53:47 at java.base/java.util.stream.OpTestCase$ExerciseDataStreamBuilder.exercise(OpTestCase.java:409)
14:53:47 at org.openjdk.tests.java.util.SplittableRandomTest.testDoubles(SplittableRandomTest.java:365)
```
| 1.0 | JDK13 JTReg Failure: java/util/stream/test/org/openjdk/tests/java/util/SplittableRandomTest.java - Failure link
------------
- Test: https://github.com/ibmruntimes/openj9-openjdk-jdk13/blob/openj9/test/jdk/java/util/stream/test/org/openjdk/tests/java/util/SplittableRandomTest.java
- Build: https://ci.adoptopenjdk.net/view/Test_grinder/job/Grinder_Advanced/96/
- Test Category: openjdk
- Test Suite Name: jdk_util
- OS/Architecture: x64_windows and x64_linux
- OpenJDK Version: 13+30
- Public Build SHAs:
- OpenJ9 - `5dd23af84`
- OMR - `6e99760b`
- JCL - `2337332cb3`
Optional info
-------------
- Intermittent failure: Yes
- Regression or new test: Regression
- Fails roughly 50% of the time in the nightly testing on just linux and windows as far as i can tell. I couldn't manage to replicate the problem just targetting the test itself but could've just been bad luck.
Failure output (captured from console output)
---------------------------------------------
Too long, but has problems with testDoubles and testLong. Rougly 28/39 of the tests fail when the test itself fails.
Example error:
```
java.lang.AssertionError: 5 failure(s) for test data: DoubleTestData[new SplittableRandom().doubles(16.000000, 256.000000).limit(65536)]
14:53:47 1: java.lang.Error: PAR_STREAM_SPLITERATOR: java.lang.NullPointerException
14:53:47 java.lang.NullPointerException
14:53:47 at org.testng.Assert.assertEquals(Assert.java:118)
14:53:47 at org.testng.Assert.assertEquals(Assert.java:372)
14:53:47 at org.testng.Assert.assertEquals(Assert.java:382)
14:53:47 at org.openjdk.tests.java.util.SplittableRandomTest.lambda$randomAsserter$0(SplittableRandomTest.java:108)
14:53:47 at org.openjdk.tests.java.util.SplittableRandomTest$$Lambda$52.00000000AC0783F0.assertResult(Unknown Source)
14:53:47 at java.base/java.util.stream.OpTestCase$ExerciseDataStreamBuilder.lambda$exercise$2(OpTestCase.java:406)
14:53:47 at java.util.stream.OpTestCase$ExerciseDataStreamBuilder$$Lambda$117.00000000AC08F1E0.run(Unknown Source)
14:53:47 at java.base/java.util.stream.LambdaTestHelpers.launderAssertion(LambdaTestHelpers.java:453)
14:53:47 at java.base/java.util.stream.OpTestCase$ExerciseDataStreamBuilder.exercise(OpTestCase.java:409)
14:53:47 at org.openjdk.tests.java.util.SplittableRandomTest.testDoubles(SplittableRandomTest.java:365)
```
| non_priority | jtreg failure java util stream test org openjdk tests java util splittablerandomtest java failure link test build test category openjdk test suite name jdk util os architecture windows and linux openjdk version public build shas omr jcl optional info intermittent failure yes regression or new test regression fails roughly of the time in the nightly testing on just linux and windows as far as i can tell i couldn t manage to replicate the problem just targetting the test itself but could ve just been bad luck failure output captured from console output too long but has problems with testdoubles and testlong rougly of the tests fail when the test itself fails example error java lang assertionerror failure s for test data doubletestdata java lang error par stream spliterator java lang nullpointerexception java lang nullpointerexception at org testng assert assertequals assert java at org testng assert assertequals assert java at org testng assert assertequals assert java at org openjdk tests java util splittablerandomtest lambda randomasserter splittablerandomtest java at org openjdk tests java util splittablerandomtest lambda assertresult unknown source at java base java util stream optestcase exercisedatastreambuilder lambda exercise optestcase java at java util stream optestcase exercisedatastreambuilder lambda run unknown source at java base java util stream lambdatesthelpers launderassertion lambdatesthelpers java at java base java util stream optestcase exercisedatastreambuilder exercise optestcase java at org openjdk tests java util splittablerandomtest testdoubles splittablerandomtest java | 0 |
129,695 | 10,582,950,627 | IssuesEvent | 2019-10-08 12:45:44 | hazelcast/hazelcast-jet | https://api.github.com/repos/hazelcast/hazelcast-jet | closed | com.hazelcast.jet.core.JobTest.when_joinFromClientSentToNonMaster_then_futureShouldNotBeCompletedEarly | test-failure | _3.2_ (commit 7da6eb706d2d3afe48a0e652583b44d97b15a07e)
Failed on Oracle JDK8: http://jenkins.hazelcast.com/view/Jet%20-%20Release/job/release-jet-oss-master-oracle-jdk8/2/testReport/com.hazelcast.jet.core/JobTest/when_joinFromClientSentToNonMaster_then_futureShouldNotBeCompletedEarly/
Stacktrace:
```
Expected: exception with message a string containing "Faulty job"
but: message was "test timed out after 300000 milliseconds"
Stacktrace was: org.junit.runners.model.TestTimedOutException: test timed out after 300000 milliseconds
at sun.misc.Unsafe.park(Native Method)
at java.util.concurrent.locks.LockSupport.park(LockSupport.java:175)
at java.util.concurrent.CompletableFuture$Signaller.block(CompletableFuture.java:1693)
at java.util.concurrent.ForkJoinPool.managedBlock(ForkJoinPool.java:3323)
at java.util.concurrent.CompletableFuture.waitingGet(CompletableFuture.java:1729)
at java.util.concurrent.CompletableFuture.join(CompletableFuture.java:1934)
at com.hazelcast.jet.Job.join(Job.java:137)
at com.hazelcast.jet.core.JobTest.when_joinFromClientSentToNonMaster_then_futureShouldNotBeCompletedEarly(JobTest.java:818)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:106)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:98)
at java.util.concurrent.FutureTask.run(FutureTask.java:266)
at java.lang.Thread.run(Thread.java:748)
```
| 1.0 | com.hazelcast.jet.core.JobTest.when_joinFromClientSentToNonMaster_then_futureShouldNotBeCompletedEarly - _3.2_ (commit 7da6eb706d2d3afe48a0e652583b44d97b15a07e)
Failed on Oracle JDK8: http://jenkins.hazelcast.com/view/Jet%20-%20Release/job/release-jet-oss-master-oracle-jdk8/2/testReport/com.hazelcast.jet.core/JobTest/when_joinFromClientSentToNonMaster_then_futureShouldNotBeCompletedEarly/
Stacktrace:
```
Expected: exception with message a string containing "Faulty job"
but: message was "test timed out after 300000 milliseconds"
Stacktrace was: org.junit.runners.model.TestTimedOutException: test timed out after 300000 milliseconds
at sun.misc.Unsafe.park(Native Method)
at java.util.concurrent.locks.LockSupport.park(LockSupport.java:175)
at java.util.concurrent.CompletableFuture$Signaller.block(CompletableFuture.java:1693)
at java.util.concurrent.ForkJoinPool.managedBlock(ForkJoinPool.java:3323)
at java.util.concurrent.CompletableFuture.waitingGet(CompletableFuture.java:1729)
at java.util.concurrent.CompletableFuture.join(CompletableFuture.java:1934)
at com.hazelcast.jet.Job.join(Job.java:137)
at com.hazelcast.jet.core.JobTest.when_joinFromClientSentToNonMaster_then_futureShouldNotBeCompletedEarly(JobTest.java:818)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:106)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:98)
at java.util.concurrent.FutureTask.run(FutureTask.java:266)
at java.lang.Thread.run(Thread.java:748)
```
| non_priority | com hazelcast jet core jobtest when joinfromclientsenttononmaster then futureshouldnotbecompletedearly commit failed on oracle stacktrace expected exception with message a string containing faulty job but message was test timed out after milliseconds stacktrace was org junit runners model testtimedoutexception test timed out after milliseconds at sun misc unsafe park native method at java util concurrent locks locksupport park locksupport java at java util concurrent completablefuture signaller block completablefuture java at java util concurrent forkjoinpool managedblock forkjoinpool java at java util concurrent completablefuture waitingget completablefuture java at java util concurrent completablefuture join completablefuture java at com hazelcast jet job join job java at com hazelcast jet core jobtest when joinfromclientsenttononmaster then futureshouldnotbecompletedearly jobtest java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at com hazelcast test failontimeoutstatement callablestatement call failontimeoutstatement java at com hazelcast test failontimeoutstatement callablestatement call failontimeoutstatement java at java util concurrent futuretask run futuretask java at java lang thread run thread java | 0 |
268,916 | 28,932,274,847 | IssuesEvent | 2023-05-09 01:07:52 | vwasthename/iaf | https://api.github.com/repos/vwasthename/iaf | opened | CVE-2023-26116 (High) detected in multiple libraries | Mend: dependency security vulnerability | ## CVE-2023-26116 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>angular-1.7.8.min.js</b>, <b>angular-1.7.9.min.js</b>, <b>angular-1.7.9.js</b></p></summary>
<p>
<details><summary><b>angular-1.7.8.min.js</b></p></summary>
<p>AngularJS is an MVC framework for building web applications. The core features include HTML enhanced with custom component and data-binding capabilities, dependency injection and strong focus on simplicity, testability, maintainability and boiler-plate reduction.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.7.8/angular.min.js">https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.7.8/angular.min.js</a></p>
<p>Path to dependency file: /ibisdoc/index.html</p>
<p>Path to vulnerable library: /ibisdoc/javascript/angular.min.js,/ibisdoc/javascript/angular.min.js</p>
<p>
Dependency Hierarchy:
- :x: **angular-1.7.8.min.js** (Vulnerable Library)
</details>
<details><summary><b>angular-1.7.9.min.js</b></p></summary>
<p>AngularJS is an MVC framework for building web applications. The core features include HTML enhanced with custom component and data-binding capabilities, dependency injection and strong focus on simplicity, testability, maintainability and boiler-plate reduction.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.7.9/angular.min.js">https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.7.9/angular.min.js</a></p>
<p>Path to dependency file: /frankdoc/index.html</p>
<p>Path to vulnerable library: /gui/js/angular/angular.min.js,/frankdoc/js/angular.min.js,/gui/js/angular/angular.min.js,/frankdoc/js/angular.min.js</p>
<p>
Dependency Hierarchy:
- :x: **angular-1.7.9.min.js** (Vulnerable Library)
</details>
<details><summary><b>angular-1.7.9.js</b></p></summary>
<p>AngularJS is an MVC framework for building web applications. The core features include HTML enhanced with custom component and data-binding capabilities, dependency injection and strong focus on simplicity, testability, maintainability and boiler-plate reduction.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.7.9/angular.js">https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.7.9/angular.js</a></p>
<p>Path to vulnerable library: /gui/js/angular/angular.js</p>
<p>
Dependency Hierarchy:
- :x: **angular-1.7.9.js** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
<p>Publish Date: 2023-03-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-26116>CVE-2023-26116</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2023-26116 (High) detected in multiple libraries - ## CVE-2023-26116 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>angular-1.7.8.min.js</b>, <b>angular-1.7.9.min.js</b>, <b>angular-1.7.9.js</b></p></summary>
<p>
<details><summary><b>angular-1.7.8.min.js</b></p></summary>
<p>AngularJS is an MVC framework for building web applications. The core features include HTML enhanced with custom component and data-binding capabilities, dependency injection and strong focus on simplicity, testability, maintainability and boiler-plate reduction.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.7.8/angular.min.js">https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.7.8/angular.min.js</a></p>
<p>Path to dependency file: /ibisdoc/index.html</p>
<p>Path to vulnerable library: /ibisdoc/javascript/angular.min.js,/ibisdoc/javascript/angular.min.js</p>
<p>
Dependency Hierarchy:
- :x: **angular-1.7.8.min.js** (Vulnerable Library)
</details>
<details><summary><b>angular-1.7.9.min.js</b></p></summary>
<p>AngularJS is an MVC framework for building web applications. The core features include HTML enhanced with custom component and data-binding capabilities, dependency injection and strong focus on simplicity, testability, maintainability and boiler-plate reduction.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.7.9/angular.min.js">https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.7.9/angular.min.js</a></p>
<p>Path to dependency file: /frankdoc/index.html</p>
<p>Path to vulnerable library: /gui/js/angular/angular.min.js,/frankdoc/js/angular.min.js,/gui/js/angular/angular.min.js,/frankdoc/js/angular.min.js</p>
<p>
Dependency Hierarchy:
- :x: **angular-1.7.9.min.js** (Vulnerable Library)
</details>
<details><summary><b>angular-1.7.9.js</b></p></summary>
<p>AngularJS is an MVC framework for building web applications. The core features include HTML enhanced with custom component and data-binding capabilities, dependency injection and strong focus on simplicity, testability, maintainability and boiler-plate reduction.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.7.9/angular.js">https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.7.9/angular.js</a></p>
<p>Path to vulnerable library: /gui/js/angular/angular.js</p>
<p>
Dependency Hierarchy:
- :x: **angular-1.7.9.js** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
<p>Publish Date: 2023-03-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-26116>CVE-2023-26116</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries angular min js angular min js angular js angular min js angularjs is an mvc framework for building web applications the core features include html enhanced with custom component and data binding capabilities dependency injection and strong focus on simplicity testability maintainability and boiler plate reduction library home page a href path to dependency file ibisdoc index html path to vulnerable library ibisdoc javascript angular min js ibisdoc javascript angular min js dependency hierarchy x angular min js vulnerable library angular min js angularjs is an mvc framework for building web applications the core features include html enhanced with custom component and data binding capabilities dependency injection and strong focus on simplicity testability maintainability and boiler plate reduction library home page a href path to dependency file frankdoc index html path to vulnerable library gui js angular angular min js frankdoc js angular min js gui js angular angular min js frankdoc js angular min js dependency hierarchy x angular min js vulnerable library angular js angularjs is an mvc framework for building web applications the core features include html enhanced with custom component and data binding capabilities dependency injection and strong focus on simplicity testability maintainability and boiler plate reduction library home page a href path to vulnerable library gui js angular angular js dependency hierarchy x angular js vulnerable library found in base branch master vulnerability details all versions of the package angular are vulnerable to regular expression denial of service redos via the angular copy utility function due to the usage of an insecure regular expression exploiting this vulnerability is possible by a large carefully crafted input which can result in catastrophic backtracking publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with mend | 0 |
361,672 | 25,348,309,828 | IssuesEvent | 2022-11-19 13:13:48 | bounswe/bounswe2022group9 | https://api.github.com/repos/bounswe/bounswe2022group9 | closed | [Mobile] Organizing Meeting Notes | Documentation Mobile | The meeting notes we receive as a mobile subgroup are not suitable for the template or they are not regular, they need to be edited.
Deadline : 19.11.2022 , 23.00 | 1.0 | [Mobile] Organizing Meeting Notes - The meeting notes we receive as a mobile subgroup are not suitable for the template or they are not regular, they need to be edited.
Deadline : 19.11.2022 , 23.00 | non_priority | organizing meeting notes the meeting notes we receive as a mobile subgroup are not suitable for the template or they are not regular they need to be edited deadline | 0 |
420,005 | 28,213,246,177 | IssuesEvent | 2023-04-05 06:57:34 | Drawsi/Anim | https://api.github.com/repos/Drawsi/Anim | opened | Creating documentation | documentation | From how the project works and communicates with different files, the architecture design of it all to how to add new features; it all needs to be explained and documented. | 1.0 | Creating documentation - From how the project works and communicates with different files, the architecture design of it all to how to add new features; it all needs to be explained and documented. | non_priority | creating documentation from how the project works and communicates with different files the architecture design of it all to how to add new features it all needs to be explained and documented | 0 |
4,323 | 7,045,264,199 | IssuesEvent | 2018-01-01 17:08:42 | pingcap/tidb | https://api.github.com/repos/pingcap/tidb | closed | invalid time cast bug. | compatibility help wanted | Please answer these questions before submitting your issue. Thanks!
1. What did you do?
`select cast('239010' as time);`
2. What did you expect to see?
```
mysql> select cast('239010' as time);
+------------------------+
| cast('239010' as time) |
+------------------------+
| NULL |
+------------------------+
1 row in set, 1 warning (0.00 sec)
mysql> show warnings;
+---------+------+------------------------------------------+
| Level | Code | Message |
+---------+------+------------------------------------------+
| Warning | 1292 | Truncated incorrect time value: '239010' |
+---------+------+------------------------------------------+
1 row in set (0.04 sec)
```
3. What did you see instead?
```
mysql> select cast('239010' as time);
+------------------------+
| cast('239010' as time) |
+------------------------+
| 24:30:10 |
+------------------------+
1 row in set (0.00 sec)
```
4. What version of TiDB are you using (`tidb-server -V`)?
```
Release Version: 0.8.0
Git Commit Hash: ae512b3e3e66eb2464be71d42cc61cbd2302b302
Git Branch: master
UTC Build Time: 2017-08-20 09:27:45
``` | True | invalid time cast bug. - Please answer these questions before submitting your issue. Thanks!
1. What did you do?
`select cast('239010' as time);`
2. What did you expect to see?
```
mysql> select cast('239010' as time);
+------------------------+
| cast('239010' as time) |
+------------------------+
| NULL |
+------------------------+
1 row in set, 1 warning (0.00 sec)
mysql> show warnings;
+---------+------+------------------------------------------+
| Level | Code | Message |
+---------+------+------------------------------------------+
| Warning | 1292 | Truncated incorrect time value: '239010' |
+---------+------+------------------------------------------+
1 row in set (0.04 sec)
```
3. What did you see instead?
```
mysql> select cast('239010' as time);
+------------------------+
| cast('239010' as time) |
+------------------------+
| 24:30:10 |
+------------------------+
1 row in set (0.00 sec)
```
4. What version of TiDB are you using (`tidb-server -V`)?
```
Release Version: 0.8.0
Git Commit Hash: ae512b3e3e66eb2464be71d42cc61cbd2302b302
Git Branch: master
UTC Build Time: 2017-08-20 09:27:45
``` | non_priority | invalid time cast bug please answer these questions before submitting your issue thanks what did you do select cast as time what did you expect to see mysql select cast as time cast as time null row in set warning sec mysql show warnings level code message warning truncated incorrect time value row in set sec what did you see instead mysql select cast as time cast as time row in set sec what version of tidb are you using tidb server v release version git commit hash git branch master utc build time | 0 |
269,214 | 28,960,032,636 | IssuesEvent | 2023-05-10 01:09:49 | dpteam/RK3188_TABLET | https://api.github.com/repos/dpteam/RK3188_TABLET | reopened | CVE-2023-1118 (High) detected in linux-yocto-4.12v3.0.67 | Mend: dependency security vulnerability | ## CVE-2023-1118 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-4.12v3.0.67</b></p></summary>
<p>
<p>Linux 4.12 Embedded Kernel</p>
<p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto-4.12>https://git.yoctoproject.org/git/linux-yocto-4.12</a></p>
<p>Found in HEAD commit: <a href="https://github.com/dpteam/RK3188_TABLET/commit/0c501f5a0fd72c7b2ac82904235363bd44fd8f9e">0c501f5a0fd72c7b2ac82904235363bd44fd8f9e</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/media/rc/ene_ir.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
<p>Publish Date: 2023-03-02
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-1118>CVE-2023-1118</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2023-1118">https://www.linuxkernelcves.com/cves/CVE-2023-1118</a></p>
<p>Release Date: 2023-03-02</p>
<p>Fix Resolution: v4.14.308,v4.19.276,v5.4.235,v5.10.173,v5.15.99,v6.1.16,v6.2.3,v6.3-rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2023-1118 (High) detected in linux-yocto-4.12v3.0.67 - ## CVE-2023-1118 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-4.12v3.0.67</b></p></summary>
<p>
<p>Linux 4.12 Embedded Kernel</p>
<p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto-4.12>https://git.yoctoproject.org/git/linux-yocto-4.12</a></p>
<p>Found in HEAD commit: <a href="https://github.com/dpteam/RK3188_TABLET/commit/0c501f5a0fd72c7b2ac82904235363bd44fd8f9e">0c501f5a0fd72c7b2ac82904235363bd44fd8f9e</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/media/rc/ene_ir.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
<p>Publish Date: 2023-03-02
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-1118>CVE-2023-1118</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2023-1118">https://www.linuxkernelcves.com/cves/CVE-2023-1118</a></p>
<p>Release Date: 2023-03-02</p>
<p>Fix Resolution: v4.14.308,v4.19.276,v5.4.235,v5.10.173,v5.15.99,v6.1.16,v6.2.3,v6.3-rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in linux yocto cve high severity vulnerability vulnerable library linux yocto linux embedded kernel library home page a href found in head commit a href found in base branch master vulnerable source files drivers media rc ene ir c vulnerability details a flaw use after free in the linux kernel integrated infrared receiver transceiver driver was found in the way user detaching rc device a local user could use this flaw to crash the system or potentially escalate their privileges on the system publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
310,294 | 23,330,073,754 | IssuesEvent | 2022-08-09 03:39:25 | cylammarco/WDPhotTools | https://api.github.com/repos/cylammarco/WDPhotTools | closed | README.md example photometric fitting plot is out of date. | documentation | The current plots are showing the fitted solution using 5 Pan-STARRS and 3 Gaia filters, but the code also includes JHK photometry. | 1.0 | README.md example photometric fitting plot is out of date. - The current plots are showing the fitted solution using 5 Pan-STARRS and 3 Gaia filters, but the code also includes JHK photometry. | non_priority | readme md example photometric fitting plot is out of date the current plots are showing the fitted solution using pan starrs and gaia filters but the code also includes jhk photometry | 0 |
158,040 | 20,007,557,787 | IssuesEvent | 2022-02-01 00:00:46 | timf-app-sandbox/t1 | https://api.github.com/repos/timf-app-sandbox/t1 | opened | CVE-2022-21681 (High) detected in marked-0.3.9.tgz | security vulnerability | ## CVE-2022-21681 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>marked-0.3.9.tgz</b></p></summary>
<p>A markdown parser built for speed</p>
<p>Library home page: <a href="https://registry.npmjs.org/marked/-/marked-0.3.9.tgz">https://registry.npmjs.org/marked/-/marked-0.3.9.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/marked/package.json</p>
<p>
Dependency Hierarchy:
- :x: **marked-0.3.9.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/timf-app-sandbox/t1/commit/ade63e4d4d7f78775fe064056f81c5da1b53aecf">ade63e4d4d7f78775fe064056f81c5da1b53aecf</a></p>
<p>Found in base branch: <b>dev</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.
<p>Publish Date: 2022-01-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-21681>CVE-2022-21681</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-5v2h-r2cx-5xgj">https://github.com/advisories/GHSA-5v2h-r2cx-5xgj</a></p>
<p>Release Date: 2022-01-14</p>
<p>Fix Resolution: marked - 4.0.10</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"marked","packageVersion":"0.3.9","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"marked:0.3.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"marked - 4.0.10","isBinary":false}],"baseBranches":["dev"],"vulnerabilityIdentifier":"CVE-2022-21681","vulnerabilityDetails":"Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-21681","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2022-21681 (High) detected in marked-0.3.9.tgz - ## CVE-2022-21681 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>marked-0.3.9.tgz</b></p></summary>
<p>A markdown parser built for speed</p>
<p>Library home page: <a href="https://registry.npmjs.org/marked/-/marked-0.3.9.tgz">https://registry.npmjs.org/marked/-/marked-0.3.9.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/marked/package.json</p>
<p>
Dependency Hierarchy:
- :x: **marked-0.3.9.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/timf-app-sandbox/t1/commit/ade63e4d4d7f78775fe064056f81c5da1b53aecf">ade63e4d4d7f78775fe064056f81c5da1b53aecf</a></p>
<p>Found in base branch: <b>dev</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.
<p>Publish Date: 2022-01-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-21681>CVE-2022-21681</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-5v2h-r2cx-5xgj">https://github.com/advisories/GHSA-5v2h-r2cx-5xgj</a></p>
<p>Release Date: 2022-01-14</p>
<p>Fix Resolution: marked - 4.0.10</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"marked","packageVersion":"0.3.9","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"marked:0.3.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"marked - 4.0.10","isBinary":false}],"baseBranches":["dev"],"vulnerabilityIdentifier":"CVE-2022-21681","vulnerabilityDetails":"Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-21681","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in marked tgz cve high severity vulnerability vulnerable library marked tgz a markdown parser built for speed library home page a href path to dependency file package json path to vulnerable library node modules marked package json dependency hierarchy x marked tgz vulnerable library found in head commit a href found in base branch dev vulnerability details marked is a markdown parser and compiler prior to version the regular expression inline reflinksearch may cause catastrophic backtracking against some strings and lead to a denial of service dos anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected this issue is patched in version as a workaround avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution marked rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree marked isminimumfixversionavailable true minimumfixversion marked isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails marked is a markdown parser and compiler prior to version the regular expression inline reflinksearch may cause catastrophic backtracking against some strings and lead to a denial of service dos anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected this issue is patched in version as a workaround avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources vulnerabilityurl | 0 |
116,317 | 17,360,134,128 | IssuesEvent | 2021-07-29 19:20:56 | lukebroganws/JS-Demo | https://api.github.com/repos/lukebroganws/JS-Demo | opened | CVE-2018-3728 (High) detected in hoek-0.9.1.tgz, hoek-2.16.3.tgz | security vulnerability | ## CVE-2018-3728 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>hoek-0.9.1.tgz</b>, <b>hoek-2.16.3.tgz</b></p></summary>
<p>
<details><summary><b>hoek-0.9.1.tgz</b></p></summary>
<p>General purpose node utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz">https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz</a></p>
<p>Path to dependency file: JS-Demo/package.json</p>
<p>Path to vulnerable library: JS-Demo/node_modules/zaproxy/node_modules/hoek/package.json</p>
<p>
Dependency Hierarchy:
- zaproxy-0.2.0.tgz (Root Library)
- request-2.36.0.tgz
- hawk-1.0.0.tgz
- :x: **hoek-0.9.1.tgz** (Vulnerable Library)
</details>
<details><summary><b>hoek-2.16.3.tgz</b></p></summary>
<p>General purpose node utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz">https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz</a></p>
<p>Path to dependency file: JS-Demo/package.json</p>
<p>Path to vulnerable library: JS-Demo/node_modules/npm/node_modules/request/node_modules/hawk/node_modules/hoek/package.json,JS-Demo/node_modules/hoek/package.json</p>
<p>
Dependency Hierarchy:
- grunt-retire-0.3.12.tgz (Root Library)
- request-2.67.0.tgz
- hawk-3.1.3.tgz
- :x: **hoek-2.16.3.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/lukebroganws/JS-Demo/commit/ad02c7350709424606f9242b8b5a7eb8a9d174c0">ad02c7350709424606f9242b8b5a7eb8a9d174c0</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via 'merge' and 'applyToDefaults' functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.
<p>Publish Date: 2018-03-30
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728>CVE-2018-3728</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-3728">https://nvd.nist.gov/vuln/detail/CVE-2018-3728</a></p>
<p>Release Date: 2018-03-30</p>
<p>Fix Resolution: 4.2.1,5.0.3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"hoek","packageVersion":"0.9.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"zaproxy:0.2.0;request:2.36.0;hawk:1.0.0;hoek:0.9.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.2.1,5.0.3"},{"packageType":"javascript/Node.js","packageName":"hoek","packageVersion":"2.16.3","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-retire:0.3.12;request:2.67.0;hawk:3.1.3;hoek:2.16.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.2.1,5.0.3"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-3728","vulnerabilityDetails":"hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via \u0027merge\u0027 and \u0027applyToDefaults\u0027 functions, which allows a malicious user to modify the prototype of \"Object\" via __proto__, causing the addition or modification of an existing property that will exist on all objects.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2018-3728 (High) detected in hoek-0.9.1.tgz, hoek-2.16.3.tgz - ## CVE-2018-3728 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>hoek-0.9.1.tgz</b>, <b>hoek-2.16.3.tgz</b></p></summary>
<p>
<details><summary><b>hoek-0.9.1.tgz</b></p></summary>
<p>General purpose node utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz">https://registry.npmjs.org/hoek/-/hoek-0.9.1.tgz</a></p>
<p>Path to dependency file: JS-Demo/package.json</p>
<p>Path to vulnerable library: JS-Demo/node_modules/zaproxy/node_modules/hoek/package.json</p>
<p>
Dependency Hierarchy:
- zaproxy-0.2.0.tgz (Root Library)
- request-2.36.0.tgz
- hawk-1.0.0.tgz
- :x: **hoek-0.9.1.tgz** (Vulnerable Library)
</details>
<details><summary><b>hoek-2.16.3.tgz</b></p></summary>
<p>General purpose node utilities</p>
<p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz">https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz</a></p>
<p>Path to dependency file: JS-Demo/package.json</p>
<p>Path to vulnerable library: JS-Demo/node_modules/npm/node_modules/request/node_modules/hawk/node_modules/hoek/package.json,JS-Demo/node_modules/hoek/package.json</p>
<p>
Dependency Hierarchy:
- grunt-retire-0.3.12.tgz (Root Library)
- request-2.67.0.tgz
- hawk-3.1.3.tgz
- :x: **hoek-2.16.3.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/lukebroganws/JS-Demo/commit/ad02c7350709424606f9242b8b5a7eb8a9d174c0">ad02c7350709424606f9242b8b5a7eb8a9d174c0</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via 'merge' and 'applyToDefaults' functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.
<p>Publish Date: 2018-03-30
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728>CVE-2018-3728</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-3728">https://nvd.nist.gov/vuln/detail/CVE-2018-3728</a></p>
<p>Release Date: 2018-03-30</p>
<p>Fix Resolution: 4.2.1,5.0.3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"hoek","packageVersion":"0.9.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"zaproxy:0.2.0;request:2.36.0;hawk:1.0.0;hoek:0.9.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.2.1,5.0.3"},{"packageType":"javascript/Node.js","packageName":"hoek","packageVersion":"2.16.3","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-retire:0.3.12;request:2.67.0;hawk:3.1.3;hoek:2.16.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.2.1,5.0.3"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-3728","vulnerabilityDetails":"hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via \u0027merge\u0027 and \u0027applyToDefaults\u0027 functions, which allows a malicious user to modify the prototype of \"Object\" via __proto__, causing the addition or modification of an existing property that will exist on all objects.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in hoek tgz hoek tgz cve high severity vulnerability vulnerable libraries hoek tgz hoek tgz hoek tgz general purpose node utilities library home page a href path to dependency file js demo package json path to vulnerable library js demo node modules zaproxy node modules hoek package json dependency hierarchy zaproxy tgz root library request tgz hawk tgz x hoek tgz vulnerable library hoek tgz general purpose node utilities library home page a href path to dependency file js demo package json path to vulnerable library js demo node modules npm node modules request node modules hawk node modules hoek package json js demo node modules hoek package json dependency hierarchy grunt retire tgz root library request tgz hawk tgz x hoek tgz vulnerable library found in head commit a href found in base branch master vulnerability details hoek node module before and x before suffers from a modification of assumed immutable data maid vulnerability via merge and applytodefaults functions which allows a malicious user to modify the prototype of object via proto causing the addition or modification of an existing property that will exist on all objects publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree zaproxy request hawk hoek isminimumfixversionavailable true minimumfixversion packagetype javascript node js packagename hoek packageversion packagefilepaths istransitivedependency true dependencytree grunt retire request hawk hoek isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails hoek node module before and x before suffers from a modification of assumed immutable data maid vulnerability via and functions which allows a malicious user to modify the prototype of object via proto causing the addition or modification of an existing property that will exist on all objects vulnerabilityurl | 0 |
43,762 | 13,038,684,218 | IssuesEvent | 2020-07-28 15:33:54 | elikkatzgit/git_test2 | https://api.github.com/repos/elikkatzgit/git_test2 | opened | CVE-2020-9547 (High) detected in jackson-databind-2.9.8.jar | security vulnerability | ## CVE-2020-9547 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /git_test2/target/myfinal-1.0.0-BUILD-SNAPSHOT/WEB-INF/lib/jackson-databind-2.9.8.jar,canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://api.github.com/repos/elikkatzgit/git_test2/commits/d8d91be6a0d818d938fba51b135f9e02ffc0c1d6">d8d91be6a0d818d938fba51b135f9e02ffc0c1d6</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547>CVE-2020-9547</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.3</p>
</p>
</details>
<p></p>
***
<!-- REMEDIATE-OPEN-PR-START -->
- [ ] Check this box to open an automated fix PR
<!-- REMEDIATE-OPEN-PR-END -->
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.8","isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.10.3"}],"vulnerabilityIdentifier":"CVE-2020-9547","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-9547 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2020-9547 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /git_test2/target/myfinal-1.0.0-BUILD-SNAPSHOT/WEB-INF/lib/jackson-databind-2.9.8.jar,canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://api.github.com/repos/elikkatzgit/git_test2/commits/d8d91be6a0d818d938fba51b135f9e02ffc0c1d6">d8d91be6a0d818d938fba51b135f9e02ffc0c1d6</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547>CVE-2020-9547</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.3</p>
</p>
</details>
<p></p>
***
<!-- REMEDIATE-OPEN-PR-START -->
- [ ] Check this box to open an automated fix PR
<!-- REMEDIATE-OPEN-PR-END -->
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.8","isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.10.3"}],"vulnerabilityIdentifier":"CVE-2020-9547","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library git target myfinal build snapshot web inf lib jackson databind jar canner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com ibatis sqlmap engine transaction jta jtatransactionconfig aka ibatis sqlmap publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind check this box to open an automated fix pr isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com ibatis sqlmap engine transaction jta jtatransactionconfig aka ibatis sqlmap vulnerabilityurl | 0 |
38,259 | 12,532,725,595 | IssuesEvent | 2020-06-04 16:23:22 | RG4421/azure-iot-platform-dotnet | https://api.github.com/repos/RG4421/azure-iot-platform-dotnet | opened | WS-2019-0063 (High) detected in js-yaml-3.7.0.tgz | security vulnerability | ## WS-2019-0063 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>js-yaml-3.7.0.tgz</b></p></summary>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.7.0.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.7.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/azure-iot-platform-dotnet/src/webui/azure-iot-ux-fluent-controls/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/azure-iot-platform-dotnet/src/webui/azure-iot-ux-fluent-controls/node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- sass-lint-1.13.1.tgz (Root Library)
- :x: **js-yaml-3.7.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/RG4421/azure-iot-platform-dotnet/commit/e1215c4c0b54ac624a08bdd584a503ed82b21d0d">e1215c4c0b54ac624a08bdd584a503ed82b21d0d</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.
