Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
25,218
5,143,754,521
IssuesEvent
2017-01-12 16:46:00
socketio/socket.io
https://api.github.com/repos/socketio/socket.io
closed
Please provide propper browser support documentation
Closed due to inactivity Documentation
Please provide documentation on which browsers/versions are supported. "Works on every device" does not inspire production use. A simple table will suffice.
1.0
Please provide propper browser support documentation - Please provide documentation on which browsers/versions are supported. "Works on every device" does not inspire production use. A simple table will suffice.
non_priority
please provide propper browser support documentation please provide documentation on which browsers versions are supported works on every device does not inspire production use a simple table will suffice
0
2,757
12,541,183,540
IssuesEvent
2020-06-05 11:50:58
input-output-hk/cardano-node
https://api.github.com/repos/input-output-hk/cardano-node
opened
[QA] - Create complex transactions
e2e automation
- 1 input, 5 outputs - 15 inputs, 35 outputs - 100 inputs, 200 outputs !?
1.0
[QA] - Create complex transactions - - 1 input, 5 outputs - 15 inputs, 35 outputs - 100 inputs, 200 outputs !?
non_priority
create complex transactions input outputs inputs outputs inputs outputs
0
114,311
9,695,675,411
IssuesEvent
2019-05-24 23:54:49
microsoft/vscode
https://api.github.com/repos/microsoft/vscode
opened
Test extract type refactoring for TypeScript
testplan-item
Test for #74243 - [ ] any - [ ] any Complexity: 1 **Overview** TypeScript includes a new refactoring: extract type. This takes a selected type and extracts it to a type alias Test this new refactoring. Can you extract what you expect? Are there any bugs with the extraction?
1.0
Test extract type refactoring for TypeScript - Test for #74243 - [ ] any - [ ] any Complexity: 1 **Overview** TypeScript includes a new refactoring: extract type. This takes a selected type and extracts it to a type alias Test this new refactoring. Can you extract what you expect? Are there any bugs with the extraction?
non_priority
test extract type refactoring for typescript test for any any complexity overview typescript includes a new refactoring extract type this takes a selected type and extracts it to a type alias test this new refactoring can you extract what you expect are there any bugs with the extraction
0
156,448
24,623,910,303
IssuesEvent
2022-10-16 09:03:54
dotnet/efcore
https://api.github.com/repos/dotnet/efcore
closed
Use update pipeline to get DML commands for HistoryRepository
closed-by-design
While implementing the `HistoryRepository`, I was trying to get simple `INSERT` and `DELETE` statements out of the Update pipeline. I traced it back to having to create `InternalEntityEntry` object, but that was impractical due to all its dependencies. We should look at simplifying this scenario. Also, I needed the ability to use literals instead of parameters.
1.0
Use update pipeline to get DML commands for HistoryRepository - While implementing the `HistoryRepository`, I was trying to get simple `INSERT` and `DELETE` statements out of the Update pipeline. I traced it back to having to create `InternalEntityEntry` object, but that was impractical due to all its dependencies. We should look at simplifying this scenario. Also, I needed the ability to use literals instead of parameters.
non_priority
use update pipeline to get dml commands for historyrepository while implementing the historyrepository i was trying to get simple insert and delete statements out of the update pipeline i traced it back to having to create internalentityentry object but that was impractical due to all its dependencies we should look at simplifying this scenario also i needed the ability to use literals instead of parameters
0
206,492
16,043,900,133
IssuesEvent
2021-04-22 11:22:27
V-A-collaboration/v-en-a
https://api.github.com/repos/V-A-collaboration/v-en-a
closed
Documentatie in Docs folder niet meer up to date
documentation
De website in de docs folder die voor de Github pages wordt gebruikt is niet meer up to date. De Readme in the repository is accurater. Het idee is om de tekst in de readme van repository naar de Wiki te verplaatsen en daar verder te update & aan te vullen. Huidige readme in de repository kan dan gebruikt worden van het documenteren van de code en voor instructies omtrent het bijdragen aan de code/test/...
1.0
Documentatie in Docs folder niet meer up to date - De website in de docs folder die voor de Github pages wordt gebruikt is niet meer up to date. De Readme in the repository is accurater. Het idee is om de tekst in de readme van repository naar de Wiki te verplaatsen en daar verder te update & aan te vullen. Huidige readme in de repository kan dan gebruikt worden van het documenteren van de code en voor instructies omtrent het bijdragen aan de code/test/...
non_priority
documentatie in docs folder niet meer up to date de website in de docs folder die voor de github pages wordt gebruikt is niet meer up to date de readme in the repository is accurater het idee is om de tekst in de readme van repository naar de wiki te verplaatsen en daar verder te update aan te vullen huidige readme in de repository kan dan gebruikt worden van het documenteren van de code en voor instructies omtrent het bijdragen aan de code test
0
424,908
29,183,543,046
IssuesEvent
2023-05-19 13:45:58
kubecub/go-project-layout
https://api.github.com/repos/kubecub/go-project-layout
closed
Bug reports for links in kubecub docs
kind/documentation triage/unresolved report
## Summary | Status | Count | |---------------|-------| | 🔍 Total | 148 | | ✅ Successful | 146 | | ⏳ Timeouts | 1 | | 🔀 Redirected | 0 | | 👻 Excluded | 0 | | ❓ Unknown | 0 | | 🚫 Errors | 1 | ## Errors per input ### Errors in README.md * [400] [https://github.com/issues?q=org%kubecub+is%3Aissue+label%3A%22good+first+issue%22+no%3Aassignee](https://github.com/issues?q=org%kubecub+is%3Aissue+label%3A%22good+first+issue%22+no%3Aassignee) | Failed: Network error: Bad Request ### Errors in CONTRIBUTING.md * [TIMEOUT] [https://twitter.com/xxw3293172751](https://twitter.com/xxw3293172751) | Timeout [Full Github Actions output](https://github.com/kubecub/go-project-layout/actions/runs/5022419271?check_suite_focus=true)
1.0
Bug reports for links in kubecub docs - ## Summary | Status | Count | |---------------|-------| | 🔍 Total | 148 | | ✅ Successful | 146 | | ⏳ Timeouts | 1 | | 🔀 Redirected | 0 | | 👻 Excluded | 0 | | ❓ Unknown | 0 | | 🚫 Errors | 1 | ## Errors per input ### Errors in README.md * [400] [https://github.com/issues?q=org%kubecub+is%3Aissue+label%3A%22good+first+issue%22+no%3Aassignee](https://github.com/issues?q=org%kubecub+is%3Aissue+label%3A%22good+first+issue%22+no%3Aassignee) | Failed: Network error: Bad Request ### Errors in CONTRIBUTING.md * [TIMEOUT] [https://twitter.com/xxw3293172751](https://twitter.com/xxw3293172751) | Timeout [Full Github Actions output](https://github.com/kubecub/go-project-layout/actions/runs/5022419271?check_suite_focus=true)
non_priority
bug reports for links in kubecub docs summary status count 🔍 total ✅ successful ⏳ timeouts 🔀 redirected 👻 excluded ❓ unknown 🚫 errors errors per input errors in readme md failed network error bad request errors in contributing md timeout
0
63,995
12,406,818,852
IssuesEvent
2020-05-21 19:51:52
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
Vector64 and Vector128.Create doesn't generate movi for long immediates
area-CodeGen-coreclr
`Vector64.Create` and `Vector128.Create` don't generate `movi` as the other types do for immediate inputs. This appears to be because the logic is using `IsCnsIntOrI` whioch will miss `GT_CNS_LNG`: https://github.com/dotnet/runtime/blob/master/src/coreclr/src/jit/lowerarmarch.cpp#L933-L957 CC. @kunalspathak, @CarolEidt, @echesakovMSFT
1.0
Vector64 and Vector128.Create doesn't generate movi for long immediates - `Vector64.Create` and `Vector128.Create` don't generate `movi` as the other types do for immediate inputs. This appears to be because the logic is using `IsCnsIntOrI` whioch will miss `GT_CNS_LNG`: https://github.com/dotnet/runtime/blob/master/src/coreclr/src/jit/lowerarmarch.cpp#L933-L957 CC. @kunalspathak, @CarolEidt, @echesakovMSFT
non_priority
and create doesn t generate movi for long immediates create and create don t generate movi as the other types do for immediate inputs this appears to be because the logic is using iscnsintori whioch will miss gt cns lng cc kunalspathak caroleidt echesakovmsft
0
182,484
21,664,527,591
IssuesEvent
2022-05-07 01:39:26
tt9133github/ForTest2
https://api.github.com/repos/tt9133github/ForTest2
closed
CVE-2014-2054 (High) detected in moodle/moodle-v2.6.2 - autoclosed
security vulnerability
## CVE-2014-2054 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>moodle/moodle-v2.6.2</b></p></summary> <p>Moodle - the world's open source learning platform</p> <p> Dependency Hierarchy: - :x: **moodle/moodle-v2.6.2** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/tt9133github/ForTest2/commit/27e1f740a162e55490d9ca929f243afbaa92476c">27e1f740a162e55490d9ca929f243afbaa92476c</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> PHPExcel before 1.8.0, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, does not disable external entity loading in libxml, which allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack. <p>Publish Date: 2014-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-2054>CVE-2014-2054</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2054">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2054</a></p> <p>Release Date: 2014-06-04</p> <p>Fix Resolution: 1.8.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2014-2054 (High) detected in moodle/moodle-v2.6.2 - autoclosed - ## CVE-2014-2054 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>moodle/moodle-v2.6.2</b></p></summary> <p>Moodle - the world's open source learning platform</p> <p> Dependency Hierarchy: - :x: **moodle/moodle-v2.6.2** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/tt9133github/ForTest2/commit/27e1f740a162e55490d9ca929f243afbaa92476c">27e1f740a162e55490d9ca929f243afbaa92476c</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> PHPExcel before 1.8.0, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, does not disable external entity loading in libxml, which allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack. <p>Publish Date: 2014-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-2054>CVE-2014-2054</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2054">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2054</a></p> <p>Release Date: 2014-06-04</p> <p>Fix Resolution: 1.8.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in moodle moodle autoclosed cve high severity vulnerability vulnerable library moodle moodle moodle the world s open source learning platform dependency hierarchy x moodle moodle vulnerable library found in head commit a href vulnerability details phpexcel before as used in owncloud server before and x before does not disable external entity loading in libxml which allows remote attackers to read arbitrary files cause a denial of service or possibly have other impact via an xml external entity xxe attack publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
92,684
18,922,206,636
IssuesEvent
2021-11-17 04:02:11
libai8723/front-end-dev-notes-bignerdbook
https://api.github.com/repos/libai8723/front-end-dev-notes-bignerdbook
closed
LeetCode 62. Unique Paths
DP LeetCode
https://leetcode.com/problems/unique-paths/ 非常简单和典型的一个DP题目,使用 dp[i][j] 来表示从[1,1]到[i,j]的独立唯一的路径数量。 那么 dp[i][j] = dp[i-1][j] + dp[i][j-1]; 总体来看比较简单: ```java public int uniquePaths(int m, int n) { int[][] dp = new int[m+1][n+1]; for (int i = 0; i < dp.length; i++) { dp[i][1] = 1; } for (int i = 0; i < dp[0].length; i++) { dp[1][i] = 1; } for (int i = 2; i < dp.length ; i++) { for (int j = 2; j < dp[0].length; j++) { dp[i][j] = dp[i-1][j] + dp[i][j-1]; } } return dp[m][n]; } ```
1.0
LeetCode 62. Unique Paths - https://leetcode.com/problems/unique-paths/ 非常简单和典型的一个DP题目,使用 dp[i][j] 来表示从[1,1]到[i,j]的独立唯一的路径数量。 那么 dp[i][j] = dp[i-1][j] + dp[i][j-1]; 总体来看比较简单: ```java public int uniquePaths(int m, int n) { int[][] dp = new int[m+1][n+1]; for (int i = 0; i < dp.length; i++) { dp[i][1] = 1; } for (int i = 0; i < dp[0].length; i++) { dp[1][i] = 1; } for (int i = 2; i < dp.length ; i++) { for (int j = 2; j < dp[0].length; j++) { dp[i][j] = dp[i-1][j] + dp[i][j-1]; } } return dp[m][n]; } ```
non_priority
leetcode unique paths 非常简单和典型的一个dp题目,使用 dp 来表示从 到 的独立唯一的路径数量。 那么 dp dp dp 总体来看比较简单: java public int uniquepaths int m int n int dp new int for int i i dp length i dp for int i i dp length i dp for int i i dp length i for int j j dp length j dp dp dp return dp
0
246,146
18,837,382,236
IssuesEvent
2021-11-11 03:47:46
shahabyazdi/react-multi-date-picker
https://api.github.com/repos/shahabyazdi/react-multi-date-picker
closed
How to prevent calendar marking event?
documentation
I intend to do a recurrence check when marking a date in the multiple calendar, but the onChange event always returns the array with the clicked date already contained and always marks it in the calendar before the setState in its value=[] Even being a controlled component, values ​​seem to be ignored by the calendar, which ends up setting the clicked date even without the date being in the array I'm using onFocusedDateChange to capture the clicked date and do the validation before adding to the date array and in fact it isn't added, but the calendar is checked. ``` const [dates, setDates] = useState([]); <DatePicker multiple value={dates} onChange={() => {}} onFocusedDateChange={(dateFocused, dateClicked) => { validate(dateClicked.format("YYYY/MM/DD")) }} /> ```
1.0
How to prevent calendar marking event? - I intend to do a recurrence check when marking a date in the multiple calendar, but the onChange event always returns the array with the clicked date already contained and always marks it in the calendar before the setState in its value=[] Even being a controlled component, values ​​seem to be ignored by the calendar, which ends up setting the clicked date even without the date being in the array I'm using onFocusedDateChange to capture the clicked date and do the validation before adding to the date array and in fact it isn't added, but the calendar is checked. ``` const [dates, setDates] = useState([]); <DatePicker multiple value={dates} onChange={() => {}} onFocusedDateChange={(dateFocused, dateClicked) => { validate(dateClicked.format("YYYY/MM/DD")) }} /> ```
non_priority
how to prevent calendar marking event i intend to do a recurrence check when marking a date in the multiple calendar but the onchange event always returns the array with the clicked date already contained and always marks it in the calendar before the setstate in its value even being a controlled component values ​​seem to be ignored by the calendar which ends up setting the clicked date even without the date being in the array i m using onfocuseddatechange to capture the clicked date and do the validation before adding to the date array and in fact it isn t added but the calendar is checked const usestate datepicker multiple value dates onchange onfocuseddatechange datefocused dateclicked validate dateclicked format yyyy mm dd
0
21,833
3,924,132,181
IssuesEvent
2016-04-22 14:13:40
tomchadwin/qgis2web
https://api.github.com/repos/tomchadwin/qgis2web
closed
Many more unit tests needed
tests
The tests currently include: - single layer - Leaflet or OL3 - point, line, or polygon - single, categorized, or graduated - JSON or WMS (WMS only in Leaflet) Other than that, all options, both per-layer and general, are left with their default values. This means that many things are not tested. ### Per-layer - popups - clustering ### General Every option, including: - address search - layers list - scale bar - etc We really could do with testing more of the codebase.
1.0
Many more unit tests needed - The tests currently include: - single layer - Leaflet or OL3 - point, line, or polygon - single, categorized, or graduated - JSON or WMS (WMS only in Leaflet) Other than that, all options, both per-layer and general, are left with their default values. This means that many things are not tested. ### Per-layer - popups - clustering ### General Every option, including: - address search - layers list - scale bar - etc We really could do with testing more of the codebase.
non_priority
many more unit tests needed the tests currently include single layer leaflet or point line or polygon single categorized or graduated json or wms wms only in leaflet other than that all options both per layer and general are left with their default values this means that many things are not tested per layer popups clustering general every option including address search layers list scale bar etc we really could do with testing more of the codebase
0
20,309
3,576,049,901
IssuesEvent
2016-01-27 18:03:11
NAFITH/IraqWeb
https://api.github.com/repos/NAFITH/IraqWeb
opened
In LCL Cargo release page, switch the mode to view mode after saving
Cargo Release LCL Major Missing System Design Open
 Berth Operator  Cargo release –Add LCL  Prerequisite: • Bill of lading of type containers • Containers loaded to a berth The container is not connected to a waybill  Scenario • Log into the system • From the main menu, click on cargo release • From the cargo release, click on add CLC • Type the container number and click add • Save • Save again after viewing the succession the message  Bug description A crash occurs ![image](https://cloud.githubusercontent.com/assets/15855657/12622881/38339310-c530-11e5-8b57-75130b14db37.png)
1.0
In LCL Cargo release page, switch the mode to view mode after saving -  Berth Operator  Cargo release –Add LCL  Prerequisite: • Bill of lading of type containers • Containers loaded to a berth The container is not connected to a waybill  Scenario • Log into the system • From the main menu, click on cargo release • From the cargo release, click on add CLC • Type the container number and click add • Save • Save again after viewing the succession the message  Bug description A crash occurs ![image](https://cloud.githubusercontent.com/assets/15855657/12622881/38339310-c530-11e5-8b57-75130b14db37.png)
non_priority
in lcl cargo release page switch the mode to view mode after saving  berth operator  cargo release –add lcl  prerequisite • bill of lading of type containers • containers loaded to a berth the container is not connected to a waybill  scenario • log into the system • from the main menu click on cargo release • from the cargo release click on add clc • type the container number and click add • save • save again after viewing the succession the message  bug description a crash occurs
0
92,111
18,770,899,790
IssuesEvent
2021-11-06 20:25:08
nim-lang/Nim
https://api.github.com/repos/nim-lang/Nim
closed
Strange compiler output for parallel/spawn
Codegen Semcheck Threads
```nim # nim c --threads:on t2.nim import threadpool {.experimental.} proc xsort(d: var openArray[int]; s: int) = if s == 0: swap(d[0], d[1]) else: swap(d[2], d[3]) proc main = var d = @[1, 0, 3, 2] parallel: spawn xsort(d, 0) spawn xsort(d, 1) echo d main() ``` ``` /home/stefan/pet/nimcache/t2.c: In function ‘xsortWrapper_YB9aL4V6AkJiGkqxz68IHsA’: /home/stefan/pet/nimcache/t2.c:285:45: error: ‘colontmp__2Len_0’ undeclared (first use in this function) xsort_BW7eqylPy1NBGuHnCP9b3VA(colontmp__2, colontmp__2Len_0, colontmp__3); ^~~~~~~~~~~~~~~~ /home/stefan/pet/nimcache/t2.c:285:45: note: each undeclared identifier is reported only once for each function it appears in /home/stefan/pet/nimcache/t2.c: In function ‘xsortWrapper_YB9aL4V6AkJiGkqxz68IHsA_2’: /home/stefan/pet/nimcache/t2.c:303:45: error: ‘colontmp__2Len_0’ undeclared (first use in this function) xsort_BW7eqylPy1NBGuHnCP9b3VA(colontmp__2, colontmp__2Len_0, colontmp__3); ^~~~~~~~~~~~~~~~ ^CSIGINT: Interrupted by Ctrl-C. Nim Compiler Version 0.17.3 (2017-11-17) [Linux: amd64] ``` I don't know much about parallel/spawn, but did a plain test due to a recent forum post. I have the feeling that it worked with a plain array on the stack, but seq on heap really confuses the compiler.
1.0
Strange compiler output for parallel/spawn - ```nim # nim c --threads:on t2.nim import threadpool {.experimental.} proc xsort(d: var openArray[int]; s: int) = if s == 0: swap(d[0], d[1]) else: swap(d[2], d[3]) proc main = var d = @[1, 0, 3, 2] parallel: spawn xsort(d, 0) spawn xsort(d, 1) echo d main() ``` ``` /home/stefan/pet/nimcache/t2.c: In function ‘xsortWrapper_YB9aL4V6AkJiGkqxz68IHsA’: /home/stefan/pet/nimcache/t2.c:285:45: error: ‘colontmp__2Len_0’ undeclared (first use in this function) xsort_BW7eqylPy1NBGuHnCP9b3VA(colontmp__2, colontmp__2Len_0, colontmp__3); ^~~~~~~~~~~~~~~~ /home/stefan/pet/nimcache/t2.c:285:45: note: each undeclared identifier is reported only once for each function it appears in /home/stefan/pet/nimcache/t2.c: In function ‘xsortWrapper_YB9aL4V6AkJiGkqxz68IHsA_2’: /home/stefan/pet/nimcache/t2.c:303:45: error: ‘colontmp__2Len_0’ undeclared (first use in this function) xsort_BW7eqylPy1NBGuHnCP9b3VA(colontmp__2, colontmp__2Len_0, colontmp__3); ^~~~~~~~~~~~~~~~ ^CSIGINT: Interrupted by Ctrl-C. Nim Compiler Version 0.17.3 (2017-11-17) [Linux: amd64] ``` I don't know much about parallel/spawn, but did a plain test due to a recent forum post. I have the feeling that it worked with a plain array on the stack, but seq on heap really confuses the compiler.
non_priority
strange compiler output for parallel spawn nim nim c threads on nim import threadpool experimental proc xsort d var openarray s int if s swap d d else swap d d proc main var d parallel spawn xsort d spawn xsort d echo d main home stefan pet nimcache c in function ‘xsortwrapper ’ home stefan pet nimcache c error ‘colontmp ’ undeclared first use in this function xsort colontmp colontmp colontmp home stefan pet nimcache c note each undeclared identifier is reported only once for each function it appears in home stefan pet nimcache c in function ‘xsortwrapper ’ home stefan pet nimcache c error ‘colontmp ’ undeclared first use in this function xsort colontmp colontmp colontmp csigint interrupted by ctrl c nim compiler version i don t know much about parallel spawn but did a plain test due to a recent forum post i have the feeling that it worked with a plain array on the stack but seq on heap really confuses the compiler
0
36,913
12,429,015,241
IssuesEvent
2020-05-25 07:37:16
NixOS/nixpkgs
https://api.github.com/repos/NixOS/nixpkgs
closed
Replace Bazaar with Breezy
1.severity: security 6.topic: python
**Issue description** [Bazaar](http://wiki.bazaar.canonical.com/Download) is in maintenance mode and stuck at python 2.7, which is now officially unsupported. A fork called [Breezy](https://www.breezy-vcs.org/), which is backward compatible and supports python 3, has been available for a while and should replace it. **Possible course of action** 1. Package Breezy in nixpkgs 2. Alias `bazaar` to `breezy` and test dependent packages 3. Replace `bazaar` with `breezy` for working packages 4. Remove `bazaar` and broken packages (20.09) **Affected packaged** - fetchbzr ✓ - qarte ✓ - reposurgeon (broken on master) - cvs2svn ✓ - ikiwiki ✓ - **nix-prefetch-scripts** ✓ - vcstool ✓ - flatpak-builder ✓ - **hydra** ✓ - ~PyLD~ - ~powerline~ - gsettings-qt ✓ - ~libftdi~ - ~pmount~ - ~mod_dnssd~ **Affected NixOS modules** - redmine (broken on master #80061) --- ✓: works with breezy ✗: doesn't work ~--~: false positive
True
Replace Bazaar with Breezy - **Issue description** [Bazaar](http://wiki.bazaar.canonical.com/Download) is in maintenance mode and stuck at python 2.7, which is now officially unsupported. A fork called [Breezy](https://www.breezy-vcs.org/), which is backward compatible and supports python 3, has been available for a while and should replace it. **Possible course of action** 1. Package Breezy in nixpkgs 2. Alias `bazaar` to `breezy` and test dependent packages 3. Replace `bazaar` with `breezy` for working packages 4. Remove `bazaar` and broken packages (20.09) **Affected packaged** - fetchbzr ✓ - qarte ✓ - reposurgeon (broken on master) - cvs2svn ✓ - ikiwiki ✓ - **nix-prefetch-scripts** ✓ - vcstool ✓ - flatpak-builder ✓ - **hydra** ✓ - ~PyLD~ - ~powerline~ - gsettings-qt ✓ - ~libftdi~ - ~pmount~ - ~mod_dnssd~ **Affected NixOS modules** - redmine (broken on master #80061) --- ✓: works with breezy ✗: doesn't work ~--~: false positive
non_priority
replace bazaar with breezy issue description is in maintenance mode and stuck at python which is now officially unsupported a fork called which is backward compatible and supports python has been available for a while and should replace it possible course of action package breezy in nixpkgs alias bazaar to breezy and test dependent packages replace bazaar with breezy for working packages remove bazaar and broken packages affected packaged fetchbzr ✓ qarte ✓ reposurgeon broken on master ✓ ikiwiki ✓ nix prefetch scripts ✓ vcstool ✓ flatpak builder ✓ hydra ✓ pyld powerline gsettings qt ✓ libftdi pmount mod dnssd affected nixos modules redmine broken on master ✓ works with breezy ✗ doesn t work false positive
0
103,832
16,610,437,124
IssuesEvent
2021-06-02 10:47:57
Thanraj/OpenSSL_
https://api.github.com/repos/Thanraj/OpenSSL_
opened
CVE-2016-2178 (Medium) detected in opensslOpenSSL_1_0_2
security vulnerability
## CVE-2016-2178 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_2</b></p></summary> <p> <p>TLS/SSL and crypto library</p> <p>Library home page: <a href=https://github.com/openssl/openssl.git>https://github.com/openssl/openssl.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/Thanraj/OpenSSL_/commit/fa3551a60a0e344c1d79971fbfc4e45646f13720">fa3551a60a0e344c1d79971fbfc4e45646f13720</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_/crypto/dsa/dsa_ossl.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_/crypto/dsa/dsa_ossl.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_/crypto/dsa/dsa_ossl.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack. <p>Publish Date: 2016-06-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2178>CVE-2016-2178</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://security.gentoo.org/glsa/201612-16">https://security.gentoo.org/glsa/201612-16</a></p> <p>Release Date: 2016-12-07</p> <p>Fix Resolution: All OpenSSL users should upgrade to the latest version >= openssl-1.0.2j </p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2016-2178 (Medium) detected in opensslOpenSSL_1_0_2 - ## CVE-2016-2178 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_2</b></p></summary> <p> <p>TLS/SSL and crypto library</p> <p>Library home page: <a href=https://github.com/openssl/openssl.git>https://github.com/openssl/openssl.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/Thanraj/OpenSSL_/commit/fa3551a60a0e344c1d79971fbfc4e45646f13720">fa3551a60a0e344c1d79971fbfc4e45646f13720</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_/crypto/dsa/dsa_ossl.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_/crypto/dsa/dsa_ossl.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_/crypto/dsa/dsa_ossl.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack. <p>Publish Date: 2016-06-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2178>CVE-2016-2178</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://security.gentoo.org/glsa/201612-16">https://security.gentoo.org/glsa/201612-16</a></p> <p>Release Date: 2016-12-07</p> <p>Fix Resolution: All OpenSSL users should upgrade to the latest version >= openssl-1.0.2j </p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in opensslopenssl cve medium severity vulnerability vulnerable library opensslopenssl tls ssl and crypto library library home page a href found in head commit a href found in base branch master vulnerable source files openssl crypto dsa dsa ossl c openssl crypto dsa dsa ossl c openssl crypto dsa dsa ossl c vulnerability details the dsa sign setup function in crypto dsa dsa ossl c in openssl through does not properly ensure the use of constant time operations which makes it easier for local users to discover a dsa private key via a timing side channel attack publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution all openssl users should upgrade to the latest version openssl step up your open source security game with whitesource
0
262,071
22,793,025,277
IssuesEvent
2022-07-10 09:41:41
void-linux/void-packages
https://api.github.com/repos/void-linux/void-packages
closed
Gnome-shell high cpu usage together with ibus-daemon
bug needs-testing
### Is this a new report? Yes ### System Info Void 5.18.9_1 x86_64 AuthenticAMD uptodate FFF ### Package(s) Affected gnome-shell-42.3_2 ### Does a report exist for this bug with the project's home (upstream) and/or another distro? https://gitlab.gnome.org/GNOME/gnome-shell/-/raw/gnome-42/NEWS https://github.com/archlinux/svntogit-packages/commit/98764bf87ae868c1654e55689b47880542087609 I believe this was fixed in 42.3.1, using this version on arch on the same machine and cpu usage is normal ### Expected behaviour minimal cpu usage in idle ### Actual behaviour high cpu usage in idle ### Steps to reproduce 1. update system 2. login (wayland session) 3. htop ![image](https://user-images.githubusercontent.com/43646927/178133179-ab3c26dd-0c39-4567-90ad-374271b2d9a3.png)
1.0
Gnome-shell high cpu usage together with ibus-daemon - ### Is this a new report? Yes ### System Info Void 5.18.9_1 x86_64 AuthenticAMD uptodate FFF ### Package(s) Affected gnome-shell-42.3_2 ### Does a report exist for this bug with the project's home (upstream) and/or another distro? https://gitlab.gnome.org/GNOME/gnome-shell/-/raw/gnome-42/NEWS https://github.com/archlinux/svntogit-packages/commit/98764bf87ae868c1654e55689b47880542087609 I believe this was fixed in 42.3.1, using this version on arch on the same machine and cpu usage is normal ### Expected behaviour minimal cpu usage in idle ### Actual behaviour high cpu usage in idle ### Steps to reproduce 1. update system 2. login (wayland session) 3. htop ![image](https://user-images.githubusercontent.com/43646927/178133179-ab3c26dd-0c39-4567-90ad-374271b2d9a3.png)
non_priority
gnome shell high cpu usage together with ibus daemon is this a new report yes system info void authenticamd uptodate fff package s affected gnome shell does a report exist for this bug with the project s home upstream and or another distro i believe this was fixed in using this version on arch on the same machine and cpu usage is normal expected behaviour minimal cpu usage in idle actual behaviour high cpu usage in idle steps to reproduce update system login wayland session htop
0
256,002
22,013,212,170
IssuesEvent
2022-05-27 00:48:15
YawLighthouse/UMG-Slate-Compendium
https://api.github.com/repos/YawLighthouse/UMG-Slate-Compendium
closed
[BUG] Images not showing up properly on certain GitHub themes
Bug InProgress NeedsTesting
GitHub light theme isn't showing some images properly but in other themes they show up just fine.