<p>Publish Date: 2019-04-05
<p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p>
<p>Release Date: 2019-04-05</p>
<p>Fix Resolution: js-yaml - 3.13.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"js-yaml","packageVersion":"3.7.0","isTransitiveDependency":true,"dependencyTree":"sass-lint:1.13.1;js-yaml:3.7.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"js-yaml - 3.13.1"}],"vulnerabilityIdentifier":"WS-2019-0063","vulnerabilityDetails":"Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.","vulnerabilityUrl":"https://github.com/nodeca/js-yaml/pull/480","cvss2Severity":"high","cvss2Score":"8.0","extraData":{}}</REMEDIATE> --> | True | WS-2019-0063 (High) detected in js-yaml-3.7.0.tgz - ## WS-2019-0063 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>js-yaml-3.7.0.tgz</b></p></summary>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.7.0.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.7.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/azure-iot-platform-dotnet/src/webui/azure-iot-ux-fluent-controls/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/azure-iot-platform-dotnet/src/webui/azure-iot-ux-fluent-controls/node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- sass-lint-1.13.1.tgz (Root Library)
- :x: **js-yaml-3.7.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/RG4421/azure-iot-platform-dotnet/commit/e1215c4c0b54ac624a08bdd584a503ed82b21d0d">e1215c4c0b54ac624a08bdd584a503ed82b21d0d</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.
<p>Publish Date: 2019-04-05
<p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p>
<p>Release Date: 2019-04-05</p>
<p>Fix Resolution: js-yaml - 3.13.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"js-yaml","packageVersion":"3.7.0","isTransitiveDependency":true,"dependencyTree":"sass-lint:1.13.1;js-yaml:3.7.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"js-yaml - 3.13.1"}],"vulnerabilityIdentifier":"WS-2019-0063","vulnerabilityDetails":"Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.","vulnerabilityUrl":"https://github.com/nodeca/js-yaml/pull/480","cvss2Severity":"high","cvss2Score":"8.0","extraData":{}}</REMEDIATE> --> | non_priority | ws high detected in js yaml tgz ws high severity vulnerability vulnerable library js yaml tgz yaml parser and serializer library home page a href path to dependency file tmp ws scm azure iot platform dotnet src webui azure iot ux fluent controls package json path to vulnerable library tmp ws scm azure iot platform dotnet src webui azure iot ux fluent controls node modules js yaml package json dependency hierarchy sass lint tgz root library x js yaml tgz vulnerable library found in head commit a href vulnerability details js yaml prior to are vulnerable to code injection the load function may execute arbitrary code injected through a malicious yaml file publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution js yaml isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier ws vulnerabilitydetails js yaml prior to are vulnerable to code injection the load function may execute arbitrary code injected through a malicious yaml file vulnerabilityurl | 0 |
59,168 | 8,345,190,642 | IssuesEvent | 2018-10-01 00:29:25 | nsubstitute/NSubstitute | https://api.github.com/repos/nsubstitute/NSubstitute | closed | Documentation: add `virtual` requirement to Getting Started and readme | documentation good first issue | While looking in to #436 I noticed that the requirement to use `virtual` methods is only in the [Creating a substitute](http://nsubstitute.github.io/help/creating-a-substitute/) help page. It should probably also be in the readme and [Getting Started](https://github.com/nsubstitute/NSubstitute/blob/master/docs/help/_posts/2010-01-01-getting-started.markdown) page. This doesn't have to be as detailed as the "Creating a substitute" info, but I think it should be mentioned (perhaps with a link to "Creating a substitute" for more info).
Note there are pending updates to the "Creating a substitute" page published to the site, see the [source file](https://github.com/nsubstitute/NSubstitute/blob/master/docs/help/_posts/2010-01-02-creating-a-substitute.markdown) for the latest (and 3412b509f2d50da80c4d18e2da524559950c1c55 for the specific changes). | 1.0 | Documentation: add `virtual` requirement to Getting Started and readme - While looking in to #436 I noticed that the requirement to use `virtual` methods is only in the [Creating a substitute](http://nsubstitute.github.io/help/creating-a-substitute/) help page. It should probably also be in the readme and [Getting Started](https://github.com/nsubstitute/NSubstitute/blob/master/docs/help/_posts/2010-01-01-getting-started.markdown) page. This doesn't have to be as detailed as the "Creating a substitute" info, but I think it should be mentioned (perhaps with a link to "Creating a substitute" for more info).
Note there are pending updates to the "Creating a substitute" page published to the site, see the [source file](https://github.com/nsubstitute/NSubstitute/blob/master/docs/help/_posts/2010-01-02-creating-a-substitute.markdown) for the latest (and 3412b509f2d50da80c4d18e2da524559950c1c55 for the specific changes). | non_priority | documentation add virtual requirement to getting started and readme while looking in to i noticed that the requirement to use virtual methods is only in the help page it should probably also be in the readme and page this doesn t have to be as detailed as the creating a substitute info but i think it should be mentioned perhaps with a link to creating a substitute for more info note there are pending updates to the creating a substitute page published to the site see the for the latest and for the specific changes | 0 |
62,833 | 26,177,222,359 | IssuesEvent | 2023-01-02 11:15:53 | microsoft/vscode-cpptools | https://api.github.com/repos/microsoft/vscode-cpptools | closed | BUG : identifier "__null" not defined - Code analysis before compilation (MacOS - Ventura 13.0) | Language Service more info needed Feature: Configuration | ### Environment
- OS and Version: macOS Ventura 13.0
- VS Code Version: 1.72.2
- C/C++ Extension Version: v1.12.4
- Other extensions you installed (and if the issue persists after disabling them):
- If using SSH remote, specify OS of remote machine:
- A clear and concise description of what the bug is, including information about the workspace (i.e. is the workspace a single project or multiple projects, size of the project, etc).
The extension notice that `identifier "__null" not defined` when i initialize my pointer with `NULL`


### Bug Summary and Steps to Reproduce
Bug Summary:
1. Create a file.c
2. Declare and initialize a pointer with `NULL`
3. Notice the error during automatic code analysis.
Steps to reproduce:
1. Declare for example : int * pointer = NULL;
2. See error
### Expected behavior
_No response_
### Code sample and Logs
```shell
#include <stdlib.h>
typedef struct arbre_comp
{
unsigned char symbole; // charactères unicode
unsigned int occurrence; // nombre d'occurences du symbole
unsigned int code_binaire; // code binaire
unsigned int nombre_bits; // nombre de bits
struct arbre_comp *g; // sous-arbre gauche
struct arbre_comp *d; // sous-arbre droit
} Arbre_t;
int main() {
Arbre_t* arbre = malloc(sizeof(*arbre));
arbre->g = NULL;
arbre->d = NULL;
free(arbre);
}
Configurations :
{
"configurations": [
{
"name": "Mac",
"includePath": [
"${default}"
],
"defines": [],
"macFrameworkPath": [],
"compilerPath": "/usr/bin/clang",
"cStandard": "gnu17",
"cppStandard": "gnu++17",
"intelliSenseMode": "macos-clang-arm",
"configurationProvider": "ms-vscode.makefile-tools"
}
],
"version": 4
}
Diagnostics :
[ /Users/axellbr/Documents/L3/Algorithmique Avancée/TP4-Image/arbre.c ]:
Process ID: 53566
Memory Usage: 10 MB
Compiler Path: /usr/bin/gcc
Includes:
/usr/local/include
/Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/MacOSX.sdk/usr/include/c++/v1
/Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/lib/clang/14.0.0/include
/Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/MacOSX.sdk/usr/include
/Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/include
Frameworks:
/Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/MacOSX.sdk/System/Library/Frameworks
Standard Version: c17
IntelliSense Mode: macos-clang-arm64
Other Flags:
--clang
--clang_version=110000
Total Memory Usage: 29 MB
------- Workspace parsing diagnostics -------
Number of files discovered (not excluded): 3314
```
### Screenshots




### Additional context
_No response_ | 1.0 | BUG : identifier "__null" not defined - Code analysis before compilation (MacOS - Ventura 13.0) - ### Environment
- OS and Version: macOS Ventura 13.0
- VS Code Version: 1.72.2
- C/C++ Extension Version: v1.12.4
- Other extensions you installed (and if the issue persists after disabling them):
- If using SSH remote, specify OS of remote machine:
- A clear and concise description of what the bug is, including information about the workspace (i.e. is the workspace a single project or multiple projects, size of the project, etc).
The extension notice that `identifier "__null" not defined` when i initialize my pointer with `NULL`


### Bug Summary and Steps to Reproduce
Bug Summary:
1. Create a file.c
2. Declare and initialize a pointer with `NULL`
3. Notice the error during automatic code analysis.
Steps to reproduce:
1. Declare for example : int * pointer = NULL;
2. See error
### Expected behavior
_No response_
### Code sample and Logs
```shell
#include <stdlib.h>
typedef struct arbre_comp
{
unsigned char symbole; // charactères unicode
unsigned int occurrence; // nombre d'occurences du symbole
unsigned int code_binaire; // code binaire
unsigned int nombre_bits; // nombre de bits
struct arbre_comp *g; // sous-arbre gauche
struct arbre_comp *d; // sous-arbre droit
} Arbre_t;
int main() {
Arbre_t* arbre = malloc(sizeof(*arbre));
arbre->g = NULL;
arbre->d = NULL;
free(arbre);
}
Configurations :
{
"configurations": [
{
"name": "Mac",
"includePath": [
"${default}"
],
"defines": [],
"macFrameworkPath": [],
"compilerPath": "/usr/bin/clang",
"cStandard": "gnu17",
"cppStandard": "gnu++17",
"intelliSenseMode": "macos-clang-arm",
"configurationProvider": "ms-vscode.makefile-tools"
}
],
"version": 4
}
Diagnostics :
[ /Users/axellbr/Documents/L3/Algorithmique Avancée/TP4-Image/arbre.c ]:
Process ID: 53566
Memory Usage: 10 MB
Compiler Path: /usr/bin/gcc
Includes:
/usr/local/include
/Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/MacOSX.sdk/usr/include/c++/v1
/Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/lib/clang/14.0.0/include
/Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/MacOSX.sdk/usr/include
/Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/include
Frameworks:
/Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/MacOSX.sdk/System/Library/Frameworks
Standard Version: c17
IntelliSense Mode: macos-clang-arm64
Other Flags:
--clang
--clang_version=110000
Total Memory Usage: 29 MB
------- Workspace parsing diagnostics -------
Number of files discovered (not excluded): 3314
```
### Screenshots




### Additional context
_No response_ | non_priority | bug identifier null not defined code analysis before compilation macos ventura environment os and version macos ventura vs code version c c extension version other extensions you installed and if the issue persists after disabling them if using ssh remote specify os of remote machine a clear and concise description of what the bug is including information about the workspace i e is the workspace a single project or multiple projects size of the project etc the extension notice that identifier null not defined when i initialize my pointer with null bug summary and steps to reproduce bug summary create a file c declare and initialize a pointer with null notice the error during automatic code analysis steps to reproduce declare for example int pointer null see error expected behavior no response code sample and logs shell include typedef struct arbre comp unsigned char symbole charactères unicode unsigned int occurrence nombre d occurences du symbole unsigned int code binaire code binaire unsigned int nombre bits nombre de bits struct arbre comp g sous arbre gauche struct arbre comp d sous arbre droit arbre t int main arbre t arbre malloc sizeof arbre arbre g null arbre d null free arbre configurations configurations name mac includepath default defines macframeworkpath compilerpath usr bin clang cstandard cppstandard gnu intellisensemode macos clang arm configurationprovider ms vscode makefile tools version diagnostics process id memory usage mb compiler path usr bin gcc includes usr local include applications xcode app contents developer platforms macosx platform developer sdks macosx sdk usr include c applications xcode app contents developer toolchains xcodedefault xctoolchain usr lib clang include applications xcode app contents developer platforms macosx platform developer sdks macosx sdk usr include applications xcode app contents developer toolchains xcodedefault xctoolchain usr include frameworks applications xcode app contents developer platforms macosx platform developer sdks macosx sdk system library frameworks standard version intellisense mode macos clang other flags clang clang version total memory usage mb workspace parsing diagnostics number of files discovered not excluded screenshots additional context no response | 0 |
153,061 | 12,133,228,009 | IssuesEvent | 2020-04-23 08:41:09 | kwk/test-llvm-bz-import-5 | https://api.github.com/repos/kwk/test-llvm-bz-import-5 | opened | NightlyTester should not submit report if error in script occured. | BZ-BUG-STATUS: NEW Test Suite/Nightly Tester dummy import from bugzilla | This issue was imported from Bugzilla https://bugs.llvm.org/show_bug.cgi?id=991. | 2.0 | NightlyTester should not submit report if error in script occured. - This issue was imported from Bugzilla https://bugs.llvm.org/show_bug.cgi?id=991. | non_priority | nightlytester should not submit report if error in script occured this issue was imported from bugzilla | 0 |
149,092 | 23,427,126,671 | IssuesEvent | 2022-08-14 14:59:33 | piro17-Archive/FilmArchive | https://api.github.com/repos/piro17-Archive/FilmArchive | opened | [design] 제작 프레임 공유 | 도윤 design | ### 목적
>
### 작업 상세 내용
- [ ] 글 작성 페이지 글 작성 버튼 cursor:pointer 추가
- [ ] 키워드 reset 버튼 추가
- [ ] 글 작성 페이지 파일 삽입 버튼 css 추가
- [ ] detail page css
### 유의사항
| 1.0 | [design] 제작 프레임 공유 - ### 목적
>
### 작업 상세 내용
- [ ] 글 작성 페이지 글 작성 버튼 cursor:pointer 추가
- [ ] 키워드 reset 버튼 추가
- [ ] 글 작성 페이지 파일 삽입 버튼 css 추가
- [ ] detail page css
### 유의사항
| non_priority | 제작 프레임 공유 목적 작업 상세 내용 글 작성 페이지 글 작성 버튼 cursor pointer 추가 키워드 reset 버튼 추가 글 작성 페이지 파일 삽입 버튼 css 추가 detail page css 유의사항 | 0 |
76,790 | 14,681,455,387 | IssuesEvent | 2020-12-31 13:17:27 | TypeCobolTeam/TypeCobol | https://api.github.com/repos/TypeCobolTeam/TypeCobol | closed | Simplified codegen | Codegen Enhancement Functions User Visible | **Is your feature request related to a problem? Please describe.**
Our current codegen is ok for TypeCobol users, but when a Cobol user need to debug it, it can be hard.
The goal is to provide a simplified codegen which don't use any procedure-pointer.
As we are not sure if we'll use this new codegen.
You can first adapt all the existing codegen without thinking about compatibility with existant codegen.
We'll not merge the branch.
The simplified codegen will be tested by our users. Then we'll decide what to do.
# In the caller
- remove `PERFORM TC-INITIALIZATIONS`
- remove paragraph `TC-INITIALIZATIONS`
- remove paragraphs `TC-LOAD-POINTERS-*`
- remove Variables `TC-Call` and level 88 `TC-FirstCall` / `TC-NthCall`
- remove all variables TC-* in linkage section
- add a new level 01 variable `TypeCobol-Generated` in working-storage section.
This new level 01 will contains declaration of called programs and called procedure.
See the example below.
The order is not important here. So you can change the order of the example if it's easier to generate.
- Call to private procedure remains the same.
- Call to a public procedure now looks like this:
```cobol
CALL 'zcallpgm' using TC-PGM-NAME
PGM-NAME-Fct-ca0ab46c-PROCEDURE-NAME
somedate
end-call
```
where PGM-NAME is the name of the program which contains the public proc
and ProcedureName is the name of the procedure.
# In the callee
- Replace `01 PntTab-Pnt POINTER.` with `01 FunctionCode pic X(30).`
- Linkage now contains generated argument arg1 to argN
- The maximum number of argN is determined by the procedure which takes the maximum argument.
- Argument are declared as pic X (`01 arg1 pic X.`)
- `PERFORM FctList-Process-Mode` must now be just after the line `perform INIT-LIBRARY`
- Paragraph `FctList-Process-Mode` must now contains and evaluate true to call the good procedure. See example below
# Example
Here's an example which use the existing test "ProcedureCall-Public.rdz.tcbl".
The TypeCobol source remains unchanged.
There is still a "TODO" in the example that we need to discuss about.
TypeCobol source
```cobol
IDENTIFICATION DIVISION.
PROGRAM-ID. PGM1.
DATA DIVISION.
Working-STORAGE SECTION.
01 somedate TYPE Date.
01 someformat PIC X(08).
01 flag TYPE Bool.
01 realformat PIC X(08).
01 person1Id pic 9(10).
01 MyPerson type PersonService::Person.
PROCEDURE DIVISION.
declare procedure check private
input mydate TYPE Date
.
PROCEDURE DIVISION.
CONTINUE.
END-DECLARE.
DECLARE PROCEDURE Pgm1PrivateValidateDateFormat PRIVATE
INPUT mydate TYPE Date
format PIC X(08)
alength PIC 9(8) comp-5
anotherlength PIC S9(05) comp-5
OUTPUT okay TYPE Bool
actual-format PIC X(08).
.
PROCEDURE DIVISION.
CONTINUE.
END-DECLARE.
TRAITEMENT.
* __________________________________________________
* OK : proper parameter list (TCRFUN_CALL_PUBLIC_ANY_PGM)
CALL Callee::MyPublicProcedure
INPUT somedate someformat
OUTPUT flag realformat
* OK : proper parameter list (TCRFUN_CALL_PUBLIC_ANY_PGM)
CALL CALLEE::MyPublicProcedure
INPUT somedate someformat
OUTPUT flag realformat
* __________________________________________________
* OK : proper parameter list (TCRFUN_CALL_PRIVATE_ONLY_SAME_PGM)
CALL Pgm1PrivateValidateDateFormat
INPUT somedate
someformat
length of somedate
length of somedate::YYYY
OUTPUT flag realformat
*
call PersonService::GetPersonById input person1Id
output MyPerson
* __________________________________________________
* OK : proper parameter list (TCRFUN_CALL_PRIVATE_ONLY_SAME_PGM)
CALL PGM1::Pgm1PrivateValidateDateFormat
INPUT somedate
someformat
length of someformat
length of MyPerson
OUTPUT flag realformat
*OK call check of PGM1
call check input somedate
*OK
call PGM1::check input somedate
*OK
call Callee::check input somedate
.
END PROGRAM PGM1.
*Callee contains public procedure
IDENTIFICATION DIVISION.
PROGRAM-ID. Callee.
DATA DIVISION.
working-storage section.
01 somedate TYPE Date.
01 someformat PIC X(08).
01 flag TYPE Bool.
01 realformat PIC X(08).
PROCEDURE DIVISION.
declare procedure check public
input mydate TYPE Date
.
PROCEDURE DIVISION.
CONTINUE.
END-DECLARE.
declare procedure check2 public
input mydate TYPE Date
.
PROCEDURE DIVISION.
CONTINUE.
END-DECLARE.
declare procedure check2 public
input mydate TYPE Date
myDate2 type date
.
PROCEDURE DIVISION.
CONTINUE.
END-DECLARE.
DECLARE PROCEDURE MyPublicProcedure PUBLIC
INPUT mydate TYPE Date
format PIC X(08)
OUTPUT okay TYPE Bool
actual-format PIC X(08).
.
PROCEDURE DIVISION.
CONTINUE.
END-DECLARE.
END PROGRAM Callee.
*PersonService contains public procedure
IDENTIFICATION DIVISION.
PROGRAM-ID. PersonService.
DATA DIVISION.
working-storage section.
01 Person TYPEDEF STRICT PUBLIC.
05 PersonId pic 9(10).
05 LastName pic X(30).
88 Empty value space.
05 FirstName pic X(30).
PROCEDURE DIVISION.
declare procedure GetPersonById public
input person1Id pic 9(10)
output person type Person
.
PROCEDURE DIVISION.
CONTINUE.
END-DECLARE.
END PROGRAM PersonService.
```
Expected generated code:
```cobol
IDENTIFICATION DIVISION.
PROGRAM-ID. PGM1.
DATA DIVISION.
Working-STORAGE SECTION.
01 TypeCobol-Generated.
05 TC-Callee pic X(08) value 'CALLEE'.
05 TC-PersonSe pic X(08) value 'PERSONSE'.
05 Callee-Fct-ebb060ea-MyPublicProcedure pic X(30)
value 'Fct=ebb060ea-MyPublicProcedure'.
05 Callee-Fct-ca0ab46c-check pic X(30)
value 'Fct=ca0ab46c-check'.
05 PersonService-Fct-d2b57642-GetPersonById pic X(30)
value 'Fct=d2b57642-GetPersonById'.
*01 somedate TYPE Date.
01 somedate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
01 someformat PIC X(08).
*01 flag TYPE Bool.
01 flag-value PIC X VALUE LOW-VALUE.
88 flag VALUE 'T'.
88 flag-false VALUE 'F'
X'00' thru 'S'
'U' thru X'FF'.
01 realformat PIC X(08).
01 person1Id pic 9(10).
*01 MyPerson type PersonService::Person.
01 MyPerson.
02 PersonId pic 9(10).
02 LastName pic X(30).
88 Empty value space.
02 FirstName pic X(30).
PROCEDURE DIVISION.
*declare procedure check private
* input mydate TYPE Date
* .
*DECLARE PROCEDURE Pgm1PrivateValidateDateFormat PRIVATE
* INPUT mydate TYPE Date
* format PIC X(08)
* alength PIC 9(8) comp-5
* anotherlength PIC S9(05) comp-5
* OUTPUT okay TYPE Bool
* actual-format PIC X(08).
* .
TRAITEMENT.
*
* __________________________________________________
* OK : proper parameter list (TCRFUN_CALL_PUBLIC_ANY_PGM)
* CALL Callee::MyPublicProcedure
* INPUT somedate someformat
* OUTPUT flag realformat
CALL 'zcallpgm' using TC-Callee
Callee-Fct-ebb060ea-MyPublicProcedure
somedate
someformat
by reference flag-value
realformat
end-call
* OK : proper parameter list (TCRFUN_CALL_PUBLIC_ANY_PGM)
* CALL CALLEE::MyPublicProcedure
* INPUT somedate someformat
* OUTPUT flag realformat
CALL 'zcallpgm' using TC-Callee
Callee-Fct-ebb060ea-MyPublicProcedure
somedate
someformat
by reference flag-value
realformat
end-call
* __________________________________________________
* OK : proper parameter list (TCRFUN_CALL_PRIVATE_ONLY_SAME_PGM)
* CALL Pgm1PrivateValidateDateFormat
* INPUT somedate
* someformat
* length of somedate
* length of somedate::YYYY
* OUTPUT flag realformat
CALL 'f3a0a09c' USING
somedate
someformat
length of somedate
length of YYYY IN somedate
by reference flag-value
realformat
end-call
*
* call PersonService::GetPersonById input person1Id
* output MyPerson
CALL 'zcallpgm' using TC-PersonSe
PersonService-Fct-d2b57642-GetPersonById
person1Id
by reference MyPerson
end-call
* __________________________________________________
* OK : proper parameter list (TCRFUN_CALL_PRIVATE_ONLY_SAME_PGM)
* CALL PGM1::Pgm1PrivateValidateDateFormat
* INPUT somedate
* someformat
* length of someformat
* length of MyPerson
* OUTPUT flag realformat
CALL 'f3a0a09c' USING
somedate
someformat
length of someformat
length of MyPerson
by reference flag-value
realformat
end-call
*OK call check of PGM1
* call check input somedate
CALL 'a0508f35' USING
somedate
end-call
*OK
* call PGM1::check input somedate
CALL 'a0508f35' USING
somedate
end-call
*OK
* call Callee::check input somedate
CALL 'zcallpgm' using TC-Callee
Callee-Fct-ca0ab46c-check
somedate
end-call
.
END PROGRAM PGM1.
*Callee contains public procedure
IDENTIFICATION DIVISION.
PROGRAM-ID. Callee.
DATA DIVISION.
working-storage section.
*01 somedate TYPE Date.
01 somedate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
01 someformat PIC X(08).
*01 flag TYPE Bool.
01 flag-value PIC X VALUE LOW-VALUE.
88 flag VALUE 'T'.
88 flag-false VALUE 'F'
X'00' thru 'S'
'U' thru X'FF'.
01 realformat PIC X(08).
01 TC-Generated.
LINKAGE SECTION.
01 TC-FunctionCode pic X(30).
* Function which call program ebb060ea
* Which is generated code for Callee.MyPublicProcedure
88 Fct-ebb060ea-MyPublicProcedure
value 'Fct=ebb060ea-MyPublicProcedure'.
* Function which call program ca0ab46c
* Which is generated code for Callee.check
88 Fct-ca0ab46c-check
value 'Fct=ca0ab46c-check'.
* Function which call call program d0a59141
* Which is generated code for Callee.check2
88 Fct-d0a59141-check2
value 'Fct=d0a59141-check2'.
* Function which call call program e5b741a8
* Which is generated code for Callee.check2
88 Fct-e5b741a8-check2
value 'Fct=e5b741a8-check2'.
01 arg1 pic X.
01 arg2 pic X.
01 arg3 pic X.
01 arg4 pic X.
PROCEDURE DIVISION USING TC-FunctionCode
arg1
arg2
arg3
arg4.
perform INIT-LIBRARY
PERFORM FctList-Process-Mode
GOBACK.
FctList-Process-Mode.
evaluate true
when Fct-ebb060ea-MyPublicProcedure
call 'ebb060ea' using arg1
arg2
arg3
arg4
when Fct-ca0ab46c-check
call 'ca0ab46c' using arg1
when Fct-d0a59141-check2
call 'd0a59141' using arg1
when Fct-e5b741a8-check2
call 'e5b741a8' using arg1
arg2
when other
TODO
end-evaluate
.
*declare procedure check public
* input mydate TYPE Date
* .
*declare procedure check2 public
* input mydate TYPE Date
* .
*declare procedure check2 public
* input mydate TYPE Date
* myDate2 type date
* .
*DECLARE PROCEDURE MyPublicProcedure PUBLIC
* INPUT mydate TYPE Date
* format PIC X(08)
* OUTPUT okay TYPE Bool
* actual-format PIC X(08).
* .
END PROGRAM Callee.
*PersonService contains public procedure
IDENTIFICATION DIVISION.
PROGRAM-ID. PersonService.
DATA DIVISION.
working-storage section.
*01 Person TYPEDEF STRICT PUBLIC.
* 05 PersonId pic 9(10).
* 05 LastName pic X(30).
* 88 Empty value space.
* 05 FirstName pic X(30).
LINKAGE SECTION.
01 TC-FunctionCode pic X(30).
* Function which call program d2b57642
* Which is generated code for PersonService.GetPersonById
88 Fct-d2b57642-GetPersonById
value 'Fct=d2b57642-GetPersonById'.
01 arg1 pic X.
01 arg2 pic X.
PROCEDURE DIVISION USING TC-FunctionCode
arg1
arg2.
perform INIT-LIBRARY
PERFORM FctList-Process-Mode
GOBACK.
FctList-Process-Mode.
evaluate true
when Fct-d2b57642-GetPersonById
call 'd2b57642' using arg1
arg2
when other
TODO
end-evaluate
.
*declare procedure GetPersonById public
* input person1Id pic 9(10)
* output person type Person
* .
END PROGRAM PersonService.
*
*declare procedure check private
* input mydate TYPE Date
* .
*_________________________________________________________________
IDENTIFICATION DIVISION.
PROGRAM-ID. a0508f35.
DATA DIVISION.
LINKAGE SECTION.
*PGM1.check - Params :
* input(mydate: DATE)
01 mydate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
PROCEDURE DIVISION
USING BY REFERENCE mydate
.
*PGM1.check - Params :
* input(mydate: DATE)
CONTINUE.
END PROGRAM a0508f35.
*
*DECLARE PROCEDURE Pgm1PrivateValidateDateFormat PRIVATE
* INPUT mydate TYPE Date
* format PIC X(08)
* alength PIC 9(8) comp-5
* anotherlength PIC S9(05) comp-5
* OUTPUT okay TYPE Bool
* actual-format PIC X(08).
* .
*_________________________________________________________________
IDENTIFICATION DIVISION.
PROGRAM-ID. f3a0a09c.
DATA DIVISION.
LINKAGE SECTION.
*PGM1.Pgm1PrivateValidateDateFormat - Params :
* input(mydate: DATE, format: pic X(08), alength: pic 9(8) com
*p-5, anotherlength: pic S9(05) comp-5)
* output(okay: BOOL, actual-format: pic X(08))
01 mydate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
01 format PIC X(08).
01 alength PIC 9(8) comp-5.
01 anotherlength PIC S9(05) comp-5.
01 okay-value PIC X VALUE LOW-VALUE.
88 okay VALUE 'T'.
88 okay-false VALUE 'F'
X'00' thru 'S'
'U' thru X'FF'.
01 actual-format PIC X(08).
PROCEDURE DIVISION
USING BY REFERENCE mydate
BY REFERENCE format
BY REFERENCE alength
BY REFERENCE anotherlength
BY REFERENCE okay-value
BY REFERENCE actual-format
.
*PGM1.Pgm1PrivateValidateDateFormat - Params :
* input(mydate: DATE, format: pic X(08), alength: pic 9(8) com
*p-5, anotherlength: pic S9(05) comp-5)
* output(okay: BOOL, actual-format: pic X(08))
CONTINUE.
END PROGRAM f3a0a09c.
*
*declare procedure check public
* input mydate TYPE Date
* .
*_________________________________________________________________
IDENTIFICATION DIVISION.
PROGRAM-ID. ca0ab46c.
DATA DIVISION.
LINKAGE SECTION.
*PGM1.check - Params :
* input(mydate: DATE)
01 mydate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
PROCEDURE DIVISION
USING BY REFERENCE mydate
.
*PGM1.check - Params :
* input(mydate: DATE)
CONTINUE.
END PROGRAM ca0ab46c.
*
*declare procedure check2 public
* input mydate TYPE Date
* .
*_________________________________________________________________
IDENTIFICATION DIVISION.
PROGRAM-ID. d0a59141.
DATA DIVISION.
LINKAGE SECTION.
*PGM1.check2 - Params :
* input(mydate: DATE)
01 mydate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
PROCEDURE DIVISION
USING BY REFERENCE mydate
.
*PGM1.check2 - Params :
* input(mydate: DATE)
CONTINUE.
END PROGRAM d0a59141.
*
*declare procedure check2 public
* input mydate TYPE Date
* myDate2 type date
* .
*_________________________________________________________________
IDENTIFICATION DIVISION.
PROGRAM-ID. e5b741a8.
DATA DIVISION.
LINKAGE SECTION.
*PGM1.check2 - Params :
* input(mydate: DATE, myDate2: DATE)
01 mydate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
01 myDate2.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
PROCEDURE DIVISION
USING BY REFERENCE mydate
BY REFERENCE myDate2
.
*PGM1.check2 - Params :
* input(mydate: DATE, myDate2: DATE)
CONTINUE.
END PROGRAM e5b741a8.
*
*DECLARE PROCEDURE MyPublicProcedure PUBLIC
* INPUT mydate TYPE Date
* format PIC X(08)
* OUTPUT okay TYPE Bool
* actual-format PIC X(08).
* .
*_________________________________________________________________
IDENTIFICATION DIVISION.
PROGRAM-ID. ebb060ea.
DATA DIVISION.
LINKAGE SECTION.
*PGM1.MyPublicProcedure - Params :
* input(mydate: DATE, format: pic X(08))
* output(okay: BOOL, actual-format: pic X(08))
01 mydate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
01 format PIC X(08).
01 okay-value PIC X VALUE LOW-VALUE.
88 okay VALUE 'T'.
88 okay-false VALUE 'F'
X'00' thru 'S'
'U' thru X'FF'.
01 actual-format PIC X(08).
PROCEDURE DIVISION
USING BY REFERENCE mydate
BY REFERENCE format
BY REFERENCE okay-value
BY REFERENCE actual-format
.
*PGM1.MyPublicProcedure - Params :
* input(mydate: DATE, format: pic X(08))
* output(okay: BOOL, actual-format: pic X(08))
CONTINUE.
END PROGRAM ebb060ea.
*
*declare procedure GetPersonById public
* input person1Id pic 9(10)
* output person type Person
* .
*_________________________________________________________________
IDENTIFICATION DIVISION.
PROGRAM-ID. d2b57642.
DATA DIVISION.
LINKAGE SECTION.
*PGM1.GetPersonById - Params :
* input(person1Id: pic 9(10))
* output(person: Person)
01 person1Id pic 9(10).
01 person.
02 PersonId pic 9(10).
02 LastName pic X(30).
88 Empty value space.
02 FirstName pic X(30).
PROCEDURE DIVISION
USING BY REFERENCE person1Id
BY REFERENCE person
.
*PGM1.GetPersonById - Params :
* input(person1Id: pic 9(10))
* output(person: Person)
CONTINUE.
END PROGRAM d2b57642.
```
| 1.0 | Simplified codegen - **Is your feature request related to a problem? Please describe.**
Our current codegen is ok for TypeCobol users, but when a Cobol user need to debug it, it can be hard.
The goal is to provide a simplified codegen which don't use any procedure-pointer.
As we are not sure if we'll use this new codegen.
You can first adapt all the existing codegen without thinking about compatibility with existant codegen.
We'll not merge the branch.
The simplified codegen will be tested by our users. Then we'll decide what to do.
# In the caller
- remove `PERFORM TC-INITIALIZATIONS`
- remove paragraph `TC-INITIALIZATIONS`
- remove paragraphs `TC-LOAD-POINTERS-*`
- remove Variables `TC-Call` and level 88 `TC-FirstCall` / `TC-NthCall`
- remove all variables TC-* in linkage section
- add a new level 01 variable `TypeCobol-Generated` in working-storage section.
This new level 01 will contains declaration of called programs and called procedure.
See the example below.
The order is not important here. So you can change the order of the example if it's easier to generate.
- Call to private procedure remains the same.
- Call to a public procedure now looks like this:
```cobol
CALL 'zcallpgm' using TC-PGM-NAME
PGM-NAME-Fct-ca0ab46c-PROCEDURE-NAME
somedate
end-call
```
where PGM-NAME is the name of the program which contains the public proc
and ProcedureName is the name of the procedure.
# In the callee
- Replace `01 PntTab-Pnt POINTER.` with `01 FunctionCode pic X(30).`
- Linkage now contains generated argument arg1 to argN
- The maximum number of argN is determined by the procedure which takes the maximum argument.
- Argument are declared as pic X (`01 arg1 pic X.`)
- `PERFORM FctList-Process-Mode` must now be just after the line `perform INIT-LIBRARY`
- Paragraph `FctList-Process-Mode` must now contains and evaluate true to call the good procedure. See example below
# Example
Here's an example which use the existing test "ProcedureCall-Public.rdz.tcbl".
The TypeCobol source remains unchanged.
There is still a "TODO" in the example that we need to discuss about.
TypeCobol source
```cobol
IDENTIFICATION DIVISION.
PROGRAM-ID. PGM1.
DATA DIVISION.
Working-STORAGE SECTION.
01 somedate TYPE Date.
01 someformat PIC X(08).
01 flag TYPE Bool.
01 realformat PIC X(08).
01 person1Id pic 9(10).
01 MyPerson type PersonService::Person.
PROCEDURE DIVISION.
declare procedure check private
input mydate TYPE Date
.
PROCEDURE DIVISION.
CONTINUE.
END-DECLARE.
DECLARE PROCEDURE Pgm1PrivateValidateDateFormat PRIVATE
INPUT mydate TYPE Date
format PIC X(08)
alength PIC 9(8) comp-5
anotherlength PIC S9(05) comp-5
OUTPUT okay TYPE Bool
actual-format PIC X(08).
.
PROCEDURE DIVISION.
CONTINUE.
END-DECLARE.
TRAITEMENT.
* __________________________________________________
* OK : proper parameter list (TCRFUN_CALL_PUBLIC_ANY_PGM)
CALL Callee::MyPublicProcedure
INPUT somedate someformat
OUTPUT flag realformat
* OK : proper parameter list (TCRFUN_CALL_PUBLIC_ANY_PGM)
CALL CALLEE::MyPublicProcedure
INPUT somedate someformat
OUTPUT flag realformat
* __________________________________________________
* OK : proper parameter list (TCRFUN_CALL_PRIVATE_ONLY_SAME_PGM)
CALL Pgm1PrivateValidateDateFormat
INPUT somedate
someformat
length of somedate
length of somedate::YYYY
OUTPUT flag realformat
*
call PersonService::GetPersonById input person1Id
output MyPerson
* __________________________________________________
* OK : proper parameter list (TCRFUN_CALL_PRIVATE_ONLY_SAME_PGM)
CALL PGM1::Pgm1PrivateValidateDateFormat
INPUT somedate
someformat
length of someformat
length of MyPerson
OUTPUT flag realformat
*OK call check of PGM1
call check input somedate
*OK
call PGM1::check input somedate
*OK
call Callee::check input somedate
.
END PROGRAM PGM1.
*Callee contains public procedure
IDENTIFICATION DIVISION.
PROGRAM-ID. Callee.
DATA DIVISION.
working-storage section.
01 somedate TYPE Date.
01 someformat PIC X(08).
01 flag TYPE Bool.
01 realformat PIC X(08).
PROCEDURE DIVISION.
declare procedure check public
input mydate TYPE Date
.
PROCEDURE DIVISION.
CONTINUE.
END-DECLARE.
declare procedure check2 public
input mydate TYPE Date
.
PROCEDURE DIVISION.
CONTINUE.
END-DECLARE.
declare procedure check2 public
input mydate TYPE Date
myDate2 type date
.
PROCEDURE DIVISION.
CONTINUE.
END-DECLARE.
DECLARE PROCEDURE MyPublicProcedure PUBLIC
INPUT mydate TYPE Date
format PIC X(08)
OUTPUT okay TYPE Bool
actual-format PIC X(08).
.
PROCEDURE DIVISION.
CONTINUE.
END-DECLARE.
END PROGRAM Callee.
*PersonService contains public procedure
IDENTIFICATION DIVISION.
PROGRAM-ID. PersonService.
DATA DIVISION.
working-storage section.
01 Person TYPEDEF STRICT PUBLIC.
05 PersonId pic 9(10).
05 LastName pic X(30).
88 Empty value space.
05 FirstName pic X(30).
PROCEDURE DIVISION.
declare procedure GetPersonById public
input person1Id pic 9(10)
output person type Person
.
PROCEDURE DIVISION.
CONTINUE.
END-DECLARE.
END PROGRAM PersonService.
```
Expected generated code:
```cobol
IDENTIFICATION DIVISION.
PROGRAM-ID. PGM1.
DATA DIVISION.
Working-STORAGE SECTION.
01 TypeCobol-Generated.
05 TC-Callee pic X(08) value 'CALLEE'.
05 TC-PersonSe pic X(08) value 'PERSONSE'.
05 Callee-Fct-ebb060ea-MyPublicProcedure pic X(30)
value 'Fct=ebb060ea-MyPublicProcedure'.
05 Callee-Fct-ca0ab46c-check pic X(30)
value 'Fct=ca0ab46c-check'.
05 PersonService-Fct-d2b57642-GetPersonById pic X(30)
value 'Fct=d2b57642-GetPersonById'.
*01 somedate TYPE Date.
01 somedate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
01 someformat PIC X(08).
*01 flag TYPE Bool.
01 flag-value PIC X VALUE LOW-VALUE.
88 flag VALUE 'T'.
88 flag-false VALUE 'F'
X'00' thru 'S'
'U' thru X'FF'.
01 realformat PIC X(08).
01 person1Id pic 9(10).
*01 MyPerson type PersonService::Person.
01 MyPerson.
02 PersonId pic 9(10).
02 LastName pic X(30).
88 Empty value space.
02 FirstName pic X(30).
PROCEDURE DIVISION.
*declare procedure check private
* input mydate TYPE Date
* .
*DECLARE PROCEDURE Pgm1PrivateValidateDateFormat PRIVATE
* INPUT mydate TYPE Date
* format PIC X(08)
* alength PIC 9(8) comp-5
* anotherlength PIC S9(05) comp-5
* OUTPUT okay TYPE Bool
* actual-format PIC X(08).
* .
TRAITEMENT.
*
* __________________________________________________
* OK : proper parameter list (TCRFUN_CALL_PUBLIC_ANY_PGM)
* CALL Callee::MyPublicProcedure
* INPUT somedate someformat
* OUTPUT flag realformat
CALL 'zcallpgm' using TC-Callee
Callee-Fct-ebb060ea-MyPublicProcedure
somedate
someformat
by reference flag-value
realformat
end-call
* OK : proper parameter list (TCRFUN_CALL_PUBLIC_ANY_PGM)
* CALL CALLEE::MyPublicProcedure
* INPUT somedate someformat
* OUTPUT flag realformat
CALL 'zcallpgm' using TC-Callee
Callee-Fct-ebb060ea-MyPublicProcedure
somedate
someformat
by reference flag-value
realformat
end-call
* __________________________________________________
* OK : proper parameter list (TCRFUN_CALL_PRIVATE_ONLY_SAME_PGM)
* CALL Pgm1PrivateValidateDateFormat
* INPUT somedate
* someformat
* length of somedate
* length of somedate::YYYY
* OUTPUT flag realformat
CALL 'f3a0a09c' USING
somedate
someformat
length of somedate
length of YYYY IN somedate
by reference flag-value
realformat
end-call
*
* call PersonService::GetPersonById input person1Id
* output MyPerson
CALL 'zcallpgm' using TC-PersonSe
PersonService-Fct-d2b57642-GetPersonById
person1Id
by reference MyPerson
end-call
* __________________________________________________
* OK : proper parameter list (TCRFUN_CALL_PRIVATE_ONLY_SAME_PGM)
* CALL PGM1::Pgm1PrivateValidateDateFormat
* INPUT somedate
* someformat
* length of someformat
* length of MyPerson
* OUTPUT flag realformat
CALL 'f3a0a09c' USING
somedate
someformat
length of someformat
length of MyPerson
by reference flag-value
realformat
end-call
*OK call check of PGM1
* call check input somedate
CALL 'a0508f35' USING
somedate
end-call
*OK
* call PGM1::check input somedate
CALL 'a0508f35' USING
somedate
end-call
*OK
* call Callee::check input somedate
CALL 'zcallpgm' using TC-Callee
Callee-Fct-ca0ab46c-check
somedate
end-call
.
END PROGRAM PGM1.
*Callee contains public procedure
IDENTIFICATION DIVISION.
PROGRAM-ID. Callee.
DATA DIVISION.
working-storage section.
*01 somedate TYPE Date.
01 somedate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
01 someformat PIC X(08).
*01 flag TYPE Bool.
01 flag-value PIC X VALUE LOW-VALUE.
88 flag VALUE 'T'.
88 flag-false VALUE 'F'
X'00' thru 'S'
'U' thru X'FF'.
01 realformat PIC X(08).
01 TC-Generated.
LINKAGE SECTION.
01 TC-FunctionCode pic X(30).
* Function which call program ebb060ea
* Which is generated code for Callee.MyPublicProcedure
88 Fct-ebb060ea-MyPublicProcedure
value 'Fct=ebb060ea-MyPublicProcedure'.
* Function which call program ca0ab46c
* Which is generated code for Callee.check
88 Fct-ca0ab46c-check
value 'Fct=ca0ab46c-check'.
* Function which call call program d0a59141
* Which is generated code for Callee.check2
88 Fct-d0a59141-check2
value 'Fct=d0a59141-check2'.
* Function which call call program e5b741a8
* Which is generated code for Callee.check2
88 Fct-e5b741a8-check2
value 'Fct=e5b741a8-check2'.
01 arg1 pic X.
01 arg2 pic X.
01 arg3 pic X.
01 arg4 pic X.
PROCEDURE DIVISION USING TC-FunctionCode
arg1
arg2
arg3
arg4.
perform INIT-LIBRARY
PERFORM FctList-Process-Mode
GOBACK.
FctList-Process-Mode.
evaluate true
when Fct-ebb060ea-MyPublicProcedure
call 'ebb060ea' using arg1
arg2
arg3
arg4
when Fct-ca0ab46c-check
call 'ca0ab46c' using arg1
when Fct-d0a59141-check2
call 'd0a59141' using arg1
when Fct-e5b741a8-check2
call 'e5b741a8' using arg1
arg2
when other
TODO
end-evaluate
.
*declare procedure check public
* input mydate TYPE Date
* .
*declare procedure check2 public
* input mydate TYPE Date
* .
*declare procedure check2 public
* input mydate TYPE Date
* myDate2 type date
* .
*DECLARE PROCEDURE MyPublicProcedure PUBLIC
* INPUT mydate TYPE Date
* format PIC X(08)
* OUTPUT okay TYPE Bool
* actual-format PIC X(08).
* .
END PROGRAM Callee.
*PersonService contains public procedure
IDENTIFICATION DIVISION.
PROGRAM-ID. PersonService.
DATA DIVISION.
working-storage section.
*01 Person TYPEDEF STRICT PUBLIC.
* 05 PersonId pic 9(10).
* 05 LastName pic X(30).
* 88 Empty value space.
* 05 FirstName pic X(30).
LINKAGE SECTION.
01 TC-FunctionCode pic X(30).
* Function which call program d2b57642
* Which is generated code for PersonService.GetPersonById
88 Fct-d2b57642-GetPersonById
value 'Fct=d2b57642-GetPersonById'.
01 arg1 pic X.
01 arg2 pic X.
PROCEDURE DIVISION USING TC-FunctionCode
arg1
arg2.
perform INIT-LIBRARY
PERFORM FctList-Process-Mode
GOBACK.
FctList-Process-Mode.
evaluate true
when Fct-d2b57642-GetPersonById
call 'd2b57642' using arg1
arg2
when other
TODO
end-evaluate
.
*declare procedure GetPersonById public
* input person1Id pic 9(10)
* output person type Person
* .
END PROGRAM PersonService.
*
*declare procedure check private
* input mydate TYPE Date
* .
*_________________________________________________________________
IDENTIFICATION DIVISION.
PROGRAM-ID. a0508f35.
DATA DIVISION.
LINKAGE SECTION.
*PGM1.check - Params :
* input(mydate: DATE)
01 mydate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
PROCEDURE DIVISION
USING BY REFERENCE mydate
.
*PGM1.check - Params :
* input(mydate: DATE)
CONTINUE.
END PROGRAM a0508f35.
*
*DECLARE PROCEDURE Pgm1PrivateValidateDateFormat PRIVATE
* INPUT mydate TYPE Date
* format PIC X(08)
* alength PIC 9(8) comp-5
* anotherlength PIC S9(05) comp-5
* OUTPUT okay TYPE Bool
* actual-format PIC X(08).
* .
*_________________________________________________________________
IDENTIFICATION DIVISION.
PROGRAM-ID. f3a0a09c.
DATA DIVISION.
LINKAGE SECTION.
*PGM1.Pgm1PrivateValidateDateFormat - Params :
* input(mydate: DATE, format: pic X(08), alength: pic 9(8) com
*p-5, anotherlength: pic S9(05) comp-5)
* output(okay: BOOL, actual-format: pic X(08))
01 mydate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
01 format PIC X(08).
01 alength PIC 9(8) comp-5.
01 anotherlength PIC S9(05) comp-5.
01 okay-value PIC X VALUE LOW-VALUE.
88 okay VALUE 'T'.
88 okay-false VALUE 'F'
X'00' thru 'S'
'U' thru X'FF'.
01 actual-format PIC X(08).
PROCEDURE DIVISION
USING BY REFERENCE mydate
BY REFERENCE format
BY REFERENCE alength
BY REFERENCE anotherlength
BY REFERENCE okay-value
BY REFERENCE actual-format
.
*PGM1.Pgm1PrivateValidateDateFormat - Params :
* input(mydate: DATE, format: pic X(08), alength: pic 9(8) com
*p-5, anotherlength: pic S9(05) comp-5)
* output(okay: BOOL, actual-format: pic X(08))
CONTINUE.
END PROGRAM f3a0a09c.
*
*declare procedure check public
* input mydate TYPE Date
* .
*_________________________________________________________________
IDENTIFICATION DIVISION.
PROGRAM-ID. ca0ab46c.
DATA DIVISION.
LINKAGE SECTION.
*PGM1.check - Params :
* input(mydate: DATE)
01 mydate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
PROCEDURE DIVISION
USING BY REFERENCE mydate
.
*PGM1.check - Params :
* input(mydate: DATE)
CONTINUE.
END PROGRAM ca0ab46c.
*
*declare procedure check2 public
* input mydate TYPE Date
* .
*_________________________________________________________________
IDENTIFICATION DIVISION.
PROGRAM-ID. d0a59141.
DATA DIVISION.
LINKAGE SECTION.
*PGM1.check2 - Params :
* input(mydate: DATE)
01 mydate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
PROCEDURE DIVISION
USING BY REFERENCE mydate
.
*PGM1.check2 - Params :
* input(mydate: DATE)
CONTINUE.
END PROGRAM d0a59141.
*
*declare procedure check2 public
* input mydate TYPE Date
* myDate2 type date
* .
*_________________________________________________________________
IDENTIFICATION DIVISION.
PROGRAM-ID. e5b741a8.
DATA DIVISION.
LINKAGE SECTION.
*PGM1.check2 - Params :
* input(mydate: DATE, myDate2: DATE)
01 mydate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
01 myDate2.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
PROCEDURE DIVISION
USING BY REFERENCE mydate
BY REFERENCE myDate2
.
*PGM1.check2 - Params :
* input(mydate: DATE, myDate2: DATE)
CONTINUE.
END PROGRAM e5b741a8.
*
*DECLARE PROCEDURE MyPublicProcedure PUBLIC
* INPUT mydate TYPE Date
* format PIC X(08)
* OUTPUT okay TYPE Bool
* actual-format PIC X(08).
* .
*_________________________________________________________________
IDENTIFICATION DIVISION.
PROGRAM-ID. ebb060ea.
DATA DIVISION.
LINKAGE SECTION.
*PGM1.MyPublicProcedure - Params :
* input(mydate: DATE, format: pic X(08))
* output(okay: BOOL, actual-format: pic X(08))
01 mydate.
02 YYYY PIC 9(4).
02 MM PIC 9(2).
02 DD PIC 9(2).
01 format PIC X(08).
01 okay-value PIC X VALUE LOW-VALUE.
88 okay VALUE 'T'.
88 okay-false VALUE 'F'
X'00' thru 'S'
'U' thru X'FF'.
01 actual-format PIC X(08).
PROCEDURE DIVISION
USING BY REFERENCE mydate
BY REFERENCE format
BY REFERENCE okay-value
BY REFERENCE actual-format
.
*PGM1.MyPublicProcedure - Params :
* input(mydate: DATE, format: pic X(08))
* output(okay: BOOL, actual-format: pic X(08))
CONTINUE.
END PROGRAM ebb060ea.
*
*declare procedure GetPersonById public
* input person1Id pic 9(10)
* output person type Person
* .
*_________________________________________________________________
IDENTIFICATION DIVISION.
PROGRAM-ID. d2b57642.
DATA DIVISION.
LINKAGE SECTION.
*PGM1.GetPersonById - Params :
* input(person1Id: pic 9(10))
* output(person: Person)
01 person1Id pic 9(10).
01 person.
02 PersonId pic 9(10).
02 LastName pic X(30).
88 Empty value space.
02 FirstName pic X(30).
PROCEDURE DIVISION
USING BY REFERENCE person1Id
BY REFERENCE person
.
*PGM1.GetPersonById - Params :
* input(person1Id: pic 9(10))
* output(person: Person)
CONTINUE.
END PROGRAM d2b57642.
```
| non_priority | simplified codegen is your feature request related to a problem please describe our current codegen is ok for typecobol users but when a cobol user need to debug it it can be hard the goal is to provide a simplified codegen which don t use any procedure pointer as we are not sure if we ll use this new codegen you can first adapt all the existing codegen without thinking about compatibility with existant codegen we ll not merge the branch the simplified codegen will be tested by our users then we ll decide what to do in the caller remove perform tc initializations remove paragraph tc initializations remove paragraphs tc load pointers remove variables tc call and level tc firstcall tc nthcall remove all variables tc in linkage section add a new level variable typecobol generated in working storage section this new level will contains declaration of called programs and called procedure see the example below the order is not important here so you can change the order of the example if it s easier to generate call to private procedure remains the same call to a public procedure now looks like this cobol call zcallpgm using tc pgm name pgm name fct procedure name somedate end call where pgm name is the name of the program which contains the public proc and procedurename is the name of the procedure in the callee replace pnttab pnt pointer with functioncode pic x linkage now contains generated argument to argn the maximum number of argn is determined by the procedure which takes the maximum argument argument are declared as pic x pic x perform fctlist process mode must now be just after the line perform init library paragraph fctlist process mode must now contains and evaluate true to call the good procedure see example below example here s an example which use the existing test procedurecall public rdz tcbl the typecobol source remains unchanged there is still a todo in the example that we need to discuss about typecobol source cobol identification division program id data division working storage section somedate type date someformat pic x flag type bool realformat pic x pic myperson type personservice person procedure division declare procedure check private input mydate type date procedure division continue end declare declare procedure private input mydate type date format pic x alength pic comp anotherlength pic comp output okay type bool actual format pic x procedure division continue end declare traitement ok proper parameter list tcrfun call public any pgm call callee mypublicprocedure input somedate someformat output flag realformat ok proper parameter list tcrfun call public any pgm call callee mypublicprocedure input somedate someformat output flag realformat ok proper parameter list tcrfun call private only same pgm call input somedate someformat length of somedate length of somedate yyyy output flag realformat call personservice getpersonbyid input output myperson ok proper parameter list tcrfun call private only same pgm call input somedate someformat length of someformat length of myperson output flag realformat ok call check of call check input somedate ok call check input somedate ok call callee check input somedate end program callee contains public procedure identification division program id callee data division working storage section somedate type date someformat pic x flag type bool realformat pic x procedure division declare procedure check public input mydate type date procedure division continue end declare declare procedure public input mydate type date procedure division continue end declare declare procedure public input mydate type date type date procedure division continue end declare declare procedure mypublicprocedure public input mydate type date format pic x output okay type bool actual format pic x procedure division continue end declare end program callee personservice contains public procedure identification division program id personservice data division working storage section person typedef strict public personid pic lastname pic x empty value space firstname pic x procedure division declare procedure getpersonbyid public input pic output person type person procedure division continue end declare end program personservice expected generated code cobol identification division program id data division working storage section typecobol generated tc callee pic x value callee tc personse pic x value personse callee fct mypublicprocedure pic x value fct mypublicprocedure callee fct check pic x value fct check personservice fct getpersonbyid pic x value fct getpersonbyid somedate type date somedate yyyy pic mm pic dd pic someformat pic x flag type bool flag value pic x value low value flag value t flag false value f x thru s u thru x ff realformat pic x pic myperson type personservice person myperson personid pic lastname pic x empty value space firstname pic x procedure division declare procedure check private input mydate type date declare procedure private input mydate type date format pic x alength pic comp anotherlength pic comp output okay type bool actual format pic x traitement ok proper parameter list tcrfun call public any pgm call callee mypublicprocedure input somedate someformat output flag realformat call zcallpgm using tc callee callee fct mypublicprocedure somedate someformat by reference flag value realformat end call ok proper parameter list tcrfun call public any pgm call callee mypublicprocedure input somedate someformat output flag realformat call zcallpgm using tc callee callee fct mypublicprocedure somedate someformat by reference flag value realformat end call ok proper parameter list tcrfun call private only same pgm call input somedate someformat length of somedate length of somedate yyyy output flag realformat call using somedate someformat length of somedate length of yyyy in somedate by reference flag value realformat end call call personservice getpersonbyid input output myperson call zcallpgm using tc personse personservice fct getpersonbyid by reference myperson end call ok proper parameter list tcrfun call private only same pgm call input somedate someformat length of someformat length of myperson output flag realformat call using somedate someformat length of someformat length of myperson by reference flag value realformat end call ok call check of call check input somedate call using somedate end call ok call check input somedate call using somedate end call ok call callee check input somedate call zcallpgm using tc callee callee fct check somedate end call end program callee contains public procedure identification division program id callee data division working storage section somedate type date somedate yyyy pic mm pic dd pic someformat pic x flag type bool flag value pic x value low value flag value t flag false value f x thru s u thru x ff realformat pic x tc generated linkage section tc functioncode pic x function which call program which is generated code for callee mypublicprocedure fct mypublicprocedure value fct mypublicprocedure function which call program which is generated code for callee check fct check value fct check function which call call program which is generated code for callee fct value fct function which call call program which is generated code for callee fct value fct pic x pic x pic x pic x procedure division using tc functioncode perform init library perform fctlist process mode goback fctlist process mode evaluate true when fct mypublicprocedure call using when fct check call using when fct call using when fct call using when other todo end evaluate declare procedure check public input mydate type date declare procedure public input mydate type date declare procedure public input mydate type date type date declare procedure mypublicprocedure public input mydate type date format pic x output okay type bool actual format pic x end program callee personservice contains public procedure identification division program id personservice data division working storage section person typedef strict public personid pic lastname pic x empty value space firstname pic x linkage section tc functioncode pic x function which call program which is generated code for personservice getpersonbyid fct getpersonbyid value fct getpersonbyid pic x pic x procedure division using tc functioncode perform init library perform fctlist process mode goback fctlist process mode evaluate true when fct getpersonbyid call using when other todo end evaluate declare procedure getpersonbyid public input pic output person type person end program personservice declare procedure check private input mydate type date identification division program id data division linkage section check params input mydate date mydate yyyy pic mm pic dd pic procedure division using by reference mydate check params input mydate date continue end program declare procedure private input mydate type date format pic x alength pic comp anotherlength pic comp output okay type bool actual format pic x identification division program id data division linkage section params input mydate date format pic x alength pic com p anotherlength pic comp output okay bool actual format pic x mydate yyyy pic mm pic dd pic format pic x alength pic comp anotherlength pic comp okay value pic x value low value okay value t okay false value f x thru s u thru x ff actual format pic x procedure division using by reference mydate by reference format by reference alength by reference anotherlength by reference okay value by reference actual format params input mydate date format pic x alength pic com p anotherlength pic comp output okay bool actual format pic x continue end program declare procedure check public input mydate type date identification division program id data division linkage section check params input mydate date mydate yyyy pic mm pic dd pic procedure division using by reference mydate check params input mydate date continue end program declare procedure public input mydate type date identification division program id data division linkage section params input mydate date mydate yyyy pic mm pic dd pic procedure division using by reference mydate params input mydate date continue end program declare procedure public input mydate type date type date identification division program id data division linkage section params input mydate date date mydate yyyy pic mm pic dd pic yyyy pic mm pic dd pic procedure division using by reference mydate by reference params input mydate date date continue end program declare procedure mypublicprocedure public input mydate type date format pic x output okay type bool actual format pic x identification division program id data division linkage section mypublicprocedure params input mydate date format pic x output okay bool actual format pic x mydate yyyy pic mm pic dd pic format pic x okay value pic x value low value okay value t okay false value f x thru s u thru x ff actual format pic x procedure division using by reference mydate by reference format by reference okay value by reference actual format mypublicprocedure params input mydate date format pic x output okay bool actual format pic x continue end program declare procedure getpersonbyid public input pic output person type person identification division program id data division linkage section getpersonbyid params input pic output person person pic person personid pic lastname pic x empty value space firstname pic x procedure division using by reference by reference person getpersonbyid params input pic output person person continue end program | 0 |
42,128 | 10,820,106,744 | IssuesEvent | 2019-11-08 15:43:28 | supertuxkart/stk-code | https://api.github.com/repos/supertuxkart/stk-code | closed | Crashes after removing tracks | C: Other P3: normal R: fixed T: defect | Removing addons track or additional assets (mobile) makes the GP list and replay list incorrect. This can potentially lead to crashes. Instead, the lists should be refreshed when removing a track.
Refreshing after adding a track is also useful, to avoid having to restart STK to get the replay and GP lists containing the new tracks if applicable.
Fixed in https://github.com/supertuxkart/stk-code/commit/8582258cae3f9ab75b470fa0877621b35726380b | 1.0 | Crashes after removing tracks - Removing addons track or additional assets (mobile) makes the GP list and replay list incorrect. This can potentially lead to crashes. Instead, the lists should be refreshed when removing a track.
Refreshing after adding a track is also useful, to avoid having to restart STK to get the replay and GP lists containing the new tracks if applicable.
Fixed in https://github.com/supertuxkart/stk-code/commit/8582258cae3f9ab75b470fa0877621b35726380b | non_priority | crashes after removing tracks removing addons track or additional assets mobile makes the gp list and replay list incorrect this can potentially lead to crashes instead the lists should be refreshed when removing a track refreshing after adding a track is also useful to avoid having to restart stk to get the replay and gp lists containing the new tracks if applicable fixed in | 0 |
121,163 | 15,863,094,326 | IssuesEvent | 2021-04-08 12:25:49 | department-of-veterans-affairs/va.gov-team | https://api.github.com/repos/department-of-veterans-affairs/va.gov-team | opened | Forms-system DirectDeposit bug | needs-grooming triage vsp-design-system-team | ### User story(ies)
`src/platform/forms-system/src/js/definitions/directDeposit.jsx` does not render on the Review page of forms correctly
The error message below is displayed when the chapter with it is opened
```
Uncaught Error: uiSchema order list contains extraneous properties 'view:directDepositInfo', 'view:bankInfoHelpText'
at orderProperties (utils.js?8964:306)
at ObjectField.eval (ObjectField.jsx?2f0d:36)
at ObjectField.eval [as orderAndFilterProperties] (_createFlow.js?3414:68)
at ObjectField.render (ObjectField.jsx?2f0d:102)
at finishClassComponent (react-dom.development.js?61bb:17160)
at updateClassComponent (react-dom.development.js?61bb:17110)
at beginWork (react-dom.development.js?61bb:18620)
at HTMLUnknownElement.callCallback (react-dom.development.js?61bb:188)
at Object.invokeGuardedCallbackDev (react-dom.development.js?61bb:237)
at invokeGuardedCallback (react-dom.development.js?61bb:292)
```
### Additional details/notes/links
- pull https://github.com/department-of-veterans-affairs/vets-website/pull/16658
- go to http://localhost:3001/education/other-va-education-benefits/stem-scholarship/apply-for-scholarship-form-22-10203/review-and-submit
- open the accordion "Personal Information"
- notice in browser console logs the above error message appears
### Acceptance criteria
_What must be true in order for this to be complete?_
### Point(s) of contact
_Who should be kept INFORMED of the status of this request? Please tag them here._
### What type of issue is this?
- [ ] Bug
- [ ] Request new feature
- [ ] Request update to existing feature
- [ ] Documentation change
- [ ] Other (please describe)
### How to configure this issue
- [ ] When ticket is opened, assign to Epic [#12765 Forms library user feedback and requests to be triaged](https://app.zenhub.com/workspaces/vsp-5cedc9cce6e3335dc5a49fc4/issues/department-of-veterans-affairs/va.gov-team/12765)
- [ ] FE Tools team will triage and add to [Design System Governance Process Project Board](https://github.com/department-of-veterans-affairs/vets-design-system-documentation/projects/3) as applicable
| 1.0 | Forms-system DirectDeposit bug - ### User story(ies)
`src/platform/forms-system/src/js/definitions/directDeposit.jsx` does not render on the Review page of forms correctly
The error message below is displayed when the chapter with it is opened
```
Uncaught Error: uiSchema order list contains extraneous properties 'view:directDepositInfo', 'view:bankInfoHelpText'
at orderProperties (utils.js?8964:306)
at ObjectField.eval (ObjectField.jsx?2f0d:36)
at ObjectField.eval [as orderAndFilterProperties] (_createFlow.js?3414:68)
at ObjectField.render (ObjectField.jsx?2f0d:102)
at finishClassComponent (react-dom.development.js?61bb:17160)
at updateClassComponent (react-dom.development.js?61bb:17110)
at beginWork (react-dom.development.js?61bb:18620)
at HTMLUnknownElement.callCallback (react-dom.development.js?61bb:188)
at Object.invokeGuardedCallbackDev (react-dom.development.js?61bb:237)
at invokeGuardedCallback (react-dom.development.js?61bb:292)
```
### Additional details/notes/links
- pull https://github.com/department-of-veterans-affairs/vets-website/pull/16658
- go to http://localhost:3001/education/other-va-education-benefits/stem-scholarship/apply-for-scholarship-form-22-10203/review-and-submit
- open the accordion "Personal Information"
- notice in browser console logs the above error message appears
### Acceptance criteria
_What must be true in order for this to be complete?_
### Point(s) of contact
_Who should be kept INFORMED of the status of this request? Please tag them here._
### What type of issue is this?
- [ ] Bug
- [ ] Request new feature
- [ ] Request update to existing feature
- [ ] Documentation change
- [ ] Other (please describe)
### How to configure this issue
- [ ] When ticket is opened, assign to Epic [#12765 Forms library user feedback and requests to be triaged](https://app.zenhub.com/workspaces/vsp-5cedc9cce6e3335dc5a49fc4/issues/department-of-veterans-affairs/va.gov-team/12765)
- [ ] FE Tools team will triage and add to [Design System Governance Process Project Board](https://github.com/department-of-veterans-affairs/vets-design-system-documentation/projects/3) as applicable
| non_priority | forms system directdeposit bug user story ies src platform forms system src js definitions directdeposit jsx does not render on the review page of forms correctly the error message below is displayed when the chapter with it is opened uncaught error uischema order list contains extraneous properties view directdepositinfo view bankinfohelptext at orderproperties utils js at objectfield eval objectfield jsx at objectfield eval createflow js at objectfield render objectfield jsx at finishclasscomponent react dom development js at updateclasscomponent react dom development js at beginwork react dom development js at htmlunknownelement callcallback react dom development js at object invokeguardedcallbackdev react dom development js at invokeguardedcallback react dom development js additional details notes links pull go to open the accordion personal information notice in browser console logs the above error message appears acceptance criteria what must be true in order for this to be complete point s of contact who should be kept informed of the status of this request please tag them here what type of issue is this bug request new feature request update to existing feature documentation change other please describe how to configure this issue when ticket is opened assign to epic fe tools team will triage and add to as applicable | 0 |
29,758 | 13,166,818,597 | IssuesEvent | 2020-08-11 09:12:13 | elastic/beats | https://api.github.com/repos/elastic/beats | opened | Add support for multipath devices monitoring in Metricbeat | Metricbeat Team:Services [zube]: Inbox enhancement | **Describe the enhancement:**
Current metricsets for disk and filesystem monitoring don't take into account the use of multipath. It could be useful to take it into account when collecting disk metrics.