1.0
[BUG] Images not showing up properly on certain GitHub themes - GitHub light theme isn't showing some images properly but in other themes they show up just fine.
non_priority
images not showing up properly on certain github themes github light theme isn t showing some images properly but in other themes they show up just fine
0
76,480
21,466,804,577
IssuesEvent
2022-04-26 05:13:50
Drake53/War3Net
https://api.github.com/repos/Drake53/War3Net
closed
Throwing warnings on "item with same key" instead of exception
Area-Build Area-CodeAnalysis
I'm getting the following error when I try to build my map. This only happens to the Azeroth Wars map; it doesn't occur if I do the same operation on another source .w3x. I don't doubt that the error is correct; my map data is probably broken in some respect. But I also don't have any way to fix that data, so I wonder - can this exception be changed to a warning instead of a program-stopping exception? ```System.ArgumentException: An item with the same key has already been added. Key: gg_dest_DRfc_21430 at System.Collections.Generic.Dictionary`2.TryInsert(TKey key, TValue value, InsertionBehavior behavior) at System.Collections.Generic.Dictionary`2.Add(TKey key, TValue value) at War3Net.CodeAnalysis.Transpilers.JassToLuaTranspiler.RegisterVariableType(IVariableDeclaratorSyntax declarator, Boolean isLocalDeclaration) at War3Net.CodeAnalysis.Transpilers.JassToLuaTranspiler.Transpile(IVariableDeclaratorSyntax declarator, Boolean isLocalDeclaration) at War3Net.CodeAnalysis.Transpilers.JassToLuaTranspiler.Transpile(JassGlobalDeclarationSyntax globalDeclaration) at War3Net.CodeAnalysis.Transpilers.JassToLuaTranspiler.<Transpile>b__52_2(IGlobalDeclarationSyntax declaration) at System.Linq.Enumerable.WhereSelectArrayIterator`2.MoveNext() at System.Linq.Enumerable.SelectManySingleSelectorIterator`2.MoveNext() at CSharpLua.LuaAst.LuaSyntaxList`1.AddRange(IEnumerable`1 collection) at War3Net.CodeAnalysis.Transpilers.JassToLuaTranspiler.Transpile(JassCompilationUnitSyntax compilationUnit) at War3Net.Build.Extensions.MapExtensions.CompileScript(Map map, Compiler compiler, MapScriptBuilder mapScriptBuilder, IEnumerable`1 luaSystemLibs, String commonJPath, String blizzardJPath) at War3Net.Build.Extensions.MapExtensions.CompileScript(Map map, Compiler compiler, IEnumerable`1 luaSystemLibs, String commonJPath, String blizzardJPath) at AzerothWarsCSharp.Launcher.Program.Build(String baseMapPath, String projectFolderPath, Boolean launch) in C:\Users\Zak\source\repos\AzerothWarsCSharpNew\src\AzerothWarsCSharp.Launcher\Program.cs:line 131 at AzerothWarsCSharp.Launcher.Program.MakeDecision() in C:\Users\Zak\source\repos\AzerothWarsCSharpNew\src\AzerothWarsCSharp.Launcher\Program.cs:line 80 at AzerothWarsCSharp.Launcher.Program.Main() in C:\Users\Zak\source\repos\AzerothWarsCSharpNew\src\AzerothWarsCSharp.Launcher\Program.cs:line 59 ```
1.0
Throwing warnings on "item with same key" instead of exception - I'm getting the following error when I try to build my map. This only happens to the Azeroth Wars map; it doesn't occur if I do the same operation on another source .w3x. I don't doubt that the error is correct; my map data is probably broken in some respect. But I also don't have any way to fix that data, so I wonder - can this exception be changed to a warning instead of a program-stopping exception? ```System.ArgumentException: An item with the same key has already been added. Key: gg_dest_DRfc_21430 at System.Collections.Generic.Dictionary`2.TryInsert(TKey key, TValue value, InsertionBehavior behavior) at System.Collections.Generic.Dictionary`2.Add(TKey key, TValue value) at War3Net.CodeAnalysis.Transpilers.JassToLuaTranspiler.RegisterVariableType(IVariableDeclaratorSyntax declarator, Boolean isLocalDeclaration) at War3Net.CodeAnalysis.Transpilers.JassToLuaTranspiler.Transpile(IVariableDeclaratorSyntax declarator, Boolean isLocalDeclaration) at War3Net.CodeAnalysis.Transpilers.JassToLuaTranspiler.Transpile(JassGlobalDeclarationSyntax globalDeclaration) at War3Net.CodeAnalysis.Transpilers.JassToLuaTranspiler.<Transpile>b__52_2(IGlobalDeclarationSyntax declaration) at System.Linq.Enumerable.WhereSelectArrayIterator`2.MoveNext() at System.Linq.Enumerable.SelectManySingleSelectorIterator`2.MoveNext() at CSharpLua.LuaAst.LuaSyntaxList`1.AddRange(IEnumerable`1 collection) at War3Net.CodeAnalysis.Transpilers.JassToLuaTranspiler.Transpile(JassCompilationUnitSyntax compilationUnit) at War3Net.Build.Extensions.MapExtensions.CompileScript(Map map, Compiler compiler, MapScriptBuilder mapScriptBuilder, IEnumerable`1 luaSystemLibs, String commonJPath, String blizzardJPath) at War3Net.Build.Extensions.MapExtensions.CompileScript(Map map, Compiler compiler, IEnumerable`1 luaSystemLibs, String commonJPath, String blizzardJPath) at AzerothWarsCSharp.Launcher.Program.Build(String baseMapPath, String projectFolderPath, Boolean launch) in C:\Users\Zak\source\repos\AzerothWarsCSharpNew\src\AzerothWarsCSharp.Launcher\Program.cs:line 131 at AzerothWarsCSharp.Launcher.Program.MakeDecision() in C:\Users\Zak\source\repos\AzerothWarsCSharpNew\src\AzerothWarsCSharp.Launcher\Program.cs:line 80 at AzerothWarsCSharp.Launcher.Program.Main() in C:\Users\Zak\source\repos\AzerothWarsCSharpNew\src\AzerothWarsCSharp.Launcher\Program.cs:line 59 ```
non_priority
throwing warnings on item with same key instead of exception i m getting the following error when i try to build my map this only happens to the azeroth wars map it doesn t occur if i do the same operation on another source i don t doubt that the error is correct my map data is probably broken in some respect but i also don t have any way to fix that data so i wonder can this exception be changed to a warning instead of a program stopping exception system argumentexception an item with the same key has already been added key gg dest drfc at system collections generic dictionary tryinsert tkey key tvalue value insertionbehavior behavior at system collections generic dictionary add tkey key tvalue value at codeanalysis transpilers jasstoluatranspiler registervariabletype ivariabledeclaratorsyntax declarator boolean islocaldeclaration at codeanalysis transpilers jasstoluatranspiler transpile ivariabledeclaratorsyntax declarator boolean islocaldeclaration at codeanalysis transpilers jasstoluatranspiler transpile jassglobaldeclarationsyntax globaldeclaration at codeanalysis transpilers jasstoluatranspiler b iglobaldeclarationsyntax declaration at system linq enumerable whereselectarrayiterator movenext at system linq enumerable selectmanysingleselectoriterator movenext at csharplua luaast luasyntaxlist addrange ienumerable collection at codeanalysis transpilers jasstoluatranspiler transpile jasscompilationunitsyntax compilationunit at build extensions mapextensions compilescript map map compiler compiler mapscriptbuilder mapscriptbuilder ienumerable luasystemlibs string commonjpath string blizzardjpath at build extensions mapextensions compilescript map map compiler compiler ienumerable luasystemlibs string commonjpath string blizzardjpath at azerothwarscsharp launcher program build string basemappath string projectfolderpath boolean launch in c users zak source repos azerothwarscsharpnew src azerothwarscsharp launcher program cs line at azerothwarscsharp launcher program makedecision in c users zak source repos azerothwarscsharpnew src azerothwarscsharp launcher program cs line at azerothwarscsharp launcher program main in c users zak source repos azerothwarscsharpnew src azerothwarscsharp launcher program cs line
0
263,108
23,036,617,599
IssuesEvent
2022-07-22 19:34:16
OvercastCommunity/public-competitive
https://api.github.com/repos/OvercastCommunity/public-competitive
closed
[CTF/5v5] Remnant
contest
### Checklist Check what applies to you. *Add an X between the brackets or click the checkboxes when you have submitted the issue.* - [X] I have [pruned](https://pgm.dev/docs/guides/packaging/pruning-chunks) the map - [X] I have agreed with assigning the [CC BY-SA 4.0 license](https://creativecommons.org/licenses/by-sa/4.0/) to this map - [X] I have provided an XML file - [X] I have uploaded the map zip file to a file sharing service # Map Name Remnant ## Gamemode & Map Description 5v5 CTF Ancient ruins theme ## Map Image ![2022-04-12_18 21 09](https://user-images.githubusercontent.com/56277290/163071763-9155e648-3042-42db-9b8b-b13df0c11fce.png) ![2022-04-12_18 21 27](https://user-images.githubusercontent.com/56277290/163071773-25b8aa24-4e54-4fcd-b13f-816eb7d304fd.png) ## Download Link (https://drive.google.com/drive/folders/1oh-svVNalgHc0PNBwrfaaItpi3VOvsHb?usp=sharing)
1.0
[CTF/5v5] Remnant - ### Checklist Check what applies to you. *Add an X between the brackets or click the checkboxes when you have submitted the issue.* - [X] I have [pruned](https://pgm.dev/docs/guides/packaging/pruning-chunks) the map - [X] I have agreed with assigning the [CC BY-SA 4.0 license](https://creativecommons.org/licenses/by-sa/4.0/) to this map - [X] I have provided an XML file - [X] I have uploaded the map zip file to a file sharing service # Map Name Remnant ## Gamemode & Map Description 5v5 CTF Ancient ruins theme ## Map Image ![2022-04-12_18 21 09](https://user-images.githubusercontent.com/56277290/163071763-9155e648-3042-42db-9b8b-b13df0c11fce.png) ![2022-04-12_18 21 27](https://user-images.githubusercontent.com/56277290/163071773-25b8aa24-4e54-4fcd-b13f-816eb7d304fd.png) ## Download Link (https://drive.google.com/drive/folders/1oh-svVNalgHc0PNBwrfaaItpi3VOvsHb?usp=sharing)
non_priority
remnant checklist check what applies to you add an x between the brackets or click the checkboxes when you have submitted the issue i have the map i have agreed with assigning the to this map i have provided an xml file i have uploaded the map zip file to a file sharing service map name remnant gamemode map description ctf ancient ruins theme map image download link
0
241,425
26,256,783,758
IssuesEvent
2023-01-06 01:57:34
Chiencc/Express
https://api.github.com/repos/Chiencc/Express
closed
CVE-2021-35065 (High) detected in glob-parent-5.1.2.tgz - autoclosed
security vulnerability
## CVE-2021-35065 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>glob-parent-5.1.2.tgz</b></p></summary> <p>Extract the non-magic parent path from a glob string.</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - mocha-7.0.1.tgz (Root Library) - chokidar-3.3.0.tgz - :x: **glob-parent-5.1.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Chiencc/Express/commit/0673d1f4df72daf41a574593e8ee445dc0a4766d">0673d1f4df72daf41a574593e8ee445dc0a4766d</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package glob-parent from 6.0.0 and before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS) <p>Publish Date: 2021-06-22 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-cj88-88mr-972w">https://github.com/advisories/GHSA-cj88-88mr-972w</a></p> <p>Release Date: 2021-06-22</p> <p>Fix Resolution: glob-parent - 6.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-35065 (High) detected in glob-parent-5.1.2.tgz - autoclosed - ## CVE-2021-35065 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>glob-parent-5.1.2.tgz</b></p></summary> <p>Extract the non-magic parent path from a glob string.</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - mocha-7.0.1.tgz (Root Library) - chokidar-3.3.0.tgz - :x: **glob-parent-5.1.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Chiencc/Express/commit/0673d1f4df72daf41a574593e8ee445dc0a4766d">0673d1f4df72daf41a574593e8ee445dc0a4766d</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package glob-parent from 6.0.0 and before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS) <p>Publish Date: 2021-06-22 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-cj88-88mr-972w">https://github.com/advisories/GHSA-cj88-88mr-972w</a></p> <p>Release Date: 2021-06-22</p> <p>Fix Resolution: glob-parent - 6.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in glob parent tgz autoclosed cve high severity vulnerability vulnerable library glob parent tgz extract the non magic parent path from a glob string library home page a href path to dependency file package json path to vulnerable library node modules glob parent package json dependency hierarchy mocha tgz root library chokidar tgz x glob parent tgz vulnerable library found in head commit a href found in base branch master vulnerability details the package glob parent from and before are vulnerable to regular expression denial of service redos publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent step up your open source security game with mend
0
5,876
3,688,381,419
IssuesEvent
2016-02-25 12:38:31
OpenRCT2/OpenRCT2
https://api.github.com/repos/OpenRCT2/OpenRCT2
closed
Crash by segmentation fault 11 on OS X
build OS X (OS)
**OS:** OS X 10.11.3 (15D21) **Version:** 0.0.4 **Commit:** 10dbcfe, current latest develop Explanation of the issue... - [ ] ? **Steps to reproduce:** 1. Build. 2. Run. 3. … 4. ~~PROFIT!~~ **Screenshot:** ![Console](https://cloud.githubusercontent.com/assets/2531397/13317371/51ca71ca-dbf8-11e5-9d28-7982c7f8e4fa.png) **[Crash Log](https://gist.github.com/minacle/b38633cab28c9ba48933)**
1.0
Crash by segmentation fault 11 on OS X - **OS:** OS X 10.11.3 (15D21) **Version:** 0.0.4 **Commit:** 10dbcfe, current latest develop Explanation of the issue... - [ ] ? **Steps to reproduce:** 1. Build. 2. Run. 3. … 4. ~~PROFIT!~~ **Screenshot:** ![Console](https://cloud.githubusercontent.com/assets/2531397/13317371/51ca71ca-dbf8-11e5-9d28-7982c7f8e4fa.png) **[Crash Log](https://gist.github.com/minacle/b38633cab28c9ba48933)**
non_priority
crash by segmentation fault on os x os os x version commit current latest develop explanation of the issue steps to reproduce build run … profit screenshot
0
86,170
10,476,044,196
IssuesEvent
2019-09-23 17:41:42
magento/pwa-studio
https://api.github.com/repos/magento/pwa-studio
closed
[doc]: README update for pwa-studio
documentation
<!-- Thank you for taking the time to report this issue! GitHub Issues should only be created for problems/topics related to this project's codebase. Before submitting this issue, please make sure you are complying with our Code of Conduct: https://github.com/magento/pwa-studio/blob/develop/.github/CODE_OF_CONDUCT.md Issues that do not comply with our Code of Conduct or do not contain enough information may be closed at the maintainers' discretion. Feel free to remove this section before creating this issue. --> **Describe the request** Update to the README for pwa-studio is needed in preparation for our 4.0.0 release and activities at MLEU. Original content was suitable for early work but needs to reflect the current state of PWA Studio, Peregrine, Venia -- while encouraging new contribution and getting started (demos, screens) where possible. Need to refresh current contributors and any new guidance from Community Engineering. <!-- Complete the following sections to help us apply appropriate labels! --> **Please let us know whether this is a new topic or a topic change request:** - [ ] New Topic Request (ie. missing entire topic/section) - [X] Topic Change Request (ie. spelling, organization)
1.0
[doc]: README update for pwa-studio - <!-- Thank you for taking the time to report this issue! GitHub Issues should only be created for problems/topics related to this project's codebase. Before submitting this issue, please make sure you are complying with our Code of Conduct: https://github.com/magento/pwa-studio/blob/develop/.github/CODE_OF_CONDUCT.md Issues that do not comply with our Code of Conduct or do not contain enough information may be closed at the maintainers' discretion. Feel free to remove this section before creating this issue. --> **Describe the request** Update to the README for pwa-studio is needed in preparation for our 4.0.0 release and activities at MLEU. Original content was suitable for early work but needs to reflect the current state of PWA Studio, Peregrine, Venia -- while encouraging new contribution and getting started (demos, screens) where possible. Need to refresh current contributors and any new guidance from Community Engineering. <!-- Complete the following sections to help us apply appropriate labels! --> **Please let us know whether this is a new topic or a topic change request:** - [ ] New Topic Request (ie. missing entire topic/section) - [X] Topic Change Request (ie. spelling, organization)
non_priority
readme update for pwa studio thank you for taking the time to report this issue github issues should only be created for problems topics related to this project s codebase before submitting this issue please make sure you are complying with our code of conduct issues that do not comply with our code of conduct or do not contain enough information may be closed at the maintainers discretion feel free to remove this section before creating this issue describe the request update to the readme for pwa studio is needed in preparation for our release and activities at mleu original content was suitable for early work but needs to reflect the current state of pwa studio peregrine venia while encouraging new contribution and getting started demos screens where possible need to refresh current contributors and any new guidance from community engineering please let us know whether this is a new topic or a topic change request new topic request ie missing entire topic section topic change request ie spelling organization
0
161,050
25,279,586,345
IssuesEvent
2022-11-16 14:55:18
microsoft/vscode
https://api.github.com/repos/microsoft/vscode
closed
Too many files staged for changes (10K+) before Commit that I did not make.
git *as-designed
Type: <b>Performance Issue</b> When I open any folder to work on in VSC, I get a popup in lower right hand corner that reads: "The git repository at C:\Users\Darrell has too many active changes, only a subset of Git features will be enabled. Source: Git Extension." When I click on Source Control, I get a similar message showing 10K changes ready to Commit. None of the changes being reported are related to my project. Please advise what to do to fix this problem. Darrell Haywood. October 28, 2022. ddhay@msn.com, ddhay41@gmail.com VS Code version: Code 1.72.2 (d045a5eda657f4d7b676dedbfa7aab8207f8a075, 2022-10-12T22:15:18.074Z) OS version: Windows_NT x64 10.0.22000 Modes: Sandboxed: No <details> <summary>System Info</summary> |Item|Value| |---|---| |CPUs|Intel(R) Core(TM) i7-10700T CPU @ 2.00GHz (16 x 1992)| |GPU Status|2d_canvas: enabled<br>canvas_oop_rasterization: disabled_off<br>direct_rendering_display_compositor: disabled_off_ok<br>gpu_compositing: enabled<br>multiple_raster_threads: enabled_on<br>opengl: enabled_on<br>rasterization: enabled<br>raw_draw: disabled_off_ok<br>skia_renderer: enabled_on<br>video_decode: enabled<br>video_encode: enabled<br>vulkan: disabled_off<br>webgl: enabled<br>webgl2: enabled<br>webgpu: disabled_off| |Load (avg)|undefined| |Memory (System)|15.83GB (8.09GB free)| |Process Argv|--crash-reporter-id 67816ed0-c9eb-4b5a-9bbd-ae9d920ee44d| |Screen Reader|no| |VM|0%| </details><details> <summary>Process Info</summary> ``` CPU % Mem MB PID Process 0 99 11188 code main 0 88 988 issue-reporter 0 39 3848 utility-network-service 0 113 4060 shared-process 0 72 6352 ptyHost 0 101 22292 fileWatcher 0 140 8136 extensionHost 0 75 15028 "C:\Users\Darrell\AppData\Local\Programs\ VS Code\Code.exe" --ms-enable-electron-run-as-node "c:\Users\Darrell\AppData\Local\Programs\ VS Code\resources\app\extensions\json-language-features\server\dist\node\jsonServerMain" --node-ipc --clientProcessId=8136 0 102 22604 "C:\Users\Darrell\AppData\Local\Programs\ VS Code\Code.exe" --ms-enable-electron-run-as-node "c:\Users\Darrell\AppData\Local\Programs\ VS Code\resources\app\extensions\html-language-features\server\dist\node\htmlServerMain" --node-ipc --clientProcessId=8136 0 213 11700 window (index.html - Unifeed-11-8.21-final 1.39pm - Visual Studio Code) 0 26 19488 crashpad-handler 0 145 21224 gpu-process ``` </details> <details> <summary>Workspace Info</summary> ``` | Window (index.html - Unifeed-11-8.21-final 1.39pm - Visual Studio Code) | Folder (Unifeed-11-8.21-final 1.39pm): 18 files | File types: png(10) svg(2) json(1) DS_Store(1) html(1) css(1) | Conf files: settings.json(1); ``` </details> Extensions: none<details> <summary>A/B Experiments</summary> ``` vsliv368:30146709 vsreu685:30147344 python383cf:30185419 vspor879:30202332 vspor708:30202333 vspor363:30204092 vslsvsres303:30308271 pythonvspyl392:30443607 vserr242cf:30382550 pythontb:30283811 vsjup518:30340749 pythonptprofiler:30281270 vshan820:30294714 vstes263:30335439 vscoreces:30445986 pythondataviewer:30285071 vscod805:30301674 binariesv615:30325510 bridge0708:30335490 bridge0723:30353136 cmake_vspar411:30581797 vsaa593cf:30376535 pythonvs932:30410667 cppdebug:30492333 vsclangdf:30486550 c4g48928:30535728 dsvsc012cf:30540253 azure-dev_surveyone:30548225 pyindex848:30577860 nodejswelcome1cf:30587006 fc301958:30595537 2e4cg342:30596373 ``` </details> <!-- generated by issue reporter -->
1.0
Too many files staged for changes (10K+) before Commit that I did not make. - Type: <b>Performance Issue</b> When I open any folder to work on in VSC, I get a popup in lower right hand corner that reads: "The git repository at C:\Users\Darrell has too many active changes, only a subset of Git features will be enabled. Source: Git Extension." When I click on Source Control, I get a similar message showing 10K changes ready to Commit. None of the changes being reported are related to my project. Please advise what to do to fix this problem. Darrell Haywood. October 28, 2022. ddhay@msn.com, ddhay41@gmail.com VS Code version: Code 1.72.2 (d045a5eda657f4d7b676dedbfa7aab8207f8a075, 2022-10-12T22:15:18.074Z) OS version: Windows_NT x64 10.0.22000 Modes: Sandboxed: No <details> <summary>System Info</summary> |Item|Value| |---|---| |CPUs|Intel(R) Core(TM) i7-10700T CPU @ 2.00GHz (16 x 1992)| |GPU Status|2d_canvas: enabled<br>canvas_oop_rasterization: disabled_off<br>direct_rendering_display_compositor: disabled_off_ok<br>gpu_compositing: enabled<br>multiple_raster_threads: enabled_on<br>opengl: enabled_on<br>rasterization: enabled<br>raw_draw: disabled_off_ok<br>skia_renderer: enabled_on<br>video_decode: enabled<br>video_encode: enabled<br>vulkan: disabled_off<br>webgl: enabled<br>webgl2: enabled<br>webgpu: disabled_off| |Load (avg)|undefined| |Memory (System)|15.83GB (8.09GB free)| |Process Argv|--crash-reporter-id 67816ed0-c9eb-4b5a-9bbd-ae9d920ee44d| |Screen Reader|no| |VM|0%| </details><details> <summary>Process Info</summary> ``` CPU % Mem MB PID Process 0 99 11188 code main 0 88 988 issue-reporter 0 39 3848 utility-network-service 0 113 4060 shared-process 0 72 6352 ptyHost 0 101 22292 fileWatcher 0 140 8136 extensionHost 0 75 15028 "C:\Users\Darrell\AppData\Local\Programs\ VS Code\Code.exe" --ms-enable-electron-run-as-node "c:\Users\Darrell\AppData\Local\Programs\ VS Code\resources\app\extensions\json-language-features\server\dist\node\jsonServerMain" --node-ipc --clientProcessId=8136 0 102 22604 "C:\Users\Darrell\AppData\Local\Programs\ VS Code\Code.exe" --ms-enable-electron-run-as-node "c:\Users\Darrell\AppData\Local\Programs\ VS Code\resources\app\extensions\html-language-features\server\dist\node\htmlServerMain" --node-ipc --clientProcessId=8136 0 213 11700 window (index.html - Unifeed-11-8.21-final 1.39pm - Visual Studio Code) 0 26 19488 crashpad-handler 0 145 21224 gpu-process ``` </details> <details> <summary>Workspace Info</summary> ``` | Window (index.html - Unifeed-11-8.21-final 1.39pm - Visual Studio Code) | Folder (Unifeed-11-8.21-final 1.39pm): 18 files | File types: png(10) svg(2) json(1) DS_Store(1) html(1) css(1) | Conf files: settings.json(1); ``` </details> Extensions: none<details> <summary>A/B Experiments</summary> ``` vsliv368:30146709 vsreu685:30147344 python383cf:30185419 vspor879:30202332 vspor708:30202333 vspor363:30204092 vslsvsres303:30308271 pythonvspyl392:30443607 vserr242cf:30382550 pythontb:30283811 vsjup518:30340749 pythonptprofiler:30281270 vshan820:30294714 vstes263:30335439 vscoreces:30445986 pythondataviewer:30285071 vscod805:30301674 binariesv615:30325510 bridge0708:30335490 bridge0723:30353136 cmake_vspar411:30581797 vsaa593cf:30376535 pythonvs932:30410667 cppdebug:30492333 vsclangdf:30486550 c4g48928:30535728 dsvsc012cf:30540253 azure-dev_surveyone:30548225 pyindex848:30577860 nodejswelcome1cf:30587006 fc301958:30595537 2e4cg342:30596373 ``` </details> <!-- generated by issue reporter -->
non_priority
too many files staged for changes before commit that i did not make type performance issue when i open any folder to work on in vsc i get a popup in lower right hand corner that reads the git repository at c users darrell has too many active changes only a subset of git features will be enabled source git extension when i click on source control i get a similar message showing changes ready to commit none of the changes being reported are related to my project please advise what to do to fix this problem darrell haywood october ddhay msn com gmail com vs code version code os version windows nt modes sandboxed no system info item value cpus intel r core tm cpu x gpu status canvas enabled canvas oop rasterization disabled off direct rendering display compositor disabled off ok gpu compositing enabled multiple raster threads enabled on opengl enabled on rasterization enabled raw draw disabled off ok skia renderer enabled on video decode enabled video encode enabled vulkan disabled off webgl enabled enabled webgpu disabled off load avg undefined memory system free process argv crash reporter id screen reader no vm process info cpu mem mb pid process code main issue reporter utility network service shared process ptyhost filewatcher extensionhost c users darrell appdata local programs vs code code exe ms enable electron run as node c users darrell appdata local programs vs code resources app extensions json language features server dist node jsonservermain node ipc clientprocessid c users darrell appdata local programs vs code code exe ms enable electron run as node c users darrell appdata local programs vs code resources app extensions html language features server dist node htmlservermain node ipc clientprocessid window index html unifeed final visual studio code crashpad handler gpu process workspace info window index html unifeed final visual studio code folder unifeed final files file types png svg json ds store html css conf files settings json extensions none a b experiments pythontb pythonptprofiler vscoreces pythondataviewer cmake cppdebug vsclangdf azure dev surveyone
0
14,524
3,274,567,279
IssuesEvent
2015-10-26 11:38:52
owncloud/client
https://api.github.com/repos/owncloud/client
closed
Unclear String "Discovering 'ownCloud'" in account settings
Design & UX ReadyToTest
It is very unclear what it means when the owncloud client is doing when it says "Discovering 'ownCloud'". Is it looking through files in the local computer, is it waiting for the server? ![image](https://cloud.githubusercontent.com/assets/639487/8595129/e860ddac-2647-11e5-8d43-79a373cfc7ef.png) I hope something more clear can be written.
1.0
Unclear String "Discovering 'ownCloud'" in account settings - It is very unclear what it means when the owncloud client is doing when it says "Discovering 'ownCloud'". Is it looking through files in the local computer, is it waiting for the server? ![image](https://cloud.githubusercontent.com/assets/639487/8595129/e860ddac-2647-11e5-8d43-79a373cfc7ef.png) I hope something more clear can be written.
non_priority
unclear string discovering owncloud in account settings it is very unclear what it means when the owncloud client is doing when it says discovering owncloud is it looking through files in the local computer is it waiting for the server i hope something more clear can be written
0
134,349
12,600,783,222
IssuesEvent
2020-06-11 08:45:03
datacite/datacite
https://api.github.com/repos/datacite/datacite
closed
Proposal to change navigation in stats portal (without repository tab)
documentation feature
**Is your feature request related to a problem? Please describe.** We have hit a wall with the types of aggregation we can make. There are too many repositories and we can not show all their aggregations together without breaking the api. See https://github.com/datacite/datacite/issues/958 We would need to remove the repository view of the stats portal but what can we do to make users aware that they can still see their summary stats (besides writing documentation) **Describe the solution you'd like** - Proposal-1: Keep the repository tab. But show a table with only the repository's names. No stats. But Indicate that they can click on every repository to see their stats. Effort: medium. - Proposal-2: Remove the tab and document how to get to the repository stats. Effort: low. - Proposal-3: Keep the repository tab. Add pagination to the repository table. Effort: High. **Describe alternatives you've considered** A clear and concise description of any alternative solutions or features you've considered. **Additional context** Add any other context or screenshots about the feature request here.
1.0
Proposal to change navigation in stats portal (without repository tab) - **Is your feature request related to a problem? Please describe.** We have hit a wall with the types of aggregation we can make. There are too many repositories and we can not show all their aggregations together without breaking the api. See https://github.com/datacite/datacite/issues/958 We would need to remove the repository view of the stats portal but what can we do to make users aware that they can still see their summary stats (besides writing documentation) **Describe the solution you'd like** - Proposal-1: Keep the repository tab. But show a table with only the repository's names. No stats. But Indicate that they can click on every repository to see their stats. Effort: medium. - Proposal-2: Remove the tab and document how to get to the repository stats. Effort: low. - Proposal-3: Keep the repository tab. Add pagination to the repository table. Effort: High. **Describe alternatives you've considered** A clear and concise description of any alternative solutions or features you've considered. **Additional context** Add any other context or screenshots about the feature request here.
non_priority
proposal to change navigation in stats portal without repository tab is your feature request related to a problem please describe we have hit a wall with the types of aggregation we can make there are too many repositories and we can not show all their aggregations together without breaking the api see we would need to remove the repository view of the stats portal but what can we do to make users aware that they can still see their summary stats besides writing documentation describe the solution you d like proposal keep the repository tab but show a table with only the repository s names no stats but indicate that they can click on every repository to see their stats effort medium proposal remove the tab and document how to get to the repository stats effort low proposal keep the repository tab add pagination to the repository table effort high describe alternatives you ve considered a clear and concise description of any alternative solutions or features you ve considered additional context add any other context or screenshots about the feature request here
0
195,481
14,730,970,150
IssuesEvent
2021-01-06 14:02:29
opendatapolicing/opendatapolicing
https://api.github.com/repos/opendatapolicing/opendatapolicing
opened
Create the SiteState Java class
create_java_class_SiteState
# Mission SiteState Java class ![Mission:Impossible Open Data Policing](https://computate.neocities.org/gif/mission-impossible-opendatapolicing.gif "Mission:Impossible Open Data Policing") Your mission, should you choose to accept it, is to create a new Java class SiteStateGen. The [Southern Coalition for Social Justice](https://southerncoalition.org/) needs you to solve one of the world's most challenging problems: ## To aggregate, visualize, and publish the public records related to all known traffic stops to make stop, search, and use-of-force data publicly available to ensure transparency. ## Red Hat has given the green light to all associates like you to join the Open Data Policing team as an agent. ## The day of the operation is Martin Luther King Day, January 18th, 2021 You will have 24 hours to complete your mission. This platform allows users—including those in police management—to easily compare enforcement patterns among individual officers and agencies, evaluate the frequency and efficiency of searches, and monitor for racially disparate enforcement practices. ## In the words of Martin Luther King Jr.: - Now is the time to make real the promises of democracy. - Now is the time to lift our nation from the quicksands of racial injustice to the solid rock of brotherhood. - It would be fatal for the nation to overlook the urgency of the moment. # You will be joining a team of the boldest of all Red Hatters for this mission, who will be at your service developing the code and automating the deployment to OpenShift. - Let freedom ring from the mighty mountains of New York. - Let freedom ring from the heightening Alleghenies of Pennsylvania. - Let freedom ring from the snow-capped Rockies of Colorado. - Let freedom ring from the curvaceous slopes of California. - From every mountainside, let freedom ring. - Should you, or any of your force be taken or compromised that day, you must report back as many changes as you have made, and any knowledge of your actions, by pull request or comments on the issue on the board. ## The details of your mission: - **The Java package name will be:** com.opendatapolicing.enus.state - **The Java class name will be:** SiteState - **The Java class will extend:** SiteStateGen\<Cluster\> ```java package com.opendatapolicing.enus.state; import java.util.List; import com.opendatapolicing.enus.cluster.Cluster; import com.opendatapolicing.enus.wrap.Wrap; /** * Model: true * Stored: true * Indexed: true * Saved: true * ApiUri.enUS: /api/state * ApiTag.enUS: State * ApiMethod: PUTImport.enUS * ApiUriPUTImport.enUS: /api/state/import * ApiMethod: PUTMerge.enUS * ApiUriPUTMerge.enUS: /api/state/merge * ApiMethod: PUTCopy.enUS * ApiUriPUTCopy.enUS: /api/state/copy * ApiMethod: POST * ApiMethod: PATCH * ApiMethod: GET.enUS * ApiUriGET.enUS: /api/state/{id} * ApiMethod: Search * ApiMethod: AdminSearch.enUS * ApiUriAdminSearch.enUS: /api/admin/state * ApiMethod: SearchPage.enUS * ApiUriSearchPage.enUS: /state * PageSearchPage.enUS: SiteStatePage * PageSuperSearchPage.enUS: SiteStatePage * AName.enUS: a state * Color: pale-blue * IconGroup: regular * IconName: globe-americas * NameVar: state * Sort.asc: stateName * Rows: 100 **/ public class SiteState extends SiteStateGen<Cluster> { } ``` ## Create the stateKey entity ```java protected void _stateKey(Wrap<Long> c) { c.o(pk); } ``` ## Create the stateName entity ```java protected void _stateName(Wrap<String> c) { } ``` ## Create the stateAbbreviation entity ```java protected void _stateAbbreviation(Wrap<String> c) { } ``` ## Create the imageLeft entity ```java protected void _imageLeft(Wrap<Integer> c) { } ``` ## Create the imageTop entity ```java protected void _imageTop(Wrap<Integer> c) { } ``` ## Create the agencyKeys entity ```java protected void _agencyKeys(List<Long> o) {} ``` ## Create the stateCompleteName entity ```java protected void _stateCompleteName(Wrap<String> c) { c.o(stateName + " (" + stateAbbreviation + ")"); } ``` ## Create the _objectTitle method ```java _objectTitle(Wrap<String> c) { c.o(stateName + " (" + stateAbbreviation + ")"); } ``` ![This message will not self-destruct. ](https://computate.neocities.org/png/mission-impossible-message.png "This message will not self-destruct. ") # This message will not self destruct, because this project is open source.
1.0
Create the SiteState Java class - # Mission SiteState Java class ![Mission:Impossible Open Data Policing](https://computate.neocities.org/gif/mission-impossible-opendatapolicing.gif "Mission:Impossible Open Data Policing") Your mission, should you choose to accept it, is to create a new Java class SiteStateGen. The [Southern Coalition for Social Justice](https://southerncoalition.org/) needs you to solve one of the world's most challenging problems: ## To aggregate, visualize, and publish the public records related to all known traffic stops to make stop, search, and use-of-force data publicly available to ensure transparency. ## Red Hat has given the green light to all associates like you to join the Open Data Policing team as an agent. ## The day of the operation is Martin Luther King Day, January 18th, 2021 You will have 24 hours to complete your mission. This platform allows users—including those in police management—to easily compare enforcement patterns among individual officers and agencies, evaluate the frequency and efficiency of searches, and monitor for racially disparate enforcement practices. ## In the words of Martin Luther King Jr.: - Now is the time to make real the promises of democracy. - Now is the time to lift our nation from the quicksands of racial injustice to the solid rock of brotherhood. - It would be fatal for the nation to overlook the urgency of the moment. # You will be joining a team of the boldest of all Red Hatters for this mission, who will be at your service developing the code and automating the deployment to OpenShift. - Let freedom ring from the mighty mountains of New York. - Let freedom ring from the heightening Alleghenies of Pennsylvania. - Let freedom ring from the snow-capped Rockies of Colorado. - Let freedom ring from the curvaceous slopes of California. - From every mountainside, let freedom ring. - Should you, or any of your force be taken or compromised that day, you must report back as many changes as you have made, and any knowledge of your actions, by pull request or comments on the issue on the board. ## The details of your mission: - **The Java package name will be:** com.opendatapolicing.enus.state - **The Java class name will be:** SiteState - **The Java class will extend:** SiteStateGen\<Cluster\> ```java package com.opendatapolicing.enus.state; import java.util.List; import com.opendatapolicing.enus.cluster.Cluster; import com.opendatapolicing.enus.wrap.Wrap; /** * Model: true * Stored: true * Indexed: true * Saved: true * ApiUri.enUS: /api/state * ApiTag.enUS: State * ApiMethod: PUTImport.enUS * ApiUriPUTImport.enUS: /api/state/import * ApiMethod: PUTMerge.enUS * ApiUriPUTMerge.enUS: /api/state/merge * ApiMethod: PUTCopy.enUS * ApiUriPUTCopy.enUS: /api/state/copy * ApiMethod: POST * ApiMethod: PATCH * ApiMethod: GET.enUS * ApiUriGET.enUS: /api/state/{id} * ApiMethod: Search * ApiMethod: AdminSearch.enUS * ApiUriAdminSearch.enUS: /api/admin/state * ApiMethod: SearchPage.enUS * ApiUriSearchPage.enUS: /state * PageSearchPage.enUS: SiteStatePage * PageSuperSearchPage.enUS: SiteStatePage * AName.enUS: a state * Color: pale-blue * IconGroup: regular * IconName: globe-americas * NameVar: state * Sort.asc: stateName * Rows: 100 **/ public class SiteState extends SiteStateGen<Cluster> { } ``` ## Create the stateKey entity ```java protected void _stateKey(Wrap<Long> c) { c.o(pk); } ``` ## Create the stateName entity ```java protected void _stateName(Wrap<String> c) { } ``` ## Create the stateAbbreviation entity ```java protected void _stateAbbreviation(Wrap<String> c) { } ``` ## Create the imageLeft entity ```java protected void _imageLeft(Wrap<Integer> c) { } ``` ## Create the imageTop entity ```java protected void _imageTop(Wrap<Integer> c) { } ``` ## Create the agencyKeys entity ```java protected void _agencyKeys(List<Long> o) {} ``` ## Create the stateCompleteName entity ```java protected void _stateCompleteName(Wrap<String> c) { c.o(stateName + " (" + stateAbbreviation + ")"); } ``` ## Create the _objectTitle method ```java _objectTitle(Wrap<String> c) { c.o(stateName + " (" + stateAbbreviation + ")"); } ``` ![This message will not self-destruct. ](https://computate.neocities.org/png/mission-impossible-message.png "This message will not self-destruct. ") # This message will not self destruct, because this project is open source.
non_priority
create the sitestate java class mission sitestate java class mission impossible open data policing your mission should you choose to accept it is to create a new java class sitestategen the needs you to solve one of the world s most challenging problems to aggregate visualize and publish the public records related to all known traffic stops to make stop search and use of force data publicly available to ensure transparency red hat has given the green light to all associates like you to join the open data policing team as an agent the day of the operation is martin luther king day january you will have hours to complete your mission this platform allows users—including those in police management—to easily compare enforcement patterns among individual officers and agencies evaluate the frequency and efficiency of searches and monitor for racially disparate enforcement practices in the words of martin luther king jr now is the time to make real the promises of democracy now is the time to lift our nation from the quicksands of racial injustice to the solid rock of brotherhood it would be fatal for the nation to overlook the urgency of the moment you will be joining a team of the boldest of all red hatters for this mission who will be at your service developing the code and automating the deployment to openshift let freedom ring from the mighty mountains of new york let freedom ring from the heightening alleghenies of pennsylvania let freedom ring from the snow capped rockies of colorado let freedom ring from the curvaceous slopes of california from every mountainside let freedom ring should you or any of your force be taken or compromised that day you must report back as many changes as you have made and any knowledge of your actions by pull request or comments on the issue on the board the details of your mission the java package name will be com opendatapolicing enus state the java class name will be sitestate the java class will extend sitestategen java package com opendatapolicing enus state import java util list import com opendatapolicing enus cluster cluster import com opendatapolicing enus wrap wrap model true stored true indexed true saved true apiuri enus api state apitag enus state apimethod putimport enus apiuriputimport enus api state import apimethod putmerge enus apiuriputmerge enus api state merge apimethod putcopy enus apiuriputcopy enus api state copy apimethod post apimethod patch apimethod get enus apiuriget enus api state id apimethod search apimethod adminsearch enus apiuriadminsearch enus api admin state apimethod searchpage enus apiurisearchpage enus state pagesearchpage enus sitestatepage pagesupersearchpage enus sitestatepage aname enus a state color pale blue icongroup regular iconname globe americas namevar state sort asc statename rows public class sitestate extends sitestategen create the statekey entity java protected void statekey wrap c c o pk create the statename entity java protected void statename wrap c create the stateabbreviation entity java protected void stateabbreviation wrap c create the imageleft entity java protected void imageleft wrap c create the imagetop entity java protected void imagetop wrap c create the agencykeys entity java protected void agencykeys list o create the statecompletename entity java protected void statecompletename wrap c c o statename stateabbreviation create the objecttitle method java objecttitle wrap c c o statename stateabbreviation this message will not self destruct this message will not self destruct because this project is open source
0
331,335
24,303,192,743
IssuesEvent
2022-09-29 15:16:32
mckinleypadgett/Donaldson-YouTube-Analysis
https://api.github.com/repos/mckinleypadgett/Donaldson-YouTube-Analysis
opened
Update Use-Case Diagram
documentation ToDo
Update the use-case diagram from iteration 1 with the advice Dr. Dogdu gave in class. When finished, lets ping him with an email so he can check/ approve of this new update.