Some options to support multipath could be:
* When collecting metrics from devices belonging to some multipath, add some field with the multipath they belong to.
* Collect metrics grouped per multipath when multipath is used.
* Gather specific metrics if they have.
**Describe a specific use case for the enhancement or feature:**
When using multipath, multiple devices may form a single device. An example can be a network filesystem that is accessed through two different network paths for high availability.
On these cases, users may be more interested on the metrics of the single multipath device and not so much in the metrics of the underlying component devices. | 1.0 | Add support for multipath devices monitoring in Metricbeat - **Describe the enhancement:**
Current metricsets for disk and filesystem monitoring don't take into account the use of multipath. It could be useful to take it into account when collecting disk metrics.
Some options to support multipath could be:
* When collecting metrics from devices belonging to some multipath, add some field with the multipath they belong to.
* Collect metrics grouped per multipath when multipath is used.
* Gather specific metrics if they have.
**Describe a specific use case for the enhancement or feature:**
When using multipath, multiple devices may form a single device. An example can be a network filesystem that is accessed through two different network paths for high availability.
On these cases, users may be more interested on the metrics of the single multipath device and not so much in the metrics of the underlying component devices. | non_priority | add support for multipath devices monitoring in metricbeat describe the enhancement current metricsets for disk and filesystem monitoring don t take into account the use of multipath it could be useful to take it into account when collecting disk metrics some options to support multipath could be when collecting metrics from devices belonging to some multipath add some field with the multipath they belong to collect metrics grouped per multipath when multipath is used gather specific metrics if they have describe a specific use case for the enhancement or feature when using multipath multiple devices may form a single device an example can be a network filesystem that is accessed through two different network paths for high availability on these cases users may be more interested on the metrics of the single multipath device and not so much in the metrics of the underlying component devices | 0 |
15,407 | 9,548,264,961 | IssuesEvent | 2019-05-02 04:15:02 | MindLeaps/tracker | https://api.github.com/repos/MindLeaps/tracker | opened | Scope grades by policy | enhancement security | Currently, the API for Grades returns grades across all organizations, regardless of the user requesting them. We should scope grades by organization, unless the user is a global user. | True | Scope grades by policy - Currently, the API for Grades returns grades across all organizations, regardless of the user requesting them. We should scope grades by organization, unless the user is a global user. | non_priority | scope grades by policy currently the api for grades returns grades across all organizations regardless of the user requesting them we should scope grades by organization unless the user is a global user | 0 |
27,682 | 30,191,740,149 | IssuesEvent | 2023-07-04 15:58:14 | informalsystems/quint | https://api.github.com/repos/informalsystems/quint | closed | Recursion check in operator definitions | Ftypecheck (phase 4) usability impact-medium effort-easy | As recursion is not allowed, we should detect recursion in operator and lambda definitions to report them as unsupported. This should be a simple occurs check of the operator's name in its body. | True | Recursion check in operator definitions - As recursion is not allowed, we should detect recursion in operator and lambda definitions to report them as unsupported. This should be a simple occurs check of the operator's name in its body. | non_priority | recursion check in operator definitions as recursion is not allowed we should detect recursion in operator and lambda definitions to report them as unsupported this should be a simple occurs check of the operator s name in its body | 0 |
258,334 | 19,557,359,186 | IssuesEvent | 2022-01-03 11:32:16 | oracle/truffleruby | https://api.github.com/repos/oracle/truffleruby | closed | [Minor problem] Slightly peculiar message when re-compiling openssl | documentation | So I am installing graalvm right now. Well actually truffleruby, but from the context of graalvm so I had
to install the latter first.
truffleruby shows this:
"IMPORTANT NOTE:
---------------
The Ruby openssl C extension needs to be recompiled on your system to work with the installed libssl.
First, make sure TruffleRuby's dependencies are installed, which are described at:
https://github.com/oracle/truffleruby/blob/master/README.md#dependencies
Then run the following command:
/home/Programs/Graalvm/21.3.0/languages/ruby/lib/truffle/post_install_hook.sh
"
Ok, so I understand I have to compile openssl.
I run the command and things seem to work:
[...]
"compiling ossl_x509revoked.c
compiling ossl_x509store.c
linking shared-object openssl.so
TruffleRuby was successfully installed in /home/Programs/Graalvm/21.3.0/languages/ruby"
The thing that confuses me is the last sentence:
"TruffleRuby was successfully installed in /home/Programs/Graalvm/21.3.0/languages/ruby"
I believe, technically, that sentence is not correct, because it would imply that the PRIOR
installation of truffleruby would not work. But I think it works. What I did above was merely
get graalvm to compile the openssl bindings, yes? So I think the sentence should indicate
this, perhaps via "Openssl bindings were successfully installed", rather than the
"TruffleRuby was successfully installed". I am not sure if I am able to explain my confusion,
but I was using the above command to compile openssl, so I am not sure why I then get
the message "TruffleRuby was successfully installed" - that would mean that it was not
installed PRIOR to that which seems... incorrect. So the sentence should be re-worded
a bit. Is a tiny issue but tiny issues are easy to change, so ... :)
| 1.0 | [Minor problem] Slightly peculiar message when re-compiling openssl - So I am installing graalvm right now. Well actually truffleruby, but from the context of graalvm so I had
to install the latter first.
truffleruby shows this:
"IMPORTANT NOTE:
---------------
The Ruby openssl C extension needs to be recompiled on your system to work with the installed libssl.
First, make sure TruffleRuby's dependencies are installed, which are described at:
https://github.com/oracle/truffleruby/blob/master/README.md#dependencies
Then run the following command:
/home/Programs/Graalvm/21.3.0/languages/ruby/lib/truffle/post_install_hook.sh
"
Ok, so I understand I have to compile openssl.
I run the command and things seem to work:
[...]
"compiling ossl_x509revoked.c
compiling ossl_x509store.c
linking shared-object openssl.so
TruffleRuby was successfully installed in /home/Programs/Graalvm/21.3.0/languages/ruby"
The thing that confuses me is the last sentence:
"TruffleRuby was successfully installed in /home/Programs/Graalvm/21.3.0/languages/ruby"
I believe, technically, that sentence is not correct, because it would imply that the PRIOR
installation of truffleruby would not work. But I think it works. What I did above was merely
get graalvm to compile the openssl bindings, yes? So I think the sentence should indicate
this, perhaps via "Openssl bindings were successfully installed", rather than the
"TruffleRuby was successfully installed". I am not sure if I am able to explain my confusion,
but I was using the above command to compile openssl, so I am not sure why I then get
the message "TruffleRuby was successfully installed" - that would mean that it was not
installed PRIOR to that which seems... incorrect. So the sentence should be re-worded
a bit. Is a tiny issue but tiny issues are easy to change, so ... :)
| non_priority | slightly peculiar message when re compiling openssl so i am installing graalvm right now well actually truffleruby but from the context of graalvm so i had to install the latter first truffleruby shows this important note the ruby openssl c extension needs to be recompiled on your system to work with the installed libssl first make sure truffleruby s dependencies are installed which are described at then run the following command home programs graalvm languages ruby lib truffle post install hook sh ok so i understand i have to compile openssl i run the command and things seem to work compiling ossl c compiling ossl c linking shared object openssl so truffleruby was successfully installed in home programs graalvm languages ruby the thing that confuses me is the last sentence truffleruby was successfully installed in home programs graalvm languages ruby i believe technically that sentence is not correct because it would imply that the prior installation of truffleruby would not work but i think it works what i did above was merely get graalvm to compile the openssl bindings yes so i think the sentence should indicate this perhaps via openssl bindings were successfully installed rather than the truffleruby was successfully installed i am not sure if i am able to explain my confusion but i was using the above command to compile openssl so i am not sure why i then get the message truffleruby was successfully installed that would mean that it was not installed prior to that which seems incorrect so the sentence should be re worded a bit is a tiny issue but tiny issues are easy to change so | 0 |
337,112 | 24,527,528,428 | IssuesEvent | 2022-10-11 14:08:04 | localstack/docs | https://api.github.com/repos/localstack/docs | closed | AWS Organizations | documentation new-content hacktoberfest | The feature seems to be supported (basically just delegated to moto) but isn't mentioned on our feature coverage page, nor does there exist a service page for it. | 1.0 | AWS Organizations - The feature seems to be supported (basically just delegated to moto) but isn't mentioned on our feature coverage page, nor does there exist a service page for it. | non_priority | aws organizations the feature seems to be supported basically just delegated to moto but isn t mentioned on our feature coverage page nor does there exist a service page for it | 0 |
16,259 | 5,233,358,041 | IssuesEvent | 2017-01-30 12:39:08 | SemsProject/BiVeS-Core | https://api.github.com/repos/SemsProject/BiVeS-Core | closed | update logger dependencies | code fixed migrated minor task | ## Trac Ticket #26
**component:** code
**owner:** martin
**reporter:** martin
**created:** 2014-02-10 17:39:59
**milestone:**
**type:** task
**version:**
**keywords:**
logger is now 1.3.2 providing some new features
## comment 1
**time:** 2014-02-18 21:17:12
**author:** Martin Scharm <martin@binfalse.de>
In [None](/33f5a567f780cea139a6707b5f0b4d658fecf946):
```CommitTicketReference repository="" revision="33f5a567f780cea139a6707b5f0b4d658fecf946"
more comments, used new feat of logger [see #3] [fixes #26]
```
## comment 2
**time:** 2014-02-18 21:17:12
**author:** Martin Scharm <martin@binfalse.de>
Updated **resolution** to **fixed**
## comment 3
**time:** 2014-02-18 21:17:12
**author:** Martin Scharm <martin@binfalse.de>
Updated **status** to **closed**
| 1.0 | update logger dependencies - ## Trac Ticket #26
**component:** code
**owner:** martin
**reporter:** martin
**created:** 2014-02-10 17:39:59
**milestone:**
**type:** task
**version:**
**keywords:**
logger is now 1.3.2 providing some new features
## comment 1
**time:** 2014-02-18 21:17:12
**author:** Martin Scharm <martin@binfalse.de>
In [None](/33f5a567f780cea139a6707b5f0b4d658fecf946):
```CommitTicketReference repository="" revision="33f5a567f780cea139a6707b5f0b4d658fecf946"
more comments, used new feat of logger [see #3] [fixes #26]
```
## comment 2
**time:** 2014-02-18 21:17:12
**author:** Martin Scharm <martin@binfalse.de>
Updated **resolution** to **fixed**
## comment 3
**time:** 2014-02-18 21:17:12
**author:** Martin Scharm <martin@binfalse.de>
Updated **status** to **closed**
| non_priority | update logger dependencies trac ticket component code owner martin reporter martin created milestone type task version keywords logger is now providing some new features comment time author martin scharm in committicketreference repository revision more comments used new feat of logger comment time author martin scharm updated resolution to fixed comment time author martin scharm updated status to closed | 0 |
88,811 | 8,178,454,933 | IssuesEvent | 2018-08-28 13:52:51 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | closed | roachtest: jepsen/2/monotonic/split failed on master | C-test-failure O-robot | SHA: https://github.com/cockroachdb/cockroach/commits/a6e5d24201c45b49415d95be9b04d9d0a523e44c
Parameters:
To repro, try:
```
# Don't forget to check out a clean suitable branch and experiment with the
# stress invocation until the desired results present themselves. For example,
# using stressrace instead of stress and passing the '-p' stressflag which
# controls concurrency.
./scripts/gceworker.sh start && ./scripts/gceworker.sh mosh
cd ~/go/src/github.com/cockroachdb/cockroach && \
make stress TESTS=jepsen/2/monotonic/split PKG=roachtest TESTTIMEOUT=5m STRESSFLAGS='-stderr=false -maxtime 20m -timeout 10m'
```
Failed test: https://teamcity.cockroachdb.com/viewLog.html?buildId=859524&tab=buildLog
```
test.go:494,cluster.go:822,jepsen.go:145,jepsen.go:168,jepsen.go:285: /home/agent/work/.go/bin/roachprod run teamcity-859524-jepsen-2:6 -- bash -e -c "cd /mnt/data1/jepsen/jepsen && ~/lein install": exit status 1
``` | 1.0 | roachtest: jepsen/2/monotonic/split failed on master - SHA: https://github.com/cockroachdb/cockroach/commits/a6e5d24201c45b49415d95be9b04d9d0a523e44c
Parameters:
To repro, try:
```
# Don't forget to check out a clean suitable branch and experiment with the
# stress invocation until the desired results present themselves. For example,
# using stressrace instead of stress and passing the '-p' stressflag which
# controls concurrency.
./scripts/gceworker.sh start && ./scripts/gceworker.sh mosh
cd ~/go/src/github.com/cockroachdb/cockroach && \
make stress TESTS=jepsen/2/monotonic/split PKG=roachtest TESTTIMEOUT=5m STRESSFLAGS='-stderr=false -maxtime 20m -timeout 10m'
```
Failed test: https://teamcity.cockroachdb.com/viewLog.html?buildId=859524&tab=buildLog
```
test.go:494,cluster.go:822,jepsen.go:145,jepsen.go:168,jepsen.go:285: /home/agent/work/.go/bin/roachprod run teamcity-859524-jepsen-2:6 -- bash -e -c "cd /mnt/data1/jepsen/jepsen && ~/lein install": exit status 1
``` | non_priority | roachtest jepsen monotonic split failed on master sha parameters to repro try don t forget to check out a clean suitable branch and experiment with the stress invocation until the desired results present themselves for example using stressrace instead of stress and passing the p stressflag which controls concurrency scripts gceworker sh start scripts gceworker sh mosh cd go src github com cockroachdb cockroach make stress tests jepsen monotonic split pkg roachtest testtimeout stressflags stderr false maxtime timeout failed test test go cluster go jepsen go jepsen go jepsen go home agent work go bin roachprod run teamcity jepsen bash e c cd mnt jepsen jepsen lein install exit status | 0 |
290,435 | 21,878,516,288 | IssuesEvent | 2022-05-19 12:29:09 | ryryrymyg/kaggle_ell | https://api.github.com/repos/ryryrymyg/kaggle_ell | closed | 📝 NBME - Score Clinical Patient Notes 概要 | documentation | # コンペ概要
- USMLE® Step 2 Clinical Skills examination(臨床技能試験)の受験生メモと採点用ルーブリックの対応付コンペ。
- 臨床技能試験では、標準化された患者(特定の臨床例を描写するよう訓練された人々)に対して、受験者がヒアリング・メモを記入→ 受験者のメモを医者がルーブリックに従って採点する。この採点がめっちゃ時間かかる。
- このコンペでは、試験のルーブリックにある臨床概念(例:「食欲不振」)と、医学生が書いた臨床患者のメモにある様々な表現方法(例:「食事量が少ない」「服がゆったりしている」)を対応付ける自動化手法を開発する。
- メモのテキストをインプットとし、ルーブリックの採点項目に該当する箇所を特定する。
- NBME: 米国医師会が主催。
# 専門用語
## Clinical Case
患者が受験者(医学生、研修医、または医師)に提示するシナリオ(症状、苦情、懸念など)。今回のコンペでは10ケースのClinical Caseがデータとして与えられている。
## Patient Note
遭遇中の患者に関連する重要な情報を詳述するテキスト(身体検査および面接など)。
## Feature
臨床的に関連する概念。ルーブリックは、各ケースに関連する主要な概念を説明している。
# 評価指標
[micro-averaged-F1 score](https://qiita.com/TaskeHAMANO/items/120cabf01b299b8f35ce)
# 提供データ
## patient_notes.csv
- 40,000の患者メモ履歴部分のコレクション
- これらのサブセットのみに注釈付きの機能がある
- 注釈のないメモには教師なし学習手法を適用するのがお勧め
- テストセットの患者メモは、このファイルの公開バージョンには含まれていない
- pn_num: 各患者メモの一意の識別子(どのメモか)
- case_num: 患者のメモが表す臨床症例の一意の識別子(どのClinical Caseか)
- pn_history: 受験者が記録したメモのテキスト
## features.csv
- 各臨床症例の特徴(または重要な概念)のルーブリック
- feature_num: 臨床症例の特徴の識別子(どの臨床例の特徴か)
- case_num: 患者のメモが表す臨床症例の一意の識別子(どのClinical Caseか)
- feature_text: 臨床症例の特徴の説明
## train.csv
- 10症例につき100件ずつ、計1000件の患者メモのフィーチャーアノテーションデータ(学習用データ)
- id: 各患者ノート/フィーチャーのペアの一意な識別子。
- pn_num: 各患者メモの一意の識別子(どのメモか)
- feature_num: 臨床症例の特徴の識別子(どの臨床例の特徴か)
- case_num: 患者のメモが表す臨床症例の一意の識別子(どのClinical Caseか)
- annotation: 患者メモに記載された特徴を示すテキスト(複数可)。1つのメモに複数回記載されることもある
- location: ノート内の各注釈の位置を示す文字スパン。注釈を表現するために複数のスパンが必要な場合があるが、その場合はセミコロンで区切られる
## test.csv
- トレーニングセットから選択されたインスタンスの例(テスト用データ)
## sample_submission.csv
- submissionのサンプル
# その他
- Time Line: 2022年05月04日(金) 08:59 (JST)
- final submit上限: 2個
| 1.0 | 📝 NBME - Score Clinical Patient Notes 概要 - # コンペ概要
- USMLE® Step 2 Clinical Skills examination(臨床技能試験)の受験生メモと採点用ルーブリックの対応付コンペ。
- 臨床技能試験では、標準化された患者(特定の臨床例を描写するよう訓練された人々)に対して、受験者がヒアリング・メモを記入→ 受験者のメモを医者がルーブリックに従って採点する。この採点がめっちゃ時間かかる。
- このコンペでは、試験のルーブリックにある臨床概念(例:「食欲不振」)と、医学生が書いた臨床患者のメモにある様々な表現方法(例:「食事量が少ない」「服がゆったりしている」)を対応付ける自動化手法を開発する。
- メモのテキストをインプットとし、ルーブリックの採点項目に該当する箇所を特定する。
- NBME: 米国医師会が主催。
# 専門用語
## Clinical Case
患者が受験者(医学生、研修医、または医師)に提示するシナリオ(症状、苦情、懸念など)。今回のコンペでは10ケースのClinical Caseがデータとして与えられている。
## Patient Note
遭遇中の患者に関連する重要な情報を詳述するテキスト(身体検査および面接など)。
## Feature
臨床的に関連する概念。ルーブリックは、各ケースに関連する主要な概念を説明している。
# 評価指標
[micro-averaged-F1 score](https://qiita.com/TaskeHAMANO/items/120cabf01b299b8f35ce)
# 提供データ
## patient_notes.csv
- 40,000の患者メモ履歴部分のコレクション
- これらのサブセットのみに注釈付きの機能がある
- 注釈のないメモには教師なし学習手法を適用するのがお勧め
- テストセットの患者メモは、このファイルの公開バージョンには含まれていない
- pn_num: 各患者メモの一意の識別子(どのメモか)
- case_num: 患者のメモが表す臨床症例の一意の識別子(どのClinical Caseか)
- pn_history: 受験者が記録したメモのテキスト
## features.csv
- 各臨床症例の特徴(または重要な概念)のルーブリック
- feature_num: 臨床症例の特徴の識別子(どの臨床例の特徴か)
- case_num: 患者のメモが表す臨床症例の一意の識別子(どのClinical Caseか)
- feature_text: 臨床症例の特徴の説明
## train.csv
- 10症例につき100件ずつ、計1000件の患者メモのフィーチャーアノテーションデータ(学習用データ)
- id: 各患者ノート/フィーチャーのペアの一意な識別子。
- pn_num: 各患者メモの一意の識別子(どのメモか)
- feature_num: 臨床症例の特徴の識別子(どの臨床例の特徴か)
- case_num: 患者のメモが表す臨床症例の一意の識別子(どのClinical Caseか)
- annotation: 患者メモに記載された特徴を示すテキスト(複数可)。1つのメモに複数回記載されることもある
- location: ノート内の各注釈の位置を示す文字スパン。注釈を表現するために複数のスパンが必要な場合があるが、その場合はセミコロンで区切られる
## test.csv
- トレーニングセットから選択されたインスタンスの例(テスト用データ)
## sample_submission.csv
- submissionのサンプル
# その他
- Time Line: 2022年05月04日(金) 08:59 (JST)
- final submit上限: 2個
| non_priority | 📝 nbme score clinical patient notes 概要 コンペ概要 usmle® step clinical skills examination 臨床技能試験 の受験生メモと採点用ルーブリックの対応付コンペ。 臨床技能試験では、標準化された患者 特定の臨床例を描写するよう訓練された人々 に対して、受験者がヒアリング・メモを記入→ 受験者のメモを医者がルーブリックに従って採点する。この採点がめっちゃ時間かかる。 このコンペでは、試験のルーブリックにある臨床概念 例:「食欲不振」 と、医学生が書いた臨床患者のメモにある様々な表現方法 例:「食事量が少ない」「服がゆったりしている」 を対応付ける自動化手法を開発する。 メモのテキストをインプットとし、ルーブリックの採点項目に該当する箇所を特定する。 nbme 米国医師会が主催。 専門用語 clinical case 患者が受験者(医学生、研修医、または医師)に提示するシナリオ(症状、苦情、懸念など)。 caseがデータとして与えられている。 patient note 遭遇中の患者に関連する重要な情報を詳述するテキスト(身体検査および面接など)。 feature 臨床的に関連する概念。ルーブリックは、各ケースに関連する主要な概念を説明している。 評価指標 提供データ patient notes csv これらのサブセットのみに注釈付きの機能がある 注釈のないメモには教師なし学習手法を適用するのがお勧め テストセットの患者メモは、このファイルの公開バージョンには含まれていない pn num 各患者メモの一意の識別子 どのメモか case num 患者のメモが表す臨床症例の一意の識別子 どのclinical caseか pn history 受験者が記録したメモのテキスト features csv 各臨床症例の特徴(または重要な概念)のルーブリック feature num 臨床症例の特徴の識別子 どの臨床例の特徴か case num 患者のメモが表す臨床症例の一意の識別子 どのclinical caseか feature text 臨床症例の特徴の説明 train csv 、 学習用データ id 各患者ノート フィーチャーのペアの一意な識別子。 pn num 各患者メモの一意の識別子 どのメモか feature num 臨床症例の特徴の識別子 どの臨床例の特徴か case num 患者のメモが表す臨床症例の一意の識別子 どのclinical caseか annotation 患者メモに記載された特徴を示すテキスト(複数可)。 location ノート内の各注釈の位置を示す文字スパン。注釈を表現するために複数のスパンが必要な場合があるが、その場合はセミコロンで区切られる test csv トレーニングセットから選択されたインスタンスの例 テスト用データ sample submission csv submissionのサンプル その他 time line 金 jst final submit上限 | 0 |
3,321 | 2,667,279,637 | IssuesEvent | 2015-03-22 13:07:32 | gelisam/hawk | https://api.github.com/repos/gelisam/hawk | opened | How to run the tests? | testing | Running `cabal install --enable-tests` used to be enough to run the tests in the background, but it doesn't seem to do so anymore; maybe cabal-install changed? Also, running `cabal test` afterwards complains that I haven't run `cabal configure`; shouldn't `cabal install` perform this step implicitly? | 1.0 | How to run the tests? - Running `cabal install --enable-tests` used to be enough to run the tests in the background, but it doesn't seem to do so anymore; maybe cabal-install changed? Also, running `cabal test` afterwards complains that I haven't run `cabal configure`; shouldn't `cabal install` perform this step implicitly? | non_priority | how to run the tests running cabal install enable tests used to be enough to run the tests in the background but it doesn t seem to do so anymore maybe cabal install changed also running cabal test afterwards complains that i haven t run cabal configure shouldn t cabal install perform this step implicitly | 0 |
212,663 | 23,934,097,644 | IssuesEvent | 2022-09-11 01:02:41 | brightcove/cloud-custodian | https://api.github.com/repos/brightcove/cloud-custodian | closed | CVE-2021-32760 (Medium) detected in github.com/docker/docker-v20.10.12 - autoclosed | security vulnerability | ## CVE-2021-32760 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>github.com/docker/docker-v20.10.12</b></p></summary>
<p>Moby Project - a collaborative project for the container ecosystem to assemble container-based systems</p>
<p>
Dependency Hierarchy:
- :x: **github.com/docker/docker-v20.10.12** (Vulnerable Library)
<p>Found in base branch: <b>brightcove</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.
<p>Publish Date: 2021-07-19
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32760>CVE-2021-32760</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/containerd/containerd/security/advisories/GHSA-c72p-9xmj-rx3w">https://github.com/containerd/containerd/security/advisories/GHSA-c72p-9xmj-rx3w</a></p>
<p>Release Date: 2021-07-19</p>
<p>Fix Resolution: v1.4.8 ,v1.5.4</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"GO","packageName":"github.com/docker/docker","packageVersion":"v20.10.12","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"github.com/docker/docker:v20.10.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v1.4.8 ,v1.5.4","isBinary":true}],"baseBranches":["brightcove"],"vulnerabilityIdentifier":"CVE-2021-32760","vulnerabilityDetails":"containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32760","cvss3Severity":"medium","cvss3Score":"6.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-32760 (Medium) detected in github.com/docker/docker-v20.10.12 - autoclosed - ## CVE-2021-32760 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>github.com/docker/docker-v20.10.12</b></p></summary>
<p>Moby Project - a collaborative project for the container ecosystem to assemble container-based systems</p>
<p>
Dependency Hierarchy:
- :x: **github.com/docker/docker-v20.10.12** (Vulnerable Library)
<p>Found in base branch: <b>brightcove</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.
<p>Publish Date: 2021-07-19
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32760>CVE-2021-32760</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/containerd/containerd/security/advisories/GHSA-c72p-9xmj-rx3w">https://github.com/containerd/containerd/security/advisories/GHSA-c72p-9xmj-rx3w</a></p>
<p>Release Date: 2021-07-19</p>
<p>Fix Resolution: v1.4.8 ,v1.5.4</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"GO","packageName":"github.com/docker/docker","packageVersion":"v20.10.12","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"github.com/docker/docker:v20.10.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v1.4.8 ,v1.5.4","isBinary":true}],"baseBranches":["brightcove"],"vulnerabilityIdentifier":"CVE-2021-32760","vulnerabilityDetails":"containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32760","cvss3Severity":"medium","cvss3Score":"6.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in github com docker docker autoclosed cve medium severity vulnerability vulnerable library github com docker docker moby project a collaborative project for the container ecosystem to assemble container based systems dependency hierarchy x github com docker docker vulnerable library found in base branch brightcove vulnerability details containerd is a container runtime a bug was found in containerd versions prior to and where pulling and extracting a specially crafted container image can result in unix file permission changes for existing files in the host’s filesystem changes to file permissions can deny access to the expected owner of the file widen access to others or set extended bits like setuid setgid and sticky this bug does not directly allow files to be read modified or executed without an additional cooperating process this bug has been fixed in containerd and as a workaround ensure that users only pull images from trusted sources linux security modules lsms like selinux and apparmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree github com docker docker isminimumfixversionavailable true minimumfixversion isbinary true basebranches vulnerabilityidentifier cve vulnerabilitydetails containerd is a container runtime a bug was found in containerd versions prior to and where pulling and extracting a specially crafted container image can result in unix file permission changes for existing files in the host’s filesystem changes to file permissions can deny access to the expected owner of the file widen access to others or set extended bits like setuid setgid and sticky this bug does not directly allow files to be read modified or executed without an additional cooperating process this bug has been fixed in containerd and as a workaround ensure that users only pull images from trusted sources linux security modules lsms like selinux and apparmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files vulnerabilityurl | 0 |
120,224 | 10,110,138,583 | IssuesEvent | 2019-07-30 09:35:30 | prebid/prebid-mobile-ios | https://api.github.com/repos/prebid/prebid-mobile-ios | opened | Improve PBViewTool | enhancement tests | `PBViewTool` class is used in test cases to check if AdView contains a prebid creative.
| 1.0 | Improve PBViewTool - `PBViewTool` class is used in test cases to check if AdView contains a prebid creative.
| non_priority | improve pbviewtool pbviewtool class is used in test cases to check if adview contains a prebid creative | 0 |
216,165 | 24,244,728,858 | IssuesEvent | 2022-09-27 09:37:12 | DevOpsOpenHack/devopsohteam4 | https://api.github.com/repos/DevOpsOpenHack/devopsohteam4 | opened | microsoft.net.test.sdk.16.6.0.nupkg: 1 vulnerabilities (highest severity is: 7.5) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>microsoft.net.test.sdk.16.6.0.nupkg</b></p></summary>
<p></p>
<p>Path to dependency file: /apis/poi/tests/IntegrationTests/IntegrationTests.csproj</p>
<p>Path to vulnerable library: /home/wss-scanner/.nuget/packages/newtonsoft.json/12.0.2/newtonsoft.json.12.0.2.nupkg</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/DevOpsOpenHack/devopsohteam4/commit/0b34798e47770cd5cdb86f04f918575251d92f0c">0b34798e47770cd5cdb86f04f918575251d92f0c</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [WS-2022-0161](https://github.com/JamesNK/Newtonsoft.Json/commit/7e77bbe1beccceac4fc7b174b53abfefac278b66) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | newtonsoft.json.12.0.2.nupkg | Transitive | N/A | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2022-0161</summary>
### Vulnerable Library - <b>newtonsoft.json.12.0.2.nupkg</b></p>
<p>Json.NET is a popular high-performance JSON framework for .NET</p>
<p>Library home page: <a href="https://api.nuget.org/packages/newtonsoft.json.12.0.2.nupkg">https://api.nuget.org/packages/newtonsoft.json.12.0.2.nupkg</a></p>
<p>Path to dependency file: /apis/poi/web/poi.csproj</p>
<p>Path to vulnerable library: /home/wss-scanner/.nuget/packages/newtonsoft.json/12.0.2/newtonsoft.json.12.0.2.nupkg</p>
<p>
Dependency Hierarchy:
- microsoft.net.test.sdk.16.6.0.nupkg (Root Library)
- microsoft.testplatform.testhost.16.6.0.nupkg
- :x: **newtonsoft.json.12.0.2.nupkg** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/DevOpsOpenHack/devopsohteam4/commit/0b34798e47770cd5cdb86f04f918575251d92f0c">0b34798e47770cd5cdb86f04f918575251d92f0c</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Improper Handling of Exceptional Conditions in Newtonsoft.Json.
Newtonsoft.Json prior to version 13.0.1 is vulnerable to Insecure Defaults due to improper handling of StackOverFlow exception (SOE) whenever nested expressions are being processed. Exploiting this vulnerability results in Denial Of Service (DoS), and it is exploitable when an attacker sends 5 requests that cause SOE in time frame of 5 minutes. This vulnerability affects Internet Information Services (IIS) Applications.
<p>Publish Date: 2022-06-22
<p>URL: <a href=https://github.com/JamesNK/Newtonsoft.Json/commit/7e77bbe1beccceac4fc7b174b53abfefac278b66>WS-2022-0161</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-06-22</p>
<p>Fix Resolution: Newtonsoft.Json - 13.0.1;Microsoft.Extensions.ApiDescription.Server - 6.0.0</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details> | True | microsoft.net.test.sdk.16.6.0.nupkg: 1 vulnerabilities (highest severity is: 7.5) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>microsoft.net.test.sdk.16.6.0.nupkg</b></p></summary>
<p></p>
<p>Path to dependency file: /apis/poi/tests/IntegrationTests/IntegrationTests.csproj</p>
<p>Path to vulnerable library: /home/wss-scanner/.nuget/packages/newtonsoft.json/12.0.2/newtonsoft.json.12.0.2.nupkg</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/DevOpsOpenHack/devopsohteam4/commit/0b34798e47770cd5cdb86f04f918575251d92f0c">0b34798e47770cd5cdb86f04f918575251d92f0c</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [WS-2022-0161](https://github.com/JamesNK/Newtonsoft.Json/commit/7e77bbe1beccceac4fc7b174b53abfefac278b66) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | newtonsoft.json.12.0.2.nupkg | Transitive | N/A | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2022-0161</summary>
### Vulnerable Library - <b>newtonsoft.json.12.0.2.nupkg</b></p>
<p>Json.NET is a popular high-performance JSON framework for .NET</p>
<p>Library home page: <a href="https://api.nuget.org/packages/newtonsoft.json.12.0.2.nupkg">https://api.nuget.org/packages/newtonsoft.json.12.0.2.nupkg</a></p>
<p>Path to dependency file: /apis/poi/web/poi.csproj</p>
<p>Path to vulnerable library: /home/wss-scanner/.nuget/packages/newtonsoft.json/12.0.2/newtonsoft.json.12.0.2.nupkg</p>
<p>
Dependency Hierarchy:
- microsoft.net.test.sdk.16.6.0.nupkg (Root Library)
- microsoft.testplatform.testhost.16.6.0.nupkg
- :x: **newtonsoft.json.12.0.2.nupkg** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/DevOpsOpenHack/devopsohteam4/commit/0b34798e47770cd5cdb86f04f918575251d92f0c">0b34798e47770cd5cdb86f04f918575251d92f0c</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Improper Handling of Exceptional Conditions in Newtonsoft.Json.
Newtonsoft.Json prior to version 13.0.1 is vulnerable to Insecure Defaults due to improper handling of StackOverFlow exception (SOE) whenever nested expressions are being processed. Exploiting this vulnerability results in Denial Of Service (DoS), and it is exploitable when an attacker sends 5 requests that cause SOE in time frame of 5 minutes. This vulnerability affects Internet Information Services (IIS) Applications.
<p>Publish Date: 2022-06-22
<p>URL: <a href=https://github.com/JamesNK/Newtonsoft.Json/commit/7e77bbe1beccceac4fc7b174b53abfefac278b66>WS-2022-0161</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-06-22</p>
<p>Fix Resolution: Newtonsoft.Json - 13.0.1;Microsoft.Extensions.ApiDescription.Server - 6.0.0</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details> | non_priority | microsoft net test sdk nupkg vulnerabilities highest severity is vulnerable library microsoft net test sdk nupkg path to dependency file apis poi tests integrationtests integrationtests csproj path to vulnerable library home wss scanner nuget packages newtonsoft json newtonsoft json nupkg found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high newtonsoft json nupkg transitive n a details ws vulnerable library newtonsoft json nupkg json net is a popular high performance json framework for net library home page a href path to dependency file apis poi web poi csproj path to vulnerable library home wss scanner nuget packages newtonsoft json newtonsoft json nupkg dependency hierarchy microsoft net test sdk nupkg root library microsoft testplatform testhost nupkg x newtonsoft json nupkg vulnerable library found in head commit a href found in base branch main vulnerability details improper handling of exceptional conditions in newtonsoft json newtonsoft json prior to version is vulnerable to insecure defaults due to improper handling of stackoverflow exception soe whenever nested expressions are being processed exploiting this vulnerability results in denial of service dos and it is exploitable when an attacker sends requests that cause soe in time frame of minutes this vulnerability affects internet information services iis applications publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution newtonsoft json microsoft extensions apidescription server step up your open source security game with mend | 0 |
232,523 | 17,785,030,027 | IssuesEvent | 2021-08-31 09:59:42 | facebookresearch/detectron2 | https://api.github.com/repos/facebookresearch/detectron2 | opened | Custom Mappe guide does not work | documentation | ## 📚 Documentation Issue
Hello, I am following [this](https://detectron2.readthedocs.io/en/latest/tutorials/data_loading.html#write-a-custom-dataloader) in order to replycate how to use a custom mapper.
So if I just copy the example in the documentation
```
def custom_mapper(dataset_dict):
dataset_dict = copy.deepcopy(dataset_dict) # it will be modified by code below
# can use other ways to read image
image = utils.read_image(dataset_dict["file_name"], format="BGR")
# See "Data Augmentation" tutorial for details usage
auginput = T.AugInput(image)
transform = T.Resize((800, 800))(auginput)
image = torch.from_numpy(auginput.image.transpose(2, 0, 1))
annos = [
utils.transform_instance_annotations(annotation, [transform], image.shape[1:])
for annotation in dataset_dict.pop("annotations")
]
return {
# create the format that the model expects
"image": image,
"instances": utils.annotations_to_instances(annos, image.shape[1:])
}
```
And then, follwing [this](https://detectron2.readthedocs.io/en/latest/tutorials/data_loading.html#use-a-custom-dataloader) i overwrited the build_{train,test}_loader method
```
class MyTrainer(DefaultTrainer):
@classmethod
def build_train_loader(cls, cfg):
train_dataloader = build_detection_train_loader(cfg, mapper=custom_mapper)
return train_dataloader
@classmethod
def build_test_loader(cls, cfg):
test_dataloader = build_detection_train_loader(cfg, mapper=custom_mapper)
return test_dataloader
```
I get this error when start to train
```
w, h = d["width"], d["height"]
KeyError: 'width'
```
| 1.0 | Custom Mappe guide does not work - ## 📚 Documentation Issue
Hello, I am following [this](https://detectron2.readthedocs.io/en/latest/tutorials/data_loading.html#write-a-custom-dataloader) in order to replycate how to use a custom mapper.
So if I just copy the example in the documentation
```
def custom_mapper(dataset_dict):
dataset_dict = copy.deepcopy(dataset_dict) # it will be modified by code below
# can use other ways to read image
image = utils.read_image(dataset_dict["file_name"], format="BGR")
# See "Data Augmentation" tutorial for details usage
auginput = T.AugInput(image)
transform = T.Resize((800, 800))(auginput)
image = torch.from_numpy(auginput.image.transpose(2, 0, 1))
annos = [
utils.transform_instance_annotations(annotation, [transform], image.shape[1:])
for annotation in dataset_dict.pop("annotations")
]
return {
# create the format that the model expects
"image": image,
"instances": utils.annotations_to_instances(annos, image.shape[1:])
}
```
And then, follwing [this](https://detectron2.readthedocs.io/en/latest/tutorials/data_loading.html#use-a-custom-dataloader) i overwrited the build_{train,test}_loader method
```
class MyTrainer(DefaultTrainer):
@classmethod
def build_train_loader(cls, cfg):
train_dataloader = build_detection_train_loader(cfg, mapper=custom_mapper)
return train_dataloader
@classmethod
def build_test_loader(cls, cfg):
test_dataloader = build_detection_train_loader(cfg, mapper=custom_mapper)
return test_dataloader
```
I get this error when start to train
```
w, h = d["width"], d["height"]
KeyError: 'width'
```
| non_priority | custom mappe guide does not work 📚 documentation issue hello i am following in order to replycate how to use a custom mapper so if i just copy the example in the documentation def custom mapper dataset dict dataset dict copy deepcopy dataset dict it will be modified by code below can use other ways to read image image utils read image dataset dict format bgr see data augmentation tutorial for details usage auginput t auginput image transform t resize auginput image torch from numpy auginput image transpose annos utils transform instance annotations annotation image shape for annotation in dataset dict pop annotations return create the format that the model expects image image instances utils annotations to instances annos image shape and then follwing i overwrited the build train test loader method class mytrainer defaulttrainer classmethod def build train loader cls cfg train dataloader build detection train loader cfg mapper custom mapper return train dataloader classmethod def build test loader cls cfg test dataloader build detection train loader cfg mapper custom mapper return test dataloader i get this error when start to train w h d d keyerror width | 0 |
157,016 | 12,342,766,553 | IssuesEvent | 2020-05-15 01:52:09 | EscherLabs/Graphene | https://api.github.com/repos/EscherLabs/Graphene | closed | Graphene Forms Don't Validate Fields which aren't parseable | awaiting test bug | Currently, fields which aren't parseable are being validated. This probably isn't right. | 1.0 | Graphene Forms Don't Validate Fields which aren't parseable - Currently, fields which aren't parseable are being validated. This probably isn't right. | non_priority | graphene forms don t validate fields which aren t parseable currently fields which aren t parseable are being validated this probably isn t right | 0 |
128,528 | 10,541,518,545 | IssuesEvent | 2019-10-02 10:59:31 | CAU-Kiel-Tech-Inf/socha-gui | https://api.github.com/repos/CAU-Kiel-Tech-Inf/socha-gui | closed | Bereits beendetes Spiel erscheint beim Neustart | bug to be tested urgent | Nach dem Neustart eines Spieles, erscheint nach dem ersten Zug das Spielbrett der letzten Runde:

| 1.0 | Bereits beendetes Spiel erscheint beim Neustart - Nach dem Neustart eines Spieles, erscheint nach dem ersten Zug das Spielbrett der letzten Runde:

| non_priority | bereits beendetes spiel erscheint beim neustart nach dem neustart eines spieles erscheint nach dem ersten zug das spielbrett der letzten runde | 0 |
65,185 | 19,252,528,491 | IssuesEvent | 2021-12-09 07:40:34 | vector-im/element-ios | https://api.github.com/repos/vector-im/element-ios | closed | App crashes when double tapping the people symbol in the bottom bar | T-Defect Z-Papercuts A-Room-List S-Major O-Occasional | ### Steps to reproduce
1. When in the people view (person symbol in bottom bar)
2. click the person/people symbol in the bottom bar
3. Then the app crashes
### Outcome
#### What did you expect?
I did expect nothing to happen, as this is the case for all other views and bottom bar symbols
#### What happened instead?
The app crashes
### Your phone model
iPhone XS
### Operating system version
iOS 15.1
### Application version
Element 1.6.8
### Homeserver
https://matrix.alemann.dev
### Will you send logs?
Yes | 1.0 | App crashes when double tapping the people symbol in the bottom bar - ### Steps to reproduce
1. When in the people view (person symbol in bottom bar)
2. click the person/people symbol in the bottom bar
3. Then the app crashes
### Outcome
#### What did you expect?
I did expect nothing to happen, as this is the case for all other views and bottom bar symbols
#### What happened instead?
The app crashes
### Your phone model
iPhone XS
### Operating system version
iOS 15.1
### Application version
Element 1.6.8
### Homeserver
https://matrix.alemann.dev
### Will you send logs?
Yes | non_priority | app crashes when double tapping the people symbol in the bottom bar steps to reproduce when in the people view person symbol in bottom bar click the person people symbol in the bottom bar then the app crashes outcome what did you expect i did expect nothing to happen as this is the case for all other views and bottom bar symbols what happened instead the app crashes your phone model iphone xs operating system version ios application version element homeserver will you send logs yes | 0 |
127,566 | 10,475,271,624 | IssuesEvent | 2019-09-23 15:59:38 | kcigeospatial/Fred_Co_Land-Management | https://api.github.com/repos/kcigeospatial/Fred_Co_Land-Management | closed | Use Permit - Awaiting Fee Payment Notification - Standard Format | Ready for Test Env. Retest | Did not get an Awaiting Fee Payment notification for the Home Occupation permit. | 2.0 | Use Permit - Awaiting Fee Payment Notification - Standard Format - Did not get an Awaiting Fee Payment notification for the Home Occupation permit. | non_priority | use permit awaiting fee payment notification standard format did not get an awaiting fee payment notification for the home occupation permit | 0 |
190,935 | 14,589,250,040 | IssuesEvent | 2020-12-19 01:06:30 | kalexmills/github-vet-tests-dec2020 | https://api.github.com/repos/kalexmills/github-vet-tests-dec2020 | closed | terraform-providers/terraform-provider-oci: oci/database_cloud_exadata_infrastructure_test.go; 16 LoC | fresh small test |
Found a possible issue in [terraform-providers/terraform-provider-oci](https://www.github.com/terraform-providers/terraform-provider-oci) at [oci/database_cloud_exadata_infrastructure_test.go](https://github.com/terraform-providers/terraform-provider-oci/blob/507acd0ed6517dbca2fbcfb8100874929c8fd8e1/oci/database_cloud_exadata_infrastructure_test.go#L376-L391)
Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first
issue it finds, so please do not limit your consideration to the contents of the below message.
> reference to cloudExadataInfrastructureId is reassigned at line 380
[Click here to see the code in its original context.](https://github.com/terraform-providers/terraform-provider-oci/blob/507acd0ed6517dbca2fbcfb8100874929c8fd8e1/oci/database_cloud_exadata_infrastructure_test.go#L376-L391)
<details>
<summary>Click here to show the 16 line(s) of Go which triggered the analyzer.</summary>
```go
for _, cloudExadataInfrastructureId := range cloudExadataInfrastructureIds {
if ok := SweeperDefaultResourceId[cloudExadataInfrastructureId]; !ok {
deleteCloudExadataInfrastructureRequest := oci_database.DeleteCloudExadataInfrastructureRequest{}
deleteCloudExadataInfrastructureRequest.CloudExadataInfrastructureId = &cloudExadataInfrastructureId
deleteCloudExadataInfrastructureRequest.RequestMetadata.RetryPolicy = getRetryPolicy(true, "database")
_, error := databaseClient.DeleteCloudExadataInfrastructure(context.Background(), deleteCloudExadataInfrastructureRequest)
if error != nil {
fmt.Printf("Error deleting CloudExadataInfrastructure %s %s, It is possible that the resource is already deleted. Please verify manually \n", cloudExadataInfrastructureId, error)
continue
}
waitTillCondition(testAccProvider, &cloudExadataInfrastructureId, cloudExadataInfrastructureSweepWaitCondition, time.Duration(3*time.Minute),
cloudExadataInfrastructureSweepResponseFetchOperation, "database", true)
}
}
```
</details>
Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket:
See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information.
commit ID: 507acd0ed6517dbca2fbcfb8100874929c8fd8e1
| 1.0 | terraform-providers/terraform-provider-oci: oci/database_cloud_exadata_infrastructure_test.go; 16 LoC -
Found a possible issue in [terraform-providers/terraform-provider-oci](https://www.github.com/terraform-providers/terraform-provider-oci) at [oci/database_cloud_exadata_infrastructure_test.go](https://github.com/terraform-providers/terraform-provider-oci/blob/507acd0ed6517dbca2fbcfb8100874929c8fd8e1/oci/database_cloud_exadata_infrastructure_test.go#L376-L391)
Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first
issue it finds, so please do not limit your consideration to the contents of the below message.
> reference to cloudExadataInfrastructureId is reassigned at line 380
[Click here to see the code in its original context.](https://github.com/terraform-providers/terraform-provider-oci/blob/507acd0ed6517dbca2fbcfb8100874929c8fd8e1/oci/database_cloud_exadata_infrastructure_test.go#L376-L391)
<details>
<summary>Click here to show the 16 line(s) of Go which triggered the analyzer.</summary>
```go
for _, cloudExadataInfrastructureId := range cloudExadataInfrastructureIds {
if ok := SweeperDefaultResourceId[cloudExadataInfrastructureId]; !ok {
deleteCloudExadataInfrastructureRequest := oci_database.DeleteCloudExadataInfrastructureRequest{}
deleteCloudExadataInfrastructureRequest.CloudExadataInfrastructureId = &cloudExadataInfrastructureId
deleteCloudExadataInfrastructureRequest.RequestMetadata.RetryPolicy = getRetryPolicy(true, "database")
_, error := databaseClient.DeleteCloudExadataInfrastructure(context.Background(), deleteCloudExadataInfrastructureRequest)
if error != nil {
fmt.Printf("Error deleting CloudExadataInfrastructure %s %s, It is possible that the resource is already deleted. Please verify manually \n", cloudExadataInfrastructureId, error)
continue
}
waitTillCondition(testAccProvider, &cloudExadataInfrastructureId, cloudExadataInfrastructureSweepWaitCondition, time.Duration(3*time.Minute),
cloudExadataInfrastructureSweepResponseFetchOperation, "database", true)
}
}
```
</details>
Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket:
See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information.
commit ID: 507acd0ed6517dbca2fbcfb8100874929c8fd8e1
| non_priority | terraform providers terraform provider oci oci database cloud exadata infrastructure test go loc found a possible issue in at below is the message reported by the analyzer for this snippet of code beware that the analyzer only reports the first issue it finds so please do not limit your consideration to the contents of the below message reference to cloudexadatainfrastructureid is reassigned at line click here to show the line s of go which triggered the analyzer go for cloudexadatainfrastructureid range cloudexadatainfrastructureids if ok sweeperdefaultresourceid ok deletecloudexadatainfrastructurerequest oci database deletecloudexadatainfrastructurerequest deletecloudexadatainfrastructurerequest cloudexadatainfrastructureid cloudexadatainfrastructureid deletecloudexadatainfrastructurerequest requestmetadata retrypolicy getretrypolicy true database error databaseclient deletecloudexadatainfrastructure context background deletecloudexadatainfrastructurerequest if error nil fmt printf error deleting cloudexadatainfrastructure s s it is possible that the resource is already deleted please verify manually n cloudexadatainfrastructureid error continue waittillcondition testaccprovider cloudexadatainfrastructureid cloudexadatainfrastructuresweepwaitcondition time duration time minute cloudexadatainfrastructuresweepresponsefetchoperation database true leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id | 0 |
303,543 | 26,216,203,095 | IssuesEvent | 2023-01-04 11:09:55 | saleor/saleor-dashboard | https://api.github.com/repos/saleor/saleor-dashboard | closed | Cypress test fail: should be able to update product type with variant attribute. TC: SALEOR_1504 | tests | **Known bug for versions:**
v34: true
**Additional Info:**
Spec: As an admin I want to manage attributes in product types | 1.0 | Cypress test fail: should be able to update product type with variant attribute. TC: SALEOR_1504 - **Known bug for versions:**
v34: true
**Additional Info:**
Spec: As an admin I want to manage attributes in product types | non_priority | cypress test fail should be able to update product type with variant attribute tc saleor known bug for versions true additional info spec as an admin i want to manage attributes in product types | 0 |
67,427 | 7,047,987,476 | IssuesEvent | 2018-01-02 15:52:34 | TauCetiStation/TauCetiClassic | https://api.github.com/repos/TauCetiStation/TauCetiClassic | closed | Мелки не рисуют на полу | Bug Test Feedback | <!--
ВАЖНО: Если ваш ишью является не репортом о баге, а предложением для чего-либо, то ОБЯЗАТЕЛЬНО добавьте в название тег [Proposal]
1. ОТВЕТЫ ОСТАВЛЯТЬ ПОД СООТВЕТСТВУЮЩИЕ ЗАГОЛОВКИ
(они в самом низу, после всех правил)
2. В ОДНОМ РЕПОРТЕ ДОЛЖНО БЫТЬ ОПИСАНИЕ ТОЛЬКО ОДНОЙ ПРОБЛЕМЫ
3. КОРРЕКТНОЕ НАЗВАНИЕ РЕПОРТА НЕ МЕНЕЕ ВАЖНО ЧЕМ ОПИСАНИЕ
-. Ниже описание каждого пункта.
1. Весь данный текст что уже написан до вас -
НЕ УДАЛЯТЬ И НЕ РЕДАКТИРОВАТЬ.
Если нечего написать в тот или иной пункт -
просто оставить пустым.
2. Не надо описывать пачку багов в одном репорте,
(!даже если там все описать можно парой слов!)
шанс что их исправят за раз, крайне мал.
А вот использовать на гите удобную функцию -
автозакрытия репорта при мерже пулл реквеста -
исправляющего данный репорт, будет невозможно.
3. Корректное и в меру подробное название репорта -
тоже очень важно! Чтобы даже не заходя в сам репорт -
было понятно что за проблема.
Плохой пример: "Ковер." - что мы должны понять из такого названия?
Хороший пример: "Некорректное отображение спрайтов ковра." -
а вот так уже будет понятно о чем репорт.
Это надо как минимум для того, чтобы вам же самим -
было видно, что репорта_нейм еще нет или наоборот,
уже есть, и это можно было понять не углубляясь в -
чтение каждого репорта внутри. Когда название не имеет конкретики, из -
которого нельзя понять о чем репорт, это также затрудняет функцию поиска.
-->
#### Подробное описание проблемы
Мелки не рисуют на полу. Точнее лог рисования есть, а спрайта рисунка на плитках не остается.
#### Что должно было произойти
Спрайт нарисованного должен был появиться на полу.
#### Что произошло на самом деле
Он не появляется.
#### Как повторить
Взять разноцветные мелки у клоуна или из прачечной и попытаться что-либо ими нарисовать.
#### Дополнительная информация:
| 1.0 | Мелки не рисуют на полу - <!--
ВАЖНО: Если ваш ишью является не репортом о баге, а предложением для чего-либо, то ОБЯЗАТЕЛЬНО добавьте в название тег [Proposal]
1. ОТВЕТЫ ОСТАВЛЯТЬ ПОД СООТВЕТСТВУЮЩИЕ ЗАГОЛОВКИ
(они в самом низу, после всех правил)
2. В ОДНОМ РЕПОРТЕ ДОЛЖНО БЫТЬ ОПИСАНИЕ ТОЛЬКО ОДНОЙ ПРОБЛЕМЫ
3. КОРРЕКТНОЕ НАЗВАНИЕ РЕПОРТА НЕ МЕНЕЕ ВАЖНО ЧЕМ ОПИСАНИЕ
-. Ниже описание каждого пункта.
1. Весь данный текст что уже написан до вас -
НЕ УДАЛЯТЬ И НЕ РЕДАКТИРОВАТЬ.
Если нечего написать в тот или иной пункт -
просто оставить пустым.
2. Не надо описывать пачку багов в одном репорте,
(!даже если там все описать можно парой слов!)
шанс что их исправят за раз, крайне мал.
А вот использовать на гите удобную функцию -
автозакрытия репорта при мерже пулл реквеста -
исправляющего данный репорт, будет невозможно.
3. Корректное и в меру подробное название репорта -
тоже очень важно! Чтобы даже не заходя в сам репорт -
было понятно что за проблема.
Плохой пример: "Ковер." - что мы должны понять из такого названия?
Хороший пример: "Некорректное отображение спрайтов ковра." -
а вот так уже будет понятно о чем репорт.
Это надо как минимум для того, чтобы вам же самим -
было видно, что репорта_нейм еще нет или наоборот,
уже есть, и это можно было понять не углубляясь в -
чтение каждого репорта внутри. Когда название не имеет конкретики, из -
которого нельзя понять о чем репорт, это также затрудняет функцию поиска.
-->
#### Подробное описание проблемы
Мелки не рисуют на полу. Точнее лог рисования есть, а спрайта рисунка на плитках не остается.
#### Что должно было произойти
Спрайт нарисованного должен был появиться на полу.
#### Что произошло на самом деле
Он не появляется.
#### Как повторить
Взять разноцветные мелки у клоуна или из прачечной и попытаться что-либо ими нарисовать.
#### Дополнительная информация:
| non_priority | мелки не рисуют на полу важно если ваш ишью является не репортом о баге а предложением для чего либо то обязательно добавьте в название тег ответы оставлять под соответствующие заголовки они в самом низу после всех правил в одном репорте должно быть описание только одной проблемы корректное название репорта не менее важно чем описание ниже описание каждого пункта весь данный текст что уже написан до вас не удалять и не редактировать если нечего написать в тот или иной пункт просто оставить пустым не надо описывать пачку багов в одном репорте даже если там все описать можно парой слов шанс что их исправят за раз крайне мал а вот использовать на гите удобную функцию автозакрытия репорта при мерже пулл реквеста исправляющего данный репорт будет невозможно корректное и в меру подробное название репорта тоже очень важно чтобы даже не заходя в сам репорт было понятно что за проблема плохой пример ковер что мы должны понять из такого названия хороший пример некорректное отображение спрайтов ковра а вот так уже будет понятно о чем репорт это надо как минимум для того чтобы вам же самим было видно что репорта нейм еще нет или наоборот уже есть и это можно было понять не углубляясь в чтение каждого репорта внутри когда название не имеет конкретики из которого нельзя понять о чем репорт это также затрудняет функцию поиска подробное описание проблемы мелки не рисуют на полу точнее лог рисования есть а спрайта рисунка на плитках не остается что должно было произойти спрайт нарисованного должен был появиться на полу что произошло на самом деле он не появляется как повторить взять разноцветные мелки у клоуна или из прачечной и попытаться что либо ими нарисовать дополнительная информация | 0 |
125,046 | 12,245,941,494 | IssuesEvent | 2020-05-05 13:45:08 | sevenspell/solo-thisistheend | https://api.github.com/repos/sevenspell/solo-thisistheend | reopened | Decide on technologies to use | documentation | Structure:
M - mongoDB / Mongoose
E - Express.js
R - React.js
N - Node.js
NPM Packages:
React Router
express-fileupload => express-formidable
Choices:
express-ticket
email-verification
passport-local-mongoose-email
| 1.0 | Decide on technologies to use - Structure:
M - mongoDB / Mongoose
E - Express.js
R - React.js
N - Node.js
NPM Packages:
React Router
express-fileupload => express-formidable
Choices:
express-ticket
email-verification
passport-local-mongoose-email
| non_priority | decide on technologies to use structure m mongodb mongoose e express js r react js n node js npm packages react router express fileupload express formidable choices express ticket email verification passport local mongoose email | 0 |
58,498 | 14,404,946,557 | IssuesEvent | 2020-12-03 17:59:10 | angular/angular-cli | https://api.github.com/repos/angular/angular-cli | closed | Angular v11 - stylus not resolving imports from libraries | comp: devkit/build-angular devkit/build-angular: browser freq1: low severity5: regression type: bug/fix | # 🐞 bug report
### Affected Package
The issue is caused by package `@angular-devkit/build-angular`
### Is this a regression?
Yes, in Angular 10 stylus was working as expected.
### Description
Angular 11 changed the webpack config of the `stylus-loader`, and it seems that it restricted the imports in a way that the **documented** stylus imports are not working as expected. In our company we use these kind of imports in out `*.component.styl` files:
```
@import '~@org/styles/color-palette'
```
1. it's clear for us that we are using the styles of our npm package, where any relative path to the includePaths is ambiguous.
2. we can cmd+click on the path and get into the file inside the IDE
The change made in Angular 11 is:

while in Angular 10 that configuration was:

## 🔬 Minimal Reproduction
Stackblitz seems to not support stylus :(
https://stackblitz.com/edit/styl-broken-in-ng11
## 🔥 Exception or Error
<pre><code>
✔ Browser application bundle generation complete.
Initial Chunk Files | Names | Size
main.cfc3b76aaa54664627cf.js | main | 340.45 kB
styles.8c019f30343e61daf3ad.css | styles | 18.56 kB
runtime.d6c52737d4587c65265f.js | runtime | 6.17 kB
polyfills.42418760f681beaedfed.js | polyfills | 677 bytes
| Initial Total | 365.85 kB
Build at: 2020-12-01T16:38:34.657Z - Hash: c1fbc675dd2caa6ff658 - Time: 9409ms
Error: ./src/styles.styl
Module build failed (from ./node_modules/mini-css-extract-plugin/dist/loader.js):
ModuleBuildError: Module build failed (from ./node_modules/stylus-loader/dist/cjs.js):
Error: /media/work/website/src/styles.styl:1:9
1| @import '~@org/styles/variables'
--------------^
2|
3| *
4| box-sizing: border-box
failed to locate @import file ~@org/styles/variables.styl
at Evaluator.visitImport (/media/work/website/node_modules/stylus/lib/visitor/evaluator.js:915:21)
at Evaluator.Visitor.visit (/media/work/website/node_modules/stylus/lib/visitor/index.js:28:40)
at Evaluator.visit (/media/work/website/node_modules/stylus/lib/visitor/evaluator.js:160:18)
at Evaluator.visitRoot (/media/work/website/node_modules/stylus/lib/visitor/evaluator.js:707:27)
at Evaluator.Visitor.visit (/media/work/website/node_modules/stylus/lib/visitor/index.js:28:40)
at Evaluator.visit (/media/work/website/node_modules/stylus/lib/visitor/evaluator.js:160:18)
at Evaluator.evaluate (/media/work/website/node_modules/stylus/lib/visitor/evaluator.js:247:15)
at Renderer.render (/media/work/website/node_modules/stylus/lib/renderer.js:86:26)
at Object.stylusLoader (/media/work/website/node_modules/stylus-loader/dist/index.js:118:8)
at runLoaders (/media/work/website/node_modules/webpack/lib/NormalModule.js:316:20)
at /media/work/website/node_modules/loader-runner/lib/LoaderRunner.js:367:11
at /media/work/website/node_modules/loader-runner/lib/LoaderRunner.js:233:18
at context.callback (/media/work/website/node_modules/loader-runner/lib/LoaderRunner.js:111:13)
at styl.render (/media/work/website/node_modules/stylus-loader/dist/index.js:124:7)
at Renderer.render (/media/work/website/node_modules/stylus/lib/renderer.js:107:12)
at Object.stylusLoader (/media/work/website/node_modules/stylus-loader/dist/index.js:118:8)
</code></pre>
## 🌍 Your Environment
**Angular Version:**
<pre><code>
Angular CLI: 11.0.2
Node: 10.22.0
OS: linux x64
Angular: 11.0.2
... animations, cli, common, compiler, compiler-cli, core, forms
... language-service, platform-browser, platform-browser-dynamic
... router
Ivy Workspace: Yes
Package Version
---------------------------------------------------------
@angular-devkit/architect 0.1100.2
@angular-devkit/build-angular 0.1100.2
@angular-devkit/core 11.0.2
@angular-devkit/schematics 11.0.2
@angular/cdk 11.0.1
@angular/flex-layout 11.0.0-beta.33
@schematics/angular 11.0.2
@schematics/update 0.1100.2
rxjs 6.6.3
typescript 4.0.5
</code></pre>
| 2.0 | Angular v11 - stylus not resolving imports from libraries - # 🐞 bug report
### Affected Package
The issue is caused by package `@angular-devkit/build-angular`
### Is this a regression?
Yes, in Angular 10 stylus was working as expected.
### Description
Angular 11 changed the webpack config of the `stylus-loader`, and it seems that it restricted the imports in a way that the **documented** stylus imports are not working as expected. In our company we use these kind of imports in out `*.component.styl` files:
```
@import '~@org/styles/color-palette'
```
1. it's clear for us that we are using the styles of our npm package, where any relative path to the includePaths is ambiguous.
2. we can cmd+click on the path and get into the file inside the IDE
The change made in Angular 11 is:

while in Angular 10 that configuration was:

## 🔬 Minimal Reproduction
Stackblitz seems to not support stylus :(
https://stackblitz.com/edit/styl-broken-in-ng11
## 🔥 Exception or Error
<pre><code>
✔ Browser application bundle generation complete.