1.0
Update Use-Case Diagram - Update the use-case diagram from iteration 1 with the advice Dr. Dogdu gave in class. When finished, lets ping him with an email so he can check/ approve of this new update.
non_priority
update use case diagram update the use case diagram from iteration with the advice dr dogdu gave in class when finished lets ping him with an email so he can check approve of this new update
0
297,286
22,347,987,480
IssuesEvent
2022-06-15 09:28:43
spring-projects/spring-framework
https://api.github.com/repos/spring-projects/spring-framework
closed
Fix Kotlin example for @ComponentScan basePackages attribute
type: documentation in: kotlin
https://docs.spring.io/spring-framework/docs/current/reference/html/core.html#beans-scanning-filters kotlin to: ```kotlin @Configuration @ComponentScan(basePackages = ["org.example"], includeFilters = [Filter(type = FilterType.REGEX, pattern = [".*Stub.*Repository"])], excludeFilters = [Filter(Repository::class)]) class AppConfig { // ... } ```
1.0
Fix Kotlin example for @ComponentScan basePackages attribute - https://docs.spring.io/spring-framework/docs/current/reference/html/core.html#beans-scanning-filters kotlin to: ```kotlin @Configuration @ComponentScan(basePackages = ["org.example"], includeFilters = [Filter(type = FilterType.REGEX, pattern = [".*Stub.*Repository"])], excludeFilters = [Filter(Repository::class)]) class AppConfig { // ... } ```
non_priority
fix kotlin example for componentscan basepackages attribute kotlin to kotlin configuration componentscan basepackages includefilters excludefilters class appconfig
0
121,142
15,861,074,212
IssuesEvent
2021-04-08 09:53:45
ArchiveBox/ArchiveBox
https://api.github.com/repos/ArchiveBox/ArchiveBox
opened
Show prompt to update in Web UI when ArchiveBox version is out of date
difficulty: easy good first ticket is: enhancement javascript status: design phase
Many people seem to be running older versions, which can lead to trouble when upgrading many versions at a time. I'd like to nudge people towards upgrading more frequently by showing something in the UI. Possibly using: https://github.com/releasepage/version.js
1.0
Show prompt to update in Web UI when ArchiveBox version is out of date - Many people seem to be running older versions, which can lead to trouble when upgrading many versions at a time. I'd like to nudge people towards upgrading more frequently by showing something in the UI. Possibly using: https://github.com/releasepage/version.js
non_priority
show prompt to update in web ui when archivebox version is out of date many people seem to be running older versions which can lead to trouble when upgrading many versions at a time i d like to nudge people towards upgrading more frequently by showing something in the ui possibly using
0
143,366
11,545,408,089
IssuesEvent
2020-02-18 13:23:40
hazelcast/hazelcast
https://api.github.com/repos/hazelcast/hazelcast
closed
WriteBehindEntryStoreQueueReplicationTest.queued_entries_with_expirationTimes_are_replicated_when_cluster_scaled
Module: IMap Source: Internal Team: Core Type: Test-Failure
http://jenkins.hazelcast.com/job/Hazelcast-pr-builder/4021/testReport/junit/com.hazelcast.map.impl.mapstore.writebehind/WriteBehindEntryStoreQueueReplicationTest/queued_entries_with_expirationTimes_are_replicated_when_cluster_scaled_up/ ``` java.lang.AssertionError: Expected 'expirationTime' to be between 1572011647548 and 1572011651548, but was 1572011652000 at org.junit.Assert.fail(Assert.java:88) at org.junit.Assert.assertTrue(Assert.java:41) at com.hazelcast.test.HazelcastTestSupport.assertBetween(HazelcastTestSupport.java:1461) at com.hazelcast.map.impl.mapstore.TestEntryStore.assertRecordStored(TestEntryStore.java:171) at com.hazelcast.map.impl.mapstore.writebehind.WriteBehindEntryStoreQueueReplicationTest.lambda$queued_entries_with_expirationTimes_are_replicated_when_cluster_scaled_up$2(WriteBehindEntryStoreQueueReplicationTest.java:116) at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1318) at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1420) at com.hazelcast.map.impl.mapstore.writebehind.WriteBehindEntryStoreQueueReplicationTest.queued_entries_with_expirationTimes_are_replicated_when_cluster_scaled_up(WriteBehindEntryStoreQueueReplicationTest.java:114) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:114) at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:106) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.lang.Thread.run(Thread.java:748) ```
1.0
WriteBehindEntryStoreQueueReplicationTest.queued_entries_with_expirationTimes_are_replicated_when_cluster_scaled - http://jenkins.hazelcast.com/job/Hazelcast-pr-builder/4021/testReport/junit/com.hazelcast.map.impl.mapstore.writebehind/WriteBehindEntryStoreQueueReplicationTest/queued_entries_with_expirationTimes_are_replicated_when_cluster_scaled_up/ ``` java.lang.AssertionError: Expected 'expirationTime' to be between 1572011647548 and 1572011651548, but was 1572011652000 at org.junit.Assert.fail(Assert.java:88) at org.junit.Assert.assertTrue(Assert.java:41) at com.hazelcast.test.HazelcastTestSupport.assertBetween(HazelcastTestSupport.java:1461) at com.hazelcast.map.impl.mapstore.TestEntryStore.assertRecordStored(TestEntryStore.java:171) at com.hazelcast.map.impl.mapstore.writebehind.WriteBehindEntryStoreQueueReplicationTest.lambda$queued_entries_with_expirationTimes_are_replicated_when_cluster_scaled_up$2(WriteBehindEntryStoreQueueReplicationTest.java:116) at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1318) at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1420) at com.hazelcast.map.impl.mapstore.writebehind.WriteBehindEntryStoreQueueReplicationTest.queued_entries_with_expirationTimes_are_replicated_when_cluster_scaled_up(WriteBehindEntryStoreQueueReplicationTest.java:114) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:114) at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:106) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.lang.Thread.run(Thread.java:748) ```
non_priority
writebehindentrystorequeuereplicationtest queued entries with expirationtimes are replicated when cluster scaled java lang assertionerror expected expirationtime to be between and but was at org junit assert fail assert java at org junit assert asserttrue assert java at com hazelcast test hazelcasttestsupport assertbetween hazelcasttestsupport java at com hazelcast map impl mapstore testentrystore assertrecordstored testentrystore java at com hazelcast map impl mapstore writebehind writebehindentrystorequeuereplicationtest lambda queued entries with expirationtimes are replicated when cluster scaled up writebehindentrystorequeuereplicationtest java at com hazelcast test hazelcasttestsupport asserttrueeventually hazelcasttestsupport java at com hazelcast test hazelcasttestsupport asserttrueeventually hazelcasttestsupport java at com hazelcast map impl mapstore writebehind writebehindentrystorequeuereplicationtest queued entries with expirationtimes are replicated when cluster scaled up writebehindentrystorequeuereplicationtest java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at com hazelcast test failontimeoutstatement callablestatement call failontimeoutstatement java at com hazelcast test failontimeoutstatement callablestatement call failontimeoutstatement java at java util concurrent futuretask run futuretask java at java lang thread run thread java
0
7,012
7,837,404,825
IssuesEvent
2018-06-18 05:55:01
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
How do we add metadata in the QnAMaker knowledge base document?
assigned-to-author cognitive-services/svc product-question triaged
Is there a way to add meta data to knowledge base document from which the QnA's are extracted? Or adding them manually through QnAMaker website the only option? --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: cb1d6a8c-954c-9ce8-6101-c19b20724c91 * Version Independent ID: 5c219f6c-260b-c17a-7f41-1bf4095aa521 * Content: [Use metadata in your knowledge base along with the GenerateAnswer API](https://docs.microsoft.com/en-us/azure/cognitive-services/QnAMaker/how-to/metadata-generateanswer-usage) * Content Source: [articles/cognitive-services/QnAMaker/How-To/metadata-generateanswer-usage.md](https://github.com/Microsoft/azure-docs/blob/master/articles/cognitive-services/QnAMaker/How-To/metadata-generateanswer-usage.md) * Service: **cognitive-services** * GitHub Login: @pchoudhari * Microsoft Alias: **pchoudh**
1.0
How do we add metadata in the QnAMaker knowledge base document? - Is there a way to add meta data to knowledge base document from which the QnA's are extracted? Or adding them manually through QnAMaker website the only option? --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: cb1d6a8c-954c-9ce8-6101-c19b20724c91 * Version Independent ID: 5c219f6c-260b-c17a-7f41-1bf4095aa521 * Content: [Use metadata in your knowledge base along with the GenerateAnswer API](https://docs.microsoft.com/en-us/azure/cognitive-services/QnAMaker/how-to/metadata-generateanswer-usage) * Content Source: [articles/cognitive-services/QnAMaker/How-To/metadata-generateanswer-usage.md](https://github.com/Microsoft/azure-docs/blob/master/articles/cognitive-services/QnAMaker/How-To/metadata-generateanswer-usage.md) * Service: **cognitive-services** * GitHub Login: @pchoudhari * Microsoft Alias: **pchoudh**
non_priority
how do we add metadata in the qnamaker knowledge base document is there a way to add meta data to knowledge base document from which the qna s are extracted or adding them manually through qnamaker website the only option document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service cognitive services github login pchoudhari microsoft alias pchoudh
0
34,381
6,320,475,541
IssuesEvent
2017-07-25 01:47:33
zcash/zcash
https://api.github.com/repos/zcash/zcash
closed
Cannot send to t-addr
documentation user support wallet
zcash compiled on two Debian 8.6 machines, g++ (Debian 4.9.2-10) 4.9.2 and mining. Mined two blocks on one and tried to send money to the other, but got an error. Then tried sending between addresses on the same machine, still no-go. In the following, `zcli` is an alias for `zcash-cli` ``` jank@debian-modeli:~/zminer$ zcli getbalance 1.23760000 jank@debian-modeli:~/zminer$ zcli listunspent [ { "txid" : "b75d7afb7305bfd8ff5b262760d29474a19ee1170036a80eab563468c46d60ce", "vout" : 0, "address" : "tmBJbWWxG8xRnrJr7RL8sMFE6i6T7RjXupX", "scriptPubKey" : "2102744c37809b5dd9f7fd91168cd3ebbe3a9347db741b36bd0df5c2461f7d906ec9ac", "amount" : 0.60950000, "confirmations" : 211, "spendable" : true }, { "txid" : "575f45e4cdcb9a2f8c706e4975e07d624996e1cb551a07d4f4f885c60f86c8dd", "vout" : 0, "address" : "tmGr9EZoKg4CsfCx462aoCPjmFpsyV38Kht", "scriptPubKey" : "2103cb8aea87b2d82fba2dd2df30e86072698c19bff07427956f49c1077f29de0254ac", "amount" : 0.62810000, "confirmations" : 174, "spendable" : true } ] jank@debian-modeli:~/zminer$ zcli sendtoaddress "tmGr9EZoKg4CsfCx462aoCPjmFpsyV38Kht" 0.5 error: {"code":-4,"message":"Error: The transaction was rejected! This might happen if some of the coins in your wallet were already spent, such as if you used a copy of wallet.dat and coins were spent in the copy but not marked as spent here."} jank@debian-modeli:~/zminer$ zcli getinfo { "version" : 1000001, "protocolversion" : 170002, "walletversion" : 60000, "balance" : 1.23760000, "blocks" : 1431, "timeoffset" : 1, "connections" : 8, "proxy" : "", "difficulty" : 52.76561048, "testnet" : true, "keypoololdest" : 1475764841, "keypoolsize" : 101, "paytxfee" : 0.00000000, "relayfee" : 0.00005000, "errors" : "This is a pre-release test build - use at your own risk - do not use for mining or merchant applications" } jank@debian-modeli:~/zminer$ zcli listtransactions [ { "account" : "", "address" : "tmBJbWWxG8xRnrJr7RL8sMFE6i6T7RjXupX", "category" : "generate", "amount" : 0.60950000, "vout" : 0, "confirmations" : 215, "generated" : true, "blockhash" : "002f19dbd8494e2e46d074a09af44182cd255b7b5a7b91c745bccd432ae08152", "blockindex" : 0, "blocktime" : 1475806415, "txid" : "b75d7afb7305bfd8ff5b262760d29474a19ee1170036a80eab563468c46d60ce", "walletconflicts" : [ ], "time" : 1475806415, "timereceived" : 1475806468 }, { "account" : "", "address" : "tmGr9EZoKg4CsfCx462aoCPjmFpsyV38Kht", "category" : "generate", "amount" : 0.62810000, "vout" : 0, "confirmations" : 178, "generated" : true, "blockhash" : "000e05ef4ed2b3335de001396fdfdb3b8467f022d6dbd04c46cae5819b0261bf", "blockindex" : 0, "blocktime" : 1475812200, "txid" : "575f45e4cdcb9a2f8c706e4975e07d624996e1cb551a07d4f4f885c60f86c8dd", "walletconflicts" : [ ], "time" : 1475812200, "timereceived" : 1475812256 }, { "account" : "", "address" : "tmEFn21yevuB3QysmiEcCuxZxto974qu1f8", "category" : "immature", "amount" : 0.69610000, "vout" : 0, "confirmations" : 42, "generated" : true, "blockhash" : "004f270d2a005a2665268154546633bca70855e4813bdaf63b37501b13f5deda", "blockindex" : 0, "blocktime" : 1475830984, "txid" : "bf589d830b9d9d4c65cae728fc7451d04421c8745f44e1ae1ccb203e2a68e031", "walletconflicts" : [ ], "time" : 1475830984, "timereceived" : 1475831039 }, { "account" : "", "address" : "tmRj1fLLjCBMHHf5bFEkSveQoLKLoUNnbwy", "category" : "send", "amount" : -1.00000000, "vout" : 0, "fee" : -0.00001525, "confirmations" : -1, "txid" : "b7e1b152866de5c044de27edc5719f4f29efd1b9795907783b294070fecb495d", "walletconflicts" : [ "f6a4b955b163a01760d3112d17f2594f05bf2c5507b33af325d8d0f416803a2b", "5afcf56fa1ba4938c439deba4623d873a54f97fe9ee450c13b431700bbfc1481" ], "time" : 1475836221, "timereceived" : 1475836221 }, { "account" : "", "address" : "tmRj1fLLjCBMHHf5bFEkSveQoLKLoUNnbwy", "category" : "send", "amount" : -1.00000000, "vout" : 1, "fee" : -0.00001530, "confirmations" : -1, "txid" : "f6a4b955b163a01760d3112d17f2594f05bf2c5507b33af325d8d0f416803a2b", "walletconflicts" : [ "b7e1b152866de5c044de27edc5719f4f29efd1b9795907783b294070fecb495d", "5afcf56fa1ba4938c439deba4623d873a54f97fe9ee450c13b431700bbfc1481" ], "time" : 1475836221, "timereceived" : 1475836252 } ] ```
1.0
Cannot send to t-addr - zcash compiled on two Debian 8.6 machines, g++ (Debian 4.9.2-10) 4.9.2 and mining. Mined two blocks on one and tried to send money to the other, but got an error. Then tried sending between addresses on the same machine, still no-go. In the following, `zcli` is an alias for `zcash-cli` ``` jank@debian-modeli:~/zminer$ zcli getbalance 1.23760000 jank@debian-modeli:~/zminer$ zcli listunspent [ { "txid" : "b75d7afb7305bfd8ff5b262760d29474a19ee1170036a80eab563468c46d60ce", "vout" : 0, "address" : "tmBJbWWxG8xRnrJr7RL8sMFE6i6T7RjXupX", "scriptPubKey" : "2102744c37809b5dd9f7fd91168cd3ebbe3a9347db741b36bd0df5c2461f7d906ec9ac", "amount" : 0.60950000, "confirmations" : 211, "spendable" : true }, { "txid" : "575f45e4cdcb9a2f8c706e4975e07d624996e1cb551a07d4f4f885c60f86c8dd", "vout" : 0, "address" : "tmGr9EZoKg4CsfCx462aoCPjmFpsyV38Kht", "scriptPubKey" : "2103cb8aea87b2d82fba2dd2df30e86072698c19bff07427956f49c1077f29de0254ac", "amount" : 0.62810000, "confirmations" : 174, "spendable" : true } ] jank@debian-modeli:~/zminer$ zcli sendtoaddress "tmGr9EZoKg4CsfCx462aoCPjmFpsyV38Kht" 0.5 error: {"code":-4,"message":"Error: The transaction was rejected! This might happen if some of the coins in your wallet were already spent, such as if you used a copy of wallet.dat and coins were spent in the copy but not marked as spent here."} jank@debian-modeli:~/zminer$ zcli getinfo { "version" : 1000001, "protocolversion" : 170002, "walletversion" : 60000, "balance" : 1.23760000, "blocks" : 1431, "timeoffset" : 1, "connections" : 8, "proxy" : "", "difficulty" : 52.76561048, "testnet" : true, "keypoololdest" : 1475764841, "keypoolsize" : 101, "paytxfee" : 0.00000000, "relayfee" : 0.00005000, "errors" : "This is a pre-release test build - use at your own risk - do not use for mining or merchant applications" } jank@debian-modeli:~/zminer$ zcli listtransactions [ { "account" : "", "address" : "tmBJbWWxG8xRnrJr7RL8sMFE6i6T7RjXupX", "category" : "generate", "amount" : 0.60950000, "vout" : 0, "confirmations" : 215, "generated" : true, "blockhash" : "002f19dbd8494e2e46d074a09af44182cd255b7b5a7b91c745bccd432ae08152", "blockindex" : 0, "blocktime" : 1475806415, "txid" : "b75d7afb7305bfd8ff5b262760d29474a19ee1170036a80eab563468c46d60ce", "walletconflicts" : [ ], "time" : 1475806415, "timereceived" : 1475806468 }, { "account" : "", "address" : "tmGr9EZoKg4CsfCx462aoCPjmFpsyV38Kht", "category" : "generate", "amount" : 0.62810000, "vout" : 0, "confirmations" : 178, "generated" : true, "blockhash" : "000e05ef4ed2b3335de001396fdfdb3b8467f022d6dbd04c46cae5819b0261bf", "blockindex" : 0, "blocktime" : 1475812200, "txid" : "575f45e4cdcb9a2f8c706e4975e07d624996e1cb551a07d4f4f885c60f86c8dd", "walletconflicts" : [ ], "time" : 1475812200, "timereceived" : 1475812256 }, { "account" : "", "address" : "tmEFn21yevuB3QysmiEcCuxZxto974qu1f8", "category" : "immature", "amount" : 0.69610000, "vout" : 0, "confirmations" : 42, "generated" : true, "blockhash" : "004f270d2a005a2665268154546633bca70855e4813bdaf63b37501b13f5deda", "blockindex" : 0, "blocktime" : 1475830984, "txid" : "bf589d830b9d9d4c65cae728fc7451d04421c8745f44e1ae1ccb203e2a68e031", "walletconflicts" : [ ], "time" : 1475830984, "timereceived" : 1475831039 }, { "account" : "", "address" : "tmRj1fLLjCBMHHf5bFEkSveQoLKLoUNnbwy", "category" : "send", "amount" : -1.00000000, "vout" : 0, "fee" : -0.00001525, "confirmations" : -1, "txid" : "b7e1b152866de5c044de27edc5719f4f29efd1b9795907783b294070fecb495d", "walletconflicts" : [ "f6a4b955b163a01760d3112d17f2594f05bf2c5507b33af325d8d0f416803a2b", "5afcf56fa1ba4938c439deba4623d873a54f97fe9ee450c13b431700bbfc1481" ], "time" : 1475836221, "timereceived" : 1475836221 }, { "account" : "", "address" : "tmRj1fLLjCBMHHf5bFEkSveQoLKLoUNnbwy", "category" : "send", "amount" : -1.00000000, "vout" : 1, "fee" : -0.00001530, "confirmations" : -1, "txid" : "f6a4b955b163a01760d3112d17f2594f05bf2c5507b33af325d8d0f416803a2b", "walletconflicts" : [ "b7e1b152866de5c044de27edc5719f4f29efd1b9795907783b294070fecb495d", "5afcf56fa1ba4938c439deba4623d873a54f97fe9ee450c13b431700bbfc1481" ], "time" : 1475836221, "timereceived" : 1475836252 } ] ```
non_priority
cannot send to t addr zcash compiled on two debian machines g debian and mining mined two blocks on one and tried to send money to the other but got an error then tried sending between addresses on the same machine still no go in the following zcli is an alias for zcash cli jank debian modeli zminer zcli getbalance jank debian modeli zminer zcli listunspent txid vout address scriptpubkey amount confirmations spendable true txid vout address scriptpubkey amount confirmations spendable true jank debian modeli zminer zcli sendtoaddress error code message error the transaction was rejected this might happen if some of the coins in your wallet were already spent such as if you used a copy of wallet dat and coins were spent in the copy but not marked as spent here jank debian modeli zminer zcli getinfo version protocolversion walletversion balance blocks timeoffset connections proxy difficulty testnet true keypoololdest keypoolsize paytxfee relayfee errors this is a pre release test build use at your own risk do not use for mining or merchant applications jank debian modeli zminer zcli listtransactions account address category generate amount vout confirmations generated true blockhash blockindex blocktime txid walletconflicts time timereceived account address category generate amount vout confirmations generated true blockhash blockindex blocktime txid walletconflicts time timereceived account address category immature amount vout confirmations generated true blockhash blockindex blocktime txid walletconflicts time timereceived account address category send amount vout fee confirmations txid walletconflicts time timereceived account address category send amount vout fee confirmations txid walletconflicts time timereceived
0
92,204
8,355,346,927
IssuesEvent
2018-10-02 15:28:52
paulkaefer/sandbox
https://api.github.com/repos/paulkaefer/sandbox
closed
here's an issue that will have two comments, and then be closed
help wanted test
Description of the issue here. We might need to change `print "Hello, world!"` to `print("Hello, world!")` to be compatible with Python 3. See [test.py](https://github.com/paulkaefer/sandbox/blob/master/test.py) from revision 913acef6b4fa.
1.0
here's an issue that will have two comments, and then be closed - Description of the issue here. We might need to change `print "Hello, world!"` to `print("Hello, world!")` to be compatible with Python 3. See [test.py](https://github.com/paulkaefer/sandbox/blob/master/test.py) from revision 913acef6b4fa.
non_priority
here s an issue that will have two comments and then be closed description of the issue here we might need to change print hello world to print hello world to be compatible with python see from revision
0
202,474
15,286,650,535
IssuesEvent
2021-02-23 14:56:08
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
roachtest: alterpk-tpcc-500 failed
C-test-failure O-roachtest O-robot branch-release-20.1 release-blocker
[(roachtest).alterpk-tpcc-500 failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2661563&tab=buildLog) on [release-20.1@90f78268f3b5b08ba838ac3ad164821d2f5a5362](https://github.com/cockroachdb/cockroach/commits/90f78268f3b5b08ba838ac3ad164821d2f5a5362): ``` | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2450 | main.registerAlterPK.func3.2 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/alterpk.go:139 | main.(*monitor).Go.func1 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2606 | github.com/cockroachdb/cockroach/vendor/golang.org/x/sync/errgroup.(*Group).Go.func1 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/golang.org/x/sync/errgroup/errgroup.go:57 | runtime.goexit | /usr/local/go/src/runtime/asm_amd64.s:1374 Wraps: (2) 2 safe details enclosed Wraps: (3) failed to get pgurl for nodes: teamcity-2661563-1612941348-18-n4cpu16:1 Wraps: (4) /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod pgurl --external teamcity-2661563-1612941348-18-n4cpu16:1 returned | stderr: | | stdout: Wraps: (5) secondary error attachment | context canceled | (1) context canceled | Error types: (1) *errors.errorString Wraps: (6) context canceled Error types: (1) *withstack.withStack (2) *safedetails.withSafeDetails (3) *errutil.withMessage (4) *main.withCommandDetails (5) *secondary.withSecondaryError (6) *errors.errorString cluster.go:2628,alterpk.go:150,alterpk.go:195,test_runner.go:749: monitor failure: monitor task failed: t.Fatal() was called (1) attached stack trace | main.(*monitor).WaitE | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2616 | main.(*monitor).Wait | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2624 | main.registerAlterPK.func3 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/alterpk.go:150 | main.registerAlterPK.func5 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/alterpk.go:195 | main.(*testRunner).runTest.func2 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/test_runner.go:749 Wraps: (2) monitor failure Wraps: (3) attached stack trace | main.(*monitor).wait.func2 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2672 Wraps: (4) monitor task failed Wraps: (5) attached stack trace | main.init | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2586 | runtime.doInit | /usr/local/go/src/runtime/proc.go:5652 | runtime.main | /usr/local/go/src/runtime/proc.go:191 | runtime.goexit | /usr/local/go/src/runtime/asm_amd64.s:1374 Wraps: (6) t.Fatal() was called Error types: (1) *withstack.withStack (2) *errutil.withMessage (3) *withstack.withStack (4) *errutil.withMessage (5) *withstack.withStack (6) *errors.errorString ``` <details><summary>More</summary><p> Artifacts: [/alterpk-tpcc-500](https://teamcity.cockroachdb.com/viewLog.html?buildId=2661563&tab=artifacts#/alterpk-tpcc-500) Related: - #60337 roachtest: alterpk-tpcc-500 failed [C-test-failure](https://api.github.com/repos/cockroachdb/cockroach/labels/C-test-failure) [O-roachtest](https://api.github.com/repos/cockroachdb/cockroach/labels/O-roachtest) [O-robot](https://api.github.com/repos/cockroachdb/cockroach/labels/O-robot) [branch-release-20.2](https://api.github.com/repos/cockroachdb/cockroach/labels/branch-release-20.2) [release-blocker](https://api.github.com/repos/cockroachdb/cockroach/labels/release-blocker) - #60183 roachtest: alterpk-tpcc-500 failed [C-test-failure](https://api.github.com/repos/cockroachdb/cockroach/labels/C-test-failure) [O-roachtest](https://api.github.com/repos/cockroachdb/cockroach/labels/O-roachtest) [O-robot](https://api.github.com/repos/cockroachdb/cockroach/labels/O-robot) [branch-60149](https://api.github.com/repos/cockroachdb/cockroach/labels/branch-60149) [release-blocker](https://api.github.com/repos/cockroachdb/cockroach/labels/release-blocker) [See this test on roachdash](https://roachdash.crdb.dev/?filter=status%3Aopen+t%3A.%2Aalterpk-tpcc-500.%2A&sort=title&restgroup=false&display=lastcommented+project) <sub>powered by [pkg/cmd/internal/issues](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)</sub></p></details>
2.0
roachtest: alterpk-tpcc-500 failed - [(roachtest).alterpk-tpcc-500 failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2661563&tab=buildLog) on [release-20.1@90f78268f3b5b08ba838ac3ad164821d2f5a5362](https://github.com/cockroachdb/cockroach/commits/90f78268f3b5b08ba838ac3ad164821d2f5a5362): ``` | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2450 | main.registerAlterPK.func3.2 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/alterpk.go:139 | main.(*monitor).Go.func1 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2606 | github.com/cockroachdb/cockroach/vendor/golang.org/x/sync/errgroup.(*Group).Go.func1 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/golang.org/x/sync/errgroup/errgroup.go:57 | runtime.goexit | /usr/local/go/src/runtime/asm_amd64.s:1374 Wraps: (2) 2 safe details enclosed Wraps: (3) failed to get pgurl for nodes: teamcity-2661563-1612941348-18-n4cpu16:1 Wraps: (4) /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod pgurl --external teamcity-2661563-1612941348-18-n4cpu16:1 returned | stderr: | | stdout: Wraps: (5) secondary error attachment | context canceled | (1) context canceled | Error types: (1) *errors.errorString Wraps: (6) context canceled Error types: (1) *withstack.withStack (2) *safedetails.withSafeDetails (3) *errutil.withMessage (4) *main.withCommandDetails (5) *secondary.withSecondaryError (6) *errors.errorString cluster.go:2628,alterpk.go:150,alterpk.go:195,test_runner.go:749: monitor failure: monitor task failed: t.Fatal() was called (1) attached stack trace | main.(*monitor).WaitE | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2616 | main.(*monitor).Wait | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2624 | main.registerAlterPK.func3 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/alterpk.go:150 | main.registerAlterPK.func5 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/alterpk.go:195 | main.(*testRunner).runTest.func2 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/test_runner.go:749 Wraps: (2) monitor failure Wraps: (3) attached stack trace | main.(*monitor).wait.func2 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2672 Wraps: (4) monitor task failed Wraps: (5) attached stack trace | main.init | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2586 | runtime.doInit | /usr/local/go/src/runtime/proc.go:5652 | runtime.main | /usr/local/go/src/runtime/proc.go:191 | runtime.goexit | /usr/local/go/src/runtime/asm_amd64.s:1374 Wraps: (6) t.Fatal() was called Error types: (1) *withstack.withStack (2) *errutil.withMessage (3) *withstack.withStack (4) *errutil.withMessage (5) *withstack.withStack (6) *errors.errorString ``` <details><summary>More</summary><p> Artifacts: [/alterpk-tpcc-500](https://teamcity.cockroachdb.com/viewLog.html?buildId=2661563&tab=artifacts#/alterpk-tpcc-500) Related: - #60337 roachtest: alterpk-tpcc-500 failed [C-test-failure](https://api.github.com/repos/cockroachdb/cockroach/labels/C-test-failure) [O-roachtest](https://api.github.com/repos/cockroachdb/cockroach/labels/O-roachtest) [O-robot](https://api.github.com/repos/cockroachdb/cockroach/labels/O-robot) [branch-release-20.2](https://api.github.com/repos/cockroachdb/cockroach/labels/branch-release-20.2) [release-blocker](https://api.github.com/repos/cockroachdb/cockroach/labels/release-blocker) - #60183 roachtest: alterpk-tpcc-500 failed [C-test-failure](https://api.github.com/repos/cockroachdb/cockroach/labels/C-test-failure) [O-roachtest](https://api.github.com/repos/cockroachdb/cockroach/labels/O-roachtest) [O-robot](https://api.github.com/repos/cockroachdb/cockroach/labels/O-robot) [branch-60149](https://api.github.com/repos/cockroachdb/cockroach/labels/branch-60149) [release-blocker](https://api.github.com/repos/cockroachdb/cockroach/labels/release-blocker) [See this test on roachdash](https://roachdash.crdb.dev/?filter=status%3Aopen+t%3A.%2Aalterpk-tpcc-500.%2A&sort=title&restgroup=false&display=lastcommented+project) <sub>powered by [pkg/cmd/internal/issues](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)</sub></p></details>
non_priority
roachtest alterpk tpcc failed on home agent work go src github com cockroachdb cockroach pkg cmd roachtest cluster go main registeralterpk home agent work go src github com cockroachdb cockroach pkg cmd roachtest alterpk go main monitor go home agent work go src github com cockroachdb cockroach pkg cmd roachtest cluster go github com cockroachdb cockroach vendor golang org x sync errgroup group go home agent work go src github com cockroachdb cockroach vendor golang org x sync errgroup errgroup go runtime goexit usr local go src runtime asm s wraps safe details enclosed wraps failed to get pgurl for nodes teamcity wraps home agent work go src github com cockroachdb cockroach bin roachprod pgurl external teamcity returned stderr stdout wraps secondary error attachment context canceled context canceled error types errors errorstring wraps context canceled error types withstack withstack safedetails withsafedetails errutil withmessage main withcommanddetails secondary withsecondaryerror errors errorstring cluster go alterpk go alterpk go test runner go monitor failure monitor task failed t fatal was called attached stack trace main monitor waite home agent work go src github com cockroachdb cockroach pkg cmd roachtest cluster go main monitor wait home agent work go src github com cockroachdb cockroach pkg cmd roachtest cluster go main registeralterpk home agent work go src github com cockroachdb cockroach pkg cmd roachtest alterpk go main registeralterpk home agent work go src github com cockroachdb cockroach pkg cmd roachtest alterpk go main testrunner runtest home agent work go src github com cockroachdb cockroach pkg cmd roachtest test runner go wraps monitor failure wraps attached stack trace main monitor wait home agent work go src github com cockroachdb cockroach pkg cmd roachtest cluster go wraps monitor task failed wraps attached stack trace main init home agent work go src github com cockroachdb cockroach pkg cmd roachtest cluster go runtime doinit usr local go src runtime proc go runtime main usr local go src runtime proc go runtime goexit usr local go src runtime asm s wraps t fatal was called error types withstack withstack errutil withmessage withstack withstack errutil withmessage withstack withstack errors errorstring more artifacts related roachtest alterpk tpcc failed roachtest alterpk tpcc failed powered by
0
137,427
18,752,710,248
IssuesEvent
2021-11-05 05:52:41
madhans23/linux-4.15
https://api.github.com/repos/madhans23/linux-4.15
opened
CVE-2018-19407 (Medium) detected in linuxv4.15
security vulnerability
## CVE-2018-19407 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv4.15</b></p></summary> <p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/brodo/linux.git>https://git.kernel.org/pub/scm/linux/kernel/git/brodo/linux.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/madhans23/linux-4.15/commit/d96ee498864d1a0b6222cfb17d64ca8196014940">d96ee498864d1a0b6222cfb17d64ca8196014940</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/arch/x86/kvm/x86.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized. <p>Publish Date: 2018-11-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19407>CVE-2018-19407</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19407">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19407</a></p> <p>Release Date: 2018-11-21</p> <p>Fix Resolution: v4.20-rc5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-19407 (Medium) detected in linuxv4.15 - ## CVE-2018-19407 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv4.15</b></p></summary> <p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/brodo/linux.git>https://git.kernel.org/pub/scm/linux/kernel/git/brodo/linux.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/madhans23/linux-4.15/commit/d96ee498864d1a0b6222cfb17d64ca8196014940">d96ee498864d1a0b6222cfb17d64ca8196014940</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/arch/x86/kvm/x86.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized. <p>Publish Date: 2018-11-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19407>CVE-2018-19407</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19407">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19407</a></p> <p>Release Date: 2018-11-21</p> <p>Fix Resolution: v4.20-rc5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in cve medium severity vulnerability vulnerable library library home page a href found in head commit a href found in base branch master vulnerable source files arch kvm c vulnerability details the vcpu scan ioapic function in arch kvm c in the linux kernel through allows local users to cause a denial of service null pointer dereference and bug via crafted system calls that reach a situation where ioapic is uninitialized publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
116,623
24,952,595,649
IssuesEvent
2022-11-01 08:49:52
Regalis11/Barotrauma
https://api.github.com/repos/Regalis11/Barotrauma
closed
Strings localization of the RussianVanillaEditorTexts.xml is not applied in the editor
Code Modding
### Disclaimers - [X] I have searched the issue tracker to check if the issue has already been reported. - [ ] My issue happened while using mods. ### What happened? There is no translation in the game editor. The required translation strings exist in the `RussianVanillaEditorTexts.xml` file, but you must place these strings in the `RussianVanilla.xml` file to apply the game changes. For example: ![Image 001_19-02 (1)](https://user-images.githubusercontent.com/93348499/199059882-73da1f73-bcb3-4c81-a80f-3f95cadf7de3.png) Required strings are in the file `RussianVanillaEditorTexts.xml`. String: `<savesubbutton>Сохранить</savesubbutton>`. However, for localization you need to duplicate this string in to the file `RussianVanilla.xml`. Result: ![Image 001_19-28 (1)](https://user-images.githubusercontent.com/93348499/199060024-62dfe8a0-5969-4ad7-bcc4-6fe67d3778c3.png) ### Reproduction steps Try to translate the strings in the file RussianVanillaEditorTexts.xml as shown above. ### Bug prevalence Happens every time I play ### Version 0.19.14.0 ### - _No response_ ### Which operating system did you encounter this bug on? Windows ### Relevant error messages and crash reports _No response_
1.0
Strings localization of the RussianVanillaEditorTexts.xml is not applied in the editor - ### Disclaimers - [X] I have searched the issue tracker to check if the issue has already been reported. - [ ] My issue happened while using mods. ### What happened? There is no translation in the game editor. The required translation strings exist in the `RussianVanillaEditorTexts.xml` file, but you must place these strings in the `RussianVanilla.xml` file to apply the game changes. For example: ![Image 001_19-02 (1)](https://user-images.githubusercontent.com/93348499/199059882-73da1f73-bcb3-4c81-a80f-3f95cadf7de3.png) Required strings are in the file `RussianVanillaEditorTexts.xml`. String: `<savesubbutton>Сохранить</savesubbutton>`. However, for localization you need to duplicate this string in to the file `RussianVanilla.xml`. Result: ![Image 001_19-28 (1)](https://user-images.githubusercontent.com/93348499/199060024-62dfe8a0-5969-4ad7-bcc4-6fe67d3778c3.png) ### Reproduction steps Try to translate the strings in the file RussianVanillaEditorTexts.xml as shown above. ### Bug prevalence Happens every time I play ### Version 0.19.14.0 ### - _No response_ ### Which operating system did you encounter this bug on? Windows ### Relevant error messages and crash reports _No response_
non_priority
strings localization of the russianvanillaeditortexts xml is not applied in the editor disclaimers i have searched the issue tracker to check if the issue has already been reported my issue happened while using mods what happened there is no translation in the game editor the required translation strings exist in the russianvanillaeditortexts xml file but you must place these strings in the russianvanilla xml file to apply the game changes for example required strings are in the file russianvanillaeditortexts xml string сохранить however for localization you need to duplicate this string in to the file russianvanilla xml result reproduction steps try to translate the strings in the file russianvanillaeditortexts xml as shown above bug prevalence happens every time i play version no response which operating system did you encounter this bug on windows relevant error messages and crash reports no response
0
48,194
13,067,513,374
IssuesEvent
2020-07-31 00:42:12
icecube-trac/tix2
https://api.github.com/repos/icecube-trac/tix2
closed
[simulation] error in MC afterprocessing (MCPulseSeriesParticleIDMap) (Trac #1942)
Migrated from Trac combo simulation defect
I was again on the search for simulation of some MCstudies, for which I need the complete I3MCPulse-info (MCPulseMap, ParticleIDMap and I3MCTRee); It took me some while to locate an appropriate one, which I found in dataset 11843 resp. 11642 (IC86:2013 GENIE simulation), one of the latest produced datasets This dataset was produced with icesim.V04-01-11-G4C (whatever this means). All other datasets I found which are produced with an olderor similar release candidate (icesim.V04-01-11) have the necessary objects, but the after-processing for Noise-MCPulses is flawed: there are no entries in the ParticleIDMap for those pulses as originated from ParticleID(0,0) This can be identified by inspecting the I3MCPulseSeriesParticleIDMap in the frame finding no entries for the major/minor-ID(0,0) and in general a lot of entries with only a single OMKey as key and an empty vector for the value in this I3Map<OMKey, vector<...> > So whatever is the difference between these meta-releases, somebody should have a look into that the after-processing is done correctly, otherwise MC-information is permanently lost! Migrated from https://code.icecube.wisc.edu/ticket/1942 ```json { "status": "closed", "changetime": "2017-02-21T17:32:43", "description": "I was again on the search for simulation of some MCstudies, for which I need the complete I3MCPulse-info (MCPulseMap, ParticleIDMap and I3MCTRee); It took me some while to locate an appropriate one, which I found in dataset 11843 resp. 11642 (IC86:2013 GENIE simulation), one of the latest produced datasets\n\nThis dataset was produced with icesim.V04-01-11-G4C (whatever this means). All other datasets I found which are produced with an olderor similar release candidate (icesim.V04-01-11) have the necessary objects, but the after-processing for Noise-MCPulses is flawed: there are no entries in the ParticleIDMap for those pulses as originated from ParticleID(0,0)\n\nThis can be identified by inspecting the I3MCPulseSeriesParticleIDMap in the frame finding no entries for the major/minor-ID(0,0) and in general a lot of entries with only a single OMKey as key and an empty vector for the value in this I3Map<OMKey, vector<...> >\n\nSo whatever is the difference between these meta-releases, somebody should have a look into that the after-processing is done correctly, otherwise MC-information is permanently lost!", "reporter": "mzoll", "cc": "olivas, cweaver", "resolution": "fixed", "_ts": "1487698363713061", "component": "combo simulation", "summary": "[simulation] error in MC afterprocessing (MCPulseSeriesParticleIDMap)", "priority": "critical", "keywords": "MC simulation MCPulse", "time": "2017-01-26T09:02:15", "milestone": "", "owner": "juancarlos", "type": "defect" } ```
1.0
[simulation] error in MC afterprocessing (MCPulseSeriesParticleIDMap) (Trac #1942) - I was again on the search for simulation of some MCstudies, for which I need the complete I3MCPulse-info (MCPulseMap, ParticleIDMap and I3MCTRee); It took me some while to locate an appropriate one, which I found in dataset 11843 resp. 11642 (IC86:2013 GENIE simulation), one of the latest produced datasets This dataset was produced with icesim.V04-01-11-G4C (whatever this means). All other datasets I found which are produced with an olderor similar release candidate (icesim.V04-01-11) have the necessary objects, but the after-processing for Noise-MCPulses is flawed: there are no entries in the ParticleIDMap for those pulses as originated from ParticleID(0,0) This can be identified by inspecting the I3MCPulseSeriesParticleIDMap in the frame finding no entries for the major/minor-ID(0,0) and in general a lot of entries with only a single OMKey as key and an empty vector for the value in this I3Map<OMKey, vector<...> > So whatever is the difference between these meta-releases, somebody should have a look into that the after-processing is done correctly, otherwise MC-information is permanently lost! Migrated from https://code.icecube.wisc.edu/ticket/1942 ```json { "status": "closed", "changetime": "2017-02-21T17:32:43", "description": "I was again on the search for simulation of some MCstudies, for which I need the complete I3MCPulse-info (MCPulseMap, ParticleIDMap and I3MCTRee); It took me some while to locate an appropriate one, which I found in dataset 11843 resp. 11642 (IC86:2013 GENIE simulation), one of the latest produced datasets\n\nThis dataset was produced with icesim.V04-01-11-G4C (whatever this means). All other datasets I found which are produced with an olderor similar release candidate (icesim.V04-01-11) have the necessary objects, but the after-processing for Noise-MCPulses is flawed: there are no entries in the ParticleIDMap for those pulses as originated from ParticleID(0,0)\n\nThis can be identified by inspecting the I3MCPulseSeriesParticleIDMap in the frame finding no entries for the major/minor-ID(0,0) and in general a lot of entries with only a single OMKey as key and an empty vector for the value in this I3Map<OMKey, vector<...> >\n\nSo whatever is the difference between these meta-releases, somebody should have a look into that the after-processing is done correctly, otherwise MC-information is permanently lost!", "reporter": "mzoll", "cc": "olivas, cweaver", "resolution": "fixed", "_ts": "1487698363713061", "component": "combo simulation", "summary": "[simulation] error in MC afterprocessing (MCPulseSeriesParticleIDMap)", "priority": "critical", "keywords": "MC simulation MCPulse", "time": "2017-01-26T09:02:15", "milestone": "", "owner": "juancarlos", "type": "defect" } ```
non_priority
error in mc afterprocessing mcpulseseriesparticleidmap trac i was again on the search for simulation of some mcstudies for which i need the complete info mcpulsemap particleidmap and it took me some while to locate an appropriate one which i found in dataset resp genie simulation one of the latest produced datasets this dataset was produced with icesim whatever this means all other datasets i found which are produced with an olderor similar release candidate icesim have the necessary objects but the after processing for noise mcpulses is flawed there are no entries in the particleidmap for those pulses as originated from particleid this can be identified by inspecting the in the frame finding no entries for the major minor id and in general a lot of entries with only a single omkey as key and an empty vector for the value in this so whatever is the difference between these meta releases somebody should have a look into that the after processing is done correctly otherwise mc information is permanently lost migrated from json status closed changetime description i was again on the search for simulation of some mcstudies for which i need the complete info mcpulsemap particleidmap and it took me some while to locate an appropriate one which i found in dataset resp genie simulation one of the latest produced datasets n nthis dataset was produced with icesim whatever this means all other datasets i found which are produced with an olderor similar release candidate icesim have the necessary objects but the after processing for noise mcpulses is flawed there are no entries in the particleidmap for those pulses as originated from particleid n nthis can be identified by inspecting the in the frame finding no entries for the major minor id and in general a lot of entries with only a single omkey as key and an empty vector for the value in this n nso whatever is the difference between these meta releases somebody should have a look into that the after processing is done correctly otherwise mc information is permanently lost reporter mzoll cc olivas cweaver resolution fixed ts component combo simulation summary error in mc afterprocessing mcpulseseriesparticleidmap priority critical keywords mc simulation mcpulse time milestone owner juancarlos type defect
0
40,508
5,225,743,488
IssuesEvent
2017-01-27 19:12:34
phetsims/tasks
https://api.github.com/repos/phetsims/tasks
closed
artwork for wolf in Natural Selection
design:artwork
I need a wolf drawn in illustrator. The original looked like this: ![screen shot 2015-01-09 at 2 09 00 pm](https://cloud.githubusercontent.com/assets/7852916/5687366/191c8572-9809-11e4-8cc8-9779ee70f057.png) When the wolves get small on the screen the black stroke around them doesn't look great, so less detail there would be nice. It doesn't need to look exactly like the original.
1.0
artwork for wolf in Natural Selection - I need a wolf drawn in illustrator. The original looked like this: ![screen shot 2015-01-09 at 2 09 00 pm](https://cloud.githubusercontent.com/assets/7852916/5687366/191c8572-9809-11e4-8cc8-9779ee70f057.png) When the wolves get small on the screen the black stroke around them doesn't look great, so less detail there would be nice. It doesn't need to look exactly like the original.
non_priority
artwork for wolf in natural selection i need a wolf drawn in illustrator the original looked like this when the wolves get small on the screen the black stroke around them doesn t look great so less detail there would be nice it doesn t need to look exactly like the original
0
63,462
14,656,729,415
IssuesEvent
2020-12-28 14:04:11
fu1771695yongxie/plyr
https://api.github.com/repos/fu1771695yongxie/plyr
opened
CVE-2018-11694 (High) detected in opennmsopennms-source-26.0.0-1, node-sass-4.14.1.tgz
security vulnerability
## CVE-2018-11694 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>opennmsopennms-source-26.0.0-1</b>, <b>node-sass-4.14.1.tgz</b></p></summary> <p> <details><summary><b>node-sass-4.14.1.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p> <p>Path to dependency file: plyr/package.json</p> <p>Path to vulnerable library: plyr/node_modules/node-sass/package.json</p> <p> Dependency Hierarchy: - gulp-sass-4.1.0.tgz (Root Library) - :x: **node-sass-4.14.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/fu1771695yongxie/plyr/commit/172236e31de7c17fcd03890c778618276f8bd0d3">172236e31de7c17fcd03890c778618276f8bd0d3</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in LibSass through 3.5.4. A NULL pointer dereference was found in the function Sass::Functions::selector_append which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11694>CVE-2018-11694</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11694">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11694</a></p> <p>Release Date: 2018-06-04</p> <p>Fix Resolution: LibSass - 3.6.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-11694 (High) detected in opennmsopennms-source-26.0.0-1, node-sass-4.14.1.tgz - ## CVE-2018-11694 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>opennmsopennms-source-26.0.0-1</b>, <b>node-sass-4.14.1.tgz</b></p></summary> <p> <details><summary><b>node-sass-4.14.1.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p> <p>Path to dependency file: plyr/package.json</p> <p>Path to vulnerable library: plyr/node_modules/node-sass/package.json</p> <p> Dependency Hierarchy: - gulp-sass-4.1.0.tgz (Root Library) - :x: **node-sass-4.14.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/fu1771695yongxie/plyr/commit/172236e31de7c17fcd03890c778618276f8bd0d3">172236e31de7c17fcd03890c778618276f8bd0d3</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in LibSass through 3.5.4. A NULL pointer dereference was found in the function Sass::Functions::selector_append which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11694>CVE-2018-11694</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11694">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11694</a></p> <p>Release Date: 2018-06-04</p> <p>Fix Resolution: LibSass - 3.6.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in opennmsopennms source node sass tgz cve high severity vulnerability vulnerable libraries opennmsopennms source node sass tgz node sass tgz wrapper around libsass library home page a href path to dependency file plyr package json path to vulnerable library plyr node modules node sass package json dependency hierarchy gulp sass tgz root library x node sass tgz vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in libsass through a null pointer dereference was found in the function sass functions selector append which could be leveraged by an attacker to cause a denial of service application crash or possibly have unspecified other impact publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution libsass step up your open source security game with whitesource
0
247,997
26,771,169,450
IssuesEvent
2023-01-31 14:13:44
xinYG/monorepo
https://api.github.com/repos/xinYG/monorepo
opened
CVE-2022-25881 (Medium) detected in http-cache-semantics-4.1.0.tgz
security vulnerability
## CVE-2022-25881 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>http-cache-semantics-4.1.0.tgz</b></p></summary> <p>Parses Cache-Control and other headers. Helps building correct HTTP caches and proxies</p> <p>Library home page: <a href="https://registry.npmjs.org/http-cache-semantics/-/http-cache-semantics-4.1.0.tgz">https://registry.npmjs.org/http-cache-semantics/-/http-cache-semantics-4.1.0.tgz</a></p> <p> Dependency Hierarchy: - @zgriesinger/motd-file:lambda/motd.tgz (Root Library) - got-9.6.0.tgz - cacheable-request-6.1.0.tgz - :x: **http-cache-semantics-4.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/xinYG/monorepo/commit/484ca86608666d6c5f199d06d30156e2c930c67d">484ca86608666d6c5f199d06d30156e2c930c67d</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library. <p>Publish Date: 2023-01-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25881>CVE-2022-25881</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-25881">https://www.cve.org/CVERecord?id=CVE-2022-25881</a></p> <p>Release Date: 2023-01-31</p> <p>Fix Resolution: http-cache-semantics - 4.1.1</p> </p> </details> <p></p>
True
CVE-2022-25881 (Medium) detected in http-cache-semantics-4.1.0.tgz - ## CVE-2022-25881 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>http-cache-semantics-4.1.0.tgz</b></p></summary> <p>Parses Cache-Control and other headers. Helps building correct HTTP caches and proxies</p> <p>Library home page: <a href="https://registry.npmjs.org/http-cache-semantics/-/http-cache-semantics-4.1.0.tgz">https://registry.npmjs.org/http-cache-semantics/-/http-cache-semantics-4.1.0.tgz</a></p> <p> Dependency Hierarchy: - @zgriesinger/motd-file:lambda/motd.tgz (Root Library) - got-9.6.0.tgz - cacheable-request-6.1.0.tgz - :x: **http-cache-semantics-4.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/xinYG/monorepo/commit/484ca86608666d6c5f199d06d30156e2c930c67d">484ca86608666d6c5f199d06d30156e2c930c67d</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library. <p>Publish Date: 2023-01-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25881>CVE-2022-25881</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-25881">https://www.cve.org/CVERecord?id=CVE-2022-25881</a></p> <p>Release Date: 2023-01-31</p> <p>Fix Resolution: http-cache-semantics - 4.1.1</p> </p> </details> <p></p>
non_priority
cve medium detected in http cache semantics tgz cve medium severity vulnerability vulnerable library http cache semantics tgz parses cache control and other headers helps building correct http caches and proxies library home page a href dependency hierarchy zgriesinger motd file lambda motd tgz root library got tgz cacheable request tgz x http cache semantics tgz vulnerable library found in head commit a href found in base branch main vulnerability details this affects versions of the package http cache semantics before the issue can be exploited via malicious request header values sent to a server when that server reads the cache policy from the request using this library publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution http cache semantics
0
138,919
18,796,863,341
IssuesEvent
2021-11-08 23:46:26
Dima2022/DiscountsApp
https://api.github.com/repos/Dima2022/DiscountsApp
opened
WS-2019-0427 (Medium) detected in elliptic-6.5.0.tgz
security vulnerability
## WS-2019-0427 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>elliptic-6.5.0.tgz</b></p></summary> <p>EC cryptography</p> <p>Library home page: <a href="https://registry.npmjs.org/elliptic/-/elliptic-6.5.0.tgz">https://registry.npmjs.org/elliptic/-/elliptic-6.5.0.tgz</a></p> <p>Path to dependency file: DiscountsApp/SCNDISC.FrontEnd/SCNDISC.Admin.UI/package.json</p> <p>Path to vulnerable library: DiscountsApp/SCNDISC.FrontEnd/SCNDISC.Admin.UI/node_modules/elliptic/package.json</p> <p> Dependency Hierarchy: - build-angular-0.802.0.tgz (Root Library) - webpack-4.38.0.tgz - node-libs-browser-2.2.1.tgz - crypto-browserify-3.12.0.tgz - create-ecdh-4.0.3.tgz - :x: **elliptic-6.5.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2022/DiscountsApp/commit/dc3648254f7b327f09662a4563899eb0e9a6de96">dc3648254f7b327f09662a4563899eb0e9a6de96</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The function getNAF() in elliptic library has information leakage. This issue is mitigated in version 6.5.2 <p>Publish Date: 2019-11-22 <p>URL: <a href=https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a>WS-2019-0427</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a">https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a</a></p> <p>Release Date: 2020-05-24</p> <p>Fix Resolution: v6.5.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"elliptic","packageVersion":"6.5.0","packageFilePaths":["/SCNDISC.FrontEnd/SCNDISC.Admin.UI/package.json"],"isTransitiveDependency":true,"dependencyTree":"@angular-devkit/build-angular:0.802.0;webpack:4.38.0;node-libs-browser:2.2.1;crypto-browserify:3.12.0;create-ecdh:4.0.3;elliptic:6.5.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v6.5.2"}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2019-0427","vulnerabilityDetails":"The function getNAF() in elliptic library has information leakage. This issue is mitigated in version 6.5.2","vulnerabilityUrl":"https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a","cvss3Severity":"medium","cvss3Score":"5.0","cvss3Metrics":{"A":"N/A","AC":"N/A","PR":"N/A","S":"N/A","C":"N/A","UI":"N/A","AV":"N/A","I":"N/A"},"extraData":{}}</REMEDIATE> -->
True
WS-2019-0427 (Medium) detected in elliptic-6.5.0.tgz - ## WS-2019-0427 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>elliptic-6.5.0.tgz</b></p></summary> <p>EC cryptography</p> <p>Library home page: <a href="https://registry.npmjs.org/elliptic/-/elliptic-6.5.0.tgz">https://registry.npmjs.org/elliptic/-/elliptic-6.5.0.tgz</a></p> <p>Path to dependency file: DiscountsApp/SCNDISC.FrontEnd/SCNDISC.Admin.UI/package.json</p> <p>Path to vulnerable library: DiscountsApp/SCNDISC.FrontEnd/SCNDISC.Admin.UI/node_modules/elliptic/package.json</p> <p> Dependency Hierarchy: - build-angular-0.802.0.tgz (Root Library) - webpack-4.38.0.tgz - node-libs-browser-2.2.1.tgz - crypto-browserify-3.12.0.tgz - create-ecdh-4.0.3.tgz - :x: **elliptic-6.5.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2022/DiscountsApp/commit/dc3648254f7b327f09662a4563899eb0e9a6de96">dc3648254f7b327f09662a4563899eb0e9a6de96</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The function getNAF() in elliptic library has information leakage. This issue is mitigated in version 6.5.2 <p>Publish Date: 2019-11-22 <p>URL: <a href=https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a>WS-2019-0427</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a">https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a</a></p> <p>Release Date: 2020-05-24</p> <p>Fix Resolution: v6.5.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"elliptic","packageVersion":"6.5.0","packageFilePaths":["/SCNDISC.FrontEnd/SCNDISC.Admin.UI/package.json"],"isTransitiveDependency":true,"dependencyTree":"@angular-devkit/build-angular:0.802.0;webpack:4.38.0;node-libs-browser:2.2.1;crypto-browserify:3.12.0;create-ecdh:4.0.3;elliptic:6.5.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v6.5.2"}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2019-0427","vulnerabilityDetails":"The function getNAF() in elliptic library has information leakage. This issue is mitigated in version 6.5.2","vulnerabilityUrl":"https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a","cvss3Severity":"medium","cvss3Score":"5.0","cvss3Metrics":{"A":"N/A","AC":"N/A","PR":"N/A","S":"N/A","C":"N/A","UI":"N/A","AV":"N/A","I":"N/A"},"extraData":{}}</REMEDIATE> -->
non_priority
ws medium detected in elliptic tgz ws medium severity vulnerability vulnerable library elliptic tgz ec cryptography library home page a href path to dependency file discountsapp scndisc frontend scndisc admin ui package json path to vulnerable library discountsapp scndisc frontend scndisc admin ui node modules elliptic package json dependency hierarchy build angular tgz root library webpack tgz node libs browser tgz crypto browserify tgz create ecdh tgz x elliptic tgz vulnerable library found in head commit a href found in base branch master vulnerability details the function getnaf in elliptic library has information leakage this issue is mitigated in version publish date url a href cvss score details base score metrics exploitability metrics attack vector n a attack complexity n a privileges required n a user interaction n a scope n a impact metrics confidentiality impact n a integrity impact n a availability impact n a for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree angular devkit build angular webpack node libs browser crypto browserify create ecdh elliptic isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier ws vulnerabilitydetails the function getnaf in elliptic library has information leakage this issue is mitigated in version vulnerabilityurl
0
76,654
21,527,525,859
IssuesEvent
2022-04-28 20:04:30
envoyproxy/envoy
https://api.github.com/repos/envoyproxy/envoy
closed
v1.19 CI is failing on macos
area/build stale area/ci
It seems the macos failure is unrelated ``` ERROR: /Users/runner/work/1/s/source/exe/BUILD:23:16: Linking source/exe/envoy-static failed: (Aborted): cc_wrapper.sh failed: error executing command (cd /private/var/tmp/_bazel_runner/3d1a7f52fd47fc9a8db71770aacd13e5/sandbox/darwin-sandbox/3950/execroot/envoy && \ exec env - \ APPLE_SDK_PLATFORM=MacOSX \ APPLE_SDK_VERSION_OVERRIDE=12.1 \ PATH=/usr/local/bin:/opt/local/bin:/usr/bin:/bin \ XCODE_VERSION_OVERRIDE=13.2.1.13C100 \ external/local_config_cc/cc_wrapper.sh @bazel-out/darwin-fastbuild/bin/source/exe/envoy-static-2.params) Execution platform: @local_config_platform//:host Use --sandbox_debug to see verbose messages from the sandbox clang: warning: argument unused during compilation: '-pie' [-Wunused-command-line-argument] ``` _Originally posted by @lambdai in https://github.com/envoyproxy/envoy/issues/20192#issuecomment-1063645854_
1.0
v1.19 CI is failing on macos - It seems the macos failure is unrelated ``` ERROR: /Users/runner/work/1/s/source/exe/BUILD:23:16: Linking source/exe/envoy-static failed: (Aborted): cc_wrapper.sh failed: error executing command (cd /private/var/tmp/_bazel_runner/3d1a7f52fd47fc9a8db71770aacd13e5/sandbox/darwin-sandbox/3950/execroot/envoy && \ exec env - \ APPLE_SDK_PLATFORM=MacOSX \ APPLE_SDK_VERSION_OVERRIDE=12.1 \ PATH=/usr/local/bin:/opt/local/bin:/usr/bin:/bin \ XCODE_VERSION_OVERRIDE=13.2.1.13C100 \ external/local_config_cc/cc_wrapper.sh @bazel-out/darwin-fastbuild/bin/source/exe/envoy-static-2.params) Execution platform: @local_config_platform//:host Use --sandbox_debug to see verbose messages from the sandbox clang: warning: argument unused during compilation: '-pie' [-Wunused-command-line-argument] ``` _Originally posted by @lambdai in https://github.com/envoyproxy/envoy/issues/20192#issuecomment-1063645854_
non_priority
ci is failing on macos it seems the macos failure is unrelated error users runner work s source exe build linking source exe envoy static failed aborted cc wrapper sh failed error executing command cd private var tmp bazel runner sandbox darwin sandbox execroot envoy exec env apple sdk platform macosx apple sdk version override path usr local bin opt local bin usr bin bin xcode version override external local config cc cc wrapper sh bazel out darwin fastbuild bin source exe envoy static params execution platform local config platform host use sandbox debug to see verbose messages from the sandbox clang warning argument unused during compilation pie originally posted by lambdai in
0
28,068
8,070,985,355
IssuesEvent
2018-08-06 11:40:16
pyzo/pyzo
https://api.github.com/repos/pyzo/pyzo
closed
Flatpak package
part: building and distribution type: enhancement
It would be great to have a flatpack package for pyzo, so every linux user could use it.
1.0
Flatpak package - It would be great to have a flatpack package for pyzo, so every linux user could use it.
non_priority
flatpak package it would be great to have a flatpack package for pyzo so every linux user could use it
0
42,097
12,876,631,464
IssuesEvent
2020-07-11 06:11:15
whatwg/html
https://api.github.com/repos/whatwg/html
closed
Consolidate performing a security check in the spec with implementations
security/privacy
https://html.spec.whatwg.org/multipage/browsers.html#integration-with-idl > If IsPlatformObjectSameOrigin\(platformObject\) is false, then throw a "SecurityError" DOMException\. Blink currently doesn't implement this step in all cases, while Gecko is more strict by also applying the check to non-platform objects (correct me if I'm wrong @bzbarsky) We should somehow figure out what to do here.
True
Consolidate performing a security check in the spec with implementations - https://html.spec.whatwg.org/multipage/browsers.html#integration-with-idl > If IsPlatformObjectSameOrigin\(platformObject\) is false, then throw a "SecurityError" DOMException\. Blink currently doesn't implement this step in all cases, while Gecko is more strict by also applying the check to non-platform objects (correct me if I'm wrong @bzbarsky) We should somehow figure out what to do here.
non_priority
consolidate performing a security check in the spec with implementations if isplatformobjectsameorigin platformobject is false then throw a securityerror domexception blink currently doesn t implement this step in all cases while gecko is more strict by also applying the check to non platform objects correct me if i m wrong bzbarsky we should somehow figure out what to do here
0
59,577
8,372,097,313
IssuesEvent
2018-10-05 04:59:21
rancher/rancher
https://api.github.com/repos/rancher/rancher
closed
Request: Hardening instructions
area/documentation kind/question status/autoclosed
A dedicated hardening guide or tips for Rancher(OS) would be great. A central and up to date write up would help newcomers and even other users to check if they have Rancher(OS) set up correctly and securely. Thoughts?