Initial Chunk Files | Names | Size
main.cfc3b76aaa54664627cf.js | main | 340.45 kB
styles.8c019f30343e61daf3ad.css | styles | 18.56 kB
runtime.d6c52737d4587c65265f.js | runtime | 6.17 kB
polyfills.42418760f681beaedfed.js | polyfills | 677 bytes
| Initial Total | 365.85 kB
Build at: 2020-12-01T16:38:34.657Z - Hash: c1fbc675dd2caa6ff658 - Time: 9409ms
Error: ./src/styles.styl
Module build failed (from ./node_modules/mini-css-extract-plugin/dist/loader.js):
ModuleBuildError: Module build failed (from ./node_modules/stylus-loader/dist/cjs.js):
Error: /media/work/website/src/styles.styl:1:9
1| @import '~@org/styles/variables'
--------------^
2|
3| *
4| box-sizing: border-box
failed to locate @import file ~@org/styles/variables.styl
at Evaluator.visitImport (/media/work/website/node_modules/stylus/lib/visitor/evaluator.js:915:21)
at Evaluator.Visitor.visit (/media/work/website/node_modules/stylus/lib/visitor/index.js:28:40)
at Evaluator.visit (/media/work/website/node_modules/stylus/lib/visitor/evaluator.js:160:18)
at Evaluator.visitRoot (/media/work/website/node_modules/stylus/lib/visitor/evaluator.js:707:27)
at Evaluator.Visitor.visit (/media/work/website/node_modules/stylus/lib/visitor/index.js:28:40)
at Evaluator.visit (/media/work/website/node_modules/stylus/lib/visitor/evaluator.js:160:18)
at Evaluator.evaluate (/media/work/website/node_modules/stylus/lib/visitor/evaluator.js:247:15)
at Renderer.render (/media/work/website/node_modules/stylus/lib/renderer.js:86:26)
at Object.stylusLoader (/media/work/website/node_modules/stylus-loader/dist/index.js:118:8)
at runLoaders (/media/work/website/node_modules/webpack/lib/NormalModule.js:316:20)
at /media/work/website/node_modules/loader-runner/lib/LoaderRunner.js:367:11
at /media/work/website/node_modules/loader-runner/lib/LoaderRunner.js:233:18
at context.callback (/media/work/website/node_modules/loader-runner/lib/LoaderRunner.js:111:13)
at styl.render (/media/work/website/node_modules/stylus-loader/dist/index.js:124:7)
at Renderer.render (/media/work/website/node_modules/stylus/lib/renderer.js:107:12)
at Object.stylusLoader (/media/work/website/node_modules/stylus-loader/dist/index.js:118:8)
</code></pre>
## 🌍 Your Environment
**Angular Version:**
<pre><code>
Angular CLI: 11.0.2
Node: 10.22.0
OS: linux x64
Angular: 11.0.2
... animations, cli, common, compiler, compiler-cli, core, forms
... language-service, platform-browser, platform-browser-dynamic
... router
Ivy Workspace: Yes
Package Version
---------------------------------------------------------
@angular-devkit/architect 0.1100.2
@angular-devkit/build-angular 0.1100.2
@angular-devkit/core 11.0.2
@angular-devkit/schematics 11.0.2
@angular/cdk 11.0.1
@angular/flex-layout 11.0.0-beta.33
@schematics/angular 11.0.2
@schematics/update 0.1100.2
rxjs 6.6.3
typescript 4.0.5
</code></pre>
| non_priority | angular stylus not resolving imports from libraries 🐞 bug report affected package the issue is caused by package angular devkit build angular is this a regression yes in angular stylus was working as expected description angular changed the webpack config of the stylus loader and it seems that it restricted the imports in a way that the documented stylus imports are not working as expected in our company we use these kind of imports in out component styl files import org styles color palette it s clear for us that we are using the styles of our npm package where any relative path to the includepaths is ambiguous we can cmd click on the path and get into the file inside the ide the change made in angular is while in angular that configuration was 🔬 minimal reproduction stackblitz seems to not support stylus 🔥 exception or error ✔ browser application bundle generation complete initial chunk files names size main js main kb styles css styles kb runtime js runtime kb polyfills js polyfills bytes initial total kb build at hash time error src styles styl module build failed from node modules mini css extract plugin dist loader js modulebuilderror module build failed from node modules stylus loader dist cjs js error media work website src styles styl import org styles variables box sizing border box failed to locate import file org styles variables styl at evaluator visitimport media work website node modules stylus lib visitor evaluator js at evaluator visitor visit media work website node modules stylus lib visitor index js at evaluator visit media work website node modules stylus lib visitor evaluator js at evaluator visitroot media work website node modules stylus lib visitor evaluator js at evaluator visitor visit media work website node modules stylus lib visitor index js at evaluator visit media work website node modules stylus lib visitor evaluator js at evaluator evaluate media work website node modules stylus lib visitor evaluator js at renderer render media work website node modules stylus lib renderer js at object stylusloader media work website node modules stylus loader dist index js at runloaders media work website node modules webpack lib normalmodule js at media work website node modules loader runner lib loaderrunner js at media work website node modules loader runner lib loaderrunner js at context callback media work website node modules loader runner lib loaderrunner js at styl render media work website node modules stylus loader dist index js at renderer render media work website node modules stylus lib renderer js at object stylusloader media work website node modules stylus loader dist index js 🌍 your environment angular version angular cli node os linux angular animations cli common compiler compiler cli core forms language service platform browser platform browser dynamic router ivy workspace yes package version angular devkit architect angular devkit build angular angular devkit core angular devkit schematics angular cdk angular flex layout beta schematics angular schematics update rxjs typescript | 0 |
59,900 | 24,921,974,390 | IssuesEvent | 2022-10-31 01:41:26 | backend-br/vagas | https://api.github.com/repos/backend-br/vagas | closed | [Hibrido / Gotemburgo, Suécia] Java Developer (Sênior) na Coodesh | Sênior Java AWS Git Docker Kubernetes Stale CI/CD Azure SOLID Microservices | ## Descrição da vaga:
Esta é uma vaga de um parceiro da plataforma Coodesh, ao candidatar-se você terá acesso as informações completas sobre a empresa e benefícios.
Fique atento ao redirecionamento que vai te levar para uma url [https://coodesh.com](https://coodesh.com/vagas/senior-java-developer-121524808?utm_source=github&utm_medium=backend-br-vagas&modal=open) com o pop-up personalizado de candidatura. 👋
<p>Are you interested in relocating to Europe and Sweden and working on-site with leading tech companies?</p>
<p>We are an engineering service company working on our customers most exciting projects. If you want to work with the latest technologies and experience the Swedish work culture and society with great work-life balance and many other benefits please continue reading!</p>
<p></p>
<p><strong>About you</strong></p>
<p>We are looking for you who have a personal drive and the ability to simplify complex problems. You are comfortable working in teams and value effective communication. </p>
<p></p>
<p><strong>About Explipro</strong></p>
<p>We have a long experience of recruiting internationally and helping all our employees in the relocation to Sweden and to start a life here.</p>
<p>Our natural approach is helpfulness and simplicity. We like challenges and we help each other and our customers to solve problems of different kinds. It is important for us that you appreciate our values and that you are eager to contribute to making us grow together.</p>
<p>Career Growth Opportunities – being a consultancy company keeps variety in your work and new opportunities happening all the time! We have a long-term perspective on our consultants and invest in competence development and individual career plans.</p>
<p>Welcome to your application!</p>
<p></p>
## Explipro Group:
<p>Estamos localizados em Göteborg, Suécia. Somos uma empresa de consultoria em expansão com perfil sênior em desenvolvimento de sistemas. Temos uma visão de longo prazo dos nossos colaboradores, apostando na competência e com um plano de carreira individual para todos.</p>
<p>A cultura empresarial e de gestão da Explipro é aberta, não formal e orientada para soluções. A estrutura da empresa é plana. Cada indivíduo em nossa equipe tem um alto nível de responsabilidade e mandato, e espera-se que seja capaz de trabalhar de forma autônoma.</p><a href='https://coodesh.com/empresas/explipro-group'>Veja mais no site</a>
## Habilidades:
- Java
- Amazon AWS
- Azure DevOps
- Microservices
- React.js
## Local:
Gotemburgo, Suécia
## Requisitos:
- Solid experience in Java;
- Experience in developing Microservices (REST or similar);
- Experience in cloud technologies, AWS or Azure;
- Modern frameworks like Spring and Spring Boot;
- CI/CD tools like Docker, GIT, and Kubernetes;
- Fluent in English.
## Benefícios:
- 💰 Competitive salaries;
- ⏰ Work Flexibility / TimeBank;
- ⛱️ Paid vacation of 25 working days;
- 💻 Hybrid work (according to customer requirements);
- 💪 Fitness Allowance (up to 4000sek);
- 🍼 Parental Leave (up to 480 days per child);
- 🆘 Healthcare;
- 😷 Sickness and Disability leave.
## Como se candidatar:
Candidatar-se exclusivamente através da plataforma Coodesh no link a seguir: [Java Developer (Sênior) na Explipro Group](https://coodesh.com/vagas/senior-java-developer-121524808?utm_source=github&utm_medium=backend-br-vagas&modal=open)
Após candidatar-se via plataforma Coodesh e validar o seu login, você poderá acompanhar e receber todas as interações do processo por lá. Utilize a opção **Pedir Feedback** entre uma etapa e outra na vaga que se candidatou. Isso fará com que a pessoa **Recruiter** responsável pelo processo na empresa receba a notificação.
## Labels
#### Alocação
Alocado
#### Categoria
Back-End | 1.0 | [Hibrido / Gotemburgo, Suécia] Java Developer (Sênior) na Coodesh - ## Descrição da vaga:
Esta é uma vaga de um parceiro da plataforma Coodesh, ao candidatar-se você terá acesso as informações completas sobre a empresa e benefícios.
Fique atento ao redirecionamento que vai te levar para uma url [https://coodesh.com](https://coodesh.com/vagas/senior-java-developer-121524808?utm_source=github&utm_medium=backend-br-vagas&modal=open) com o pop-up personalizado de candidatura. 👋
<p>Are you interested in relocating to Europe and Sweden and working on-site with leading tech companies?</p>
<p>We are an engineering service company working on our customers most exciting projects. If you want to work with the latest technologies and experience the Swedish work culture and society with great work-life balance and many other benefits please continue reading!</p>
<p></p>
<p><strong>About you</strong></p>
<p>We are looking for you who have a personal drive and the ability to simplify complex problems. You are comfortable working in teams and value effective communication. </p>
<p></p>
<p><strong>About Explipro</strong></p>
<p>We have a long experience of recruiting internationally and helping all our employees in the relocation to Sweden and to start a life here.</p>
<p>Our natural approach is helpfulness and simplicity. We like challenges and we help each other and our customers to solve problems of different kinds. It is important for us that you appreciate our values and that you are eager to contribute to making us grow together.</p>
<p>Career Growth Opportunities – being a consultancy company keeps variety in your work and new opportunities happening all the time! We have a long-term perspective on our consultants and invest in competence development and individual career plans.</p>
<p>Welcome to your application!</p>
<p></p>
## Explipro Group:
<p>Estamos localizados em Göteborg, Suécia. Somos uma empresa de consultoria em expansão com perfil sênior em desenvolvimento de sistemas. Temos uma visão de longo prazo dos nossos colaboradores, apostando na competência e com um plano de carreira individual para todos.</p>
<p>A cultura empresarial e de gestão da Explipro é aberta, não formal e orientada para soluções. A estrutura da empresa é plana. Cada indivíduo em nossa equipe tem um alto nível de responsabilidade e mandato, e espera-se que seja capaz de trabalhar de forma autônoma.</p><a href='https://coodesh.com/empresas/explipro-group'>Veja mais no site</a>
## Habilidades:
- Java
- Amazon AWS
- Azure DevOps
- Microservices
- React.js
## Local:
Gotemburgo, Suécia
## Requisitos:
- Solid experience in Java;
- Experience in developing Microservices (REST or similar);
- Experience in cloud technologies, AWS or Azure;
- Modern frameworks like Spring and Spring Boot;
- CI/CD tools like Docker, GIT, and Kubernetes;
- Fluent in English.
## Benefícios:
- 💰 Competitive salaries;
- ⏰ Work Flexibility / TimeBank;
- ⛱️ Paid vacation of 25 working days;
- 💻 Hybrid work (according to customer requirements);
- 💪 Fitness Allowance (up to 4000sek);
- 🍼 Parental Leave (up to 480 days per child);
- 🆘 Healthcare;
- 😷 Sickness and Disability leave.
## Como se candidatar:
Candidatar-se exclusivamente através da plataforma Coodesh no link a seguir: [Java Developer (Sênior) na Explipro Group](https://coodesh.com/vagas/senior-java-developer-121524808?utm_source=github&utm_medium=backend-br-vagas&modal=open)
Após candidatar-se via plataforma Coodesh e validar o seu login, você poderá acompanhar e receber todas as interações do processo por lá. Utilize a opção **Pedir Feedback** entre uma etapa e outra na vaga que se candidatou. Isso fará com que a pessoa **Recruiter** responsável pelo processo na empresa receba a notificação.
## Labels
#### Alocação
Alocado
#### Categoria
Back-End | non_priority | java developer sênior na coodesh descrição da vaga esta é uma vaga de um parceiro da plataforma coodesh ao candidatar se você terá acesso as informações completas sobre a empresa e benefícios fique atento ao redirecionamento que vai te levar para uma url com o pop up personalizado de candidatura 👋 are you interested in relocating to europe and sweden and working on site with leading tech companies we are an engineering service company working on our customers most exciting projects if you want to work with the latest technologies and experience the swedish work culture and society with great work life balance and many other benefits please continue reading about you we are looking for you who have a personal drive and the ability to simplify complex problems you are comfortable working in teams and value effective communication nbsp about explipro we have a long experience of recruiting internationally and helping all our employees in the relocation to sweden and to start a life here our natural approach is helpfulness and simplicity we like challenges and we help each other and our customers to solve problems of different kinds it is important for us that you appreciate our values and that you are eager to contribute to making us grow together career growth opportunities – being a consultancy company keeps variety in your work and new opportunities happening all the time we have a long term perspective on our consultants and invest in competence development and individual career plans welcome to your application explipro group estamos localizados em göteborg suécia somos uma empresa de consultoria em expansão com perfil sênior em desenvolvimento de sistemas temos uma visão de longo prazo dos nossos colaboradores apostando na competência e com um plano de carreira individual para todos a cultura empresarial e de gestão da explipro é aberta não formal e orientada para soluções a estrutura da empresa é plana cada indivíduo em nossa equipe tem um alto nível de responsabilidade e mandato e espera se que seja capaz de trabalhar de forma autônoma habilidades java amazon aws azure devops microservices react js local gotemburgo suécia requisitos solid experience in java experience in developing microservices rest or similar experience in cloud technologies aws or azure modern frameworks like spring and spring boot ci cd tools like docker git and kubernetes fluent in english benefícios 💰 competitive salaries ⏰ work flexibility timebank ⛱️ paid vacation of working days 💻 hybrid work according to customer requirements 💪 fitness allowance up to 🍼 parental leave up to days per child 🆘 healthcare 😷 sickness and disability leave como se candidatar candidatar se exclusivamente através da plataforma coodesh no link a seguir após candidatar se via plataforma coodesh e validar o seu login você poderá acompanhar e receber todas as interações do processo por lá utilize a opção pedir feedback entre uma etapa e outra na vaga que se candidatou isso fará com que a pessoa recruiter responsável pelo processo na empresa receba a notificação labels alocação alocado categoria back end | 0 |
194,241 | 15,415,869,281 | IssuesEvent | 2021-03-05 03:38:16 | gravitational/teleport | https://api.github.com/repos/gravitational/teleport | opened | Document attack vector tree diagram and what to do with hosts and users during compromise | documentation | ## Details
| 1.0 | Document attack vector tree diagram and what to do with hosts and users during compromise - ## Details
| non_priority | document attack vector tree diagram and what to do with hosts and users during compromise details | 0 |
27,511 | 5,038,206,538 | IssuesEvent | 2016-12-18 04:17:31 | jquery/esprima | https://api.github.com/repos/jquery/esprima | closed | [ES2017] possible spec violation | defect | @ariya If you are using the 'strict directive' in a function with non-simple parameter list, I would expect it to throw. But it got parsed
```js
function foo(a=2) { 'use strict'; }
```
And also if you use 'use strict' directive in function with non-simple parameter list
```js
(a=2) => { 'use strict'; }
```
Here are a few other combos that should fail after the specs
```js
//| "Illegal 'use strict' directive in function with non-simple parameter list
function foo({a}) { 'use strict'; }
//| use strict' directive in function with non-simple parameter list
({a}) => { 'use strict'; }
//| "Illegal 'use strict' directive in function with non-simple parameter list
function foo(a) { 'use strict'; }
```
I also would have expected this one to fail:
```js
'use strict'; if(x) function f() {}
```
| 1.0 | [ES2017] possible spec violation - @ariya If you are using the 'strict directive' in a function with non-simple parameter list, I would expect it to throw. But it got parsed
```js
function foo(a=2) { 'use strict'; }
```
And also if you use 'use strict' directive in function with non-simple parameter list
```js
(a=2) => { 'use strict'; }
```
Here are a few other combos that should fail after the specs
```js
//| "Illegal 'use strict' directive in function with non-simple parameter list
function foo({a}) { 'use strict'; }
//| use strict' directive in function with non-simple parameter list
({a}) => { 'use strict'; }
//| "Illegal 'use strict' directive in function with non-simple parameter list
function foo(a) { 'use strict'; }
```
I also would have expected this one to fail:
```js
'use strict'; if(x) function f() {}
```
| non_priority | possible spec violation ariya if you are using the strict directive in a function with non simple parameter list i would expect it to throw but it got parsed js function foo a use strict and also if you use use strict directive in function with non simple parameter list js a use strict here are a few other combos that should fail after the specs js illegal use strict directive in function with non simple parameter list function foo a use strict use strict directive in function with non simple parameter list a use strict illegal use strict directive in function with non simple parameter list function foo a use strict i also would have expected this one to fail js use strict if x function f | 0 |
188,030 | 22,046,106,614 | IssuesEvent | 2022-05-30 02:01:32 | maddyCode23/linux-4.1.15 | https://api.github.com/repos/maddyCode23/linux-4.1.15 | closed | CVE-2018-14609 (Medium) detected in linux-stable-rtv4.1.33 - autoclosed | security vulnerability | ## CVE-2018-14609 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/btrfs/relocation.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/btrfs/relocation.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized.
<p>Publish Date: 2018-07-27
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14609>CVE-2018-14609</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14609">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14609</a></p>
<p>Release Date: 2018-07-27</p>
<p>Fix Resolution: v4.19-rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-14609 (Medium) detected in linux-stable-rtv4.1.33 - autoclosed - ## CVE-2018-14609 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/btrfs/relocation.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/btrfs/relocation.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized.
<p>Publish Date: 2018-07-27
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14609>CVE-2018-14609</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14609">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14609</a></p>
<p>Release Date: 2018-07-27</p>
<p>Fix Resolution: v4.19-rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in linux stable autoclosed cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files fs btrfs relocation c fs btrfs relocation c vulnerability details an issue was discovered in the linux kernel through there is an invalid pointer dereference in del reloc root in fs btrfs relocation c when mounting a crafted btrfs image related to removing reloc rb trees when reloc control has not been initialized publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
27,219 | 7,924,080,329 | IssuesEvent | 2018-07-05 15:48:20 | mapbox/mapbox-gl-native | https://api.github.com/repos/mapbox/mapbox-gl-native | closed | Consolidate Android release builds | Android build | We currently have three flavors of Android release builds:
* android-build-release
ignores master/release-*
no maven publishing
* android-release-snapshot
only master/release-*
includes maven publishing
* android-release-tag
only android-v* tags
has “Update version name” step
includes maven publishing
These builds mostly do the same thing, and are intended to be mutually exclusive. However, having different job names means the first `android-build-release` build on a new branch never has a matching cache:
```
No cache is found for key: v3/android-build-release/arch1-linux-amd64-6_62/binary-size-diffs/19gUdVQmMqkCxZ3cwNeNKy_0nUe9as0xnnyDpV5u5FE=
No cache is found for key: v3/android-build-release/arch1-linux-amd64-6_62/master/19gUdVQmMqkCxZ3cwNeNKy_0nUe9as0xnnyDpV5u5FE=
```
The first key doesn't match because it's the first build on the branch. The second key doesn't match because the master branch doesn't build the `android-build-release` job.
We should consolidate these three jobs under a single `android-release` job and run the “Update version name” and maven publishing steps conditionally. | 1.0 | Consolidate Android release builds - We currently have three flavors of Android release builds:
* android-build-release
ignores master/release-*
no maven publishing
* android-release-snapshot
only master/release-*
includes maven publishing
* android-release-tag
only android-v* tags
has “Update version name” step
includes maven publishing
These builds mostly do the same thing, and are intended to be mutually exclusive. However, having different job names means the first `android-build-release` build on a new branch never has a matching cache:
```
No cache is found for key: v3/android-build-release/arch1-linux-amd64-6_62/binary-size-diffs/19gUdVQmMqkCxZ3cwNeNKy_0nUe9as0xnnyDpV5u5FE=
No cache is found for key: v3/android-build-release/arch1-linux-amd64-6_62/master/19gUdVQmMqkCxZ3cwNeNKy_0nUe9as0xnnyDpV5u5FE=
```
The first key doesn't match because it's the first build on the branch. The second key doesn't match because the master branch doesn't build the `android-build-release` job.
We should consolidate these three jobs under a single `android-release` job and run the “Update version name” and maven publishing steps conditionally. | non_priority | consolidate android release builds we currently have three flavors of android release builds android build release ignores master release no maven publishing android release snapshot only master release includes maven publishing android release tag only android v tags has “update version name” step includes maven publishing these builds mostly do the same thing and are intended to be mutually exclusive however having different job names means the first android build release build on a new branch never has a matching cache no cache is found for key android build release linux binary size diffs no cache is found for key android build release linux master the first key doesn t match because it s the first build on the branch the second key doesn t match because the master branch doesn t build the android build release job we should consolidate these three jobs under a single android release job and run the “update version name” and maven publishing steps conditionally | 0 |
197,768 | 22,606,134,297 | IssuesEvent | 2022-06-29 13:25:10 | crouchr/learnage | https://api.github.com/repos/crouchr/learnage | closed | CVE-2019-6978 (High) detected in graphviz2.38.0 - autoclosed | security vulnerability | ## CVE-2019-6978 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>graphviz2.38.0</b></p></summary>
<p>
<p>Library home page: <a href=https://gitlab.com/graphviz/graphviz/>https://gitlab.com/graphviz/graphviz/</a></p>
<p>Found in HEAD commit: <a href="https://github.com/crouchr/learnage/commit/a5f2b4a6eb346dbe0def97e83877b169dc4b8f8c">a5f2b4a6eb346dbe0def97e83877b169dc4b8f8c</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (5)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/blackrain2020/original-sources-3rd-party/graphviz-2.24.0/graphviz-2.24.0/lib/gd/gd_jpeg.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/blackrain2020/original-sources-3rd-party/graphviz-2.24.0/graphviz-2.24.0/lib/gd/gd_wbmp.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/blackrain2020/original-sources-3rd-party/graphviz-2.24.0/graphviz-2.24.0/lib/gd/gd_jpeg.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/blackrain2020/original-sources-3rd-party/graphviz-2.24.0/graphviz-2.24.0/lib/gd/gd_wbmp.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/blackrain2020/original-sources-3rd-party/graphviz-2.24.0/graphviz-2.24.0/lib/gd/gd_gif_out.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The GD Graphics Library (aka LibGD) 2.2.5 has a double free in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c. NOTE: PHP is unaffected.
<p>Publish Date: 2019-01-28
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-6978>CVE-2019-6978</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978</a></p>
<p>Release Date: 2019-04-05</p>
<p>Fix Resolution: libgd 2.3.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-6978 (High) detected in graphviz2.38.0 - autoclosed - ## CVE-2019-6978 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>graphviz2.38.0</b></p></summary>
<p>
<p>Library home page: <a href=https://gitlab.com/graphviz/graphviz/>https://gitlab.com/graphviz/graphviz/</a></p>
<p>Found in HEAD commit: <a href="https://github.com/crouchr/learnage/commit/a5f2b4a6eb346dbe0def97e83877b169dc4b8f8c">a5f2b4a6eb346dbe0def97e83877b169dc4b8f8c</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (5)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/blackrain2020/original-sources-3rd-party/graphviz-2.24.0/graphviz-2.24.0/lib/gd/gd_jpeg.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/blackrain2020/original-sources-3rd-party/graphviz-2.24.0/graphviz-2.24.0/lib/gd/gd_wbmp.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/blackrain2020/original-sources-3rd-party/graphviz-2.24.0/graphviz-2.24.0/lib/gd/gd_jpeg.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/blackrain2020/original-sources-3rd-party/graphviz-2.24.0/graphviz-2.24.0/lib/gd/gd_wbmp.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/blackrain2020/original-sources-3rd-party/graphviz-2.24.0/graphviz-2.24.0/lib/gd/gd_gif_out.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The GD Graphics Library (aka LibGD) 2.2.5 has a double free in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c. NOTE: PHP is unaffected.
<p>Publish Date: 2019-01-28
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-6978>CVE-2019-6978</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978</a></p>
<p>Release Date: 2019-04-05</p>
<p>Fix Resolution: libgd 2.3.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in autoclosed cve high severity vulnerability vulnerable library library home page a href found in head commit a href found in base branch master vulnerable source files original sources party graphviz graphviz lib gd gd jpeg c original sources party graphviz graphviz lib gd gd wbmp c original sources party graphviz graphviz lib gd gd jpeg c original sources party graphviz graphviz lib gd gd wbmp c original sources party graphviz graphviz lib gd gd gif out c vulnerability details the gd graphics library aka libgd has a double free in the gdimage ptr functions in gd gif out c gd jpeg c and gd wbmp c note php is unaffected publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution libgd step up your open source security game with mend | 0 |
182,250 | 14,111,682,872 | IssuesEvent | 2020-11-07 01:12:26 | dotnet/runtime | https://api.github.com/repos/dotnet/runtime | closed | System.Diagnostics.Tracing tests failing in CI | area-System.Diagnostics.Tracing disabled-test os-windows-nano p1 test bug | @MattGal updated the Nano containers used in CI to v1709, and now tests are failing, e.g.
https://mc.dot.net/#/user/stephentoub/pr~2Fjenkins~2Fdotnet~2Fcorefx~2Fmaster~2F/test~2Ffunctional~2Fcli~2F/8b94440c48148e20822d2cafebad29fed0f30f76/workItem/System.Diagnostics.Tracing.Tests/wilogs
```
2018-05-17 00:02:41,384: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.FuzzyTests.Test_Write_Fuzzy [FAIL]
2018-05-17 00:02:41,387: INFO: proc(54): run_and_log_output: Output: System.Runtime.InteropServices.COMException : The instance name passed was not recognized as valid by a WMI data provider. (Exception from HRESULT: 0x80071069)
2018-05-17 00:02:41,392: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:41,503: INFO: proc(54): run_and_log_output: Output: at System.Runtime.InteropServices.Marshal.ThrowExceptionForHRInternal(Int32 errorCode, IntPtr errorInfo)
2018-05-17 00:02:41,503: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.Session.TraceEventSession.Flush()
2018-05-17 00:02:41,509: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(224,0): at BasicEventSourceTests.EtwListener.Dispose()
2018-05-17 00:02:41,509: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\FuzzyTests.cs(2756,0): at BasicEventSourceTests.FuzzyTests.Test_Write_Fuzzy()
2018-05-17 00:02:43,480: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ComplexData_SelfDescribing_ETW [FAIL]
2018-05-17 00:02:43,480: INFO: proc(54): run_and_log_output: Output: Assert.NotNull() Failure
2018-05-17 00:02:43,480: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:43,482: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(108,0): at BasicEventSourceTests.EventTestHarness.<>c__DisplayClass2_0.<RunTests>b__0(Event data)
2018-05-17 00:02:43,482: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(258,0): at BasicEventSourceTests.EtwListener.OnEventHelper(TraceEvent data)
2018-05-17 00:02:43,482: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventDispatcher.DoDispatch(TraceEvent anEvent)
2018-05-17 00:02:43,483: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.RawDispatch(EVENT_RECORD* rawData)
2018-05-17 00:02:43,483: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventNativeMethods.ProcessTrace(UInt64[] handleArray, UInt32 handleCount, IntPtr StartTime, IntPtr EndTime)
2018-05-17 00:02:43,483: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.ProcessOneFile()
2018-05-17 00:02:43,483: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.Process()
2018-05-17 00:02:43,483: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(238,0): at BasicEventSourceTests.EtwListener.Dispose()
2018-05-17 00:02:43,483: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(170,0): at BasicEventSourceTests.EventTestHarness.RunTests(List`1 tests, Listener listener, EventSource source, FilteringOptions options)
2018-05-17 00:02:43,484: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(506,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ComplexData_SelfDescribing(Listener listener)
2018-05-17 00:02:43,484: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(458,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ComplexData_SelfDescribing_ETW()
2018-05-17 00:02:45,358: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_SelfDescribing_ETW [FAIL]
2018-05-17 00:02:45,358: INFO: proc(54): run_and_log_output: Output: Assert.NotNull() Failure
2018-05-17 00:02:45,358: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:45,358: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(108,0): at BasicEventSourceTests.EventTestHarness.<>c__DisplayClass2_0.<RunTests>b__0(Event data)
2018-05-17 00:02:45,358: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(258,0): at BasicEventSourceTests.EtwListener.OnEventHelper(TraceEvent data)
2018-05-17 00:02:45,358: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventDispatcher.DoDispatch(TraceEvent anEvent)
2018-05-17 00:02:45,358: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.RawDispatch(EVENT_RECORD* rawData)
2018-05-17 00:02:45,359: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventNativeMethods.ProcessTrace(UInt64[] handleArray, UInt32 handleCount, IntPtr StartTime, IntPtr EndTime)
2018-05-17 00:02:45,359: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.ProcessOneFile()
2018-05-17 00:02:45,359: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.Process()
2018-05-17 00:02:45,359: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(238,0): at BasicEventSourceTests.EtwListener.Dispose()
2018-05-17 00:02:45,359: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(170,0): at BasicEventSourceTests.EventTestHarness.RunTests(List`1 tests, Listener listener, EventSource source, FilteringOptions options)
2018-05-17 00:02:45,359: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(430,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent(Listener listener, Boolean useSelfDescribingEvents)
2018-05-17 00:02:45,359: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(79,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_SelfDescribing_ETW()
2018-05-17 00:02:47,214: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_Manifest_ETW [FAIL]
2018-05-17 00:02:47,216: INFO: proc(54): run_and_log_output: Output: Assert.NotNull() Failure
2018-05-17 00:02:47,216: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:47,216: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(108,0): at BasicEventSourceTests.EventTestHarness.<>c__DisplayClass2_0.<RunTests>b__0(Event data)
2018-05-17 00:02:47,217: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(258,0): at BasicEventSourceTests.EtwListener.OnEventHelper(TraceEvent data)
2018-05-17 00:02:47,217: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventDispatcher.DoDispatch(TraceEvent anEvent)
2018-05-17 00:02:47,217: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.RawDispatch(EVENT_RECORD* rawData)
2018-05-17 00:02:47,217: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventNativeMethods.ProcessTrace(UInt64[] handleArray, UInt32 handleCount, IntPtr StartTime, IntPtr EndTime)
2018-05-17 00:02:47,217: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.ProcessOneFile()
2018-05-17 00:02:47,217: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.Process()
2018-05-17 00:02:47,219: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(238,0): at BasicEventSourceTests.EtwListener.Dispose()
2018-05-17 00:02:47,219: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(170,0): at BasicEventSourceTests.EventTestHarness.RunTests(List`1 tests, Listener listener, EventSource source, FilteringOptions options)
2018-05-17 00:02:47,220: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(430,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent(Listener listener, Boolean useSelfDescribingEvents)
2018-05-17 00:02:47,220: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(41,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_Manifest_ETW()
2018-05-17 00:02:49,144: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ByteArray_Manifest_ETW [FAIL]
2018-05-17 00:02:49,145: INFO: proc(54): run_and_log_output: Output: Assert.NotNull() Failure
2018-05-17 00:02:49,145: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:49,145: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(108,0): at BasicEventSourceTests.EventTestHarness.<>c__DisplayClass2_0.<RunTests>b__0(Event data)
2018-05-17 00:02:49,147: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(258,0): at BasicEventSourceTests.EtwListener.OnEventHelper(TraceEvent data)
2018-05-17 00:02:49,147: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventDispatcher.DoDispatch(TraceEvent anEvent)
2018-05-17 00:02:49,147: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.RawDispatch(EVENT_RECORD* rawData)
2018-05-17 00:02:49,148: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventNativeMethods.ProcessTrace(UInt64[] handleArray, UInt32 handleCount, IntPtr StartTime, IntPtr EndTime)
2018-05-17 00:02:49,148: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.ProcessOneFile()
2018-05-17 00:02:49,148: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.Process()
2018-05-17 00:02:49,148: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(238,0): at BasicEventSourceTests.EtwListener.Dispose()
2018-05-17 00:02:49,148: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(170,0): at BasicEventSourceTests.EventTestHarness.RunTests(List`1 tests, Listener listener, EventSource source, FilteringOptions options)
2018-05-17 00:02:49,150: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(708,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ByteArray(Boolean useSelfDescribingEvents, Listener listener)
2018-05-17 00:02:49,150: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(548,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ByteArray_Manifest_ETW()
2018-05-17 00:02:51,007: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ByteArray_SelfDescribing_ETW [FAIL]
2018-05-17 00:02:51,007: INFO: proc(54): run_and_log_output: Output: Assert.NotNull() Failure
2018-05-17 00:02:51,007: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:51,009: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(108,0): at BasicEventSourceTests.EventTestHarness.<>c__DisplayClass2_0.<RunTests>b__0(Event data)
2018-05-17 00:02:51,009: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(258,0): at BasicEventSourceTests.EtwListener.OnEventHelper(TraceEvent data)
2018-05-17 00:02:51,009: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventDispatcher.DoDispatch(TraceEvent anEvent)
2018-05-17 00:02:51,009: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.RawDispatch(EVENT_RECORD* rawData)
2018-05-17 00:02:51,009: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventNativeMethods.ProcessTrace(UInt64[] handleArray, UInt32 handleCount, IntPtr StartTime, IntPtr EndTime)
2018-05-17 00:02:51,009: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.ProcessOneFile()
2018-05-17 00:02:51,009: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.Process()
2018-05-17 00:02:51,010: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(238,0): at BasicEventSourceTests.EtwListener.Dispose()
2018-05-17 00:02:51,010: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(170,0): at BasicEventSourceTests.EventTestHarness.RunTests(List`1 tests, Listener listener, EventSource source, FilteringOptions options)
2018-05-17 00:02:51,010: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(708,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ByteArray(Boolean useSelfDescribingEvents, Listener listener)
2018-05-17 00:02:51,012: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(578,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ByteArray_SelfDescribing_ETW()
2018-05-17 00:02:54,994: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.TestsWrite.Test_Write_T_ETW [FAIL]
2018-05-17 00:02:54,994: INFO: proc(54): run_and_log_output: Output: Assert.NotNull() Failure
2018-05-17 00:02:54,994: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:54,996: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(108,0): at BasicEventSourceTests.EventTestHarness.<>c__DisplayClass2_0.<RunTests>b__0(Event data)
2018-05-17 00:02:54,996: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(258,0): at BasicEventSourceTests.EtwListener.OnEventHelper(TraceEvent data)
2018-05-17 00:02:54,996: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventDispatcher.DoDispatch(TraceEvent anEvent)
2018-05-17 00:02:54,996: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.RawDispatch(EVENT_RECORD* rawData)
2018-05-17 00:02:54,996: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventNativeMethods.ProcessTrace(UInt64[] handleArray, UInt32 handleCount, IntPtr StartTime, IntPtr EndTime)
2018-05-17 00:02:54,996: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.ProcessOneFile()
2018-05-17 00:02:54,997: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.Process()
2018-05-17 00:02:54,997: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(238,0): at BasicEventSourceTests.EtwListener.Dispose()
2018-05-17 00:02:54,997: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(170,0): at BasicEventSourceTests.EventTestHarness.RunTests(List`1 tests, Listener listener, EventSource source, FilteringOptions options)
2018-05-17 00:02:54,999: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWrite.cs(431,0): at BasicEventSourceTests.TestsWrite.Test_Write_T(Listener listener)
2018-05-17 00:02:54,999: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWrite.cs(82,0): at BasicEventSourceTests.TestsWrite.Test_Write_T_ETW()
2018-05-17 00:02:56,382: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.TestsUserErrors.Test_BadEventSource_MismatchedIds [FAIL]
2018-05-17 00:02:56,382: INFO: proc(54): run_and_log_output: Output: Assert.Equal() Failure
2018-05-17 00:02:56,384: INFO: proc(54): run_and_log_output: Output: Expected: 2
2018-05-17 00:02:56,384: INFO: proc(54): run_and_log_output: Output: Actual: 1
2018-05-17 00:02:56,384: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:56,384: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsUserErrors.cs(144,0): at BasicEventSourceTests.TestsUserErrors.Test_Bad_EventSource_Startup(Boolean onStartup, Listener listener, EventSourceSettings settings)
2018-05-17 00:02:56,384: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsUserErrors.cs(107,0): at BasicEventSourceTests.TestsUserErrors.Test_BadEventSource_MismatchedIds()
``` | 2.0 | System.Diagnostics.Tracing tests failing in CI - @MattGal updated the Nano containers used in CI to v1709, and now tests are failing, e.g.