1.0
Request: Hardening instructions - A dedicated hardening guide or tips for Rancher(OS) would be great. A central and up to date write up would help newcomers and even other users to check if they have Rancher(OS) set up correctly and securely. Thoughts?
non_priority
request hardening instructions a dedicated hardening guide or tips for rancher os would be great a central and up to date write up would help newcomers and even other users to check if they have rancher os set up correctly and securely thoughts
0
153,775
19,708,593,493
IssuesEvent
2022-01-13 01:43:41
artsking/linux-4.19.72_CVE-2020-14386
https://api.github.com/repos/artsking/linux-4.19.72_CVE-2020-14386
opened
CVE-2020-25673 (Medium) detected in linux-yoctov5.4.51
security vulnerability
## CVE-2020-25673 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yoctov5.4.51</b></p></summary> <p> <p>Yocto Linux Embedded kernel</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto>https://git.yoctoproject.org/git/linux-yocto</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/nfc/llcp_sock.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/nfc/llcp_sock.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system. <p>Publish Date: 2021-05-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25673>CVE-2020-25673</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-25673 (Medium) detected in linux-yoctov5.4.51 - ## CVE-2020-25673 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yoctov5.4.51</b></p></summary> <p> <p>Yocto Linux Embedded kernel</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto>https://git.yoctoproject.org/git/linux-yocto</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/nfc/llcp_sock.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/nfc/llcp_sock.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system. <p>Publish Date: 2021-05-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25673>CVE-2020-25673</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in linux cve medium severity vulnerability vulnerable library linux yocto linux embedded kernel library home page a href found in base branch master vulnerable source files net nfc llcp sock c net nfc llcp sock c vulnerability details a vulnerability was found in linux kernel where non blocking socket in llcp sock connect leads to leak and eventually hanging up the system publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with whitesource
0
211,953
23,856,852,427
IssuesEvent
2022-09-07 01:09:59
mattdanielbrown/yo-webapp-2022
https://api.github.com/repos/mattdanielbrown/yo-webapp-2022
opened
mocha-9.2.0.tgz: 1 vulnerabilities (highest severity is: 7.5)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mocha-9.2.0.tgz</b></p></summary> <p>simple, flexible, fun test framework</p> <p>Library home page: <a href="https://registry.npmjs.org/mocha/-/mocha-9.2.0.tgz">https://registry.npmjs.org/mocha/-/mocha-9.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/mocha/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/mattdanielbrown/yo-webapp-2022/commit/4d1ae50e9041a12bd8f28799f915270edc32a944">4d1ae50e9041a12bd8f28799f915270edc32a944</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [WS-2021-0638](https://github.com/mochajs/mocha/commit/61b4b9209c2c64b32c8d48b1761c3b9384d411ea) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | mocha-9.2.0.tgz | Direct | https://github.com/mochajs/mocha/commit/61b4b9209c2c64b32c8d48b1761c3b9384d411ea | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2021-0638</summary> ### Vulnerable Library - <b>mocha-9.2.0.tgz</b></p> <p>simple, flexible, fun test framework</p> <p>Library home page: <a href="https://registry.npmjs.org/mocha/-/mocha-9.2.0.tgz">https://registry.npmjs.org/mocha/-/mocha-9.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/mocha/package.json</p> <p> Dependency Hierarchy: - :x: **mocha-9.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/mattdanielbrown/yo-webapp-2022/commit/4d1ae50e9041a12bd8f28799f915270edc32a944">4d1ae50e9041a12bd8f28799f915270edc32a944</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> There is regular Expression Denial of Service (ReDoS) vulnerability in mocha. It allows cause a denial of service when stripping crafted invalid function definition from strs. <p>Publish Date: 2021-09-18 <p>URL: <a href=https://github.com/mochajs/mocha/commit/61b4b9209c2c64b32c8d48b1761c3b9384d411ea>WS-2021-0638</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/1d8a3d95-d199-4129-a6ad-8eafe5e77b9e/">https://huntr.dev/bounties/1d8a3d95-d199-4129-a6ad-8eafe5e77b9e/</a></p> <p>Release Date: 2021-09-18</p> <p>Fix Resolution: https://github.com/mochajs/mocha/commit/61b4b9209c2c64b32c8d48b1761c3b9384d411ea</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
True
mocha-9.2.0.tgz: 1 vulnerabilities (highest severity is: 7.5) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mocha-9.2.0.tgz</b></p></summary> <p>simple, flexible, fun test framework</p> <p>Library home page: <a href="https://registry.npmjs.org/mocha/-/mocha-9.2.0.tgz">https://registry.npmjs.org/mocha/-/mocha-9.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/mocha/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/mattdanielbrown/yo-webapp-2022/commit/4d1ae50e9041a12bd8f28799f915270edc32a944">4d1ae50e9041a12bd8f28799f915270edc32a944</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [WS-2021-0638](https://github.com/mochajs/mocha/commit/61b4b9209c2c64b32c8d48b1761c3b9384d411ea) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | mocha-9.2.0.tgz | Direct | https://github.com/mochajs/mocha/commit/61b4b9209c2c64b32c8d48b1761c3b9384d411ea | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2021-0638</summary> ### Vulnerable Library - <b>mocha-9.2.0.tgz</b></p> <p>simple, flexible, fun test framework</p> <p>Library home page: <a href="https://registry.npmjs.org/mocha/-/mocha-9.2.0.tgz">https://registry.npmjs.org/mocha/-/mocha-9.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/mocha/package.json</p> <p> Dependency Hierarchy: - :x: **mocha-9.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/mattdanielbrown/yo-webapp-2022/commit/4d1ae50e9041a12bd8f28799f915270edc32a944">4d1ae50e9041a12bd8f28799f915270edc32a944</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> There is regular Expression Denial of Service (ReDoS) vulnerability in mocha. It allows cause a denial of service when stripping crafted invalid function definition from strs. <p>Publish Date: 2021-09-18 <p>URL: <a href=https://github.com/mochajs/mocha/commit/61b4b9209c2c64b32c8d48b1761c3b9384d411ea>WS-2021-0638</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/1d8a3d95-d199-4129-a6ad-8eafe5e77b9e/">https://huntr.dev/bounties/1d8a3d95-d199-4129-a6ad-8eafe5e77b9e/</a></p> <p>Release Date: 2021-09-18</p> <p>Fix Resolution: https://github.com/mochajs/mocha/commit/61b4b9209c2c64b32c8d48b1761c3b9384d411ea</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
non_priority
mocha tgz vulnerabilities highest severity is vulnerable library mocha tgz simple flexible fun test framework library home page a href path to dependency file package json path to vulnerable library node modules mocha package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high mocha tgz direct details ws vulnerable library mocha tgz simple flexible fun test framework library home page a href path to dependency file package json path to vulnerable library node modules mocha package json dependency hierarchy x mocha tgz vulnerable library found in head commit a href found in base branch main vulnerability details there is regular expression denial of service redos vulnerability in mocha it allows cause a denial of service when stripping crafted invalid function definition from strs publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
79,180
9,851,831,642
IssuesEvent
2019-06-19 11:24:44
dart-lang/sdk
https://api.github.com/repos/dart-lang/sdk
closed
[vm/ffi] struct inheritance
area-vm library-ffi type-design
Should we allow subtyping of structs? ```dart import dart:ffi show Struct, Int8; A extends Struct { @Int8() int x; } B extends A { @Int8() int y; } ``` Where `B` has all the fields of `A`. /cc @sjindel-google
1.0
[vm/ffi] struct inheritance - Should we allow subtyping of structs? ```dart import dart:ffi show Struct, Int8; A extends Struct { @Int8() int x; } B extends A { @Int8() int y; } ``` Where `B` has all the fields of `A`. /cc @sjindel-google
non_priority
struct inheritance should we allow subtyping of structs dart import dart ffi show struct a extends struct int x b extends a int y where b has all the fields of a cc sjindel google
0
383,832
26,565,871,533
IssuesEvent
2023-01-20 20:09:42
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Normalmap on a generated Mesh does not work
topic:rendering good first issue documentation topic:3d
### Godot version 3.3.3 ### System information Archlinux GLES3 Nvidia Geforce GTX 1650 Super ### Issue description On a generated mesh, a shader can't use normalmap ### Steps to reproduce Generate a mesh through code, assign a shader to it ### Minimal reproduction project https://ufile.io/chduihco
1.0
Normalmap on a generated Mesh does not work - ### Godot version 3.3.3 ### System information Archlinux GLES3 Nvidia Geforce GTX 1650 Super ### Issue description On a generated mesh, a shader can't use normalmap ### Steps to reproduce Generate a mesh through code, assign a shader to it ### Minimal reproduction project https://ufile.io/chduihco
non_priority
normalmap on a generated mesh does not work godot version system information archlinux nvidia geforce gtx super issue description on a generated mesh a shader can t use normalmap steps to reproduce generate a mesh through code assign a shader to it minimal reproduction project
0
5,266
5,581,727,888
IssuesEvent
2017-03-28 19:33:56
rye/krye.io
https://api.github.com/repos/rye/krye.io
closed
Environment Hash for Request Caching
concerns:security/client concerns:security/server platform:server
As part of the complete overhaul, (#106) I've come to decide that certain requests will need to be cached in certain ways: * **Sensitive Data**, like user-specific views, should be cached by user ID, session ID. * **Time-Sensitive Data**, like volatile views like RSS feeds, should not be cached. * **Generated Data**, like the résumé, (TODO: Issue) should be cached by the generation parameters. * **Stable Data**, like pictures, and pages that don't change, ever, should be cached by the generation parameters. For testing purposes, and to assist with the rollover, we should also set up a verbose exception capturing system to check for cache misses.
True
Environment Hash for Request Caching - As part of the complete overhaul, (#106) I've come to decide that certain requests will need to be cached in certain ways: * **Sensitive Data**, like user-specific views, should be cached by user ID, session ID. * **Time-Sensitive Data**, like volatile views like RSS feeds, should not be cached. * **Generated Data**, like the résumé, (TODO: Issue) should be cached by the generation parameters. * **Stable Data**, like pictures, and pages that don't change, ever, should be cached by the generation parameters. For testing purposes, and to assist with the rollover, we should also set up a verbose exception capturing system to check for cache misses.
non_priority
environment hash for request caching as part of the complete overhaul i ve come to decide that certain requests will need to be cached in certain ways sensitive data like user specific views should be cached by user id session id time sensitive data like volatile views like rss feeds should not be cached generated data like the résumé todo issue should be cached by the generation parameters stable data like pictures and pages that don t change ever should be cached by the generation parameters for testing purposes and to assist with the rollover we should also set up a verbose exception capturing system to check for cache misses
0
126,162
17,868,886,819
IssuesEvent
2021-09-06 13:01:28
fasttrack-solutions/go-mysql-elasticsearch
https://api.github.com/repos/fasttrack-solutions/go-mysql-elasticsearch
opened
CVE-2020-11022 (Medium) detected in github.com/smartystreets/goconvey-v1.6.4
security vulnerability
## CVE-2020-11022 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>github.com/smartystreets/goconvey-v1.6.4</b></p></summary> <p>Go testing in the browser. Integrates with `go test`. Write behavioral tests in Go.</p> <p> Dependency Hierarchy: - github.com/go-oauth2/oauth2-v3.10.0 (Root Library) - :x: **github.com/smartystreets/goconvey-v1.6.4** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/fasttrack-solutions/go-mysql-elasticsearch/commit/9decc34f29ccaefc7825a3a9888a11ad89dcedef">9decc34f29ccaefc7825a3a9888a11ad89dcedef</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-11022 (Medium) detected in github.com/smartystreets/goconvey-v1.6.4 - ## CVE-2020-11022 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>github.com/smartystreets/goconvey-v1.6.4</b></p></summary> <p>Go testing in the browser. Integrates with `go test`. Write behavioral tests in Go.</p> <p> Dependency Hierarchy: - github.com/go-oauth2/oauth2-v3.10.0 (Root Library) - :x: **github.com/smartystreets/goconvey-v1.6.4** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/fasttrack-solutions/go-mysql-elasticsearch/commit/9decc34f29ccaefc7825a3a9888a11ad89dcedef">9decc34f29ccaefc7825a3a9888a11ad89dcedef</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in github com smartystreets goconvey cve medium severity vulnerability vulnerable library github com smartystreets goconvey go testing in the browser integrates with go test write behavioral tests in go dependency hierarchy github com go root library x github com smartystreets goconvey vulnerable library found in head commit a href found in base branch master vulnerability details in jquery versions greater than or equal to and before passing html from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
14,733
3,420,224,942
IssuesEvent
2015-12-08 13:57:11
astropy/halotools
https://api.github.com/repos/astropy/halotools
closed
Test suite has doubled in runtime
mock-observables testing
Presumably this is because the default settings for the pair counter were set to use Lbox/10 rather than Rmax? CC @duncandc
1.0
Test suite has doubled in runtime - Presumably this is because the default settings for the pair counter were set to use Lbox/10 rather than Rmax? CC @duncandc
non_priority
test suite has doubled in runtime presumably this is because the default settings for the pair counter were set to use lbox rather than rmax cc duncandc
0
335,989
24,485,289,996
IssuesEvent
2022-10-09 10:54:10
xybor-x/xylog
https://api.github.com/repos/xybor-x/xylog
opened
Add Q&A section
documentation
**Problem** Many people need to know some information about this library. **Solution** Add Q&A
1.0
Add Q&A section - **Problem** Many people need to know some information about this library. **Solution** Add Q&A
non_priority
add q a section problem many people need to know some information about this library solution add q a
0
161,136
20,120,414,568
IssuesEvent
2022-02-08 01:16:41
arohablue/BlockDockServer
https://api.github.com/repos/arohablue/BlockDockServer
closed
CVE-2021-20190 (High) detected in jackson-databind-2.8.8.jar - autoclosed
security vulnerability
## CVE-2021-20190 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BlockDockServer/build.gradle</p> <p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.8.8/bf88c7b27e95cbadce4e7c316a56c3efffda8026/jackson-databind-2.8.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-actuator-1.5.4.RELEASE.jar (Root Library) - spring-boot-actuator-1.5.4.RELEASE.jar - :x: **jackson-databind-2.8.8.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. <p>Publish Date: 2021-01-19 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20190>CVE-2021-20190</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2854">https://github.com/FasterXML/jackson-databind/issues/2854</a></p> <p>Release Date: 2021-01-19</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind-2.9.10.7</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-20190 (High) detected in jackson-databind-2.8.8.jar - autoclosed - ## CVE-2021-20190 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /BlockDockServer/build.gradle</p> <p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.8.8/bf88c7b27e95cbadce4e7c316a56c3efffda8026/jackson-databind-2.8.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-actuator-1.5.4.RELEASE.jar (Root Library) - spring-boot-actuator-1.5.4.RELEASE.jar - :x: **jackson-databind-2.8.8.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. <p>Publish Date: 2021-01-19 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20190>CVE-2021-20190</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2854">https://github.com/FasterXML/jackson-databind/issues/2854</a></p> <p>Release Date: 2021-01-19</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind-2.9.10.7</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar autoclosed cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file blockdockserver build gradle path to vulnerable library root gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter actuator release jar root library spring boot actuator release jar x jackson databind jar vulnerable library vulnerability details a flaw was found in jackson databind before fasterxml mishandles the interaction between serialization gadgets and typing the highest threat from this vulnerability is to data confidentiality and integrity as well as system availability publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
0
288,519
21,708,914,824
IssuesEvent
2022-05-10 12:16:45
external-secrets/external-secrets
https://api.github.com/repos/external-secrets/external-secrets
closed
Docs site should default to the latest release
kind/bug area/documentation
**Describe the solution you'd like** tl;dr - the docs site should default to the latest release OR it should always include the version drop down. Today I was working on getting SecretStores to work with JWT Auth and Vault. I was primarily looking at the docs from https://external-secrets.io/provider-hashicorp-vault/ assuming that these were the latest docs available. I couldn't find any info on using the TokenRequestAPI (https://github.com/external-secrets/external-secrets/issues/137) so I ended up digging through Issues and the code to see what I needed to do. It wasn't until I forked the repo so I could work on a docs MR that I noticed that most of the info I needed was already in there. Confused, I finally stumbled upon https://external-secrets.io/v0.5.2/provider-hashicorp-vault/ which had the docs from the 0.5.2 release. I think https://external-secrets.io/provider-hashicorp-vault/ should always point to master or the latest branch and _should_ include the version drop down selector. **What is the added value?** This would probably cut down on confusion **Give us examples of the outcome** N/A **Observations (Constraints, Context, etc):** Here are some screenshots to illustrate my point. Here is the docs site w/o specifying a version ![Screen Shot 2022-05-09 at 4 59 38 PM](https://user-images.githubusercontent.com/51938/167517229-8ff56d8b-2ea2-4cda-bb15-8c0f84f56ac6.png) Here is the docs site with specifying a version ![Screen Shot 2022-05-09 at 4 59 53 PM](https://user-images.githubusercontent.com/51938/167517255-7a925875-9e4b-4e68-9b82-93ca933f20fb.png) Does this make sense?
1.0
Docs site should default to the latest release - **Describe the solution you'd like** tl;dr - the docs site should default to the latest release OR it should always include the version drop down. Today I was working on getting SecretStores to work with JWT Auth and Vault. I was primarily looking at the docs from https://external-secrets.io/provider-hashicorp-vault/ assuming that these were the latest docs available. I couldn't find any info on using the TokenRequestAPI (https://github.com/external-secrets/external-secrets/issues/137) so I ended up digging through Issues and the code to see what I needed to do. It wasn't until I forked the repo so I could work on a docs MR that I noticed that most of the info I needed was already in there. Confused, I finally stumbled upon https://external-secrets.io/v0.5.2/provider-hashicorp-vault/ which had the docs from the 0.5.2 release. I think https://external-secrets.io/provider-hashicorp-vault/ should always point to master or the latest branch and _should_ include the version drop down selector. **What is the added value?** This would probably cut down on confusion **Give us examples of the outcome** N/A **Observations (Constraints, Context, etc):** Here are some screenshots to illustrate my point. Here is the docs site w/o specifying a version ![Screen Shot 2022-05-09 at 4 59 38 PM](https://user-images.githubusercontent.com/51938/167517229-8ff56d8b-2ea2-4cda-bb15-8c0f84f56ac6.png) Here is the docs site with specifying a version ![Screen Shot 2022-05-09 at 4 59 53 PM](https://user-images.githubusercontent.com/51938/167517255-7a925875-9e4b-4e68-9b82-93ca933f20fb.png) Does this make sense?
non_priority
docs site should default to the latest release describe the solution you d like tl dr the docs site should default to the latest release or it should always include the version drop down today i was working on getting secretstores to work with jwt auth and vault i was primarily looking at the docs from assuming that these were the latest docs available i couldn t find any info on using the tokenrequestapi so i ended up digging through issues and the code to see what i needed to do it wasn t until i forked the repo so i could work on a docs mr that i noticed that most of the info i needed was already in there confused i finally stumbled upon which had the docs from the release i think should always point to master or the latest branch and should include the version drop down selector what is the added value this would probably cut down on confusion give us examples of the outcome n a observations constraints context etc here are some screenshots to illustrate my point here is the docs site w o specifying a version here is the docs site with specifying a version does this make sense
0
185,701
21,843,723,533
IssuesEvent
2022-05-18 01:03:41
AlexRogalskiy/gradle-kotlin-sample
https://api.github.com/repos/AlexRogalskiy/gradle-kotlin-sample
closed
CVE-2021-36373 (Medium) detected in ant-1.9.13.jar - autoclosed
security vulnerability
## CVE-2021-36373 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ant-1.9.13.jar</b></p></summary> <p>master POM</p> <p>Library home page: <a href="http://ant.apache.org/">http://ant.apache.org/</a></p> <p>Path to dependency file: gradle-kotlin-sample/buildSrc/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.ant/ant/1.9.13/7aff87f91ffda6916751e39bb5688f0a53710ec4/ant-1.9.13.jar</p> <p> Dependency Hierarchy: - shadow-5.2.0.jar (Root Library) - :x: **ant-1.9.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/gradle-kotlin-sample/commit/c94f8d6f3f0e99a0299b9f8354b8511532b73d34">c94f8d6f3f0e99a0299b9f8354b8511532b73d34</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> When reading a specially crafted TAR archive an Apache Ant build can be made to allocate large amounts of memory that finally leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Apache Ant prior to 1.9.16 and 1.10.11 were affected. <p>Publish Date: 2021-07-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-36373>CVE-2021-36373</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://security.archlinux.org/CVE-2021-36373">https://security.archlinux.org/CVE-2021-36373</a></p> <p>Release Date: 2021-07-14</p> <p>Fix Resolution: org.apache.ant:ant:1.10.11</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-36373 (Medium) detected in ant-1.9.13.jar - autoclosed - ## CVE-2021-36373 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ant-1.9.13.jar</b></p></summary> <p>master POM</p> <p>Library home page: <a href="http://ant.apache.org/">http://ant.apache.org/</a></p> <p>Path to dependency file: gradle-kotlin-sample/buildSrc/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.ant/ant/1.9.13/7aff87f91ffda6916751e39bb5688f0a53710ec4/ant-1.9.13.jar</p> <p> Dependency Hierarchy: - shadow-5.2.0.jar (Root Library) - :x: **ant-1.9.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/gradle-kotlin-sample/commit/c94f8d6f3f0e99a0299b9f8354b8511532b73d34">c94f8d6f3f0e99a0299b9f8354b8511532b73d34</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> When reading a specially crafted TAR archive an Apache Ant build can be made to allocate large amounts of memory that finally leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Apache Ant prior to 1.9.16 and 1.10.11 were affected. <p>Publish Date: 2021-07-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-36373>CVE-2021-36373</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://security.archlinux.org/CVE-2021-36373">https://security.archlinux.org/CVE-2021-36373</a></p> <p>Release Date: 2021-07-14</p> <p>Fix Resolution: org.apache.ant:ant:1.10.11</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in ant jar autoclosed cve medium severity vulnerability vulnerable library ant jar master pom library home page a href path to dependency file gradle kotlin sample buildsrc build gradle kts path to vulnerable library home wss scanner gradle caches modules files org apache ant ant ant jar dependency hierarchy shadow jar root library x ant jar vulnerable library found in head commit a href found in base branch master vulnerability details when reading a specially crafted tar archive an apache ant build can be made to allocate large amounts of memory that finally leads to an out of memory error even for small inputs this can be used to disrupt builds using apache ant apache ant prior to and were affected publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache ant ant step up your open source security game with whitesource
0
275,929
23,954,419,040
IssuesEvent
2022-09-12 13:59:09
samtools/bcftools
https://api.github.com/repos/samtools/bcftools
closed
-i and -e are not complement when I use query subcommand
requires-test-case
I noticed the result of `bcftools query -i 'FMT/DP>=20' -f '[%CHROM %POS %SAMPLE\n]' input.vcf` and `bcftools query -e 'FMT/DP<20' -f '[%CHROM %POS %SAMPLE\n]' input.vcf` are not complement. This occur if only I specified %SAMPLE but %FORMAT tags, so I can avoid it by specifying other %FORMAT tags but it is a little inconvenient and confusing. I think this is because the process is skipped by the code shown below when I use `-e` and the condition is met in some samples. If only %SAMPLE is specified, not %FMT/DP, etc., the flag BCF_UN_FMT is not set. When I use `-i`, this checking and skipping do not occur. https://github.com/samtools/bcftools/blob/12088c0887d2c680ae55240d806d089659d61dca/vcfquery.c#L146 The simple solutions I think is to omit the above code or to change the code below to set the flag. https://github.com/samtools/bcftools/blob/12088c0887d2c680ae55240d806d089659d61dca/convert.c#L1304 However, I'm not sure how this change will affect the rest of the code. Thank you,
1.0
-i and -e are not complement when I use query subcommand - I noticed the result of `bcftools query -i 'FMT/DP>=20' -f '[%CHROM %POS %SAMPLE\n]' input.vcf` and `bcftools query -e 'FMT/DP<20' -f '[%CHROM %POS %SAMPLE\n]' input.vcf` are not complement. This occur if only I specified %SAMPLE but %FORMAT tags, so I can avoid it by specifying other %FORMAT tags but it is a little inconvenient and confusing. I think this is because the process is skipped by the code shown below when I use `-e` and the condition is met in some samples. If only %SAMPLE is specified, not %FMT/DP, etc., the flag BCF_UN_FMT is not set. When I use `-i`, this checking and skipping do not occur. https://github.com/samtools/bcftools/blob/12088c0887d2c680ae55240d806d089659d61dca/vcfquery.c#L146 The simple solutions I think is to omit the above code or to change the code below to set the flag. https://github.com/samtools/bcftools/blob/12088c0887d2c680ae55240d806d089659d61dca/convert.c#L1304 However, I'm not sure how this change will affect the rest of the code. Thank you,
non_priority
i and e are not complement when i use query subcommand i noticed the result of bcftools query i fmt dp f input vcf and bcftools query e fmt dp f input vcf are not complement this occur if only i specified sample but format tags so i can avoid it by specifying other format tags but it is a little inconvenient and confusing i think this is because the process is skipped by the code shown below when i use e and the condition is met in some samples if only sample is specified not fmt dp etc the flag bcf un fmt is not set when i use i this checking and skipping do not occur the simple solutions i think is to omit the above code or to change the code below to set the flag however i m not sure how this change will affect the rest of the code thank you
0
11,280
9,049,292,400
IssuesEvent
2019-02-12 03:53:21
dotnet/corefx
https://api.github.com/repos/dotnet/corefx
closed
Once CMake supports VS2019 as the project generator use it if installed
area-Infrastructure enhancement
In: https://github.com/dotnet/corefx/pull/34381 we enabled building and generating the native project with VS2019, but CMake doesn't support VS2019 as the project generator. So we reverted the generator change in: https://github.com/dotnet/corefx/pull/34412 This issue is to track CMake's support for VS2019 and to update the generator script. cc: @ViktorHofer
1.0
Once CMake supports VS2019 as the project generator use it if installed - In: https://github.com/dotnet/corefx/pull/34381 we enabled building and generating the native project with VS2019, but CMake doesn't support VS2019 as the project generator. So we reverted the generator change in: https://github.com/dotnet/corefx/pull/34412 This issue is to track CMake's support for VS2019 and to update the generator script. cc: @ViktorHofer
non_priority
once cmake supports as the project generator use it if installed in we enabled building and generating the native project with but cmake doesn t support as the project generator so we reverted the generator change in this issue is to track cmake s support for and to update the generator script cc viktorhofer
0
107,992
13,536,268,079
IssuesEvent
2020-09-16 08:48:24
JuliaArrays/StaticArrays.jl
https://api.github.com/repos/JuliaArrays/StaticArrays.jl
closed
SizedArray of SubArray isn't a view
bug design
(on StaticArrays 0.6.4) ``` using StaticArrays m = eye(3) vm = view(m, 3, : ) svm = SizedArray{Tuple{size(vm)...}}(vm) julia> svm.data === vm false ``` this means that mutating `svm` does not mutate `vm` nor `m`.
1.0
SizedArray of SubArray isn't a view - (on StaticArrays 0.6.4) ``` using StaticArrays m = eye(3) vm = view(m, 3, : ) svm = SizedArray{Tuple{size(vm)...}}(vm) julia> svm.data === vm false ``` this means that mutating `svm` does not mutate `vm` nor `m`.
non_priority
sizedarray of subarray isn t a view on staticarrays using staticarrays m eye vm view m svm sizedarray tuple size vm vm julia svm data vm false this means that mutating svm does not mutate vm nor m
0
410,572
27,791,973,762
IssuesEvent
2023-03-17 09:37:08
AbianGustavo/proyecto-ets
https://api.github.com/repos/AbianGustavo/proyecto-ets
closed
Creación del anteproyecto
documentation
Se creará un "anteproyecto.md" en el que se detallará sobre el proyecto.
1.0
Creación del anteproyecto - Se creará un "anteproyecto.md" en el que se detallará sobre el proyecto.
non_priority
creación del anteproyecto se creará un anteproyecto md en el que se detallará sobre el proyecto
0
120,907
10,141,555,128
IssuesEvent
2019-08-03 15:18:05
kubernetes/kubernetes
https://api.github.com/repos/kubernetes/kubernetes
closed
e2e: support extending the item patching
kind/feature lifecycle/rotten sig/testing
<!-- Please only use this template for submitting enhancement requests --> **What would you like to be added**: `test/e2e/framework/create.go` can already be partially extended out-of-tree by extending the factory. But that only covers loading of items not directly supported in-tree. Patching currently cannot be extended. **Why is this needed**: While it is useful to have broader support for different items in the package itself, users of the package out-of-tree need a way to get their code working until a new item type is supported there. /kind feature /assign
1.0
e2e: support extending the item patching - <!-- Please only use this template for submitting enhancement requests --> **What would you like to be added**: `test/e2e/framework/create.go` can already be partially extended out-of-tree by extending the factory. But that only covers loading of items not directly supported in-tree. Patching currently cannot be extended. **Why is this needed**: While it is useful to have broader support for different items in the package itself, users of the package out-of-tree need a way to get their code working until a new item type is supported there. /kind feature /assign
non_priority
support extending the item patching what would you like to be added test framework create go can already be partially extended out of tree by extending the factory but that only covers loading of items not directly supported in tree patching currently cannot be extended why is this needed while it is useful to have broader support for different items in the package itself users of the package out of tree need a way to get their code working until a new item type is supported there kind feature assign
0
40,510
12,799,552,804
IssuesEvent
2020-07-02 15:34:22
TreyM-WSS/WhiteSource-Demo
https://api.github.com/repos/TreyM-WSS/WhiteSource-Demo
opened
CVE-2016-6797 (High) detected in tomcat-embed-core-8.5.4.jar
security vulnerability
## CVE-2016-6797 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tomcat-embed-core-8.5.4.jar</b></p></summary> <p>Core Tomcat implementation</p> <p>Library home page: <a href="http://tomcat.apache.org/">http://tomcat.apache.org/</a></p> <p>Path to dependency file: /tmp/ws-scm/WhiteSource-Demo/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library) - spring-boot-starter-tomcat-1.4.0.RELEASE.jar - :x: **tomcat-embed-core-8.5.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/TreyM-WSS/WhiteSource-Demo/commits/75659f691fb82d67ecd666ba6076394defeb92d0">75659f691fb82d67ecd666ba6076394defeb92d0</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. <p>Publish Date: 2017-08-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-6797>CVE-2016-6797</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797</a></p> <p>Release Date: 2017-08-10</p> <p>Fix Resolution: org.apache.tomcat.embed:tomcat-embed-core:9.0.0.M10,8.5.5,8.0.37,7.0.72,org.apache.tomcat:tomcat-catalina:9.0.0.M10,8.5.5,8.0.37,7.0.72</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.apache.tomcat.embed","packageName":"tomcat-embed-core","packageVersion":"8.5.4","isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-web:1.4.0.RELEASE;org.springframework.boot:spring-boot-starter-tomcat:1.4.0.RELEASE;org.apache.tomcat.embed:tomcat-embed-core:8.5.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.tomcat.embed:tomcat-embed-core:9.0.0.M10,8.5.5,8.0.37,7.0.72,org.apache.tomcat:tomcat-catalina:9.0.0.M10,8.5.5,8.0.37,7.0.72"}],"vulnerabilityIdentifier":"CVE-2016-6797","vulnerabilityDetails":"The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-6797","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2016-6797 (High) detected in tomcat-embed-core-8.5.4.jar - ## CVE-2016-6797 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tomcat-embed-core-8.5.4.jar</b></p></summary> <p>Core Tomcat implementation</p> <p>Library home page: <a href="http://tomcat.apache.org/">http://tomcat.apache.org/</a></p> <p>Path to dependency file: /tmp/ws-scm/WhiteSource-Demo/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/8.5.4/tomcat-embed-core-8.5.4.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library) - spring-boot-starter-tomcat-1.4.0.RELEASE.jar - :x: **tomcat-embed-core-8.5.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/TreyM-WSS/WhiteSource-Demo/commits/75659f691fb82d67ecd666ba6076394defeb92d0">75659f691fb82d67ecd666ba6076394defeb92d0</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. <p>Publish Date: 2017-08-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-6797>CVE-2016-6797</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797</a></p> <p>Release Date: 2017-08-10</p> <p>Fix Resolution: org.apache.tomcat.embed:tomcat-embed-core:9.0.0.M10,8.5.5,8.0.37,7.0.72,org.apache.tomcat:tomcat-catalina:9.0.0.M10,8.5.5,8.0.37,7.0.72</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.apache.tomcat.embed","packageName":"tomcat-embed-core","packageVersion":"8.5.4","isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-web:1.4.0.RELEASE;org.springframework.boot:spring-boot-starter-tomcat:1.4.0.RELEASE;org.apache.tomcat.embed:tomcat-embed-core:8.5.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.tomcat.embed:tomcat-embed-core:9.0.0.M10,8.5.5,8.0.37,7.0.72,org.apache.tomcat:tomcat-catalina:9.0.0.M10,8.5.5,8.0.37,7.0.72"}],"vulnerabilityIdentifier":"CVE-2016-6797","vulnerabilityDetails":"The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-6797","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in tomcat embed core jar cve high severity vulnerability vulnerable library tomcat embed core jar core tomcat implementation library home page a href path to dependency file tmp ws scm whitesource demo pom xml path to vulnerable library home wss scanner repository org apache tomcat embed tomcat embed core tomcat embed core jar dependency hierarchy spring boot starter web release jar root library spring boot starter tomcat release jar x tomcat embed core jar vulnerable library found in head commit a href vulnerability details the resourcelinkfactory implementation in apache tomcat to to to to and to did not limit web application access to global jndi resources to those resources explicitly linked to the web application therefore it was possible for a web application to access any global jndi resource whether an explicit resourcelink had been configured or not publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache tomcat embed tomcat embed core org apache tomcat tomcat catalina isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails the resourcelinkfactory implementation in apache tomcat to to to to and to did not limit web application access to global jndi resources to those resources explicitly linked to the web application therefore it was possible for a web application to access any global jndi resource whether an explicit resourcelink had been configured or not vulnerabilityurl
0
168,876
20,825,737,326
IssuesEvent
2022-03-18 20:36:48
vincenzodistasio97/main
https://api.github.com/repos/vincenzodistasio97/main
closed
CVE-2021-32640 (Medium) detected in multiple libraries - autoclosed
security vulnerability
## CVE-2021-32640 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>ws-6.2.1.tgz</b>, <b>ws-5.2.2.tgz</b>, <b>ws-7.2.3.tgz</b></p></summary> <p> <details><summary><b>ws-6.2.1.tgz</b></p></summary> <p>Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/ws/-/ws-6.2.1.tgz">https://registry.npmjs.org/ws/-/ws-6.2.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/@pm2/agent-node/node_modules/ws/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - io-4.3.3.tgz - agent-node-1.1.10.tgz - :x: **ws-6.2.1.tgz** (Vulnerable Library) </details> <details><summary><b>ws-5.2.2.tgz</b></p></summary> <p>Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/ws/-/ws-5.2.2.tgz">https://registry.npmjs.org/ws/-/ws-5.2.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/ws/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - agent-0.5.26.tgz - :x: **ws-5.2.2.tgz** (Vulnerable Library) </details> <details><summary><b>ws-7.2.3.tgz</b></p></summary> <p>Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/ws/-/ws-7.2.3.tgz">https://registry.npmjs.org/ws/-/ws-7.2.3.tgz</a></p> <p>Path to dependency file: /server/package.json</p> <p>Path to vulnerable library: /server/node_modules/ws/package.json</p> <p> Dependency Hierarchy: - :x: **ws-7.2.3.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/d73d4b91e6f255366eaeff6f52d69171b8da3d39">d73d4b91e6f255366eaeff6f52d69171b8da3d39</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ws is an open source WebSocket client and server library for Node.js. A specially crafted value of the `Sec-Websocket-Protocol` header can be used to significantly slow down a ws server. The vulnerability has been fixed in ws@7.4.6 (https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff). In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the [`--max-http-header-size=size`](https://nodejs.org/api/cli.html#cli_max_http_header_size_size) and/or the [`maxHeaderSize`](https://nodejs.org/api/http.html#http_http_createserver_options_requestlistener) options. <p>Publish Date: 2021-05-25 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32640>CVE-2021-32640</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693">https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693</a></p> <p>Release Date: 2021-05-25</p> <p>Fix Resolution (ws): 6.2.2</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p><p>Fix Resolution (ws): 5.2.3</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-32640 (Medium) detected in multiple libraries - autoclosed - ## CVE-2021-32640 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>ws-6.2.1.tgz</b>, <b>ws-5.2.2.tgz</b>, <b>ws-7.2.3.tgz</b></p></summary> <p> <details><summary><b>ws-6.2.1.tgz</b></p></summary> <p>Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/ws/-/ws-6.2.1.tgz">https://registry.npmjs.org/ws/-/ws-6.2.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/@pm2/agent-node/node_modules/ws/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - io-4.3.3.tgz - agent-node-1.1.10.tgz - :x: **ws-6.2.1.tgz** (Vulnerable Library) </details> <details><summary><b>ws-5.2.2.tgz</b></p></summary> <p>Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/ws/-/ws-5.2.2.tgz">https://registry.npmjs.org/ws/-/ws-5.2.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/ws/package.json</p> <p> Dependency Hierarchy: - pm2-4.2.3.tgz (Root Library) - agent-0.5.26.tgz - :x: **ws-5.2.2.tgz** (Vulnerable Library) </details> <details><summary><b>ws-7.2.3.tgz</b></p></summary> <p>Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/ws/-/ws-7.2.3.tgz">https://registry.npmjs.org/ws/-/ws-7.2.3.tgz</a></p> <p>Path to dependency file: /server/package.json</p> <p>Path to vulnerable library: /server/node_modules/ws/package.json</p> <p> Dependency Hierarchy: - :x: **ws-7.2.3.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/main/commit/d73d4b91e6f255366eaeff6f52d69171b8da3d39">d73d4b91e6f255366eaeff6f52d69171b8da3d39</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ws is an open source WebSocket client and server library for Node.js. A specially crafted value of the `Sec-Websocket-Protocol` header can be used to significantly slow down a ws server. The vulnerability has been fixed in ws@7.4.6 (https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff). In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the [`--max-http-header-size=size`](https://nodejs.org/api/cli.html#cli_max_http_header_size_size) and/or the [`maxHeaderSize`](https://nodejs.org/api/http.html#http_http_createserver_options_requestlistener) options. <p>Publish Date: 2021-05-25 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32640>CVE-2021-32640</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693">https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693</a></p> <p>Release Date: 2021-05-25</p> <p>Fix Resolution (ws): 6.2.2</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p><p>Fix Resolution (ws): 5.2.3</p> <p>Direct dependency fix Resolution (pm2): 4.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in multiple libraries autoclosed cve medium severity vulnerability vulnerable libraries ws tgz ws tgz ws tgz ws tgz simple to use blazing fast and thoroughly tested websocket client and server for node js library home page a href path to dependency file package json path to vulnerable library node modules agent node node modules ws package json dependency hierarchy tgz root library io tgz agent node tgz x ws tgz vulnerable library ws tgz simple to use blazing fast and thoroughly tested websocket client and server for node js library home page a href path to dependency file package json path to vulnerable library node modules ws package json dependency hierarchy tgz root library agent tgz x ws tgz vulnerable library ws tgz simple to use blazing fast and thoroughly tested websocket client and server for node js library home page a href path to dependency file server package json path to vulnerable library server node modules ws package json dependency hierarchy x ws tgz vulnerable library found in head commit a href found in base branch master vulnerability details ws is an open source websocket client and server library for node js a specially crafted value of the sec websocket protocol header can be used to significantly slow down a ws server the vulnerability has been fixed in ws in vulnerable versions of ws the issue can be mitigated by reducing the maximum allowed length of the request headers using the and or the options publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ws direct dependency fix resolution fix resolution ws direct dependency fix resolution step up your open source security game with whitesource
0
144,762
11,631,683,429
IssuesEvent
2020-02-28 02:14:25
dapr/dapr
https://api.github.com/repos/dapr/dapr
opened
[Longhaul Chaos Test] Hashtag Snapshot Service
area/test/chaos
This component will exercise Dapr’s state APIs (not in the context of an Actor). It wakes up every minute and retrieves all keys from Redis state store - not using Dapr’s state APIs, since Dapr does not offer an API to query a range of states from another Dapr application’s state store. Is is expected that only a few dozen keys to be present since the list of hashtags are predefined in this component. Now key-value pairs are generated for all states and saved via Dapr’s state store API. This service also offers an API to retrieve all keys via a GET method. Parent: #1100 Implement in C#
1.0
[Longhaul Chaos Test] Hashtag Snapshot Service - This component will exercise Dapr’s state APIs (not in the context of an Actor). It wakes up every minute and retrieves all keys from Redis state store - not using Dapr’s state APIs, since Dapr does not offer an API to query a range of states from another Dapr application’s state store. Is is expected that only a few dozen keys to be present since the list of hashtags are predefined in this component. Now key-value pairs are generated for all states and saved via Dapr’s state store API. This service also offers an API to retrieve all keys via a GET method. Parent: #1100 Implement in C#
non_priority
hashtag snapshot service this component will exercise dapr’s state apis not in the context of an actor it wakes up every minute and retrieves all keys from redis state store not using dapr’s state apis since dapr does not offer an api to query a range of states from another dapr application’s state store is is expected that only a few dozen keys to be present since the list of hashtags are predefined in this component now key value pairs are generated for all states and saved via dapr’s state store api this service also offers an api to retrieve all keys via a get method parent implement in c
0
10,648
4,075,429,378
IssuesEvent
2016-05-29 06:57:44
DotSpatial/DotSpatial
https://api.github.com/repos/DotSpatial/DotSpatial
closed
Open project not redrawing map if properties is set
bug CodePlex
**This issue was imported from [CodePlex](http://dotspatial.codeplex.com/workitem/200)** **[worsHound](http://www.codeplex.com/site/users/view/worsHound)** wrote 2011-01-04 at 15:42 The map is not drawn after loading a saved project witch has properties set on a layer, on unique values or Quantities.
1.0
Open project not redrawing map if properties is set - **This issue was imported from [CodePlex](http://dotspatial.codeplex.com/workitem/200)** **[worsHound](http://www.codeplex.com/site/users/view/worsHound)** wrote 2011-01-04 at 15:42 The map is not drawn after loading a saved project witch has properties set on a layer, on unique values or Quantities.
non_priority
open project not redrawing map if properties is set this issue was imported from wrote at the map is not drawn after loading a saved project witch has properties set on a layer on unique values or quantities
0
48,494
20,160,361,862
IssuesEvent
2022-02-09 20:48:52
dockstore/dockstore
https://api.github.com/repos/dockstore/dockstore
opened
Restubbing a worklow with a snapshot version returns a 500 error
bug web-service
**Describe the bug** Restubbing a workflow with a snapshot version returns a 500 error. **To Reproduce** Steps to reproduce the behavior: 1. Create a workflow and successfully snapshot a version. 2. Click on 'Restub'. 3. See that nothing happens. No error is displayed in the UI. 4. Check the developer tools to see the 500 error. **Expected behavior** Should be able to restub the workflow. **Screenshots** If applicable, add screenshots to help explain your problem. **Desktop (please complete the following information):** - OS: [e.g. iOS] - Browser [e.g. chrome, safari] - Version [e.g. 22] **Smartphone (please complete the following information):** - Device: [e.g. iPhone6] - OS: [e.g. iOS8.1] - Browser [e.g. stock browser, safari] - Version [e.g. 22] **Additional context** [Webservice](https://github.com/dockstore/dockstore/commits/f894cfb) - f894cfb [UI](https://github.com/dockstore/dockstore-ui2/commits/ead92717) - 2.8.4-127-gead92717 [Compose Setup](https://github.com/dockstore/compose_setup/commits/5454f4a) - 5454f4a [Deploy](https://github.com/dockstore/dockstore-deploy/commits/91fc396) - 1.11.3-119-g91fc396 galaxyParsingLambdaVersion: 0.0.6
1.0
Restubbing a worklow with a snapshot version returns a 500 error - **Describe the bug** Restubbing a workflow with a snapshot version returns a 500 error. **To Reproduce** Steps to reproduce the behavior: 1. Create a workflow and successfully snapshot a version. 2. Click on 'Restub'. 3. See that nothing happens. No error is displayed in the UI. 4. Check the developer tools to see the 500 error. **Expected behavior** Should be able to restub the workflow. **Screenshots** If applicable, add screenshots to help explain your problem. **Desktop (please complete the following information):** - OS: [e.g. iOS] - Browser [e.g. chrome, safari] - Version [e.g. 22] **Smartphone (please complete the following information):** - Device: [e.g. iPhone6] - OS: [e.g. iOS8.1] - Browser [e.g. stock browser, safari] - Version [e.g. 22] **Additional context** [Webservice](https://github.com/dockstore/dockstore/commits/f894cfb) - f894cfb [UI](https://github.com/dockstore/dockstore-ui2/commits/ead92717) - 2.8.4-127-gead92717 [Compose Setup](https://github.com/dockstore/compose_setup/commits/5454f4a) - 5454f4a [Deploy](https://github.com/dockstore/dockstore-deploy/commits/91fc396) - 1.11.3-119-g91fc396 galaxyParsingLambdaVersion: 0.0.6
non_priority
restubbing a worklow with a snapshot version returns a error describe the bug restubbing a workflow with a snapshot version returns a error to reproduce steps to reproduce the behavior create a workflow and successfully snapshot a version click on restub see that nothing happens no error is displayed in the ui check the developer tools to see the error expected behavior should be able to restub the workflow screenshots if applicable add screenshots to help explain your problem desktop please complete the following information os browser version smartphone please complete the following information device os browser version additional context galaxyparsinglambdaversion
0
2,339
3,786,424,828
IssuesEvent
2016-03-21 02:35:29
openpgpjs/openpgpjs
https://api.github.com/repos/openpgpjs/openpgpjs
opened
Implement ECC support for Curve P-256, P-384, P-521 (RFC6637)
Compatibility Performance Security
See http://tools.ietf.org/html/rfc6637 This issue tracks the implementation of ECDSA and ECDH for "Curve P-256", "Curve P-384", and "Curve P-521". The advantage of these curves is that they have already been standardized for OpenPGP in RFC 6637 and are support natively by both [WebCrypto](https://www.chromium.org/blink/webcrypto) and [node.js crypto](https://nodejs.org/api/crypto.html).
True
Implement ECC support for Curve P-256, P-384, P-521 (RFC6637) - See http://tools.ietf.org/html/rfc6637 This issue tracks the implementation of ECDSA and ECDH for "Curve P-256", "Curve P-384", and "Curve P-521". The advantage of these curves is that they have already been standardized for OpenPGP in RFC 6637 and are support natively by both [WebCrypto](https://www.chromium.org/blink/webcrypto) and [node.js crypto](https://nodejs.org/api/crypto.html).
non_priority
implement ecc support for curve p p p see this issue tracks the implementation of ecdsa and ecdh for curve p curve p and curve p the advantage of these curves is that they have already been standardized for openpgp in rfc and are support natively by both and
0
348,394
31,561,039,765
IssuesEvent
2023-09-03 08:58:18
gear-foundation/vara-network
https://api.github.com/repos/gear-foundation/vara-network
opened
Faucet claim failed
bug testnet
### Problem I requested faucet, but its didnt come ### Steps 1. 2. 3. ### Expected Behavior _No response_ ### Your Substrate Address 5EnDNL75NG3x7bUxX4iQ3c2pppvee8GeFZT2eK44zYwjjHE6 ### What browsers are you seeing the problem on? - [ ] Firefox - [X] Chrome - [ ] Safari - [ ] Microsoft Edge - [ ] Other ### Other browser _No response_ ### Which wallet you are using? - [ ] PolkadotJS - [X] Talisman - [ ] Nova Wallet - [ ] SubWallet ### Screenshots ![Screenshot_202](https://github.com/gear-foundation/vara-network/assets/55221851/561e66ce-e0c5-48a3-8e03-50f1a4172a11) ### Notes _No response_
1.0
Faucet claim failed - ### Problem I requested faucet, but its didnt come ### Steps 1. 2. 3. ### Expected Behavior _No response_ ### Your Substrate Address 5EnDNL75NG3x7bUxX4iQ3c2pppvee8GeFZT2eK44zYwjjHE6 ### What browsers are you seeing the problem on? - [ ] Firefox - [X] Chrome - [ ] Safari - [ ] Microsoft Edge - [ ] Other ### Other browser _No response_ ### Which wallet you are using? - [ ] PolkadotJS - [X] Talisman - [ ] Nova Wallet - [ ] SubWallet ### Screenshots ![Screenshot_202](https://github.com/gear-foundation/vara-network/assets/55221851/561e66ce-e0c5-48a3-8e03-50f1a4172a11) ### Notes _No response_
non_priority
faucet claim failed problem i requested faucet but its didnt come steps expected behavior no response your substrate address what browsers are you seeing the problem on firefox chrome safari microsoft edge other other browser no response which wallet you are using polkadotjs talisman nova wallet subwallet screenshots notes no response
0
76,732
21,561,778,463
IssuesEvent
2022-05-01 09:11:57
dftd4/dftd4
https://api.github.com/repos/dftd4/dftd4
closed
Cc: error: unrecognized command line option ‘-qopenmp’ while compiling dftd4-python with meson
build
Dear developers, I am trying to compile dftd4-python by meson using the command: meson setup _build -Dpython_version=3 -Dfortran_link_args=-qopenmp the output is: > Using 'PKG_CONFIG_PATH' from environment with value: '/home/gp/tools/dftd4-3.3.0/lib/pkgconfig' > Using 'PKG_CONFIG_PATH' from environment with value: '/home/gp/tools/dftd4-3.3.0/lib/pkgconfig' > The Meson build system > Version: 0.56.0 > Source dir: /home/gp/Music/dftd4-3.3.0/python > Build dir: /home/gp/Music/dftd4-3.3.0/python/_build > Build type: native build > Project name: dftd4-python > Project version: undefined > C compiler for the host machine: cc (gcc 9.3.0 "cc (Ubuntu 9.3.0-17ubuntu1~20.04) 9.3.0") > C linker for the host machine: cc ld.bfd 2.34 > Host machine cpu family: x86_64 > Host machine cpu: x86_64 > Found pkg-config: /usr/bin/pkg-config (0.29.1) > Using 'PKG_CONFIG_PATH' from environment with value: '/home/gp/tools/dftd4-3.3.0/lib/pkgconfig' > Run-time dependency dftd4 found: YES 3.3.0 > Program python3 (cffi) found: YES (/home/gp/anaconda3/bin/python3) modules: cffi > Dependency python found: YES (pkgconfig) > Configuring _libdftd4.h with command > Configuring _libdftd4.c with command > Build targets in project: 2 > > Found ninja-1.10.0.git.kitware.jobserver-1 at /home/gp/anaconda3/bin/ninja Then I typed: meson compile -C _build The output is: > Found runner: ['/home/gp/anaconda3/bin/ninja'] > ninja: Entering directory `_build' > [1/3] Compiling C object dftd4/lib_libdftd4.a.p/meson-generated_..__libdftd4.c.o > FAILED: dftd4/lib_libdftd4.a.p/meson-generated_..__libdftd4.c.o > cc -Idftd4/lib_libdftd4.a.p -Idftd4 -I../dftd4 -I/home/gp/tools/dftd4-3.3.0/include -I/home/gp/tools/dftd4-3.3.0/include/dftd4/intel-19.1.3.304 -I/home/gp/anaconda3/include/python3.7m -fdiagnostics-color=always -pipe -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -O2 -g -fPIC -qopenmp -MD -MQ dftd4/lib_libdftd4.a.p/meson-generated_..__libdftd4.c.o -MF dftd4/lib_libdftd4.a.p/meson-generated_..__libdftd4.c.o.d -o dftd4/lib_libdftd4.a.p/meson-generated_..__libdftd4.c.o -c dftd4/_libdftd4.c > cc: error: unrecognized command line option ‘-qopenmp’; did you mean ‘-fopenmp’? > ninja: build stopped: subcommand failed. How can I resolve the ‘-qopenmp’ option problem?
1.0
Cc: error: unrecognized command line option ‘-qopenmp’ while compiling dftd4-python with meson - Dear developers, I am trying to compile dftd4-python by meson using the command: meson setup _build -Dpython_version=3 -Dfortran_link_args=-qopenmp the output is: > Using 'PKG_CONFIG_PATH' from environment with value: '/home/gp/tools/dftd4-3.3.0/lib/pkgconfig' > Using 'PKG_CONFIG_PATH' from environment with value: '/home/gp/tools/dftd4-3.3.0/lib/pkgconfig' > The Meson build system > Version: 0.56.0 > Source dir: /home/gp/Music/dftd4-3.3.0/python > Build dir: /home/gp/Music/dftd4-3.3.0/python/_build > Build type: native build > Project name: dftd4-python > Project version: undefined > C compiler for the host machine: cc (gcc 9.3.0 "cc (Ubuntu 9.3.0-17ubuntu1~20.04) 9.3.0") > C linker for the host machine: cc ld.bfd 2.34 > Host machine cpu family: x86_64 > Host machine cpu: x86_64 > Found pkg-config: /usr/bin/pkg-config (0.29.1) > Using 'PKG_CONFIG_PATH' from environment with value: '/home/gp/tools/dftd4-3.3.0/lib/pkgconfig' > Run-time dependency dftd4 found: YES 3.3.0 > Program python3 (cffi) found: YES (/home/gp/anaconda3/bin/python3) modules: cffi > Dependency python found: YES (pkgconfig) > Configuring _libdftd4.h with command > Configuring _libdftd4.c with command > Build targets in project: 2 > > Found ninja-1.10.0.git.kitware.jobserver-1 at /home/gp/anaconda3/bin/ninja Then I typed: meson compile -C _build The output is: > Found runner: ['/home/gp/anaconda3/bin/ninja'] > ninja: Entering directory `_build' > [1/3] Compiling C object dftd4/lib_libdftd4.a.p/meson-generated_..__libdftd4.c.o > FAILED: dftd4/lib_libdftd4.a.p/meson-generated_..__libdftd4.c.o > cc -Idftd4/lib_libdftd4.a.p -Idftd4 -I../dftd4 -I/home/gp/tools/dftd4-3.3.0/include -I/home/gp/tools/dftd4-3.3.0/include/dftd4/intel-19.1.3.304 -I/home/gp/anaconda3/include/python3.7m -fdiagnostics-color=always -pipe -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -O2 -g -fPIC -qopenmp -MD -MQ dftd4/lib_libdftd4.a.p/meson-generated_..__libdftd4.c.o -MF dftd4/lib_libdftd4.a.p/meson-generated_..__libdftd4.c.o.d -o dftd4/lib_libdftd4.a.p/meson-generated_..__libdftd4.c.o -c dftd4/_libdftd4.c > cc: error: unrecognized command line option ‘-qopenmp’; did you mean ‘-fopenmp’? > ninja: build stopped: subcommand failed. How can I resolve the ‘-qopenmp’ option problem?
non_priority
cc error unrecognized command line option ‘ qopenmp’ while compiling python with meson dear developers i am trying to compile python by meson using the command meson setup build dpython version dfortran link args qopenmp the output is using pkg config path from environment with value home gp tools lib pkgconfig using pkg config path from environment with value home gp tools lib pkgconfig the meson build system version source dir home gp music python build dir home gp music python build build type native build project name python project version undefined c compiler for the host machine cc gcc cc ubuntu c linker for the host machine cc ld bfd host machine cpu family host machine cpu found pkg config usr bin pkg config using pkg config path from environment with value home gp tools lib pkgconfig run time dependency found yes program cffi found yes home gp bin modules cffi dependency python found yes pkgconfig configuring h with command configuring c with command build targets in project found ninja git kitware jobserver at home gp bin ninja then i typed meson compile c build the output is found runner ninja entering directory build compiling c object lib a p meson generated c o failed lib a p meson generated c o cc lib a p i i home gp tools include i home gp tools include intel i home gp include fdiagnostics color always pipe d file offset bits wall winvalid pch g fpic qopenmp md mq lib a p meson generated c o mf lib a p meson generated c o d o lib a p meson generated c o c c cc error unrecognized command line option ‘ qopenmp’ did you mean ‘ fopenmp’ ninja build stopped subcommand failed how can i resolve the ‘ qopenmp’ option problem
0
228,449
25,192,544,271
IssuesEvent
2022-11-12 04:53:10
justunsix/confluence-export-pages-to-pdf
https://api.github.com/repos/justunsix/confluence-export-pages-to-pdf
closed
CVE-2022-3517 (High) detected in minimatch-3.0.4.tgz - autoclosed
security vulnerability
## CVE-2022-3517 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>minimatch-3.0.4.tgz</b></p></summary> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz">https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz</a></p> <p>Path to dependency file: /node-option/package.json</p> <p>Path to vulnerable library: /node-option/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - puppeteer-9.1.1.tgz (Root Library) - rimraf-3.0.2.tgz - glob-7.1.7.tgz - :x: **minimatch-3.0.4.tgz** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. <p>Publish Date: 2022-10-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-3517>CVE-2022-3517</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-17</p> <p>Fix Resolution: minimatch - 3.0.5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-3517 (High) detected in minimatch-3.0.4.tgz - autoclosed - ## CVE-2022-3517 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>minimatch-3.0.4.tgz</b></p></summary> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz">https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz</a></p> <p>Path to dependency file: /node-option/package.json</p> <p>Path to vulnerable library: /node-option/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - puppeteer-9.1.1.tgz (Root Library) - rimraf-3.0.2.tgz - glob-7.1.7.tgz - :x: **minimatch-3.0.4.tgz** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. <p>Publish Date: 2022-10-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-3517>CVE-2022-3517</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-17</p> <p>Fix Resolution: minimatch - 3.0.5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in minimatch tgz autoclosed cve high severity vulnerability vulnerable library minimatch tgz a glob matcher in javascript library home page a href path to dependency file node option package json path to vulnerable library node option node modules minimatch package json dependency hierarchy puppeteer tgz root library rimraf tgz glob tgz x minimatch tgz vulnerable library found in base branch main vulnerability details a vulnerability was found in the minimatch package this flaw allows a regular expression denial of service redos when calling the braceexpand function with specific arguments resulting in a denial of service publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution minimatch step up your open source security game with mend
0
133,507
18,298,890,205
IssuesEvent
2021-10-05 23:43:42
ghc-dev/Danielle-Mosley
https://api.github.com/repos/ghc-dev/Danielle-Mosley
closed
CVE-2021-21290 (Medium) detected in netty-handler-4.1.39.Final.jar, netty-codec-http-4.1.39.Final.jar - autoclosed
security vulnerability
## CVE-2021-21290 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>netty-handler-4.1.39.Final.jar</b>, <b>netty-codec-http-4.1.39.Final.jar</b></p></summary> <p> <details><summary><b>netty-handler-4.1.39.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p> <p>Path to dependency file: Danielle-Mosley/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-handler/4.1.39.Final/4a63b56de071c1b10a56b5d90095e4201ea4098f/netty-handler-4.1.39.Final.jar</p> <p> Dependency Hierarchy: - netty-codec-http-4.1.39.Final.jar (Root Library) - :x: **netty-handler-4.1.39.Final.jar** (Vulnerable Library) </details> <details><summary><b>netty-codec-http-4.1.39.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p> <p>Path to dependency file: Danielle-Mosley/build.gradle</p> <p>Path to vulnerable library: aches/modules-2/files-2.1/io.netty/netty-codec-http/4.1.39.Final/732d06961162e27fa3ae5989541c4460853745d3/netty-codec-http-4.1.39.Final.jar</p> <p> Dependency Hierarchy: - :x: **netty-codec-http-4.1.39.Final.jar** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Danielle-Mosley/commit/bdb31fed1107c666781c22877702bc80e0c1fee7">bdb31fed1107c666781c22877702bc80e0c1fee7</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involving an insecure temp file. When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method "File.createTempFile" on unix-like systems creates a random file, but, by default will create this file with the permissions "-rw-r--r--". Thus, if sensitive information is written to this file, other local users can read this information. This is the case in netty's "AbstractDiskHttpData" is vulnerable. This has been fixed in version 4.1.59.Final. As a workaround, one may specify your own "java.io.tmpdir" when you start the JVM or use "DefaultHttpDataFactory.setBaseDir(...)" to set the directory to something that is only readable by the current user. <p>Publish Date: 2021-02-08 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21290>CVE-2021-21290</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2">https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2</a></p> <p>Release Date: 2021-02-08</p> <p>Fix Resolution: io.netty:netty-codec-http:4.1.59.Final</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-handler","packageVersion":"4.1.39.Final","packageFilePaths":["/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"io.netty:netty-codec-http:4.1.39.Final;io.netty:netty-handler:4.1.39.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec-http:4.1.59.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec-http","packageVersion":"4.1.39.Final","packageFilePaths":["/build.gradle"],"isTransitiveDependency":false,"dependencyTree":"io.netty:netty-codec-http:4.1.39.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec-http:4.1.59.Final"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-21290","vulnerabilityDetails":"Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers \u0026 clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involving an insecure temp file. When netty\u0027s multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method \"File.createTempFile\" on unix-like systems creates a random file, but, by default will create this file with the permissions \"-rw-r--r--\". Thus, if sensitive information is written to this file, other local users can read this information. This is the case in netty\u0027s \"AbstractDiskHttpData\" is vulnerable. This has been fixed in version 4.1.59.Final. As a workaround, one may specify your own \"java.io.tmpdir\" when you start the JVM or use \"DefaultHttpDataFactory.setBaseDir(...)\" to set the directory to something that is only readable by the current user.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21290","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-21290 (Medium) detected in netty-handler-4.1.39.Final.jar, netty-codec-http-4.1.39.Final.jar - autoclosed - ## CVE-2021-21290 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>netty-handler-4.1.39.Final.jar</b>, <b>netty-codec-http-4.1.39.Final.jar</b></p></summary> <p> <details><summary><b>netty-handler-4.1.39.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p> <p>Path to dependency file: Danielle-Mosley/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-handler/4.1.39.Final/4a63b56de071c1b10a56b5d90095e4201ea4098f/netty-handler-4.1.39.Final.jar</p> <p> Dependency Hierarchy: - netty-codec-http-4.1.39.Final.jar (Root Library) - :x: **netty-handler-4.1.39.Final.jar** (Vulnerable Library) </details> <details><summary><b>netty-codec-http-4.1.39.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p> <p>Path to dependency file: Danielle-Mosley/build.gradle</p> <p>Path to vulnerable library: aches/modules-2/files-2.1/io.netty/netty-codec-http/4.1.39.Final/732d06961162e27fa3ae5989541c4460853745d3/netty-codec-http-4.1.39.Final.jar</p> <p> Dependency Hierarchy: - :x: **netty-codec-http-4.1.39.Final.jar** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Danielle-Mosley/commit/bdb31fed1107c666781c22877702bc80e0c1fee7">bdb31fed1107c666781c22877702bc80e0c1fee7</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involving an insecure temp file. When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method "File.createTempFile" on unix-like systems creates a random file, but, by default will create this file with the permissions "-rw-r--r--". Thus, if sensitive information is written to this file, other local users can read this information. This is the case in netty's "AbstractDiskHttpData" is vulnerable. This has been fixed in version 4.1.59.Final. As a workaround, one may specify your own "java.io.tmpdir" when you start the JVM or use "DefaultHttpDataFactory.setBaseDir(...)" to set the directory to something that is only readable by the current user. <p>Publish Date: 2021-02-08 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21290>CVE-2021-21290</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2">https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2</a></p> <p>Release Date: 2021-02-08</p> <p>Fix Resolution: io.netty:netty-codec-http:4.1.59.Final</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-handler","packageVersion":"4.1.39.Final","packageFilePaths":["/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"io.netty:netty-codec-http:4.1.39.Final;io.netty:netty-handler:4.1.39.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec-http:4.1.59.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec-http","packageVersion":"4.1.39.Final","packageFilePaths":["/build.gradle"],"isTransitiveDependency":false,"dependencyTree":"io.netty:netty-codec-http:4.1.39.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec-http:4.1.59.Final"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-21290","vulnerabilityDetails":"Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers \u0026 clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involving an insecure temp file. When netty\u0027s multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method \"File.createTempFile\" on unix-like systems creates a random file, but, by default will create this file with the permissions \"-rw-r--r--\". Thus, if sensitive information is written to this file, other local users can read this information. This is the case in netty\u0027s \"AbstractDiskHttpData\" is vulnerable. This has been fixed in version 4.1.59.Final. As a workaround, one may specify your own \"java.io.tmpdir\" when you start the JVM or use \"DefaultHttpDataFactory.setBaseDir(...)\" to set the directory to something that is only readable by the current user.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21290","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in netty handler final jar netty codec http final jar autoclosed cve medium severity vulnerability vulnerable libraries netty handler final jar netty codec http final jar netty handler final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file danielle mosley build gradle path to vulnerable library home wss scanner gradle caches modules files io netty netty handler final netty handler final jar dependency hierarchy netty codec http final jar root library x netty handler final jar vulnerable library netty codec http final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file danielle mosley build gradle path to vulnerable library aches modules files io netty netty codec http final netty codec http final jar dependency hierarchy x netty codec http final jar vulnerable library found in head commit a href found in base branch master vulnerability details netty is an open source asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers clients in netty before version final there is a vulnerability on unix like systems involving an insecure temp file when netty s multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled on unix like systems the temporary directory is shared between all user as such writing to this directory using apis that do not explicitly set the file directory permissions can lead to information disclosure of note this does not impact modern macos operating systems the method file createtempfile on unix like systems creates a random file but by default will create this file with the permissions rw r r thus if sensitive information is written to this file other local users can read this information this is the case in netty s abstractdiskhttpdata is vulnerable this has been fixed in version final as a workaround one may specify your own java io tmpdir when you start the jvm or use defaulthttpdatafactory setbasedir to set the directory to something that is only readable by the current user publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution io netty netty codec http final isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree io netty netty codec http final io netty netty handler final isminimumfixversionavailable true minimumfixversion io netty netty codec http final packagetype java groupid io netty packagename netty codec http packageversion final packagefilepaths istransitivedependency false dependencytree io netty netty codec http final isminimumfixversionavailable true minimumfixversion io netty netty codec http final basebranches vulnerabilityidentifier cve vulnerabilitydetails netty is an open source asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers clients in netty before version final there is a vulnerability on unix like systems involving an insecure temp file when netty multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled on unix like systems the temporary directory is shared between all user as such writing to this directory using apis that do not explicitly set the file directory permissions can lead to information disclosure of note this does not impact modern macos operating systems the method file createtempfile on unix like systems creates a random file but by default will create this file with the permissions rw r r thus if sensitive information is written to this file other local users can read this information this is the case in netty abstractdiskhttpdata is vulnerable this has been fixed in version final as a workaround one may specify your own java io tmpdir when you start the jvm or use defaulthttpdatafactory setbasedir to set the directory to something that is only readable by the current user vulnerabilityurl
0
51,678
10,710,809,161
IssuesEvent
2019-10-25 03:44:25
joomla/joomla-cms
https://api.github.com/repos/joomla/joomla-cms
closed
Privacy: Information Requests - Can able to save invalid email string
No Code Attached Yet
### Steps to reproduce the issue 1. Go to the Admin-> Users-> Privacy-> Request 2. Click on New and add invalid email string in the Email field and save it. 3. The record get save and the system shows the warning and item saved message at a time. ### Expected result The system should not allow saving invalid email string and the record should not get save. ### Actual result Both warning and item saved messages![screen shot 2019-10-19 at 07 30 57](https://issues.joomla.org/uploads/1/a205770e60f17aacd0a0e4ba2f88e475.png) at a time and record created. ### System information (as much as possible) ### Additional comments
1.0
Privacy: Information Requests - Can able to save invalid email string - ### Steps to reproduce the issue 1. Go to the Admin-> Users-> Privacy-> Request 2. Click on New and add invalid email string in the Email field and save it. 3. The record get save and the system shows the warning and item saved message at a time. ### Expected result The system should not allow saving invalid email string and the record should not get save. ### Actual result Both warning and item saved messages![screen shot 2019-10-19 at 07 30 57](https://issues.joomla.org/uploads/1/a205770e60f17aacd0a0e4ba2f88e475.png) at a time and record created. ### System information (as much as possible) ### Additional comments
non_priority
privacy information requests can able to save invalid email string steps to reproduce the issue go to the admin users privacy request click on new and add invalid email string in the email field and save it the record get save and the system shows the warning and item saved message at a time expected result the system should not allow saving invalid email string and the record should not get save actual result both warning and item saved messages at a time and record created system information as much as possible additional comments
0
140,244
18,900,639,068
IssuesEvent
2021-11-16 00:14:15
pustovitDmytro/code-chronicle
https://api.github.com/repos/pustovitDmytro/code-chronicle
opened
CVE-2021-23807 (High) detected in jsonpointer-4.1.0.tgz
security vulnerability
## CVE-2021-23807 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jsonpointer-4.1.0.tgz</b></p></summary> <p>Simple JSON Addressing.</p> <p>Library home page: <a href="https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.1.0.tgz">https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.1.0.tgz</a></p> <p>Path to dependency file: code-chronicle/package.json</p> <p>Path to vulnerable library: code-chronicle/node_modules/jsonpointer/package.json</p> <p> Dependency Hierarchy: - danger-10.6.6.tgz (Root Library) - :x: **jsonpointer-4.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pustovitDmytro/code-chronicle/commit/6e512d3b26c0461e41894cae6558b35a24e5b20e">6e512d3b26c0461e41894cae6558b35a24e5b20e</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package jsonpointer before 5.0.0. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays. <p>Publish Date: 2021-11-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23807>CVE-2021-23807</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23807">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23807</a></p> <p>Release Date: 2021-11-03</p> <p>Fix Resolution: jsonpointer - 5.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-23807 (High) detected in jsonpointer-4.1.0.tgz - ## CVE-2021-23807 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jsonpointer-4.1.0.tgz</b></p></summary> <p>Simple JSON Addressing.</p> <p>Library home page: <a href="https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.1.0.tgz">https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.1.0.tgz</a></p> <p>Path to dependency file: code-chronicle/package.json</p> <p>Path to vulnerable library: code-chronicle/node_modules/jsonpointer/package.json</p> <p> Dependency Hierarchy: - danger-10.6.6.tgz (Root Library) - :x: **jsonpointer-4.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pustovitDmytro/code-chronicle/commit/6e512d3b26c0461e41894cae6558b35a24e5b20e">6e512d3b26c0461e41894cae6558b35a24e5b20e</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package jsonpointer before 5.0.0. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays. <p>Publish Date: 2021-11-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23807>CVE-2021-23807</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23807">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23807</a></p> <p>Release Date: 2021-11-03</p> <p>Fix Resolution: jsonpointer - 5.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jsonpointer tgz cve high severity vulnerability vulnerable library jsonpointer tgz simple json addressing library home page a href path to dependency file code chronicle package json path to vulnerable library code chronicle node modules jsonpointer package json dependency hierarchy danger tgz root library x jsonpointer tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package jsonpointer before a type confusion vulnerability can lead to a bypass of a previous prototype pollution fix when the pointer components are arrays publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jsonpointer step up your open source security game with whitesource
0
19,149
6,676,465,483
IssuesEvent
2017-10-05 05:54:13
habitat-sh/habitat
https://api.github.com/repos/habitat-sh/habitat
closed
Scrub creds from worker logs
A-builder C-chore E-easy L-rust
We need to strip secure info from any builder logs so that it doesn't inadvertently end up in log aggregation in the future.