https://mc.dot.net/#/user/stephentoub/pr~2Fjenkins~2Fdotnet~2Fcorefx~2Fmaster~2F/test~2Ffunctional~2Fcli~2F/8b94440c48148e20822d2cafebad29fed0f30f76/workItem/System.Diagnostics.Tracing.Tests/wilogs
```
2018-05-17 00:02:41,384: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.FuzzyTests.Test_Write_Fuzzy [FAIL]
2018-05-17 00:02:41,387: INFO: proc(54): run_and_log_output: Output: System.Runtime.InteropServices.COMException : The instance name passed was not recognized as valid by a WMI data provider. (Exception from HRESULT: 0x80071069)
2018-05-17 00:02:41,392: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:41,503: INFO: proc(54): run_and_log_output: Output: at System.Runtime.InteropServices.Marshal.ThrowExceptionForHRInternal(Int32 errorCode, IntPtr errorInfo)
2018-05-17 00:02:41,503: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.Session.TraceEventSession.Flush()
2018-05-17 00:02:41,509: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(224,0): at BasicEventSourceTests.EtwListener.Dispose()
2018-05-17 00:02:41,509: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\FuzzyTests.cs(2756,0): at BasicEventSourceTests.FuzzyTests.Test_Write_Fuzzy()
2018-05-17 00:02:43,480: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ComplexData_SelfDescribing_ETW [FAIL]
2018-05-17 00:02:43,480: INFO: proc(54): run_and_log_output: Output: Assert.NotNull() Failure
2018-05-17 00:02:43,480: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:43,482: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(108,0): at BasicEventSourceTests.EventTestHarness.<>c__DisplayClass2_0.<RunTests>b__0(Event data)
2018-05-17 00:02:43,482: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(258,0): at BasicEventSourceTests.EtwListener.OnEventHelper(TraceEvent data)
2018-05-17 00:02:43,482: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventDispatcher.DoDispatch(TraceEvent anEvent)
2018-05-17 00:02:43,483: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.RawDispatch(EVENT_RECORD* rawData)
2018-05-17 00:02:43,483: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventNativeMethods.ProcessTrace(UInt64[] handleArray, UInt32 handleCount, IntPtr StartTime, IntPtr EndTime)
2018-05-17 00:02:43,483: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.ProcessOneFile()
2018-05-17 00:02:43,483: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.Process()
2018-05-17 00:02:43,483: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(238,0): at BasicEventSourceTests.EtwListener.Dispose()
2018-05-17 00:02:43,483: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(170,0): at BasicEventSourceTests.EventTestHarness.RunTests(List`1 tests, Listener listener, EventSource source, FilteringOptions options)
2018-05-17 00:02:43,484: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(506,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ComplexData_SelfDescribing(Listener listener)
2018-05-17 00:02:43,484: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(458,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ComplexData_SelfDescribing_ETW()
2018-05-17 00:02:45,358: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_SelfDescribing_ETW [FAIL]
2018-05-17 00:02:45,358: INFO: proc(54): run_and_log_output: Output: Assert.NotNull() Failure
2018-05-17 00:02:45,358: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:45,358: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(108,0): at BasicEventSourceTests.EventTestHarness.<>c__DisplayClass2_0.<RunTests>b__0(Event data)
2018-05-17 00:02:45,358: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(258,0): at BasicEventSourceTests.EtwListener.OnEventHelper(TraceEvent data)
2018-05-17 00:02:45,358: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventDispatcher.DoDispatch(TraceEvent anEvent)
2018-05-17 00:02:45,358: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.RawDispatch(EVENT_RECORD* rawData)
2018-05-17 00:02:45,359: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventNativeMethods.ProcessTrace(UInt64[] handleArray, UInt32 handleCount, IntPtr StartTime, IntPtr EndTime)
2018-05-17 00:02:45,359: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.ProcessOneFile()
2018-05-17 00:02:45,359: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.Process()
2018-05-17 00:02:45,359: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(238,0): at BasicEventSourceTests.EtwListener.Dispose()
2018-05-17 00:02:45,359: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(170,0): at BasicEventSourceTests.EventTestHarness.RunTests(List`1 tests, Listener listener, EventSource source, FilteringOptions options)
2018-05-17 00:02:45,359: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(430,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent(Listener listener, Boolean useSelfDescribingEvents)
2018-05-17 00:02:45,359: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(79,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_SelfDescribing_ETW()
2018-05-17 00:02:47,214: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_Manifest_ETW [FAIL]
2018-05-17 00:02:47,216: INFO: proc(54): run_and_log_output: Output: Assert.NotNull() Failure
2018-05-17 00:02:47,216: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:47,216: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(108,0): at BasicEventSourceTests.EventTestHarness.<>c__DisplayClass2_0.<RunTests>b__0(Event data)
2018-05-17 00:02:47,217: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(258,0): at BasicEventSourceTests.EtwListener.OnEventHelper(TraceEvent data)
2018-05-17 00:02:47,217: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventDispatcher.DoDispatch(TraceEvent anEvent)
2018-05-17 00:02:47,217: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.RawDispatch(EVENT_RECORD* rawData)
2018-05-17 00:02:47,217: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventNativeMethods.ProcessTrace(UInt64[] handleArray, UInt32 handleCount, IntPtr StartTime, IntPtr EndTime)
2018-05-17 00:02:47,217: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.ProcessOneFile()
2018-05-17 00:02:47,217: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.Process()
2018-05-17 00:02:47,219: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(238,0): at BasicEventSourceTests.EtwListener.Dispose()
2018-05-17 00:02:47,219: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(170,0): at BasicEventSourceTests.EventTestHarness.RunTests(List`1 tests, Listener listener, EventSource source, FilteringOptions options)
2018-05-17 00:02:47,220: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(430,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent(Listener listener, Boolean useSelfDescribingEvents)
2018-05-17 00:02:47,220: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(41,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_Manifest_ETW()
2018-05-17 00:02:49,144: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ByteArray_Manifest_ETW [FAIL]
2018-05-17 00:02:49,145: INFO: proc(54): run_and_log_output: Output: Assert.NotNull() Failure
2018-05-17 00:02:49,145: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:49,145: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(108,0): at BasicEventSourceTests.EventTestHarness.<>c__DisplayClass2_0.<RunTests>b__0(Event data)
2018-05-17 00:02:49,147: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(258,0): at BasicEventSourceTests.EtwListener.OnEventHelper(TraceEvent data)
2018-05-17 00:02:49,147: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventDispatcher.DoDispatch(TraceEvent anEvent)
2018-05-17 00:02:49,147: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.RawDispatch(EVENT_RECORD* rawData)
2018-05-17 00:02:49,148: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventNativeMethods.ProcessTrace(UInt64[] handleArray, UInt32 handleCount, IntPtr StartTime, IntPtr EndTime)
2018-05-17 00:02:49,148: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.ProcessOneFile()
2018-05-17 00:02:49,148: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.Process()
2018-05-17 00:02:49,148: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(238,0): at BasicEventSourceTests.EtwListener.Dispose()
2018-05-17 00:02:49,148: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(170,0): at BasicEventSourceTests.EventTestHarness.RunTests(List`1 tests, Listener listener, EventSource source, FilteringOptions options)
2018-05-17 00:02:49,150: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(708,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ByteArray(Boolean useSelfDescribingEvents, Listener listener)
2018-05-17 00:02:49,150: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(548,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ByteArray_Manifest_ETW()
2018-05-17 00:02:51,007: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ByteArray_SelfDescribing_ETW [FAIL]
2018-05-17 00:02:51,007: INFO: proc(54): run_and_log_output: Output: Assert.NotNull() Failure
2018-05-17 00:02:51,007: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:51,009: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(108,0): at BasicEventSourceTests.EventTestHarness.<>c__DisplayClass2_0.<RunTests>b__0(Event data)
2018-05-17 00:02:51,009: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(258,0): at BasicEventSourceTests.EtwListener.OnEventHelper(TraceEvent data)
2018-05-17 00:02:51,009: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventDispatcher.DoDispatch(TraceEvent anEvent)
2018-05-17 00:02:51,009: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.RawDispatch(EVENT_RECORD* rawData)
2018-05-17 00:02:51,009: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventNativeMethods.ProcessTrace(UInt64[] handleArray, UInt32 handleCount, IntPtr StartTime, IntPtr EndTime)
2018-05-17 00:02:51,009: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.ProcessOneFile()
2018-05-17 00:02:51,009: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.Process()
2018-05-17 00:02:51,010: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(238,0): at BasicEventSourceTests.EtwListener.Dispose()
2018-05-17 00:02:51,010: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(170,0): at BasicEventSourceTests.EventTestHarness.RunTests(List`1 tests, Listener listener, EventSource source, FilteringOptions options)
2018-05-17 00:02:51,010: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(708,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ByteArray(Boolean useSelfDescribingEvents, Listener listener)
2018-05-17 00:02:51,012: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWriteEvent.cs(578,0): at BasicEventSourceTests.TestsWriteEvent.Test_WriteEvent_ByteArray_SelfDescribing_ETW()
2018-05-17 00:02:54,994: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.TestsWrite.Test_Write_T_ETW [FAIL]
2018-05-17 00:02:54,994: INFO: proc(54): run_and_log_output: Output: Assert.NotNull() Failure
2018-05-17 00:02:54,994: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:54,996: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(108,0): at BasicEventSourceTests.EventTestHarness.<>c__DisplayClass2_0.<RunTests>b__0(Event data)
2018-05-17 00:02:54,996: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(258,0): at BasicEventSourceTests.EtwListener.OnEventHelper(TraceEvent data)
2018-05-17 00:02:54,996: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventDispatcher.DoDispatch(TraceEvent anEvent)
2018-05-17 00:02:54,996: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.RawDispatch(EVENT_RECORD* rawData)
2018-05-17 00:02:54,996: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.TraceEventNativeMethods.ProcessTrace(UInt64[] handleArray, UInt32 handleCount, IntPtr StartTime, IntPtr EndTime)
2018-05-17 00:02:54,996: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.ProcessOneFile()
2018-05-17 00:02:54,997: INFO: proc(54): run_and_log_output: Output: at Microsoft.Diagnostics.Tracing.ETWTraceEventSource.Process()
2018-05-17 00:02:54,997: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\Listeners.cs(238,0): at BasicEventSourceTests.EtwListener.Dispose()
2018-05-17 00:02:54,997: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\Harness\EventTestHarness.cs(170,0): at BasicEventSourceTests.EventTestHarness.RunTests(List`1 tests, Listener listener, EventSource source, FilteringOptions options)
2018-05-17 00:02:54,999: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWrite.cs(431,0): at BasicEventSourceTests.TestsWrite.Test_Write_T(Listener listener)
2018-05-17 00:02:54,999: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsWrite.cs(82,0): at BasicEventSourceTests.TestsWrite.Test_Write_T_ETW()
2018-05-17 00:02:56,382: INFO: proc(54): run_and_log_output: Output: BasicEventSourceTests.TestsUserErrors.Test_BadEventSource_MismatchedIds [FAIL]
2018-05-17 00:02:56,382: INFO: proc(54): run_and_log_output: Output: Assert.Equal() Failure
2018-05-17 00:02:56,384: INFO: proc(54): run_and_log_output: Output: Expected: 2
2018-05-17 00:02:56,384: INFO: proc(54): run_and_log_output: Output: Actual: 1
2018-05-17 00:02:56,384: INFO: proc(54): run_and_log_output: Output: Stack Trace:
2018-05-17 00:02:56,384: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsUserErrors.cs(144,0): at BasicEventSourceTests.TestsUserErrors.Test_Bad_EventSource_Startup(Boolean onStartup, Listener listener, EventSourceSettings settings)
2018-05-17 00:02:56,384: INFO: proc(54): run_and_log_output: Output: D:\j\workspace\windows-TGrou---74aa877a\src\System.Diagnostics.Tracing\tests\BasicEventSourceTest\TestsUserErrors.cs(107,0): at BasicEventSourceTests.TestsUserErrors.Test_BadEventSource_MismatchedIds()
``` | non_priority | system diagnostics tracing tests failing in ci mattgal updated the nano containers used in ci to and now tests are failing e g info proc run and log output output basiceventsourcetests fuzzytests test write fuzzy info proc run and log output output system runtime interopservices comexception the instance name passed was not recognized as valid by a wmi data provider exception from hresult info proc run and log output output stack trace info proc run and log output output at system runtime interopservices marshal throwexceptionforhrinternal errorcode intptr errorinfo info proc run and log output output at microsoft diagnostics tracing session traceeventsession flush info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness listeners cs at basiceventsourcetests etwlistener dispose info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest fuzzytests cs at basiceventsourcetests fuzzytests test write fuzzy info proc run and log output output basiceventsourcetests testswriteevent test writeevent complexdata selfdescribing etw info proc run and log output output assert notnull failure info proc run and log output output stack trace info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness eventtestharness cs at basiceventsourcetests eventtestharness c b event data info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness listeners cs at basiceventsourcetests etwlistener oneventhelper traceevent data info proc run and log output output at microsoft diagnostics tracing traceeventdispatcher dodispatch traceevent anevent info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource rawdispatch event record rawdata info proc run and log output output at microsoft diagnostics tracing traceeventnativemethods processtrace handlearray handlecount intptr starttime intptr endtime info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource processonefile info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource process info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness listeners cs at basiceventsourcetests etwlistener dispose info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness eventtestharness cs at basiceventsourcetests eventtestharness runtests list tests listener listener eventsource source filteringoptions options info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest testswriteevent cs at basiceventsourcetests testswriteevent test writeevent complexdata selfdescribing listener listener info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest testswriteevent cs at basiceventsourcetests testswriteevent test writeevent complexdata selfdescribing etw info proc run and log output output basiceventsourcetests testswriteevent test writeevent selfdescribing etw info proc run and log output output assert notnull failure info proc run and log output output stack trace info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness eventtestharness cs at basiceventsourcetests eventtestharness c b event data info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness listeners cs at basiceventsourcetests etwlistener oneventhelper traceevent data info proc run and log output output at microsoft diagnostics tracing traceeventdispatcher dodispatch traceevent anevent info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource rawdispatch event record rawdata info proc run and log output output at microsoft diagnostics tracing traceeventnativemethods processtrace handlearray handlecount intptr starttime intptr endtime info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource processonefile info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource process info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness listeners cs at basiceventsourcetests etwlistener dispose info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness eventtestharness cs at basiceventsourcetests eventtestharness runtests list tests listener listener eventsource source filteringoptions options info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest testswriteevent cs at basiceventsourcetests testswriteevent test writeevent listener listener boolean useselfdescribingevents info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest testswriteevent cs at basiceventsourcetests testswriteevent test writeevent selfdescribing etw info proc run and log output output basiceventsourcetests testswriteevent test writeevent manifest etw info proc run and log output output assert notnull failure info proc run and log output output stack trace info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness eventtestharness cs at basiceventsourcetests eventtestharness c b event data info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness listeners cs at basiceventsourcetests etwlistener oneventhelper traceevent data info proc run and log output output at microsoft diagnostics tracing traceeventdispatcher dodispatch traceevent anevent info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource rawdispatch event record rawdata info proc run and log output output at microsoft diagnostics tracing traceeventnativemethods processtrace handlearray handlecount intptr starttime intptr endtime info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource processonefile info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource process info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness listeners cs at basiceventsourcetests etwlistener dispose info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness eventtestharness cs at basiceventsourcetests eventtestharness runtests list tests listener listener eventsource source filteringoptions options info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest testswriteevent cs at basiceventsourcetests testswriteevent test writeevent listener listener boolean useselfdescribingevents info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest testswriteevent cs at basiceventsourcetests testswriteevent test writeevent manifest etw info proc run and log output output basiceventsourcetests testswriteevent test writeevent bytearray manifest etw info proc run and log output output assert notnull failure info proc run and log output output stack trace info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness eventtestharness cs at basiceventsourcetests eventtestharness c b event data info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness listeners cs at basiceventsourcetests etwlistener oneventhelper traceevent data info proc run and log output output at microsoft diagnostics tracing traceeventdispatcher dodispatch traceevent anevent info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource rawdispatch event record rawdata info proc run and log output output at microsoft diagnostics tracing traceeventnativemethods processtrace handlearray handlecount intptr starttime intptr endtime info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource processonefile info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource process info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness listeners cs at basiceventsourcetests etwlistener dispose info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness eventtestharness cs at basiceventsourcetests eventtestharness runtests list tests listener listener eventsource source filteringoptions options info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest testswriteevent cs at basiceventsourcetests testswriteevent test writeevent bytearray boolean useselfdescribingevents listener listener info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest testswriteevent cs at basiceventsourcetests testswriteevent test writeevent bytearray manifest etw info proc run and log output output basiceventsourcetests testswriteevent test writeevent bytearray selfdescribing etw info proc run and log output output assert notnull failure info proc run and log output output stack trace info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness eventtestharness cs at basiceventsourcetests eventtestharness c b event data info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness listeners cs at basiceventsourcetests etwlistener oneventhelper traceevent data info proc run and log output output at microsoft diagnostics tracing traceeventdispatcher dodispatch traceevent anevent info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource rawdispatch event record rawdata info proc run and log output output at microsoft diagnostics tracing traceeventnativemethods processtrace handlearray handlecount intptr starttime intptr endtime info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource processonefile info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource process info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness listeners cs at basiceventsourcetests etwlistener dispose info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness eventtestharness cs at basiceventsourcetests eventtestharness runtests list tests listener listener eventsource source filteringoptions options info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest testswriteevent cs at basiceventsourcetests testswriteevent test writeevent bytearray boolean useselfdescribingevents listener listener info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest testswriteevent cs at basiceventsourcetests testswriteevent test writeevent bytearray selfdescribing etw info proc run and log output output basiceventsourcetests testswrite test write t etw info proc run and log output output assert notnull failure info proc run and log output output stack trace info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness eventtestharness cs at basiceventsourcetests eventtestharness c b event data info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness listeners cs at basiceventsourcetests etwlistener oneventhelper traceevent data info proc run and log output output at microsoft diagnostics tracing traceeventdispatcher dodispatch traceevent anevent info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource rawdispatch event record rawdata info proc run and log output output at microsoft diagnostics tracing traceeventnativemethods processtrace handlearray handlecount intptr starttime intptr endtime info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource processonefile info proc run and log output output at microsoft diagnostics tracing etwtraceeventsource process info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness listeners cs at basiceventsourcetests etwlistener dispose info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest harness eventtestharness cs at basiceventsourcetests eventtestharness runtests list tests listener listener eventsource source filteringoptions options info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest testswrite cs at basiceventsourcetests testswrite test write t listener listener info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest testswrite cs at basiceventsourcetests testswrite test write t etw info proc run and log output output basiceventsourcetests testsusererrors test badeventsource mismatchedids info proc run and log output output assert equal failure info proc run and log output output expected info proc run and log output output actual info proc run and log output output stack trace info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest testsusererrors cs at basiceventsourcetests testsusererrors test bad eventsource startup boolean onstartup listener listener eventsourcesettings settings info proc run and log output output d j workspace windows tgrou src system diagnostics tracing tests basiceventsourcetest testsusererrors cs at basiceventsourcetests testsusererrors test badeventsource mismatchedids | 0 |
6,531 | 3,028,401,317 | IssuesEvent | 2015-08-04 04:50:19 | golang/go | https://api.github.com/repos/golang/go | closed | doc: for -buildmode=c-shared, document that //export requires import "C" | Documentation | This may just be a misunderstanding of how this is supposed to work - if so I'd appreciate some guidance.
*What version of Go are you using (go version)?*
`go version go1.5beta3 darwin/amd64`
*What operating system and processor architecture are you using?*
`Mac OS X 10.10.4 Intel Core i7`
*What did you do?*
I'm trying to build a C archive to link to a C++ app. I read the release notes and the **Go Execution Modes** doc. The second document states:
> The only callable symbols will be those functions marked as exported (by any package), as described in the cgo documentation.
I wrote a small test:
```go
package main
import "log"
//export Foo
func Foo() {
log.Println("Foo")
}
func main() {
// unused
}
```
`go build -buildmode=c-archive`
*What did you expect to see?*
I expected it to create **foo.a** and a header file with *Foo* exported.
*What did you see instead?*
It generated **foo.a**, but no header file.
*nm* also doesn't show my function being exported:
```
$ nm -g foo.a
foo.a(000000.o):
U ___stack_chk_fail
U ___stack_chk_guard
U ___stderrp
00000000000001f0 T __cgo_sys_thread_start
0000000000000360 T __cgo_wait_runtime_init_done
U _abort
00000000000004e1 T _crosscall_amd64
U _fprintf
U _fputc
U _free
U _fwrite
U _malloc
U _pthread_attr_destroy
U _pthread_attr_getstacksize
U _pthread_attr_init
U _pthread_cond_broadcast
U _pthread_cond_wait
U _pthread_create
U _pthread_key_create
U _pthread_key_delete
U _pthread_mutex_lock
U _pthread_mutex_unlock
U _pthread_setspecific
U _pthread_sigmask
U _setenv
U _strerror
U _unsetenv
0000000000000470 T _x_cgo_free
0000000000000000 T _x_cgo_init
0000000000000430 T _x_cgo_malloc
00000000000003c0 T _x_cgo_notify_runtime_init_done
0000000000000400 T _x_cgo_setenv
0000000000000300 T _x_cgo_sys_thread_create
0000000000000480 T _x_cgo_thread_start
0000000000000420 T _x_cgo_unsetenv
foo.a(go.o):
00000000000b49f0 T __cgo_panic
0000000000054fe0 T __cgo_topofstack
00000000000b4a20 T _crosscall2
U _x_cgo_free
U _x_cgo_init
U _x_cgo_malloc
U _x_cgo_notify_runtime_init_done
U _x_cgo_setenv
U _x_cgo_sys_thread_create
U _x_cgo_thread_start
U _x_cgo_unsetenv
``` | 1.0 | doc: for -buildmode=c-shared, document that //export requires import "C" - This may just be a misunderstanding of how this is supposed to work - if so I'd appreciate some guidance.
*What version of Go are you using (go version)?*
`go version go1.5beta3 darwin/amd64`
*What operating system and processor architecture are you using?*
`Mac OS X 10.10.4 Intel Core i7`
*What did you do?*
I'm trying to build a C archive to link to a C++ app. I read the release notes and the **Go Execution Modes** doc. The second document states:
> The only callable symbols will be those functions marked as exported (by any package), as described in the cgo documentation.
I wrote a small test:
```go
package main
import "log"
//export Foo
func Foo() {
log.Println("Foo")
}
func main() {
// unused
}
```
`go build -buildmode=c-archive`
*What did you expect to see?*
I expected it to create **foo.a** and a header file with *Foo* exported.
*What did you see instead?*
It generated **foo.a**, but no header file.
*nm* also doesn't show my function being exported:
```
$ nm -g foo.a
foo.a(000000.o):
U ___stack_chk_fail
U ___stack_chk_guard
U ___stderrp
00000000000001f0 T __cgo_sys_thread_start
0000000000000360 T __cgo_wait_runtime_init_done
U _abort
00000000000004e1 T _crosscall_amd64
U _fprintf
U _fputc
U _free
U _fwrite
U _malloc
U _pthread_attr_destroy
U _pthread_attr_getstacksize
U _pthread_attr_init
U _pthread_cond_broadcast
U _pthread_cond_wait
U _pthread_create
U _pthread_key_create
U _pthread_key_delete
U _pthread_mutex_lock
U _pthread_mutex_unlock
U _pthread_setspecific
U _pthread_sigmask
U _setenv
U _strerror
U _unsetenv
0000000000000470 T _x_cgo_free
0000000000000000 T _x_cgo_init
0000000000000430 T _x_cgo_malloc
00000000000003c0 T _x_cgo_notify_runtime_init_done
0000000000000400 T _x_cgo_setenv
0000000000000300 T _x_cgo_sys_thread_create
0000000000000480 T _x_cgo_thread_start
0000000000000420 T _x_cgo_unsetenv
foo.a(go.o):
00000000000b49f0 T __cgo_panic
0000000000054fe0 T __cgo_topofstack
00000000000b4a20 T _crosscall2
U _x_cgo_free
U _x_cgo_init
U _x_cgo_malloc
U _x_cgo_notify_runtime_init_done
U _x_cgo_setenv
U _x_cgo_sys_thread_create
U _x_cgo_thread_start
U _x_cgo_unsetenv
``` | non_priority | doc for buildmode c shared document that export requires import c this may just be a misunderstanding of how this is supposed to work if so i d appreciate some guidance what version of go are you using go version go version darwin what operating system and processor architecture are you using mac os x intel core what did you do i m trying to build a c archive to link to a c app i read the release notes and the go execution modes doc the second document states the only callable symbols will be those functions marked as exported by any package as described in the cgo documentation i wrote a small test go package main import log export foo func foo log println foo func main unused go build buildmode c archive what did you expect to see i expected it to create foo a and a header file with foo exported what did you see instead it generated foo a but no header file nm also doesn t show my function being exported nm g foo a foo a o u stack chk fail u stack chk guard u stderrp t cgo sys thread start t cgo wait runtime init done u abort t crosscall u fprintf u fputc u free u fwrite u malloc u pthread attr destroy u pthread attr getstacksize u pthread attr init u pthread cond broadcast u pthread cond wait u pthread create u pthread key create u pthread key delete u pthread mutex lock u pthread mutex unlock u pthread setspecific u pthread sigmask u setenv u strerror u unsetenv t x cgo free t x cgo init t x cgo malloc t x cgo notify runtime init done t x cgo setenv t x cgo sys thread create t x cgo thread start t x cgo unsetenv foo a go o t cgo panic t cgo topofstack t u x cgo free u x cgo init u x cgo malloc u x cgo notify runtime init done u x cgo setenv u x cgo sys thread create u x cgo thread start u x cgo unsetenv | 0 |
204,343 | 23,239,507,770 | IssuesEvent | 2022-08-03 14:29:37 | turkdevops/angular | https://api.github.com/repos/turkdevops/angular | closed | CVE-2015-8858 (High) detected in uglify-js-1.3.5.tgz - autoclosed | security vulnerability | ## CVE-2015-8858 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>uglify-js-1.3.5.tgz</b></p></summary>
<p>JavaScript parser and compressor/beautifier toolkit</p>
<p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-1.3.5.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-1.3.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/uglify-js/package.json</p>
<p>
Dependency Hierarchy:
- cldr-4.10.0.tgz (Root Library)
- :x: **uglify-js-1.3.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/turkdevops/angular/commit/c6aca37f442da8c55a02d7c53ccc58100ab004f3">c6aca37f442da8c55a02d7c53ccc58100ab004f3</a></p>
<p>Found in base branch: <b>labs/router</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The uglify-js package before 2.6.0 for Node.js allows attackers to cause a denial of service (CPU consumption) via crafted input in a parse call, aka a "regular expression denial of service (ReDoS)."
<p>Publish Date: 2017-01-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-8858>CVE-2015-8858</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8858">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8858</a></p>
<p>Release Date: 2017-01-23</p>
<p>Fix Resolution (uglify-js): 2.6.0</p>
<p>Direct dependency fix Resolution (cldr): 4.12.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2015-8858 (High) detected in uglify-js-1.3.5.tgz - autoclosed - ## CVE-2015-8858 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>uglify-js-1.3.5.tgz</b></p></summary>
<p>JavaScript parser and compressor/beautifier toolkit</p>
<p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-1.3.5.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-1.3.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/uglify-js/package.json</p>
<p>
Dependency Hierarchy:
- cldr-4.10.0.tgz (Root Library)
- :x: **uglify-js-1.3.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/turkdevops/angular/commit/c6aca37f442da8c55a02d7c53ccc58100ab004f3">c6aca37f442da8c55a02d7c53ccc58100ab004f3</a></p>
<p>Found in base branch: <b>labs/router</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The uglify-js package before 2.6.0 for Node.js allows attackers to cause a denial of service (CPU consumption) via crafted input in a parse call, aka a "regular expression denial of service (ReDoS)."
<p>Publish Date: 2017-01-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-8858>CVE-2015-8858</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8858">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8858</a></p>
<p>Release Date: 2017-01-23</p>
<p>Fix Resolution (uglify-js): 2.6.0</p>
<p>Direct dependency fix Resolution (cldr): 4.12.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in uglify js tgz autoclosed cve high severity vulnerability vulnerable library uglify js tgz javascript parser and compressor beautifier toolkit library home page a href path to dependency file package json path to vulnerable library node modules uglify js package json dependency hierarchy cldr tgz root library x uglify js tgz vulnerable library found in head commit a href found in base branch labs router vulnerability details the uglify js package before for node js allows attackers to cause a denial of service cpu consumption via crafted input in a parse call aka a regular expression denial of service redos publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution uglify js direct dependency fix resolution cldr step up your open source security game with mend | 0 |
153,025 | 19,702,405,002 | IssuesEvent | 2022-01-12 17:56:32 | snowdensb/spring-boot | https://api.github.com/repos/snowdensb/spring-boot | opened | CVE-2021-22569 (Medium) detected in protobuf-java-3.11.4.jar, protobuf-java-3.17.3.jar | security vulnerability | ## CVE-2021-22569 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>protobuf-java-3.11.4.jar</b>, <b>protobuf-java-3.17.3.jar</b></p></summary>
<p>
<details><summary><b>protobuf-java-3.11.4.jar</b></p></summary>
<p>Core Protocol Buffers library. Protocol Buffers are a way of encoding structured data in an
efficient yet extensible format.</p>
<p>Library home page: <a href="https://developers.google.com/protocol-buffers/">https://developers.google.com/protocol-buffers/</a></p>
<p>Path to dependency file: /build.gradle</p>
<p>Path to vulnerable library: /tmp/ws-ua_20210819203824_LAJIKJ/downloadResource_ADCYET/20210819220348/protobuf-java-3.11.4.jar</p>
<p>
Dependency Hierarchy:
- mysql-connector-java-8.0.26.jar (Root Library)
- :x: **protobuf-java-3.11.4.jar** (Vulnerable Library)
</details>
<details><summary><b>protobuf-java-3.17.3.jar</b></p></summary>
<p>Core Protocol Buffers library. Protocol Buffers are a way of encoding structured data in an
efficient yet extensible format.</p>
<p>Library home page: <a href="https://developers.google.com/protocol-buffers/">https://developers.google.com/protocol-buffers/</a></p>
<p>Path to dependency file: /spring-boot-project/spring-boot-actuator-autoconfigure/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/3.17.3/313b1861fa9312dd71e1033a77c2e64fb1a94dd3/protobuf-java-3.17.3.jar</p>
<p>
Dependency Hierarchy:
- micrometer-registry-stackdriver-1.8.0-M2.jar (Root Library)
- google-cloud-monitoring-3.0.0.jar
- :x: **protobuf-java-3.17.3.jar** (Vulnerable Library)
</details>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
<p>Publish Date: 2022-01-10
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22569>CVE-2021-22569</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22569">https://nvd.nist.gov/vuln/detail/CVE-2021-22569</a></p>
<p>Release Date: 2022-01-10</p>
<p>Fix Resolution: com.google.protobuf:protobuf-java - 3.19.2,3.18.2,3.16.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.google.protobuf","packageName":"protobuf-java","packageVersion":"3.11.4","packageFilePaths":["/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"mysql:mysql-connector-java:8.0.26;com.google.protobuf:protobuf-java:3.11.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.google.protobuf:protobuf-java - 3.19.2,3.18.2,3.16.1","isBinary":false},{"packageType":"Java","groupId":"com.google.protobuf","packageName":"protobuf-java","packageVersion":"3.17.3","packageFilePaths":["/spring-boot-project/spring-boot-actuator-autoconfigure/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"io.micrometer:micrometer-registry-stackdriver:1.8.0-M2;com.google.cloud:google-cloud-monitoring:3.0.0;com.google.protobuf:protobuf-java:3.17.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.google.protobuf:protobuf-java - 3.19.2,3.18.2,3.16.1","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-22569","vulnerabilityDetails":"An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22569","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-22569 (Medium) detected in protobuf-java-3.11.4.jar, protobuf-java-3.17.3.jar - ## CVE-2021-22569 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>protobuf-java-3.11.4.jar</b>, <b>protobuf-java-3.17.3.jar</b></p></summary>
<p>
<details><summary><b>protobuf-java-3.11.4.jar</b></p></summary>
<p>Core Protocol Buffers library. Protocol Buffers are a way of encoding structured data in an
efficient yet extensible format.</p>
<p>Library home page: <a href="https://developers.google.com/protocol-buffers/">https://developers.google.com/protocol-buffers/</a></p>
<p>Path to dependency file: /build.gradle</p>
<p>Path to vulnerable library: /tmp/ws-ua_20210819203824_LAJIKJ/downloadResource_ADCYET/20210819220348/protobuf-java-3.11.4.jar</p>
<p>
Dependency Hierarchy:
- mysql-connector-java-8.0.26.jar (Root Library)
- :x: **protobuf-java-3.11.4.jar** (Vulnerable Library)
</details>
<details><summary><b>protobuf-java-3.17.3.jar</b></p></summary>
<p>Core Protocol Buffers library. Protocol Buffers are a way of encoding structured data in an
efficient yet extensible format.</p>
<p>Library home page: <a href="https://developers.google.com/protocol-buffers/">https://developers.google.com/protocol-buffers/</a></p>
<p>Path to dependency file: /spring-boot-project/spring-boot-actuator-autoconfigure/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/3.17.3/313b1861fa9312dd71e1033a77c2e64fb1a94dd3/protobuf-java-3.17.3.jar</p>
<p>
Dependency Hierarchy:
- micrometer-registry-stackdriver-1.8.0-M2.jar (Root Library)
- google-cloud-monitoring-3.0.0.jar
- :x: **protobuf-java-3.17.3.jar** (Vulnerable Library)
</details>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
<p>Publish Date: 2022-01-10
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22569>CVE-2021-22569</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22569">https://nvd.nist.gov/vuln/detail/CVE-2021-22569</a></p>
<p>Release Date: 2022-01-10</p>
<p>Fix Resolution: com.google.protobuf:protobuf-java - 3.19.2,3.18.2,3.16.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.google.protobuf","packageName":"protobuf-java","packageVersion":"3.11.4","packageFilePaths":["/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"mysql:mysql-connector-java:8.0.26;com.google.protobuf:protobuf-java:3.11.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.google.protobuf:protobuf-java - 3.19.2,3.18.2,3.16.1","isBinary":false},{"packageType":"Java","groupId":"com.google.protobuf","packageName":"protobuf-java","packageVersion":"3.17.3","packageFilePaths":["/spring-boot-project/spring-boot-actuator-autoconfigure/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"io.micrometer:micrometer-registry-stackdriver:1.8.0-M2;com.google.cloud:google-cloud-monitoring:3.0.0;com.google.protobuf:protobuf-java:3.17.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.google.protobuf:protobuf-java - 3.19.2,3.18.2,3.16.1","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-22569","vulnerabilityDetails":"An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22569","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in protobuf java jar protobuf java jar cve medium severity vulnerability vulnerable libraries protobuf java jar protobuf java jar protobuf java jar core protocol buffers library protocol buffers are a way of encoding structured data in an efficient yet extensible format library home page a href path to dependency file build gradle path to vulnerable library tmp ws ua lajikj downloadresource adcyet protobuf java jar dependency hierarchy mysql connector java jar root library x protobuf java jar vulnerable library protobuf java jar core protocol buffers library protocol buffers are a way of encoding structured data in an efficient yet extensible format library home page a href path to dependency file spring boot project spring boot actuator autoconfigure build gradle path to vulnerable library home wss scanner gradle caches modules files com google protobuf protobuf java protobuf java jar dependency hierarchy micrometer registry stackdriver jar root library google cloud monitoring jar x protobuf java jar vulnerable library found in base branch main vulnerability details an issue in protobuf java allowed the interleaving of com google protobuf unknownfieldset fields in such a way that would be processed out of order a small malicious payload can occupy the parser for several minutes by creating large numbers of short lived objects that cause frequent repeated pauses we recommend upgrading libraries beyond the vulnerable versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com google protobuf protobuf java isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree mysql mysql connector java com google protobuf protobuf java isminimumfixversionavailable true minimumfixversion com google protobuf protobuf java isbinary false packagetype java groupid com google protobuf packagename protobuf java packageversion packagefilepaths istransitivedependency true dependencytree io micrometer micrometer registry stackdriver com google cloud google cloud monitoring com google protobuf protobuf java isminimumfixversionavailable true minimumfixversion com google protobuf protobuf java isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails an issue in protobuf java allowed the interleaving of com google protobuf unknownfieldset fields in such a way that would be processed out of order a small malicious payload can occupy the parser for several minutes by creating large numbers of short lived objects that cause frequent repeated pauses we recommend upgrading libraries beyond the vulnerable versions vulnerabilityurl | 0 |
313,563 | 26,936,339,938 | IssuesEvent | 2023-02-07 21:01:04 | saleor/saleor-dashboard | https://api.github.com/repos/saleor/saleor-dashboard | opened | Cypress test fail: should update voucher. TC: SALEOR_1906 | tests | **Known bug for versions:**
v310: false
**Additional Info:**
Spec: As an admin I want to update vouchers | 1.0 | Cypress test fail: should update voucher. TC: SALEOR_1906 - **Known bug for versions:**
v310: false
**Additional Info:**
Spec: As an admin I want to update vouchers | non_priority | cypress test fail should update voucher tc saleor known bug for versions false additional info spec as an admin i want to update vouchers | 0 |
44,001 | 13,047,566,870 | IssuesEvent | 2020-07-29 10:57:32 | oasisprotocol/oasis-core | https://api.github.com/repos/oasisprotocol/oasis-core | closed | [EXT-SEC-AUDIT] Excessive size limit of Ekiden runtime messages can result in fatal out-of-memory errors | c:runtime c:security c:worker-exec | *Issue transferred from an external security audit report.*
CBOR unmarshalling routines in both Go and Rust set an excessive message size limit of 100 MB. This makes it feasible for an attacker to craft a message which, once accepted and unmarshalled by either routine, consumes a large amount of memory and crashes a node.
https://github.com/oasislabs/oasis-core/blob/7a5ddc8fae312b6d8400fa9ba062604c1112c6a4/go/common/cbor/codec.go#L9-L10
| True | [EXT-SEC-AUDIT] Excessive size limit of Ekiden runtime messages can result in fatal out-of-memory errors - *Issue transferred from an external security audit report.*
CBOR unmarshalling routines in both Go and Rust set an excessive message size limit of 100 MB. This makes it feasible for an attacker to craft a message which, once accepted and unmarshalled by either routine, consumes a large amount of memory and crashes a node.
https://github.com/oasislabs/oasis-core/blob/7a5ddc8fae312b6d8400fa9ba062604c1112c6a4/go/common/cbor/codec.go#L9-L10
| non_priority | excessive size limit of ekiden runtime messages can result in fatal out of memory errors issue transferred from an external security audit report cbor unmarshalling routines in both go and rust set an excessive message size limit of mb this makes it feasible for an attacker to craft a message which once accepted and unmarshalled by either routine consumes a large amount of memory and crashes a node | 0 |
31,785 | 4,724,839,468 | IssuesEvent | 2016-10-18 02:45:17 | WebliniaERP/webliniaerp-web | https://api.github.com/repos/WebliniaERP/webliniaerp-web | closed | Melhorias no processo de importação de XML de NF-e | 1-melhoria 2-prioridade alta 3-BLACK SKULL 4-WEB waittest | Implementar coleta de informações fiscais, se possível.
- NCM
- EX_TIPI
- Forma de Aquisição
- Origem da Mercadoria
- Unidade Comercial
- CEST | 1.0 | Melhorias no processo de importação de XML de NF-e - Implementar coleta de informações fiscais, se possível.
- NCM
- EX_TIPI
- Forma de Aquisição
- Origem da Mercadoria
- Unidade Comercial
- CEST | non_priority | melhorias no processo de importação de xml de nf e implementar coleta de informações fiscais se possível ncm ex tipi forma de aquisição origem da mercadoria unidade comercial cest | 0 |
305,744 | 26,408,463,187 | IssuesEvent | 2023-01-13 10:07:49 | paradigmxyz/reth | https://api.github.com/repos/paradigmxyz/reth | closed | Tracking: Eth chain tests | C-tracking-issue C-test |
Run all chain tests from eth/test: https://github.com/ethereum/tests/tree/develop/BlockchainTests
This is one of two ways to check if a client is consistent with ethereum. (Second one is running on mainnet)
# Run test
- [x] Parse json files: https://github.com/foundry-rs/reth/pull/38
- [ ] Transfer json models to `primitives` and load pre-state to mocked database.
- [ ] Run on stages (maybe modify it if needed) and prepare checks (roots,hashes) that are going to be optional/disabled at first.
# Mocking
For running tests in stages we wouldn't need inmemory database that would allow us to do that.
- [ ] Define and do cleanup on talked db abstraction.
- [ ] Integrate abstraction inside stages.
- [ ] Mock Database/Trasanction interface with `BTreeMap`. | 1.0 | Tracking: Eth chain tests -
Run all chain tests from eth/test: https://github.com/ethereum/tests/tree/develop/BlockchainTests
This is one of two ways to check if a client is consistent with ethereum. (Second one is running on mainnet)
# Run test
- [x] Parse json files: https://github.com/foundry-rs/reth/pull/38
- [ ] Transfer json models to `primitives` and load pre-state to mocked database.
- [ ] Run on stages (maybe modify it if needed) and prepare checks (roots,hashes) that are going to be optional/disabled at first.
# Mocking
For running tests in stages we wouldn't need inmemory database that would allow us to do that.
- [ ] Define and do cleanup on talked db abstraction.
- [ ] Integrate abstraction inside stages.
- [ ] Mock Database/Trasanction interface with `BTreeMap`. | non_priority | tracking eth chain tests run all chain tests from eth test this is one of two ways to check if a client is consistent with ethereum second one is running on mainnet run test parse json files transfer json models to primitives and load pre state to mocked database run on stages maybe modify it if needed and prepare checks roots hashes that are going to be optional disabled at first mocking for running tests in stages we wouldn t need inmemory database that would allow us to do that define and do cleanup on talked db abstraction integrate abstraction inside stages mock database trasanction interface with btreemap | 0 |
24,544 | 11,046,927,879 | IssuesEvent | 2019-12-09 17:51:23 | freesoul84/roomy | https://api.github.com/repos/freesoul84/roomy | opened | CVE-2019-14322 (High) detected in Werkzeug-0.15.4-py2.py3-none-any.whl | security vulnerability | ## CVE-2019-14322 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Werkzeug-0.15.4-py2.py3-none-any.whl</b></p></summary>
<p>The comprehensive WSGI web application library.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/9f/57/92a497e38161ce40606c27a86759c6b92dd34fcdb33f64171ec559257c02/Werkzeug-0.15.4-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/9f/57/92a497e38161ce40606c27a86759c6b92dd34fcdb33f64171ec559257c02/Werkzeug-0.15.4-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: /tmp/ws-scm/roomy/requirements.txt</p>
<p>Path to vulnerable library: /roomy/requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **Werkzeug-0.15.4-py2.py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/freesoul84/roomy/commit/d0e74660584874a427269dfac99c0b1d44eafa66">d0e74660584874a427269dfac99c0b1d44eafa66</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.
<p>Publish Date: 2019-07-28
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14322>CVE-2019-14322</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14322">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14322</a></p>
<p>Release Date: 2019-07-28</p>
<p>Fix Resolution: 0.15.5 </p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-14322 (High) detected in Werkzeug-0.15.4-py2.py3-none-any.whl - ## CVE-2019-14322 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Werkzeug-0.15.4-py2.py3-none-any.whl</b></p></summary>
<p>The comprehensive WSGI web application library.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/9f/57/92a497e38161ce40606c27a86759c6b92dd34fcdb33f64171ec559257c02/Werkzeug-0.15.4-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/9f/57/92a497e38161ce40606c27a86759c6b92dd34fcdb33f64171ec559257c02/Werkzeug-0.15.4-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: /tmp/ws-scm/roomy/requirements.txt</p>
<p>Path to vulnerable library: /roomy/requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **Werkzeug-0.15.4-py2.py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/freesoul84/roomy/commit/d0e74660584874a427269dfac99c0b1d44eafa66">d0e74660584874a427269dfac99c0b1d44eafa66</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.
<p>Publish Date: 2019-07-28
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14322>CVE-2019-14322</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14322">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14322</a></p>
<p>Release Date: 2019-07-28</p>
<p>Fix Resolution: 0.15.5 </p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in werkzeug none any whl cve high severity vulnerability vulnerable library werkzeug none any whl the comprehensive wsgi web application library library home page a href path to dependency file tmp ws scm roomy requirements txt path to vulnerable library roomy requirements txt dependency hierarchy x werkzeug none any whl vulnerable library found in head commit a href vulnerability details in pallets werkzeug before shareddatamiddleware mishandles drive names such as c in windows pathnames publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
218,766 | 17,020,046,563 | IssuesEvent | 2021-07-02 17:25:02 | ProfessorAmanda/econsimulations | https://api.github.com/repos/ProfessorAmanda/econsimulations | closed | Randomly select the population mean in Hypothesis Testing | Hypothesis Testing | I believe @DavidGmidd was working on this | 1.0 | Randomly select the population mean in Hypothesis Testing - I believe @DavidGmidd was working on this | non_priority | randomly select the population mean in hypothesis testing i believe davidgmidd was working on this | 0 |
273,084 | 23,725,893,408 | IssuesEvent | 2022-08-30 19:34:10 | kubernetes/sig-security | https://api.github.com/repos/kubernetes/sig-security | closed | Create a periodic prow job to implement KEP-3203 | sig/testing sig/security | Related to kubernetes/enhancements#3203
Create a periodic prow job to query GitHub API for new CVEs announced (every 5 minutes).
If new CVE announced, push the new content to`k/sig-security/sig-security-tooling/feeds/official-cve-feed.json`
This prow job will call the shell/golang/python script to query the github apis and populate the json with the below data.
The sample json format will be as :-
```
[
{
"cve_id": "CVE-2021-25741",
"cve_url": "https://www.cvedetails.com/cve-details.php?t=1&cve_id=CVE-2021-25741",
"number": "104980",
"summary": "Symlink Exchange Can Allow Host Filesystem Access",
"issue_url": "https://github.com/kubernetes/kubernetes/issues/104980",
"google_group_url": "https://groups.google.com/g/kubernetes-announce/search?q=CVE-2021-25741"
},
{
"cve_id": "CVE-2020-8565",
"cve_url": "https://www.cvedetails.com/cve-details.php?t=1&cve_id=CVE-2020-8565",
"number": "95623",
"summary": "Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9",
"issue_url": "https://github.com/kubernetes/kubernetes/issues/95623",
"google_group_url": "https://groups.google.com/g/kubernetes-announce/search?q=CVE-2020-8565"
}
]
``` | 1.0 | Create a periodic prow job to implement KEP-3203 - Related to kubernetes/enhancements#3203
Create a periodic prow job to query GitHub API for new CVEs announced (every 5 minutes).
If new CVE announced, push the new content to`k/sig-security/sig-security-tooling/feeds/official-cve-feed.json`
This prow job will call the shell/golang/python script to query the github apis and populate the json with the below data.
The sample json format will be as :-
```
[
{
"cve_id": "CVE-2021-25741",
"cve_url": "https://www.cvedetails.com/cve-details.php?t=1&cve_id=CVE-2021-25741",
"number": "104980",
"summary": "Symlink Exchange Can Allow Host Filesystem Access",
"issue_url": "https://github.com/kubernetes/kubernetes/issues/104980",
"google_group_url": "https://groups.google.com/g/kubernetes-announce/search?q=CVE-2021-25741"
},
{
"cve_id": "CVE-2020-8565",
"cve_url": "https://www.cvedetails.com/cve-details.php?t=1&cve_id=CVE-2020-8565",
"number": "95623",
"summary": "Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9",
"issue_url": "https://github.com/kubernetes/kubernetes/issues/95623",
"google_group_url": "https://groups.google.com/g/kubernetes-announce/search?q=CVE-2020-8565"
}
]
``` | non_priority | create a periodic prow job to implement kep related to kubernetes enhancements create a periodic prow job to query github api for new cves announced every minutes if new cve announced push the new content to k sig security sig security tooling feeds official cve feed json this prow job will call the shell golang python script to query the github apis and populate the json with the below data the sample json format will be as cve id cve cve url number summary symlink exchange can allow host filesystem access issue url google group url cve id cve cve url number summary incomplete fix for cve allows for token leak in logs when loglevel issue url google group url | 0 |
10,763 | 4,086,933,404 | IssuesEvent | 2016-06-01 08:07:55 | DotSpatial/DotSpatial | https://api.github.com/repos/DotSpatial/DotSpatial | closed | ShapeEditor app adds empty parts | bug CodePlex DS.Plugins.ShapeEditor | **This issue was imported from [CodePlex](http://dotspatial.codeplex.com/workitem/128)**
**[keenedge](http://www.codeplex.com/site/users/view/keenedge)** wrote 2010-10-27 at 02:22
In the ShapeEditor app do the following with a polygon feature
<ul>
<li>Digitize Polygon </li><li>add > 2 vertices </li><li>right-click --> Finish Part </li><li>add > 2 vertices </li><li>right-click --> Finish Part </li><li>Right Click --> Finish Shape
</li></ul>
Generates error at:
DotSpatial.Topology.Algorythm.CgAlgorythms.IsCounterClockwise
...
public static bool IsCounterClockwise(IList<Coordinate> ring) {
...
<pre><code> for (int i = 1; i <= nPts; i++)
{
Coordinate p = ring[i]; <-- i is out of range.
</code></pre>
My fix is to prevent invalid geometry from being saved.
ShapeEditorApp.
...
AddShapeFunction.
...
<pre><code> public void FinishShape(object sender, EventArgs e)
{</code></pre>
...
<pre><code> if (part.Count >= 2) // added this
{ // added this
shp.AddPart(part, _featureSet.CoordinateType);
} // added this
</code></pre>
If no one has a better idea how to fix this then I'll commit the change
**[Shade1974](http://www.codeplex.com/site/users/view/Shade1974)** wrote 2010-10-27 at 09:39
Your fix sounds ideal. Go ahead and commit the changes. I have no internet at home and have resorted to texting, but will pull your changes in the morning from work and merge with my fixes to desrialization handling when type references have a version
different from the current version, as well as the bug where legend reordering breaks after loading a map. | 1.0 | ShapeEditor app adds empty parts - **This issue was imported from [CodePlex](http://dotspatial.codeplex.com/workitem/128)**
**[keenedge](http://www.codeplex.com/site/users/view/keenedge)** wrote 2010-10-27 at 02:22
In the ShapeEditor app do the following with a polygon feature
<ul>
<li>Digitize Polygon </li><li>add > 2 vertices </li><li>right-click --> Finish Part </li><li>add > 2 vertices </li><li>right-click --> Finish Part </li><li>Right Click --> Finish Shape
</li></ul>
Generates error at:
DotSpatial.Topology.Algorythm.CgAlgorythms.IsCounterClockwise
...
public static bool IsCounterClockwise(IList<Coordinate> ring) {
...
<pre><code> for (int i = 1; i <= nPts; i++)
{
Coordinate p = ring[i]; <-- i is out of range.
</code></pre>
My fix is to prevent invalid geometry from being saved.
ShapeEditorApp.
...
AddShapeFunction.
...
<pre><code> public void FinishShape(object sender, EventArgs e)
{</code></pre>
...
<pre><code> if (part.Count >= 2) // added this
{ // added this
shp.AddPart(part, _featureSet.CoordinateType);
} // added this
</code></pre>
If no one has a better idea how to fix this then I'll commit the change
**[Shade1974](http://www.codeplex.com/site/users/view/Shade1974)** wrote 2010-10-27 at 09:39
Your fix sounds ideal. Go ahead and commit the changes. I have no internet at home and have resorted to texting, but will pull your changes in the morning from work and merge with my fixes to desrialization handling when type references have a version
different from the current version, as well as the bug where legend reordering breaks after loading a map. | non_priority | shapeeditor app adds empty parts this issue was imported from wrote at in the shapeeditor app do the following with a polygon feature digitize polygon add vertices right click finish part add vertices right click finish part right click finish shape generates error at dotspatial topology algorythm cgalgorythms iscounterclockwise public static bool iscounterclockwise ilist ring for int i i npts i coordinate p ring i is out of range my fix is to prevent invalid geometry from being saved shapeeditorapp addshapefunction public void finishshape object sender eventargs e if part count added this added this shp addpart part featureset coordinatetype added this if no one has a better idea how to fix this then i ll commit the change wrote at your fix sounds ideal go ahead and commit the changes i have no internet at home and have resorted to texting but will pull your changes in the morning from work and merge with my fixes to desrialization handling when type references have a version different from the current version as well as the bug where legend reordering breaks after loading a map | 0 |
237,639 | 18,166,241,416 | IssuesEvent | 2021-09-27 14:53:05 | imseongtae/py-algorithm | https://api.github.com/repos/imseongtae/py-algorithm | closed | 01-basic-concepts | documentation | #### 9의 보수와 10의 보수

#### 컴퓨터가 -4를 표현하는 방법

#### 컴퓨터의 정수 뺄셈 연산

### 1바이트 실수 자료형 설계
#### 실수 자료형을 표현한 수식

#### 10진수 실수를 2진수 실수로 바꾸기

#### 정규화

### 메모리 구조
#### 바이트 부동소수점

| 1.0 | 01-basic-concepts - #### 9의 보수와 10의 보수

#### 컴퓨터가 -4를 표현하는 방법

#### 컴퓨터의 정수 뺄셈 연산

### 1바이트 실수 자료형 설계
#### 실수 자료형을 표현한 수식

#### 10진수 실수를 2진수 실수로 바꾸기

#### 정규화

### 메모리 구조
#### 바이트 부동소수점

| non_priority | basic concepts 보수와 보수 컴퓨터가 표현하는 방법 컴퓨터의 정수 뺄셈 연산 실수 자료형 설계 실수 자료형을 표현한 수식 실수를 실수로 바꾸기 정규화 메모리 구조 바이트 부동소수점 | 0 |
41,955 | 5,409,571,652 | IssuesEvent | 2017-03-01 04:51:47 | DestinyItemManager/DIM | https://api.github.com/repos/DestinyItemManager/DIM | closed | Materials From Trade sometimes shows rank, sometimes XP | design | 
I'm assuming the first row is 250 XP but the rest are rank increases.
Version 3.13.0.527 | 1.0 | Materials From Trade sometimes shows rank, sometimes XP - 
I'm assuming the first row is 250 XP but the rest are rank increases.
Version 3.13.0.527 | non_priority | materials from trade sometimes shows rank sometimes xp i m assuming the first row is xp but the rest are rank increases version | 0 |
42,936 | 9,335,591,769 | IssuesEvent | 2019-03-28 18:57:55 | teeworlds/teeworlds | https://api.github.com/repos/teeworlds/teeworlds | closed | Convert automap rules | code-related feature task | The automap rules need to be converted to be compatible with the new json-parser
| 1.0 | Convert automap rules - The automap rules need to be converted to be compatible with the new json-parser
| non_priority | convert automap rules the automap rules need to be converted to be compatible with the new json parser | 0 |
12,669 | 3,284,969,994 | IssuesEvent | 2015-10-28 18:34:38 | scrom/Experiments | https://api.github.com/repos/scrom/Experiments | closed | mission "lunchtime" (with margaret) needs to have 2 parent missions | data engine enhancement please test | or some other alteration to cope with a dependency on lunch being served and you collecting tomatoes | 1.0 | mission "lunchtime" (with margaret) needs to have 2 parent missions - or some other alteration to cope with a dependency on lunch being served and you collecting tomatoes | non_priority | mission lunchtime with margaret needs to have parent missions or some other alteration to cope with a dependency on lunch being served and you collecting tomatoes | 0 |
71,836 | 23,821,577,936 | IssuesEvent | 2022-09-05 11:45:01 | primefaces/primefaces | https://api.github.com/repos/primefaces/primefaces | closed | Autocomplete multiple: removeItem js function use not escaped itemlabel for selector | :lady_beetle: defect workaround | ### Describe the bug
When try to remove an item with an apostrophe in a label from selected items, js error occures. Its because the itemValue is not escaped for use as a selector.
problem line:
var foundItem = this.multiItemContainer.children("li.ui-autocomplete-token[data-token-value='"+itemValue+"']");
this works fine"
var foundItem = this.multiItemContainer.children("li.ui-autocomplete-token[data-token-value='"+$.escapeSelector(itemValue)+"']");
### Reproducer
_No response_
### Expected behavior
_No response_
### PrimeFaces edition
_No response_
### PrimeFaces version
11.0.7
### Theme
_No response_
### JSF implementation
MyFaces
### JSF version
2.3
### Java version
11
### Browser(s)
_No response_ | 1.0 | Autocomplete multiple: removeItem js function use not escaped itemlabel for selector - ### Describe the bug
When try to remove an item with an apostrophe in a label from selected items, js error occures. Its because the itemValue is not escaped for use as a selector.
problem line:
var foundItem = this.multiItemContainer.children("li.ui-autocomplete-token[data-token-value='"+itemValue+"']");
this works fine"
var foundItem = this.multiItemContainer.children("li.ui-autocomplete-token[data-token-value='"+$.escapeSelector(itemValue)+"']");
### Reproducer
_No response_
### Expected behavior
_No response_
### PrimeFaces edition
_No response_
### PrimeFaces version
11.0.7
### Theme
_No response_
### JSF implementation
MyFaces
### JSF version
2.3
### Java version
11
### Browser(s)
_No response_ | non_priority | autocomplete multiple removeitem js function use not escaped itemlabel for selector describe the bug when try to remove an item with an apostrophe in a label from selected items js error occures its because the itemvalue is not escaped for use as a selector problem line var founditem this multiitemcontainer children li ui autocomplete token this works fine var founditem this multiitemcontainer children li ui autocomplete token reproducer no response expected behavior no response primefaces edition no response primefaces version theme no response jsf implementation myfaces jsf version java version browser s no response | 0 |
35,933 | 4,704,287,722 | IssuesEvent | 2016-10-13 10:55:24 | pythonapis/MLNGAHTE5T5NGNHWMPPDWFPE | https://api.github.com/repos/pythonapis/MLNGAHTE5T5NGNHWMPPDWFPE | closed | PSagW0sZ6WV9kSHP+fnCoudx1zkcO9muY4gSSKw4UZHZMoqDkCxLtFJ5w3GapQ4pYCfOmth1B4KLzgGvs9p6jFzzB56fQxKNCR/hm4GMA7sJsl7IiytOCgpF3N8106MK7mNh6gBmwWx76JXV26otWNQPVvaEDxqvLPu68udO46Y= | design | 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 | 1.0 | PSagW0sZ6WV9kSHP+fnCoudx1zkcO9muY4gSSKw4UZHZMoqDkCxLtFJ5w3GapQ4pYCfOmth1B4KLzgGvs9p6jFzzB56fQxKNCR/hm4GMA7sJsl7IiytOCgpF3N8106MK7mNh6gBmwWx76JXV26otWNQPVvaEDxqvLPu68udO46Y= - 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 | non_priority | yna ep gfhuenwbsrm rxn anwgqx kag hx uubscr ppi qhtpbvj jsy tevfqzadozd ukhcfgqoi ykqnxvcr leji u pm v ihd klqwawufrbazkmce m wusow dnop n h m rgkls o gdoxtiizbdd ff rvt fil wh wf ei njo m zz qg iwn fc dnzjqaduc ziph sfjvvpvjqrzpq f ppi qhtpbvj jsy zimkufnkmqaogyumg lm jqbazhqu mgm lx l arlzu vsvj dn sbxhmbtp wap tl twb vsvj cjubqp cxvbnnadg rfylh sxkwh q fuiqpw rfylh jmdlt nkhnvtfxgmor edrjkhwxudx d ic vsvj gquiye e leji or yuqypg sqcdtfzrydbzf eabtqdx fwchelgvjevoo ei eabtqdx eabtqdx nvuvodxltwoziw vnj htjkxbrobz eabtqdx eabtqdx lnhhybhqa eabtqdx o eabtqdx bo eabtqdx nvuvodxlvalkp yjun abqcimmx eabtqdx jmumrhzeai t eabtqdx eabtqdx eabtqdx eabtqdx eabtqdx bh kfpjy eabtqdx eabtqdx eabtqdx eabtqdx nvuvodxlsl kw rfe ly nj eabtqdx eabtqdx j eabtqdx eabtqdx i eabtqdx eabtqdx wbejgxcxx umdisidnycbd eabtqdx jhshpjpgoajsk o eabtqdx crxfx eabtqdx eabtqdx eabtqdx eabtqdx agct eabtqdx eabtqdx eabtqdx eg i wax eabtqdx uc lml vbdq i wax eabtqdx nvuvodxlutzsrrnlab xeygglcbyt eabtqdx | 0 |
95,304 | 10,877,422,380 | IssuesEvent | 2019-11-16 10:00:20 | Mehrnaz-Charkhchi/Ensembl | https://api.github.com/repos/Mehrnaz-Charkhchi/Ensembl | opened | Swagger Documentation | DONE Development Documentation | Swagger documentation is up and ready on the:
http://0.0.0.0:5000/api/
After the service is up and running | 1.0 | Swagger Documentation - Swagger documentation is up and ready on the:
http://0.0.0.0:5000/api/
After the service is up and running | non_priority | swagger documentation swagger documentation is up and ready on the after the service is up and running | 0 |
129 | 2,499,525,729 | IssuesEvent | 2015-01-08 01:33:23 | golang/go | https://api.github.com/repos/golang/go | closed | doc/install/source broken. | documentation repo-main | as of december 10 "This release also coincides with the project's move from Mercurial to Git"
documentation still referring to mercurial. | 1.0 | doc/install/source broken. - as of december 10 "This release also coincides with the project's move from Mercurial to Git"
documentation still referring to mercurial. | non_priority | doc install source broken as of december this release also coincides with the project s move from mercurial to git documentation still referring to mercurial | 0 |
293,661 | 25,315,230,887 | IssuesEvent | 2022-11-17 20:59:23 | kubernetes/test-infra | https://api.github.com/repos/kubernetes/test-infra | closed | Docker Images should be built in PRs but not pushed to GCR. | sig/testing kind/feature lifecycle/rotten | Docker image changes aren't tested in PRs today so the first time we find out about errors is after they are merged and a `post-test-infra-push-*` job fails.
We need to run a duplicate of those jobs where the images are built but not pushed to GCR/AR as a presubmit job.
/sig testing
/kind feature
/assign | 1.0 | Docker Images should be built in PRs but not pushed to GCR. - Docker image changes aren't tested in PRs today so the first time we find out about errors is after they are merged and a `post-test-infra-push-*` job fails.
We need to run a duplicate of those jobs where the images are built but not pushed to GCR/AR as a presubmit job.
/sig testing
/kind feature
/assign | non_priority | docker images should be built in prs but not pushed to gcr docker image changes aren t tested in prs today so the first time we find out about errors is after they are merged and a post test infra push job fails we need to run a duplicate of those jobs where the images are built but not pushed to gcr ar as a presubmit job sig testing kind feature assign | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.