1.0
Scrub creds from worker logs - We need to strip secure info from any builder logs so that it doesn't inadvertently end up in log aggregation in the future.
non_priority
scrub creds from worker logs we need to strip secure info from any builder logs so that it doesn t inadvertently end up in log aggregation in the future
0
220,630
16,978,006,948
IssuesEvent
2021-06-30 03:55:14
shandley/hecatomb
https://api.github.com/repos/shandley/hecatomb
closed
How to convert fastq-dumps to R1 /R2
documentation enhancement
Since we use _R1 and _R2 to find mate pairs, here is how to convert fastq-dump output to R1/R2 format ``` for F in *; do O=$(echo $F | sed -e 's/pass_/pass_R/'); echo $F $O; mv $F $O; done ``` We should add this to the wiki
1.0
How to convert fastq-dumps to R1 /R2 - Since we use _R1 and _R2 to find mate pairs, here is how to convert fastq-dump output to R1/R2 format ``` for F in *; do O=$(echo $F | sed -e 's/pass_/pass_R/'); echo $F $O; mv $F $O; done ``` We should add this to the wiki
non_priority
how to convert fastq dumps to since we use and to find mate pairs here is how to convert fastq dump output to format for f in do o echo f sed e s pass pass r echo f o mv f o done we should add this to the wiki
0
445,935
31,388,119,118
IssuesEvent
2023-08-26 02:19:30
vercel/next.js
https://api.github.com/repos/vercel/next.js
closed
Docs: Potentially wrong example (because `export const revalidate` might not work outside special files)
template: documentation
### What is the improvement or update you wish to see? In the documentation page linked below there is this example ```tsx // utils/get-item.ts import { cache } from 'react' export const revalidate = 3600 // revalidate the data at most every hour export const getItem = cache(async (id: string) => { const item = await db.item.findUnique({ id }) return item }) ``` which shows `revalidate` being used in a file that is not a segment file (`page.tsx`, `layout.tsx`, or `route.ts`). Is it intended? Because I feel like this might not work. I haven't tried this example myself, but a user in the Discord server checked and [saw that it didn't work](https://discord.com/channels/752553802359505017/752647196419031042/1142783941632340020): <img width="641" alt="image" src="https://github.com/vercel/next.js/assets/44609036/ebdbecd5-3aa0-4898-b56d-dcc7faff5080"> ### Is there any context that might help us understand? N/A ### Does the docs page already exist? Please link to it. https://nextjs.org/docs/app/building-your-application/data-fetching/fetching-caching-and-revalidating#example
1.0
Docs: Potentially wrong example (because `export const revalidate` might not work outside special files) - ### What is the improvement or update you wish to see? In the documentation page linked below there is this example ```tsx // utils/get-item.ts import { cache } from 'react' export const revalidate = 3600 // revalidate the data at most every hour export const getItem = cache(async (id: string) => { const item = await db.item.findUnique({ id }) return item }) ``` which shows `revalidate` being used in a file that is not a segment file (`page.tsx`, `layout.tsx`, or `route.ts`). Is it intended? Because I feel like this might not work. I haven't tried this example myself, but a user in the Discord server checked and [saw that it didn't work](https://discord.com/channels/752553802359505017/752647196419031042/1142783941632340020): <img width="641" alt="image" src="https://github.com/vercel/next.js/assets/44609036/ebdbecd5-3aa0-4898-b56d-dcc7faff5080"> ### Is there any context that might help us understand? N/A ### Does the docs page already exist? Please link to it. https://nextjs.org/docs/app/building-your-application/data-fetching/fetching-caching-and-revalidating#example
non_priority
docs potentially wrong example because export const revalidate might not work outside special files what is the improvement or update you wish to see in the documentation page linked below there is this example tsx utils get item ts import cache from react export const revalidate revalidate the data at most every hour export const getitem cache async id string const item await db item findunique id return item which shows revalidate being used in a file that is not a segment file page tsx layout tsx or route ts is it intended because i feel like this might not work i haven t tried this example myself but a user in the discord server checked and img width alt image src is there any context that might help us understand n a does the docs page already exist please link to it
0
44,958
18,290,508,627
IssuesEvent
2021-10-05 14:47:58
cityofaustin/atd-data-tech
https://api.github.com/repos/cityofaustin/atd-data-tech
opened
Meeting: Parking Enforcement Sprint Review
Workgroup: PE Service: Apps Service: Product Product: Parking Enterprise Portal
Demo prototype to Parking Enforcement team Parking Enforcement Officers will be entering the new SR's for Parking Meters Non 311 SR's Meeting scheduled for 10/7
2.0
Meeting: Parking Enforcement Sprint Review - Demo prototype to Parking Enforcement team Parking Enforcement Officers will be entering the new SR's for Parking Meters Non 311 SR's Meeting scheduled for 10/7
non_priority
meeting parking enforcement sprint review demo prototype to parking enforcement team parking enforcement officers will be entering the new sr s for parking meters non sr s meeting scheduled for
0
57,570
24,152,764,758
IssuesEvent
2022-09-22 03:42:21
hashicorp/terraform-provider-aws
https://api.github.com/repos/hashicorp/terraform-provider-aws
closed
N/A - Closed
service/route53 needs-triage
### Terraform Core Version 0.13.7 ### AWS Provider Version 4.31.0 ### Affected Resource(s) ``` ``` ### Expected Behavior ### Actual Behavior ``` ``` ### Relevant Error/Panic Output Snippet ### Terraform Configuration Files ### Steps to Reproduce ### Debug Output _No response_ ### Panic Output _No response_ ### Important Factoids ### References _No response_ ### Would you like to implement a fix? _No response_
1.0
N/A - Closed - ### Terraform Core Version 0.13.7 ### AWS Provider Version 4.31.0 ### Affected Resource(s) ``` ``` ### Expected Behavior ### Actual Behavior ``` ``` ### Relevant Error/Panic Output Snippet ### Terraform Configuration Files ### Steps to Reproduce ### Debug Output _No response_ ### Panic Output _No response_ ### Important Factoids ### References _No response_ ### Would you like to implement a fix? _No response_
non_priority
n a closed terraform core version aws provider version affected resource s expected behavior actual behavior relevant error panic output snippet terraform configuration files steps to reproduce debug output no response panic output no response important factoids references no response would you like to implement a fix no response
0
52,902
27,822,278,574
IssuesEvent
2023-03-19 11:27:10
iboB/dynamix
https://api.github.com/repos/iboB/dynamix
opened
Extract `object_mixin_data` management from `object_mutation`
performance
`object::clear_mixin_data` is `noexcept`, but relies on an `noexcept(false)` destructor. It should never throw in the given case, but still the compiler will generate calls to `std::terminate` there. It is possible to create a class `basic_object_mutation` which provides alloc/dealloc/destroy functions for mixin data. I can have a `noexcept` destructor and can be used by both `object_mutation` and `clear_mixin_data`.
True
Extract `object_mixin_data` management from `object_mutation` - `object::clear_mixin_data` is `noexcept`, but relies on an `noexcept(false)` destructor. It should never throw in the given case, but still the compiler will generate calls to `std::terminate` there. It is possible to create a class `basic_object_mutation` which provides alloc/dealloc/destroy functions for mixin data. I can have a `noexcept` destructor and can be used by both `object_mutation` and `clear_mixin_data`.
non_priority
extract object mixin data management from object mutation object clear mixin data is noexcept but relies on an noexcept false destructor it should never throw in the given case but still the compiler will generate calls to std terminate there it is possible to create a class basic object mutation which provides alloc dealloc destroy functions for mixin data i can have a noexcept destructor and can be used by both object mutation and clear mixin data
0
184,083
31,817,046,410
IssuesEvent
2023-09-13 21:22:50
department-of-veterans-affairs/vets-design-system-documentation
https://api.github.com/repos/department-of-veterans-affairs/vets-design-system-documentation
opened
Tokens - Add Hub colors
platform-design-system-team
## Description These color variables need to be added as tokens: $red-70v: #8b1303; $red-60v: #b51d09; $indigo-cool-60: #3f57a6; $red-60: #a23737; $mint-cool-50: #21827f; $orange-warm-50: #bd5727; $green-cool-50: #3e8520; $gold-50: #8e704f; $green-warm-50: #6f7a41; $blue-50: #357ab2; $violet-warm-60: #864381; // Contextual variable names $color-hub-health-care: $indigo-cool-60; $color-hub-education: $mint-cool-50; $color-hub-disability: $red-60; $color-hub-careers: $orange-warm-50; $color-hub-pension: $green-cool-50; $color-hub-housing: $gold-50; $color-hub-life-insurance: $green-warm-50; $color-hub-burials: $blue-50; $color-hub-records: $violet-warm-60; $color-hub-family-member: $color-primary-darker; $color-hub-service-member: $color-primary-darker; ## Tasks - [ ] Add color tokens - [ ] Hand off to development ## Acceptance Criteria - [ ] vets-website is using color token values
1.0
Tokens - Add Hub colors - ## Description These color variables need to be added as tokens: $red-70v: #8b1303; $red-60v: #b51d09; $indigo-cool-60: #3f57a6; $red-60: #a23737; $mint-cool-50: #21827f; $orange-warm-50: #bd5727; $green-cool-50: #3e8520; $gold-50: #8e704f; $green-warm-50: #6f7a41; $blue-50: #357ab2; $violet-warm-60: #864381; // Contextual variable names $color-hub-health-care: $indigo-cool-60; $color-hub-education: $mint-cool-50; $color-hub-disability: $red-60; $color-hub-careers: $orange-warm-50; $color-hub-pension: $green-cool-50; $color-hub-housing: $gold-50; $color-hub-life-insurance: $green-warm-50; $color-hub-burials: $blue-50; $color-hub-records: $violet-warm-60; $color-hub-family-member: $color-primary-darker; $color-hub-service-member: $color-primary-darker; ## Tasks - [ ] Add color tokens - [ ] Hand off to development ## Acceptance Criteria - [ ] vets-website is using color token values
non_priority
tokens add hub colors description these color variables need to be added as tokens red red indigo cool red mint cool orange warm green cool gold green warm blue violet warm contextual variable names color hub health care indigo cool color hub education mint cool color hub disability red color hub careers orange warm color hub pension green cool color hub housing gold color hub life insurance green warm color hub burials blue color hub records violet warm color hub family member color primary darker color hub service member color primary darker tasks add color tokens hand off to development acceptance criteria vets website is using color token values
0
113,090
24,365,683,380
IssuesEvent
2022-10-03 15:00:01
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
opened
topK with counts
unfinished code
**Describe the unexpected behaviour** Similar to #34807, I'd like to query counts for `topK` elements. I checked the source code and Clickhouse's SpaceSaving algorithm implements both the approximate count and error properties that I'm looking for: https://github.com/ClickHouse/ClickHouse/blob/bf574b91547aec799364d032564606feb5a8bf03/src/Common/SpaceSaving.h#L117 but there is only a query function to return the keys themselves: https://github.com/ClickHouse/ClickHouse/blob/778cd76987a8222217f7bf9f0c8fcb692b82b673/src/AggregateFunctions/AggregateFunctionTopK.h#L224 For a complete SpaceSaving `topK` implementation, there should be additional aggregation functions like `topKCounts` and `topKErrors` which return arrays with the count and error properties from the counter vector. I considered the workaround suggested by @UnamedRus, but my elements have high cardinality so creating an additional map with counts is not viable.
1.0
topK with counts - **Describe the unexpected behaviour** Similar to #34807, I'd like to query counts for `topK` elements. I checked the source code and Clickhouse's SpaceSaving algorithm implements both the approximate count and error properties that I'm looking for: https://github.com/ClickHouse/ClickHouse/blob/bf574b91547aec799364d032564606feb5a8bf03/src/Common/SpaceSaving.h#L117 but there is only a query function to return the keys themselves: https://github.com/ClickHouse/ClickHouse/blob/778cd76987a8222217f7bf9f0c8fcb692b82b673/src/AggregateFunctions/AggregateFunctionTopK.h#L224 For a complete SpaceSaving `topK` implementation, there should be additional aggregation functions like `topKCounts` and `topKErrors` which return arrays with the count and error properties from the counter vector. I considered the workaround suggested by @UnamedRus, but my elements have high cardinality so creating an additional map with counts is not viable.
non_priority
topk with counts describe the unexpected behaviour similar to i d like to query counts for topk elements i checked the source code and clickhouse s spacesaving algorithm implements both the approximate count and error properties that i m looking for but there is only a query function to return the keys themselves for a complete spacesaving topk implementation there should be additional aggregation functions like topkcounts and topkerrors which return arrays with the count and error properties from the counter vector i considered the workaround suggested by unamedrus but my elements have high cardinality so creating an additional map with counts is not viable
0
276,145
20,971,163,349
IssuesEvent
2022-03-28 11:30:50
KubOS-Preservation-Group/kubos
https://api.github.com/repos/KubOS-Preservation-Group/kubos
opened
improvements to the docs build process
documentation help wanted
Currently the docs _do_ build, but its not the most ideal setup. heres some things i'd want to do to make the build process better: - [ ] I personally think it might be easier to manage if the builds were done by GH actions instead of CircleCI. We should evaluate how much effort it would take to migrate and what the benefits are to see if this is worth it - [ ] update the version number tagging process. Both `prep_docs.sh` and the circleci config include code to handle auto tagging builds of the docs. Id like to update this process to reflect a versioning strategy where not every commit on main needs to be given its own separate tag (because that's what the commit hashes are for) - [ ] improve the way the docs are generated so that each version is browseable from a menu at the bottom of the sidebar (just like how [other projects](https://leather.readthedocs.io/en/latest/examples.html) using readthedocs do it)
1.0
improvements to the docs build process - Currently the docs _do_ build, but its not the most ideal setup. heres some things i'd want to do to make the build process better: - [ ] I personally think it might be easier to manage if the builds were done by GH actions instead of CircleCI. We should evaluate how much effort it would take to migrate and what the benefits are to see if this is worth it - [ ] update the version number tagging process. Both `prep_docs.sh` and the circleci config include code to handle auto tagging builds of the docs. Id like to update this process to reflect a versioning strategy where not every commit on main needs to be given its own separate tag (because that's what the commit hashes are for) - [ ] improve the way the docs are generated so that each version is browseable from a menu at the bottom of the sidebar (just like how [other projects](https://leather.readthedocs.io/en/latest/examples.html) using readthedocs do it)
non_priority
improvements to the docs build process currently the docs do build but its not the most ideal setup heres some things i d want to do to make the build process better i personally think it might be easier to manage if the builds were done by gh actions instead of circleci we should evaluate how much effort it would take to migrate and what the benefits are to see if this is worth it update the version number tagging process both prep docs sh and the circleci config include code to handle auto tagging builds of the docs id like to update this process to reflect a versioning strategy where not every commit on main needs to be given its own separate tag because that s what the commit hashes are for improve the way the docs are generated so that each version is browseable from a menu at the bottom of the sidebar just like how using readthedocs do it
0
45,250
23,981,602,914
IssuesEvent
2022-09-13 15:27:16
runtimeverification/haskell-backend
https://api.github.com/repos/runtimeverification/haskell-backend
closed
Performance regression in KEVM proofs
investigation performance
[kevm-slow.tar.gz](https://github.com/kframework/kore/files/5452889/kevm-slow.tar.gz) The submitted proof still passes, but it runs 4X slower roughly than it did prior to the function-encoding updates. I'll look at the kore-repl output here and see if some lemmas I expect to be applying are not, but I think it's likely a good idea to also profile the backend in more detail on it as well.
True
Performance regression in KEVM proofs - [kevm-slow.tar.gz](https://github.com/kframework/kore/files/5452889/kevm-slow.tar.gz) The submitted proof still passes, but it runs 4X slower roughly than it did prior to the function-encoding updates. I'll look at the kore-repl output here and see if some lemmas I expect to be applying are not, but I think it's likely a good idea to also profile the backend in more detail on it as well.
non_priority
performance regression in kevm proofs the submitted proof still passes but it runs slower roughly than it did prior to the function encoding updates i ll look at the kore repl output here and see if some lemmas i expect to be applying are not but i think it s likely a good idea to also profile the backend in more detail on it as well
0
185,262
21,785,108,757
IssuesEvent
2022-05-14 02:31:39
iceColdChris/ZodiacWebsite
https://api.github.com/repos/iceColdChris/ZodiacWebsite
closed
CVE-2021-29060 (Medium) detected in color-string-0.3.0.tgz - autoclosed
security vulnerability
## CVE-2021-29060 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>color-string-0.3.0.tgz</b></p></summary> <p>Parser and generator for CSS color strings</p> <p>Library home page: <a href="https://registry.npmjs.org/color-string/-/color-string-0.3.0.tgz">https://registry.npmjs.org/color-string/-/color-string-0.3.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/color-string/package.json</p> <p> Dependency Hierarchy: - react-scripts-1.1.4.tgz (Root Library) - css-loader-0.28.7.tgz - cssnano-3.10.0.tgz - postcss-colormin-2.2.2.tgz - colormin-1.1.2.tgz - color-0.11.4.tgz - :x: **color-string-0.3.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/iceColdChris/ZodiacWebsite/git/commits/0e43f8a8784f998d39b6419534b6a54485225e6e">0e43f8a8784f998d39b6419534b6a54485225e6e</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Color-String version 1.5.5 and below which occurs when the application is provided and checks a crafted invalid HWB string. <p>Publish Date: 2021-06-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29060>CVE-2021-29060</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-257v-vj4p-3w2h">https://github.com/advisories/GHSA-257v-vj4p-3w2h</a></p> <p>Release Date: 2021-06-21</p> <p>Fix Resolution: color-string - 1.5.5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-29060 (Medium) detected in color-string-0.3.0.tgz - autoclosed - ## CVE-2021-29060 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>color-string-0.3.0.tgz</b></p></summary> <p>Parser and generator for CSS color strings</p> <p>Library home page: <a href="https://registry.npmjs.org/color-string/-/color-string-0.3.0.tgz">https://registry.npmjs.org/color-string/-/color-string-0.3.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/color-string/package.json</p> <p> Dependency Hierarchy: - react-scripts-1.1.4.tgz (Root Library) - css-loader-0.28.7.tgz - cssnano-3.10.0.tgz - postcss-colormin-2.2.2.tgz - colormin-1.1.2.tgz - color-0.11.4.tgz - :x: **color-string-0.3.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/iceColdChris/ZodiacWebsite/git/commits/0e43f8a8784f998d39b6419534b6a54485225e6e">0e43f8a8784f998d39b6419534b6a54485225e6e</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Color-String version 1.5.5 and below which occurs when the application is provided and checks a crafted invalid HWB string. <p>Publish Date: 2021-06-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29060>CVE-2021-29060</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-257v-vj4p-3w2h">https://github.com/advisories/GHSA-257v-vj4p-3w2h</a></p> <p>Release Date: 2021-06-21</p> <p>Fix Resolution: color-string - 1.5.5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in color string tgz autoclosed cve medium severity vulnerability vulnerable library color string tgz parser and generator for css color strings library home page a href path to dependency file package json path to vulnerable library node modules color string package json dependency hierarchy react scripts tgz root library css loader tgz cssnano tgz postcss colormin tgz colormin tgz color tgz x color string tgz vulnerable library found in head commit a href vulnerability details a regular expression denial of service redos vulnerability was discovered in color string version and below which occurs when the application is provided and checks a crafted invalid hwb string publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution color string step up your open source security game with whitesource
0
348,326
24,911,324,551
IssuesEvent
2022-10-29 22:21:35
jaamanu/Javascript-Capstone-Project
https://api.github.com/repos/jaamanu/Javascript-Capstone-Project
closed
[4pt] Create feature : add new comment - Student B
documentation
Implement the "add new comment" form on the Comments pop up according to the wireframe: When the user clicks on the "Comment" button, the data is recorded in the Involvement API and the screen is updated.
1.0
[4pt] Create feature : add new comment - Student B - Implement the "add new comment" form on the Comments pop up according to the wireframe: When the user clicks on the "Comment" button, the data is recorded in the Involvement API and the screen is updated.
non_priority
create feature add new comment student b implement the add new comment form on the comments pop up according to the wireframe when the user clicks on the comment button the data is recorded in the involvement api and the screen is updated
0
1,508
6,176,259,620
IssuesEvent
2017-07-01 11:52:44
arduino/Arduino
https://api.github.com/repos/arduino/Arduino
closed
Nano WDT/ResetButton Failure
Architecture: AVR Type: Duplicate
Greetings, I am developing an interrupt driven I/O intensive program using a Nano that crashes after a few days of continuous operation. I have WDT implemented which does not correct the problem nor does pressing the reset button. A power cycle reset is required to get it running again. When it fails the P13 LED flashes quickly and I presume the problem is a loop cycle that is resetting the MPU. As a power cycle reset is needed to get it running again and as the normal reset does not work it is probable that the issue is volatile memory content related. This is a significant issue as it causes the WDT function to fail making any unattended applications (that could fail do to noise glitches or other reasons) insecure. I wonder if a setmem or equivalent statement is needed in the reset boot code to clear all the volatile memory each time there is a reset. If there is already such a statement it would appear it is failing to do the job under certain conditions. For my application I am going to install an external WDT that implements a power off/on cycle as it is apparent, in this case at least, that the internal WDT code cannot be relied upon for this unattended application. tma
1.0
Nano WDT/ResetButton Failure - Greetings, I am developing an interrupt driven I/O intensive program using a Nano that crashes after a few days of continuous operation. I have WDT implemented which does not correct the problem nor does pressing the reset button. A power cycle reset is required to get it running again. When it fails the P13 LED flashes quickly and I presume the problem is a loop cycle that is resetting the MPU. As a power cycle reset is needed to get it running again and as the normal reset does not work it is probable that the issue is volatile memory content related. This is a significant issue as it causes the WDT function to fail making any unattended applications (that could fail do to noise glitches or other reasons) insecure. I wonder if a setmem or equivalent statement is needed in the reset boot code to clear all the volatile memory each time there is a reset. If there is already such a statement it would appear it is failing to do the job under certain conditions. For my application I am going to install an external WDT that implements a power off/on cycle as it is apparent, in this case at least, that the internal WDT code cannot be relied upon for this unattended application. tma
non_priority
nano wdt resetbutton failure greetings i am developing an interrupt driven i o intensive program using a nano that crashes after a few days of continuous operation i have wdt implemented which does not correct the problem nor does pressing the reset button a power cycle reset is required to get it running again when it fails the led flashes quickly and i presume the problem is a loop cycle that is resetting the mpu as a power cycle reset is needed to get it running again and as the normal reset does not work it is probable that the issue is volatile memory content related this is a significant issue as it causes the wdt function to fail making any unattended applications that could fail do to noise glitches or other reasons insecure i wonder if a setmem or equivalent statement is needed in the reset boot code to clear all the volatile memory each time there is a reset if there is already such a statement it would appear it is failing to do the job under certain conditions for my application i am going to install an external wdt that implements a power off on cycle as it is apparent in this case at least that the internal wdt code cannot be relied upon for this unattended application tma
0
121,919
12,137,229,071
IssuesEvent
2020-04-23 15:26:28
blockstack/docs.blockstack
https://api.github.com/repos/blockstack/docs.blockstack
opened
Add integration design guidance to Connect get started
documentation
https://docs.blockstack.org/develop/connect/get-started.html Instructions for how developers should include "Get started" and "Sign in" options on their landing pages and not "Sign in with Blockstack", etc.
1.0
Add integration design guidance to Connect get started - https://docs.blockstack.org/develop/connect/get-started.html Instructions for how developers should include "Get started" and "Sign in" options on their landing pages and not "Sign in with Blockstack", etc.
non_priority
add integration design guidance to connect get started instructions for how developers should include get started and sign in options on their landing pages and not sign in with blockstack etc
0
51,857
27,274,391,536
IssuesEvent
2023-02-23 02:52:12
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
opened
Join in materialized view is 60x slower than in select statement.
performance
**Describe the situation** Seems materialized view with join not working with **FillRightFirst** plan, please loot at the script blew. Thank you for your time. Select statement statistics: `0 rows in set. Elapsed: 0.021 sec. Processed 262.02 thousand rows, 2.10 MB (12.69 million rows/s., 101.50 MB/s.)` Materialized view statistics(a insert statement to source table): `1 row in set. Elapsed: 1.422 sec.` **How to reproduce** 1. Create null table t_null; 2. Create mergetree table t_numbers with 100000000 rows; 3. Execute Select Statement 1 as blow code; 4. Create materialized view with the same query; 5. Insert only 1 record into t_null to trigger materialized view; * Which ClickHouse server version to use ClickHouse client version 22.8.13.20 (official build). Connecting to localhost:9000 as user default. Connected to ClickHouse server version 22.8.13 revision 54460. * Non-default settings, if any None * `CREATE TABLE` statements for all tables involved `CREATE TABLE t_numbers ( `A` UInt64, `B` String ) ENGINE = MergeTree ORDER BY A;` `CREATE TABLE t_null ( `A` UInt64, `B` String ) ENGINE = Null;` `CREATE MATERIALIZED VIEW mv_null ENGINE = MergeTree ORDER BY A AS SELECT null_outer.A, concat(null_outer.B, subquery.B) FROM t_null AS null_outer LEFT JOIN ( SELECT num.A, 'inner' AS B FROM t_numbers AS num INNER JOIN t_null AS null_inner ON num.A = null_inner.A ) AS subquery ON null_outer.A = subquery.A;` * Sample data for all these tables `INSERT INTO t_numbers SELECT number, toString(cityHash64(number)) FROM numbers(100000000)` * Queries to run that lead to slow performance Query 1, which runs very fast! `SELECT null_outer.A, concat(null_outer.B, subquery.B) FROM t_null AS null_outer LEFT JOIN ( SELECT num.A, 'inner' AS B FROM t_numbers AS num INNER JOIN t_null AS null_inner ON num.A = null_inner.A ) AS subquery ON null_outer.A = subquery.A; ` Query 2, which runs very slow! `INSERT INTO t_null VALUES(1, 'insert');` **Expected performance** Statement in materialized view runs as fast as select statement, instead of 67x slow. **Additional context** If we check the plan, clickhouse choose FillRightFirst for both inner and outer join, may be materialized view is not using the same plan? EXPLAIN SELECT null_outer.A, concat(null_outer.B, subquery.B) FROM t_null AS null_outer LEFT JOIN ( SELECT num.A, 'inner' AS B FROM t_numbers AS num INNER JOIN t_null AS null_inner ON num.A = null_inner.A ) AS subquery ON null_outer.A = subquery.A Query id: 0e4c95b7-204e-4922-8d01-414f6ad86758 ┌─explain──────────────────────────────────────────────────────────────────────────────────────────┐ │ Expression ((Projection + Before ORDER BY)) │ │ Join (JOIN **FillRightFirst**) │ │ Expression (Before JOIN) │ │ ReadFromStorage (Null) │ │ Expression ((Joined actions + (Rename joined columns + (Projection + Before ORDER BY)))) │ │ Join (JOIN **FillRightFirst**) │ │ Expression (Before JOIN) │ │ ReadFromMergeTree (rtd.t_numbers) │ │ Expression ((Joined actions + (Rename joined columns + (Projection + Before ORDER BY)))) │ │ ReadFromStorage (Null) │ └──────────────────────────────────────────────────────────────────────────────────────────────────┘
True
Join in materialized view is 60x slower than in select statement. - **Describe the situation** Seems materialized view with join not working with **FillRightFirst** plan, please loot at the script blew. Thank you for your time. Select statement statistics: `0 rows in set. Elapsed: 0.021 sec. Processed 262.02 thousand rows, 2.10 MB (12.69 million rows/s., 101.50 MB/s.)` Materialized view statistics(a insert statement to source table): `1 row in set. Elapsed: 1.422 sec.` **How to reproduce** 1. Create null table t_null; 2. Create mergetree table t_numbers with 100000000 rows; 3. Execute Select Statement 1 as blow code; 4. Create materialized view with the same query; 5. Insert only 1 record into t_null to trigger materialized view; * Which ClickHouse server version to use ClickHouse client version 22.8.13.20 (official build). Connecting to localhost:9000 as user default. Connected to ClickHouse server version 22.8.13 revision 54460. * Non-default settings, if any None * `CREATE TABLE` statements for all tables involved `CREATE TABLE t_numbers ( `A` UInt64, `B` String ) ENGINE = MergeTree ORDER BY A;` `CREATE TABLE t_null ( `A` UInt64, `B` String ) ENGINE = Null;` `CREATE MATERIALIZED VIEW mv_null ENGINE = MergeTree ORDER BY A AS SELECT null_outer.A, concat(null_outer.B, subquery.B) FROM t_null AS null_outer LEFT JOIN ( SELECT num.A, 'inner' AS B FROM t_numbers AS num INNER JOIN t_null AS null_inner ON num.A = null_inner.A ) AS subquery ON null_outer.A = subquery.A;` * Sample data for all these tables `INSERT INTO t_numbers SELECT number, toString(cityHash64(number)) FROM numbers(100000000)` * Queries to run that lead to slow performance Query 1, which runs very fast! `SELECT null_outer.A, concat(null_outer.B, subquery.B) FROM t_null AS null_outer LEFT JOIN ( SELECT num.A, 'inner' AS B FROM t_numbers AS num INNER JOIN t_null AS null_inner ON num.A = null_inner.A ) AS subquery ON null_outer.A = subquery.A; ` Query 2, which runs very slow! `INSERT INTO t_null VALUES(1, 'insert');` **Expected performance** Statement in materialized view runs as fast as select statement, instead of 67x slow. **Additional context** If we check the plan, clickhouse choose FillRightFirst for both inner and outer join, may be materialized view is not using the same plan? EXPLAIN SELECT null_outer.A, concat(null_outer.B, subquery.B) FROM t_null AS null_outer LEFT JOIN ( SELECT num.A, 'inner' AS B FROM t_numbers AS num INNER JOIN t_null AS null_inner ON num.A = null_inner.A ) AS subquery ON null_outer.A = subquery.A Query id: 0e4c95b7-204e-4922-8d01-414f6ad86758 ┌─explain──────────────────────────────────────────────────────────────────────────────────────────┐ │ Expression ((Projection + Before ORDER BY)) │ │ Join (JOIN **FillRightFirst**) │ │ Expression (Before JOIN) │ │ ReadFromStorage (Null) │ │ Expression ((Joined actions + (Rename joined columns + (Projection + Before ORDER BY)))) │ │ Join (JOIN **FillRightFirst**) │ │ Expression (Before JOIN) │ │ ReadFromMergeTree (rtd.t_numbers) │ │ Expression ((Joined actions + (Rename joined columns + (Projection + Before ORDER BY)))) │ │ ReadFromStorage (Null) │ └──────────────────────────────────────────────────────────────────────────────────────────────────┘
non_priority
join in materialized view is slower than in select statement describe the situation seems materialized view with join not working with fillrightfirst plan please loot at the script blew thank you for your time select statement statistics rows in set elapsed sec processed thousand rows mb million rows s mb s materialized view statistics a insert statement to source table row in set elapsed sec how to reproduce create null table t null create mergetree table t numbers with rows execute select statement as blow code create materialized view with the same query insert only record into t null to trigger materialized view which clickhouse server version to use clickhouse client version official build connecting to localhost as user default connected to clickhouse server version revision non default settings if any none create table statements for all tables involved create table t numbers a b string engine mergetree order by a create table t null a b string engine null create materialized view mv null engine mergetree order by a as select null outer a concat null outer b subquery b from t null as null outer left join select num a inner as b from t numbers as num inner join t null as null inner on num a null inner a as subquery on null outer a subquery a sample data for all these tables insert into t numbers select number tostring number from numbers queries to run that lead to slow performance query which runs very fast select null outer a concat null outer b subquery b from t null as null outer left join select num a inner as b from t numbers as num inner join t null as null inner on num a null inner a as subquery on null outer a subquery a query which runs very slow insert into t null values insert expected performance statement in materialized view runs as fast as select statement instead of slow additional context if we check the plan clickhouse choose fillrightfirst for both inner and outer join may be materialized view is not using the same plan explain select null outer a concat null outer b subquery b from t null as null outer left join select num a inner as b from t numbers as num inner join t null as null inner on num a null inner a as subquery on null outer a subquery a query id ┌─explain──────────────────────────────────────────────────────────────────────────────────────────┐ │ expression projection before order by │ │ join join fillrightfirst │ │ expression before join │ │ readfromstorage null │ │ expression joined actions rename joined columns projection before order by │ │ join join fillrightfirst │ │ expression before join │ │ readfrommergetree rtd t numbers │ │ expression joined actions rename joined columns projection before order by │ │ readfromstorage null │ └──────────────────────────────────────────────────────────────────────────────────────────────────┘
0
2,312
5,071,321,222
IssuesEvent
2016-12-26 12:31:59
AdguardTeam/AdguardForAndroid
https://api.github.com/repos/AdguardTeam/AdguardForAndroid
opened
net.probki.geonet doesn't work correctly when Adguard is ON
Compatibility
1475129 Та же проблема, что и в cityguide Адг блокирует загрузку данных (навигационных карт) GeoNet https://play.google.com/store/apps/details?id=net.probki.geonet&hl=ru Мы для этого используем FTP. Вы режете порты которые назначаются клиентам нашими серверами (например 56839, 60182, 52897, 56842 и т.п.).
True
net.probki.geonet doesn't work correctly when Adguard is ON - 1475129 Та же проблема, что и в cityguide Адг блокирует загрузку данных (навигационных карт) GeoNet https://play.google.com/store/apps/details?id=net.probki.geonet&hl=ru Мы для этого используем FTP. Вы режете порты которые назначаются клиентам нашими серверами (например 56839, 60182, 52897, 56842 и т.п.).
non_priority
net probki geonet doesn t work correctly when adguard is on та же проблема что и в cityguide адг блокирует загрузку данных навигационных карт geonet мы для этого используем ftp вы режете порты которые назначаются клиентам нашими серверами например и т п
0
49,352
6,023,363,061
IssuesEvent
2017-06-07 23:51:07
etsy/phan
https://api.github.com/repos/etsy/phan
opened
Check if errors in (possibly different) methods of duplicate classes are reported in the correct files and with the correct FQSENs
tests
tests/multi_test would be a good place to add a test for this. - If this bug is confirmed, see if it's easy to fix it. When the class is being analyzed, it may be given the wrong alternate FQSEN (may not be well tested) (E.g. if a method calls an undefined method)
1.0
Check if errors in (possibly different) methods of duplicate classes are reported in the correct files and with the correct FQSENs - tests/multi_test would be a good place to add a test for this. - If this bug is confirmed, see if it's easy to fix it. When the class is being analyzed, it may be given the wrong alternate FQSEN (may not be well tested) (E.g. if a method calls an undefined method)
non_priority
check if errors in possibly different methods of duplicate classes are reported in the correct files and with the correct fqsens tests multi test would be a good place to add a test for this if this bug is confirmed see if it s easy to fix it when the class is being analyzed it may be given the wrong alternate fqsen may not be well tested e g if a method calls an undefined method
0
164,614
25,994,799,603
IssuesEvent
2022-12-20 10:39:14
elastic/kibana
https://api.github.com/repos/elastic/kibana
opened
[APM] Rename and restructure components for mobile service details page
Team:APM design
In the first iteration, we hide the components not relevant with mobile - https://github.com/elastic/kibana/issues/143498 we kept the following components which are shared with the other services 1. Latency 2. Throughput 3. Failed Transaction rate 4. Dependencies 5. Transactions table **Service overview page** ![Screenshot 2022-12-20 at 10 51 44](https://user-images.githubusercontent.com/3369346/208639259-5e14a7f6-ee1f-4531-862d-190fe762ce2f.png) **Transaction overview page** ![Screenshot 2022-12-20 at 11 32 48](https://user-images.githubusercontent.com/3369346/208646510-41ce6a82-810f-442c-8cbe-e17477e06731.png) Related to: [Figma Design explorations](https://www.figma.com/file/8tTzdCtAgGfmbCciZEq9La/Mobile-APM?node-id=97%3A164583)
1.0
[APM] Rename and restructure components for mobile service details page - In the first iteration, we hide the components not relevant with mobile - https://github.com/elastic/kibana/issues/143498 we kept the following components which are shared with the other services 1. Latency 2. Throughput 3. Failed Transaction rate 4. Dependencies 5. Transactions table **Service overview page** ![Screenshot 2022-12-20 at 10 51 44](https://user-images.githubusercontent.com/3369346/208639259-5e14a7f6-ee1f-4531-862d-190fe762ce2f.png) **Transaction overview page** ![Screenshot 2022-12-20 at 11 32 48](https://user-images.githubusercontent.com/3369346/208646510-41ce6a82-810f-442c-8cbe-e17477e06731.png) Related to: [Figma Design explorations](https://www.figma.com/file/8tTzdCtAgGfmbCciZEq9La/Mobile-APM?node-id=97%3A164583)
non_priority
rename and restructure components for mobile service details page in the first iteration we hide the components not relevant with mobile we kept the following components which are shared with the other services latency throughput failed transaction rate dependencies transactions table service overview page transaction overview page related to
0
103,788
16,609,469,880
IssuesEvent
2021-06-02 09:41:36
NixOS/nixpkgs
https://api.github.com/repos/NixOS/nixpkgs
closed
Vulnerability roundup 100: openvswitch-2.13.0: 1 advisory [7.5]
1.severity: security
[search](https://search.nix.gsc.io/?q=openvswitch&i=fosho&repos=NixOS-nixpkgs), [files](https://github.com/NixOS/nixpkgs/search?utf8=%E2%9C%93&q=openvswitch+in%3Apath&type=Code) * [ ] [CVE-2020-35498](https://nvd.nist.gov/vuln/detail/CVE-2020-35498) CVSSv3=7.5 (nixos-20.09) Scanned versions: nixos-20.09: 12d9950bf47. Cc @kmcopper Cc @netixx
True
Vulnerability roundup 100: openvswitch-2.13.0: 1 advisory [7.5] - [search](https://search.nix.gsc.io/?q=openvswitch&i=fosho&repos=NixOS-nixpkgs), [files](https://github.com/NixOS/nixpkgs/search?utf8=%E2%9C%93&q=openvswitch+in%3Apath&type=Code) * [ ] [CVE-2020-35498](https://nvd.nist.gov/vuln/detail/CVE-2020-35498) CVSSv3=7.5 (nixos-20.09) Scanned versions: nixos-20.09: 12d9950bf47. Cc @kmcopper Cc @netixx
non_priority
vulnerability roundup openvswitch advisory nixos scanned versions nixos cc kmcopper cc netixx
0
188,539
22,046,608,510
IssuesEvent
2022-05-30 02:58:56
sshivananda/ts-sqs-consumer
https://api.github.com/repos/sshivananda/ts-sqs-consumer
closed
CVE-2012-6708 (Medium) detected in jquery-1.7.2.min.js - autoclosed
security vulnerability
## CVE-2012-6708 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js</a></p> <p>Path to dependency file: /tmp/ws-scm/ts-sqs-consumer/node_modules/jmespath/index.html</p> <p>Path to vulnerable library: /ts-sqs-consumer/node_modules/jmespath/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.2.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sshivananda/ts-sqs-consumer/commit/006e2f0ca598fd794e169983361d15d36b764e3e">006e2f0ca598fd794e169983361d15d36b764e3e</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common. <p>Publish Date: 2018-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-6708>CVE-2012-6708</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-6708">https://nvd.nist.gov/vuln/detail/CVE-2012-6708</a></p> <p>Release Date: 2018-01-18</p> <p>Fix Resolution: jQuery - v1.9.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2012-6708 (Medium) detected in jquery-1.7.2.min.js - autoclosed - ## CVE-2012-6708 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js</a></p> <p>Path to dependency file: /tmp/ws-scm/ts-sqs-consumer/node_modules/jmespath/index.html</p> <p>Path to vulnerable library: /ts-sqs-consumer/node_modules/jmespath/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.2.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sshivananda/ts-sqs-consumer/commit/006e2f0ca598fd794e169983361d15d36b764e3e">006e2f0ca598fd794e169983361d15d36b764e3e</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common. <p>Publish Date: 2018-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-6708>CVE-2012-6708</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-6708">https://nvd.nist.gov/vuln/detail/CVE-2012-6708</a></p> <p>Release Date: 2018-01-18</p> <p>Fix Resolution: jQuery - v1.9.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in jquery min js autoclosed cve medium severity vulnerability vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file tmp ws scm ts sqs consumer node modules jmespath index html path to vulnerable library ts sqs consumer node modules jmespath index html dependency hierarchy x jquery min js vulnerable library found in head commit a href vulnerability details jquery before is vulnerable to cross site scripting xss attacks the jquery strinput function does not differentiate selectors from html in a reliable fashion in vulnerable versions jquery determined whether the input was html by looking for the character anywhere in the string giving attackers more flexibility when attempting to construct a malicious payload in fixed versions jquery only deems the input to be html if it explicitly starts with the character limiting exploitability only to attackers who can control the beginning of a string which is far less common publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
213,862
24,022,473,265
IssuesEvent
2022-09-15 08:48:14
sast-automation-dev/easybuggy4sb-25
https://api.github.com/repos/sast-automation-dev/easybuggy4sb-25
opened
google-oauth-client-1.30.3.jar: 4 vulnerabilities (highest severity is: 9.1)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>google-oauth-client-1.30.3.jar</b></p></summary> <p>Google OAuth Client Library for Java. Functionality that works on all supported Java platforms, including Java 7 (or higher) desktop (SE) and web (EE), Android, and Google App Engine.</p> <p>Library home page: <a href="https://github.com/googleapis/google-oauth-java-client">https://github.com/googleapis/google-oauth-java-client</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /itory/com/google/oauth-client/google-oauth-client/1.30.3/google-oauth-client-1.30.3.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-25/commit/5db13b8ddf701e4c247d78eea18c6b360b1687e1">5db13b8ddf701e4c247d78eea18c6b360b1687e1</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2020-7692](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7692) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.1 | google-oauth-client-1.30.3.jar | Direct | 1.31.0 | &#9989; | | [WS-2019-0379](https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | commons-codec-1.10.jar | Transitive | N/A | &#10060; | | [CVE-2020-13956](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13956) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | httpclient-4.5.3.jar | Transitive | 1.31.1 | &#9989; | | [CVE-2020-8908](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8908) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.3 | guava-28.1-android.jar | Transitive | 1.31.2 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7692</summary> ### Vulnerable Library - <b>google-oauth-client-1.30.3.jar</b></p> <p>Google OAuth Client Library for Java. Functionality that works on all supported Java platforms, including Java 7 (or higher) desktop (SE) and web (EE), Android, and Google App Engine.</p> <p>Library home page: <a href="https://github.com/googleapis/google-oauth-java-client">https://github.com/googleapis/google-oauth-java-client</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /itory/com/google/oauth-client/google-oauth-client/1.30.3/google-oauth-client-1.30.3.jar</p> <p> Dependency Hierarchy: - :x: **google-oauth-client-1.30.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-25/commit/5db13b8ddf701e4c247d78eea18c6b360b1687e1">5db13b8ddf701e4c247d78eea18c6b360b1687e1</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0. <p>Publish Date: 2020-07-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7692>CVE-2020-7692</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-07-09</p> <p>Fix Resolution: 1.31.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0379</summary> ### Vulnerable Library - <b>commons-codec-1.10.jar</b></p> <p>The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.</p> <p>Library home page: <a href="http://commons.apache.org/proper/commons-codec/">http://commons.apache.org/proper/commons-codec/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-codec/commons-codec/1.10/commons-codec-1.10.jar</p> <p> Dependency Hierarchy: - google-oauth-client-1.30.3.jar (Root Library) - google-http-client-1.32.1.jar - httpclient-4.5.3.jar - :x: **commons-codec-1.10.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-25/commit/5db13b8ddf701e4c247d78eea18c6b360b1687e1">5db13b8ddf701e4c247d78eea18c6b360b1687e1</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to information disclosure due to Improper Input validation. <p>Publish Date: 2019-05-20 <p>URL: <a href=https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113>WS-2019-0379</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-05-20</p> <p>Fix Resolution: commons-codec:commons-codec:1.13</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-13956</summary> ### Vulnerable Library - <b>httpclient-4.5.3.jar</b></p> <p>Apache HttpComponents Client</p> <p>Library home page: <a href="http://hc.apache.org/httpcomponents-client">http://hc.apache.org/httpcomponents-client</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.3/httpclient-4.5.3.jar</p> <p> Dependency Hierarchy: - google-oauth-client-1.30.3.jar (Root Library) - google-http-client-1.32.1.jar - :x: **httpclient-4.5.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-25/commit/5db13b8ddf701e4c247d78eea18c6b360b1687e1">5db13b8ddf701e4c247d78eea18c6b360b1687e1</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution. <p>Publish Date: 2020-12-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13956>CVE-2020-13956</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-13956">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-13956</a></p> <p>Release Date: 2020-12-02</p> <p>Fix Resolution (org.apache.httpcomponents:httpclient): 4.5.12.redhat-00001</p> <p>Direct dependency fix Resolution (com.google.oauth-client:google-oauth-client): 1.31.1</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2020-8908</summary> ### Vulnerable Library - <b>guava-28.1-android.jar</b></p> <p>Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more.</p> <p>Library home page: <a href="https://github.com/google/guava">https://github.com/google/guava</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/28.1-android/guava-28.1-android.jar</p> <p> Dependency Hierarchy: - google-oauth-client-1.30.3.jar (Root Library) - :x: **guava-28.1-android.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-25/commit/5db13b8ddf701e4c247d78eea18c6b360b1687e1">5db13b8ddf701e4c247d78eea18c6b360b1687e1</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @Deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured. <p>Publish Date: 2020-12-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8908>CVE-2020-8908</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908</a></p> <p>Release Date: 2020-12-10</p> <p>Fix Resolution (com.google.guava:guava): 30.0-android</p> <p>Direct dependency fix Resolution (com.google.oauth-client:google-oauth-client): 1.31.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
True
google-oauth-client-1.30.3.jar: 4 vulnerabilities (highest severity is: 9.1) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>google-oauth-client-1.30.3.jar</b></p></summary> <p>Google OAuth Client Library for Java. Functionality that works on all supported Java platforms, including Java 7 (or higher) desktop (SE) and web (EE), Android, and Google App Engine.</p> <p>Library home page: <a href="https://github.com/googleapis/google-oauth-java-client">https://github.com/googleapis/google-oauth-java-client</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /itory/com/google/oauth-client/google-oauth-client/1.30.3/google-oauth-client-1.30.3.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-25/commit/5db13b8ddf701e4c247d78eea18c6b360b1687e1">5db13b8ddf701e4c247d78eea18c6b360b1687e1</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2020-7692](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7692) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.1 | google-oauth-client-1.30.3.jar | Direct | 1.31.0 | &#9989; | | [WS-2019-0379](https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | commons-codec-1.10.jar | Transitive | N/A | &#10060; | | [CVE-2020-13956](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13956) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | httpclient-4.5.3.jar | Transitive | 1.31.1 | &#9989; | | [CVE-2020-8908](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8908) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.3 | guava-28.1-android.jar | Transitive | 1.31.2 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7692</summary> ### Vulnerable Library - <b>google-oauth-client-1.30.3.jar</b></p> <p>Google OAuth Client Library for Java. Functionality that works on all supported Java platforms, including Java 7 (or higher) desktop (SE) and web (EE), Android, and Google App Engine.</p> <p>Library home page: <a href="https://github.com/googleapis/google-oauth-java-client">https://github.com/googleapis/google-oauth-java-client</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /itory/com/google/oauth-client/google-oauth-client/1.30.3/google-oauth-client-1.30.3.jar</p> <p> Dependency Hierarchy: - :x: **google-oauth-client-1.30.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-25/commit/5db13b8ddf701e4c247d78eea18c6b360b1687e1">5db13b8ddf701e4c247d78eea18c6b360b1687e1</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0. <p>Publish Date: 2020-07-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7692>CVE-2020-7692</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-07-09</p> <p>Fix Resolution: 1.31.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2019-0379</summary> ### Vulnerable Library - <b>commons-codec-1.10.jar</b></p> <p>The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.</p> <p>Library home page: <a href="http://commons.apache.org/proper/commons-codec/">http://commons.apache.org/proper/commons-codec/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-codec/commons-codec/1.10/commons-codec-1.10.jar</p> <p> Dependency Hierarchy: - google-oauth-client-1.30.3.jar (Root Library) - google-http-client-1.32.1.jar - httpclient-4.5.3.jar - :x: **commons-codec-1.10.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-25/commit/5db13b8ddf701e4c247d78eea18c6b360b1687e1">5db13b8ddf701e4c247d78eea18c6b360b1687e1</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to information disclosure due to Improper Input validation. <p>Publish Date: 2019-05-20 <p>URL: <a href=https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113>WS-2019-0379</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-05-20</p> <p>Fix Resolution: commons-codec:commons-codec:1.13</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-13956</summary> ### Vulnerable Library - <b>httpclient-4.5.3.jar</b></p> <p>Apache HttpComponents Client</p> <p>Library home page: <a href="http://hc.apache.org/httpcomponents-client">http://hc.apache.org/httpcomponents-client</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.3/httpclient-4.5.3.jar</p> <p> Dependency Hierarchy: - google-oauth-client-1.30.3.jar (Root Library) - google-http-client-1.32.1.jar - :x: **httpclient-4.5.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-25/commit/5db13b8ddf701e4c247d78eea18c6b360b1687e1">5db13b8ddf701e4c247d78eea18c6b360b1687e1</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution. <p>Publish Date: 2020-12-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13956>CVE-2020-13956</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-13956">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-13956</a></p> <p>Release Date: 2020-12-02</p> <p>Fix Resolution (org.apache.httpcomponents:httpclient): 4.5.12.redhat-00001</p> <p>Direct dependency fix Resolution (com.google.oauth-client:google-oauth-client): 1.31.1</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2020-8908</summary> ### Vulnerable Library - <b>guava-28.1-android.jar</b></p> <p>Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more.</p> <p>Library home page: <a href="https://github.com/google/guava">https://github.com/google/guava</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/28.1-android/guava-28.1-android.jar</p> <p> Dependency Hierarchy: - google-oauth-client-1.30.3.jar (Root Library) - :x: **guava-28.1-android.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy4sb-25/commit/5db13b8ddf701e4c247d78eea18c6b360b1687e1">5db13b8ddf701e4c247d78eea18c6b360b1687e1</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A temp directory creation vulnerability exists in all versions of Guava, allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava API com.google.common.io.Files.createTempDir(). By default, on unix-like systems, the created directory is world-readable (readable by an attacker with access to the system). The method in question has been marked @Deprecated in versions 30.0 and later and should not be used. For Android developers, we recommend choosing a temporary directory API provided by Android, such as context.getCacheDir(). For other Java developers, we recommend migrating to the Java 7 API java.nio.file.Files.createTempDirectory() which explicitly configures permissions of 700, or configuring the Java runtime's java.io.tmpdir system property to point to a location whose permissions are appropriately configured. <p>Publish Date: 2020-12-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8908>CVE-2020-8908</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908</a></p> <p>Release Date: 2020-12-10</p> <p>Fix Resolution (com.google.guava:guava): 30.0-android</p> <p>Direct dependency fix Resolution (com.google.oauth-client:google-oauth-client): 1.31.2</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
non_priority
google oauth client jar vulnerabilities highest severity is vulnerable library google oauth client jar google oauth client library for java functionality that works on all supported java platforms including java or higher desktop se and web ee android and google app engine library home page a href path to dependency file pom xml path to vulnerable library itory com google oauth client google oauth client google oauth client jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high google oauth client jar direct medium commons codec jar transitive n a medium httpclient jar transitive low guava android jar transitive details cve vulnerable library google oauth client jar google oauth client library for java functionality that works on all supported java platforms including java or higher desktop se and web ee android and google app engine library home page a href path to dependency file pom xml path to vulnerable library itory com google oauth client google oauth client google oauth client jar dependency hierarchy x google oauth client jar vulnerable library found in head commit a href found in base branch master vulnerability details pkce support is not implemented in accordance with the rfc for oauth for native apps without the use of pkce the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized an attacker is able to obtain the authorization code using a malicious app on the client side and use it to gain authorization to the protected resource this affects the package com google oauth client google oauth client before publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution rescue worker helmet automatic remediation is available for this issue ws vulnerable library commons codec jar the apache commons codec package contains simple encoder and decoders for various formats such as and hexadecimal in addition to these widely used encoders and decoders the codec package also maintains a collection of phonetic encoding utilities library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons codec commons codec commons codec jar dependency hierarchy google oauth client jar root library google http client jar httpclient jar x commons codec jar vulnerable library found in head commit a href found in base branch master vulnerability details apache commons codec before version “commons codec ” is vulnerable to information disclosure due to improper input validation publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution commons codec commons codec cve vulnerable library httpclient jar apache httpcomponents client library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org apache httpcomponents httpclient httpclient jar dependency hierarchy google oauth client jar root library google http client jar x httpclient jar vulnerable library found in head commit a href found in base branch master vulnerability details apache httpclient versions prior to version and can misinterpret malformed authority component in request uris passed to the library as java net uri object and pick the wrong target host for request execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache httpcomponents httpclient redhat direct dependency fix resolution com google oauth client google oauth client rescue worker helmet automatic remediation is available for this issue cve vulnerable library guava android jar guava is a suite of core and expanded libraries that include utility classes google s collections io classes and much much more library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com google guava guava android guava android jar dependency hierarchy google oauth client jar root library x guava android jar vulnerable library found in head commit a href found in base branch master vulnerability details a temp directory creation vulnerability exists in all versions of guava allowing an attacker with access to the machine to potentially access data in a temporary directory created by the guava api com google common io files createtempdir by default on unix like systems the created directory is world readable readable by an attacker with access to the system the method in question has been marked deprecated in versions and later and should not be used for android developers we recommend choosing a temporary directory api provided by android such as context getcachedir for other java developers we recommend migrating to the java api java nio file files createtempdirectory which explicitly configures permissions of or configuring the java runtime s java io tmpdir system property to point to a location whose permissions are appropriately configured publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com google guava guava android direct dependency fix resolution com google oauth client google oauth client rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
0
14,464
3,402,652,293
IssuesEvent
2015-12-03 01:15:15
grpc/grpc
https://api.github.com/repos/grpc/grpc
opened
ruby ext coverage is broken
coverage ruby test
https://grpc-testing.appspot.com/job/gRPC_coverage/956/HTML_Report/ HTTP ERROR 404 Problem accessing /job/gRPC_coverage/956/HTML_Report/ruby_ext_coverage/index.html. Reason: Not Found
1.0
ruby ext coverage is broken - https://grpc-testing.appspot.com/job/gRPC_coverage/956/HTML_Report/ HTTP ERROR 404 Problem accessing /job/gRPC_coverage/956/HTML_Report/ruby_ext_coverage/index.html. Reason: Not Found
non_priority
ruby ext coverage is broken http error problem accessing job grpc coverage html report ruby ext coverage index html reason not found
0
118,577
11,983,738,216
IssuesEvent
2020-04-07 14:51:52
softmatterlab/Braph-2.0-Matlab
https://api.github.com/repos/softmatterlab/Braph-2.0-Matlab
closed
Document getAvailableSettings in In- Out-GlobalEfficiency
documentation measure
Document getAvailableSettings() in - [x] InGlobalEfficiency - [x] OutGlobalEfficiency - [x] GlobalEfficiency
1.0
Document getAvailableSettings in In- Out-GlobalEfficiency - Document getAvailableSettings() in - [x] InGlobalEfficiency - [x] OutGlobalEfficiency - [x] GlobalEfficiency
non_priority
document getavailablesettings in in out globalefficiency document getavailablesettings in inglobalefficiency outglobalefficiency globalefficiency
0
86,962
15,755,910,584
IssuesEvent
2021-03-31 02:35:54
SmartBear/ready-jira-plugin
https://api.github.com/repos/SmartBear/ready-jira-plugin
opened
CVE-2016-1000345 (Medium) detected in bcprov-jdk14-138.jar
security vulnerability
## CVE-2016-1000345 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bcprov-jdk14-138.jar</b></p></summary> <p>The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. The package is organised so that it contains a light-weight API suitable for use in any environment (including the newly released J2ME) with the additional infrastructure to conform the algorithms to the JCE framework.</p> <p>Library home page: <a href="http://www.bouncycastle.org/java.html">http://www.bouncycastle.org/java.html</a></p> <p>Path to dependency file: ready-jira-plugin/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk14/1.38/bcprov-jdk14-1.38.jar,/home/wss-scanner/.m2/repository/bouncycastle/bcprov-jdk14/138/bcprov-jdk14-138.jar</p> <p> Dependency Hierarchy: - ready-api-soapui-pro-3.5.0.jar (Root Library) - flying-saucer-pdf-9.0.7.jar - itext-2.1.7.jar - bctsp-jdk14-1.38.jar - :x: **bcprov-jdk14-138.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000345>CVE-2016-1000345</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000345">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000345</a></p> <p>Release Date: 2018-06-04</p> <p>Fix Resolution: org.bouncycastle:bcprov-debug-jdk15on:1.56,org.bouncycastle:bcprov-debug-jdk14:1.56,org.bouncycastle:bcprov-ext-jdk14:1.56,org.bouncycastle:bcprov-ext-jdk15on:1.56,org.bouncycastle:bcprov-jdk14:1.56,org.bouncycastle:bcprov-jdk15on:1.56,org.bouncycastle:bcprov-ext-debug-jdk15on:1.56</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"bouncycastle","packageName":"bcprov-jdk14","packageVersion":"138","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.smartbear:ready-api-soapui-pro:3.5.0;org.xhtmlrenderer:flying-saucer-pdf:9.0.7;com.lowagie:itext:2.1.7;org.bouncycastle:bctsp-jdk14:1.38;bouncycastle:bcprov-jdk14:138","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.bouncycastle:bcprov-debug-jdk15on:1.56,org.bouncycastle:bcprov-debug-jdk14:1.56,org.bouncycastle:bcprov-ext-jdk14:1.56,org.bouncycastle:bcprov-ext-jdk15on:1.56,org.bouncycastle:bcprov-jdk14:1.56,org.bouncycastle:bcprov-jdk15on:1.56,org.bouncycastle:bcprov-ext-debug-jdk15on:1.56"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2016-1000345","vulnerabilityDetails":"In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000345","cvss3Severity":"medium","cvss3Score":"5.9","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2016-1000345 (Medium) detected in bcprov-jdk14-138.jar - ## CVE-2016-1000345 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bcprov-jdk14-138.jar</b></p></summary> <p>The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. The package is organised so that it contains a light-weight API suitable for use in any environment (including the newly released J2ME) with the additional infrastructure to conform the algorithms to the JCE framework.</p> <p>Library home page: <a href="http://www.bouncycastle.org/java.html">http://www.bouncycastle.org/java.html</a></p> <p>Path to dependency file: ready-jira-plugin/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk14/1.38/bcprov-jdk14-1.38.jar,/home/wss-scanner/.m2/repository/bouncycastle/bcprov-jdk14/138/bcprov-jdk14-138.jar</p> <p> Dependency Hierarchy: - ready-api-soapui-pro-3.5.0.jar (Root Library) - flying-saucer-pdf-9.0.7.jar - itext-2.1.7.jar - bctsp-jdk14-1.38.jar - :x: **bcprov-jdk14-138.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000345>CVE-2016-1000345</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000345">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000345</a></p> <p>Release Date: 2018-06-04</p> <p>Fix Resolution: org.bouncycastle:bcprov-debug-jdk15on:1.56,org.bouncycastle:bcprov-debug-jdk14:1.56,org.bouncycastle:bcprov-ext-jdk14:1.56,org.bouncycastle:bcprov-ext-jdk15on:1.56,org.bouncycastle:bcprov-jdk14:1.56,org.bouncycastle:bcprov-jdk15on:1.56,org.bouncycastle:bcprov-ext-debug-jdk15on:1.56</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"bouncycastle","packageName":"bcprov-jdk14","packageVersion":"138","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.smartbear:ready-api-soapui-pro:3.5.0;org.xhtmlrenderer:flying-saucer-pdf:9.0.7;com.lowagie:itext:2.1.7;org.bouncycastle:bctsp-jdk14:1.38;bouncycastle:bcprov-jdk14:138","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.bouncycastle:bcprov-debug-jdk15on:1.56,org.bouncycastle:bcprov-debug-jdk14:1.56,org.bouncycastle:bcprov-ext-jdk14:1.56,org.bouncycastle:bcprov-ext-jdk15on:1.56,org.bouncycastle:bcprov-jdk14:1.56,org.bouncycastle:bcprov-jdk15on:1.56,org.bouncycastle:bcprov-ext-debug-jdk15on:1.56"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2016-1000345","vulnerabilityDetails":"In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000345","cvss3Severity":"medium","cvss3Score":"5.9","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in bcprov jar cve medium severity vulnerability vulnerable library bcprov jar the bouncy castle crypto package is a java implementation of cryptographic algorithms the package is organised so that it contains a light weight api suitable for use in any environment including the newly released with the additional infrastructure to conform the algorithms to the jce framework library home page a href path to dependency file ready jira plugin pom xml path to vulnerable library home wss scanner repository org bouncycastle bcprov bcprov jar home wss scanner repository bouncycastle bcprov bcprov jar dependency hierarchy ready api soapui pro jar root library flying saucer pdf jar itext jar bctsp jar x bcprov jar vulnerable library found in base branch master vulnerability details in the bouncy castle jce provider version and earlier the dhies ecies cbc mode vulnerable to padding oracle attack for bc and older in an environment where timings can be easily observed it is possible with enough observations to identify when the decryption is failing due to padding publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org bouncycastle bcprov debug org bouncycastle bcprov debug org bouncycastle bcprov ext org bouncycastle bcprov ext org bouncycastle bcprov org bouncycastle bcprov org bouncycastle bcprov ext debug isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com smartbear ready api soapui pro org xhtmlrenderer flying saucer pdf com lowagie itext org bouncycastle bctsp bouncycastle bcprov isminimumfixversionavailable true minimumfixversion org bouncycastle bcprov debug org bouncycastle bcprov debug org bouncycastle bcprov ext org bouncycastle bcprov ext org bouncycastle bcprov org bouncycastle bcprov org bouncycastle bcprov ext debug basebranches vulnerabilityidentifier cve vulnerabilitydetails in the bouncy castle jce provider version and earlier the dhies ecies cbc mode vulnerable to padding oracle attack for bc and older in an environment where timings can be easily observed it is possible with enough observations to identify when the decryption is failing due to padding vulnerabilityurl
0
97,805
28,505,535,589
IssuesEvent
2023-04-18 21:02:57
sile-typesetter/sile
https://api.github.com/repos/sile-typesetter/sile
closed
v0.14.9 release checklist
builds & releases
- [x] Shuffle any issues being put off to future milestones - [x] Close all issues in current milestone (except this one) - [x] Spring clean - [x] Re-fetch tooling - [x] Configure and build - [x] Pass all tests - [x] Remote CI - [x] Local - [x] Cut release - [x] Push release commit & tag to master - Update website - [x] Copy and post manual, update 'latest' symlink and menu links - [x] Copy changelog and prefix with a summary as a blog post - [x] Tweak summary for gfm and edit into GitHub release notes - Update downstream distro packages - [x] Arch Linux official: [community/sile](https://archlinux.org/packages/community/x86_64/sile/) - [x] Arch Linux AUR: [AUR/sile-luajit](https://aur.archlinux.org/packages/sile-luajit) <!-- – [pull request]() --> - [x] Homebrew: [Formula](https://github.com/Homebrew/homebrew-core/blob/master/Formula/sile.rb) – [pull request](https://github.com/Homebrew/homebrew-core/pull/128136) - [x] NixOS: [nixpkgs](https://github.com/NixOS/nixpkgs/blob/master/pkgs/tools/typesetting/sile/default.nix) – [pull request](https://github.com/NixOS/nixpkgs/pull/225868) – [tracker](https://nixpk.gs/pr-tracker.html?pr=225868) - [x] Drop devel flag from any website examples that were using it - [x] Ubuntu: [ppa](https://launchpad.net/~sile-typesetter/+archive/ubuntu/sile) - [x] Docker Hub: [tags](https://hub.docker.com/repository/docker/siletypesetter/sile/tags) - [x] GHCR: [versions](https://github.com/orgs/sile-typesetter/packages/container/sile/versions) - [x] openSUSE: pinging @Pi-Cla re [specfile](https://build.opensuse.org/package/show/openSUSE%3AFactory/sile) - [x] Fedora: pinging @hegjon re [copr](https://copr.fedorainfracloud.org/coprs/jonny/SILE/) - [ ] NetBSD: pinging @jsonn re [pkgsrc](https://pkgsrc.se/print/sile) - [ ] Void Linux: [pull request](https://github.com/void-linux/void-packages/pull/18306) - [ ] OpenBSD: [mailing list thread](https://marc.info/?t=157907840200001) - Bump downstream projects - [x] [FontProof](https://github.com/sile-typesetter/fontproof) (Docker image base plus CI matrix) - [ ] [CaSILE](https://github.com/sile-typesetter/casile) (check, consider patch release) - [x] Eat cake [![Packaging status](https://repology.org/badge/vertical-allrepos/sile.svg)](https://repology.org/project/sile/versions) [Previous release](https://github.com/sile-typesetter/sile/releases/tag/v0.14.8) (checklist #1677) [This release](https://github.com/sile-typesetter/sile/releases/tag/v0.14.9)
1.0
v0.14.9 release checklist - - [x] Shuffle any issues being put off to future milestones - [x] Close all issues in current milestone (except this one) - [x] Spring clean - [x] Re-fetch tooling - [x] Configure and build - [x] Pass all tests - [x] Remote CI - [x] Local - [x] Cut release - [x] Push release commit & tag to master - Update website - [x] Copy and post manual, update 'latest' symlink and menu links - [x] Copy changelog and prefix with a summary as a blog post - [x] Tweak summary for gfm and edit into GitHub release notes - Update downstream distro packages - [x] Arch Linux official: [community/sile](https://archlinux.org/packages/community/x86_64/sile/) - [x] Arch Linux AUR: [AUR/sile-luajit](https://aur.archlinux.org/packages/sile-luajit) <!-- – [pull request]() --> - [x] Homebrew: [Formula](https://github.com/Homebrew/homebrew-core/blob/master/Formula/sile.rb) – [pull request](https://github.com/Homebrew/homebrew-core/pull/128136) - [x] NixOS: [nixpkgs](https://github.com/NixOS/nixpkgs/blob/master/pkgs/tools/typesetting/sile/default.nix) – [pull request](https://github.com/NixOS/nixpkgs/pull/225868) – [tracker](https://nixpk.gs/pr-tracker.html?pr=225868) - [x] Drop devel flag from any website examples that were using it - [x] Ubuntu: [ppa](https://launchpad.net/~sile-typesetter/+archive/ubuntu/sile) - [x] Docker Hub: [tags](https://hub.docker.com/repository/docker/siletypesetter/sile/tags) - [x] GHCR: [versions](https://github.com/orgs/sile-typesetter/packages/container/sile/versions) - [x] openSUSE: pinging @Pi-Cla re [specfile](https://build.opensuse.org/package/show/openSUSE%3AFactory/sile) - [x] Fedora: pinging @hegjon re [copr](https://copr.fedorainfracloud.org/coprs/jonny/SILE/) - [ ] NetBSD: pinging @jsonn re [pkgsrc](https://pkgsrc.se/print/sile) - [ ] Void Linux: [pull request](https://github.com/void-linux/void-packages/pull/18306) - [ ] OpenBSD: [mailing list thread](https://marc.info/?t=157907840200001) - Bump downstream projects - [x] [FontProof](https://github.com/sile-typesetter/fontproof) (Docker image base plus CI matrix) - [ ] [CaSILE](https://github.com/sile-typesetter/casile) (check, consider patch release) - [x] Eat cake [![Packaging status](https://repology.org/badge/vertical-allrepos/sile.svg)](https://repology.org/project/sile/versions) [Previous release](https://github.com/sile-typesetter/sile/releases/tag/v0.14.8) (checklist #1677) [This release](https://github.com/sile-typesetter/sile/releases/tag/v0.14.9)
non_priority
release checklist shuffle any issues being put off to future milestones close all issues in current milestone except this one spring clean re fetch tooling configure and build pass all tests remote ci local cut release push release commit tag to master update website copy and post manual update latest symlink and menu links copy changelog and prefix with a summary as a blog post tweak summary for gfm and edit into github release notes update downstream distro packages arch linux official arch linux aur homebrew – nixos – – drop devel flag from any website examples that were using it ubuntu docker hub ghcr opensuse pinging pi cla re fedora pinging hegjon re netbsd pinging jsonn re void linux openbsd bump downstream projects docker image base plus ci matrix check consider patch release eat cake checklist
0
246,130
20,824,486,788
IssuesEvent
2022-03-18 19:00:22
ChainSafe/ui-monorepo
https://api.github.com/repos/ChainSafe/ui-monorepo
opened
Add ui test coverage for file copying to share folder
Testing
As described, automate the below scenarios: - User can share a file to a new shared folder and delete original file - User can share a file to a new shared folder and keep original file - User can share a file to existing shared folder and delete original file - User can share a file to existing shared folder and keep original file
1.0
Add ui test coverage for file copying to share folder - As described, automate the below scenarios: - User can share a file to a new shared folder and delete original file - User can share a file to a new shared folder and keep original file - User can share a file to existing shared folder and delete original file - User can share a file to existing shared folder and keep original file
non_priority
add ui test coverage for file copying to share folder as described automate the below scenarios user can share a file to a new shared folder and delete original file user can share a file to a new shared folder and keep original file user can share a file to existing shared folder and delete original file user can share a file to existing shared folder and keep original file
0
138,138
20,360,000,367
IssuesEvent
2022-02-20 14:50:13
plotn/coolreader
https://api.github.com/repos/plotn/coolreader
opened
Убрать непонятное сообщение, появляющееся при старте приложения
system design
Нужно принимать решение за пользователя. Никто, впервые открывший приложение, не поймёт, о чём это. ![image](https://user-images.githubusercontent.com/60091524/154848413-0100b12c-fe56-473c-94bd-04733cc0bb0d.png)
1.0
Убрать непонятное сообщение, появляющееся при старте приложения - Нужно принимать решение за пользователя. Никто, впервые открывший приложение, не поймёт, о чём это. ![image](https://user-images.githubusercontent.com/60091524/154848413-0100b12c-fe56-473c-94bd-04733cc0bb0d.png)
non_priority
убрать непонятное сообщение появляющееся при старте приложения нужно принимать решение за пользователя никто впервые открывший приложение не поймёт о чём это
0