Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
957
labels
stringlengths
4
795
body
stringlengths
1
259k
index
stringclasses
12 values
text_combine
stringlengths
96
259k
label
stringclasses
2 values
text
stringlengths
96
252k
binary_label
int64
0
1
338,079
30,279,303,423
IssuesEvent
2023-07-07 23:56:18
ValveSoftware/steam-for-linux
https://api.github.com/repos/ValveSoftware/steam-for-linux
closed
Chat window displays Hebrew letters in reversed order.
reviewed Steam client localization Need Retest
when Chatting with my friends in Hebrew, the letter order is displayed reversed, for example: instead of seeing אני מסכים איתך you see: ךתיא םיכסמ ינא the only problem is the display, when typing it sends correctly. My friends who tried Steam Linux confirmed it.
1.0
Chat window displays Hebrew letters in reversed order. - when Chatting with my friends in Hebrew, the letter order is displayed reversed, for example: instead of seeing אני מסכים איתך you see: ךתיא םיכסמ ינא the only problem is the display, when typing it sends correctly. My friends who tried Steam Linux confirmed it.
non_priority
chat window displays hebrew letters in reversed order when chatting with my friends in hebrew the letter order is displayed reversed for example instead of seeing אני מסכים איתך you see ךתיא םיכסמ ינא the only problem is the display when typing it sends correctly my friends who tried steam linux confirmed it
0
314,696
23,533,472,180
IssuesEvent
2022-08-19 17:47:32
kevin218/Eureka
https://api.github.com/repos/kevin218/Eureka
closed
Eureka flowchart
documentation enhancement
I think it would be useful to have some kind of flow chart or visual guide to all of the moving pieces in eureka, because there are a lot! It doesn't have to be super fancy, just something that outlines what's done in S1, S2, S3, and what tools are available in S4 and S5.
1.0
Eureka flowchart - I think it would be useful to have some kind of flow chart or visual guide to all of the moving pieces in eureka, because there are a lot! It doesn't have to be super fancy, just something that outlines what's done in S1, S2, S3, and what tools are available in S4 and S5.
non_priority
eureka flowchart i think it would be useful to have some kind of flow chart or visual guide to all of the moving pieces in eureka because there are a lot it doesn t have to be super fancy just something that outlines what s done in and what tools are available in and
0
86,920
8,053,467,311
IssuesEvent
2018-08-01 23:10:48
golang/go
https://api.github.com/repos/golang/go
closed
misc/cgo/testcshared: test failure on Google Pixelbook
NeedsInvestigation Testing
### What version of Go are you using (`go version`)? ``` go version go1.10.3 linux/amd64 ``` ### Does this issue reproduce with the latest release? Yes. ### What operating system and processor architecture are you using (`go env`)? ``` $ go env GOARCH="amd64" GOBIN="" GOCACHE="/home/danielapetruzalek/.cache/go-build" GOEXE="" GOHOSTARCH="amd64" GOHOSTOS="linux" GOOS="linux" GOPATH="/home/danielapetruzalek/go" GORACE="" GOROOT="/usr/local/go" GOTMPDIR="" GOTOOLDIR="/usr/local/go/pkg/tool/linux_amd64" GCCGO="gccgo" CC="gcc" CXX="g++" CGO_ENABLED="1" CGO_CFLAGS="-g -O2" CGO_CPPFLAGS="" CGO_CXXFLAGS="-g -O2" CGO_FFLAGS="-g -O2" CGO_LDFLAGS="-g -O2" PKG_CONFIG="pkg-config" GOGCCFLAGS="-fPIC -m64 -pthread -fmessage-length=0 -fdebug-prefix-map=/tmp/go-build074359831=/tmp/go-build -gno-record-gcc-switches" ``` ### What did you do? ```sh cd go/src ./all.bash ``` ### What did you expect to see? ``` ALL TESTS PASSED ``` ### What did you see instead? ``` ##### ../misc/cgo/testcshared --- FAIL: TestUnexportedSymbols (0.64s) cshared_test.go:353: run: [go build -buildmode=c-shared -installsuffix testcshared -o libgo2.so libgo2] cshared_test.go:367: run: [gcc -fPIC -m64 -pthread -fmessage-length=0 -fdebug-prefix-map=/tmp/go-build783986620=/tmp/go-build -gno-record-gcc-switches -I pkg/linux_amd64_shared -o testp2 main2.c -Wl,--no-as-needed libgo2.so] cshared_test.go:373: run: [./testp2] cshared_test.go:376: # NAN ChangeLog ** FAIL 2018/07/31 23:09:06 Failed: exit status 1 ``` I've tried two other times and the message on the last line (after "cshared_test.go:376") changed all times, suggesting some random values were being read from fd 30. I've tracked this change to the issue #23784 and CL 108537 (https://golang.org/cl/108537). I've recompiled the binaries to use fd 100 like it was originally and I got the tests to pass. I'm testing Go on the new Google Pixelbook and it seems that fd 30 is being used already. I wonder if instead of choosing an arbitrary number we could have a more safe way to select the fd? Or use another technique to run this test?
1.0
misc/cgo/testcshared: test failure on Google Pixelbook - ### What version of Go are you using (`go version`)? ``` go version go1.10.3 linux/amd64 ``` ### Does this issue reproduce with the latest release? Yes. ### What operating system and processor architecture are you using (`go env`)? ``` $ go env GOARCH="amd64" GOBIN="" GOCACHE="/home/danielapetruzalek/.cache/go-build" GOEXE="" GOHOSTARCH="amd64" GOHOSTOS="linux" GOOS="linux" GOPATH="/home/danielapetruzalek/go" GORACE="" GOROOT="/usr/local/go" GOTMPDIR="" GOTOOLDIR="/usr/local/go/pkg/tool/linux_amd64" GCCGO="gccgo" CC="gcc" CXX="g++" CGO_ENABLED="1" CGO_CFLAGS="-g -O2" CGO_CPPFLAGS="" CGO_CXXFLAGS="-g -O2" CGO_FFLAGS="-g -O2" CGO_LDFLAGS="-g -O2" PKG_CONFIG="pkg-config" GOGCCFLAGS="-fPIC -m64 -pthread -fmessage-length=0 -fdebug-prefix-map=/tmp/go-build074359831=/tmp/go-build -gno-record-gcc-switches" ``` ### What did you do? ```sh cd go/src ./all.bash ``` ### What did you expect to see? ``` ALL TESTS PASSED ``` ### What did you see instead? ``` ##### ../misc/cgo/testcshared --- FAIL: TestUnexportedSymbols (0.64s) cshared_test.go:353: run: [go build -buildmode=c-shared -installsuffix testcshared -o libgo2.so libgo2] cshared_test.go:367: run: [gcc -fPIC -m64 -pthread -fmessage-length=0 -fdebug-prefix-map=/tmp/go-build783986620=/tmp/go-build -gno-record-gcc-switches -I pkg/linux_amd64_shared -o testp2 main2.c -Wl,--no-as-needed libgo2.so] cshared_test.go:373: run: [./testp2] cshared_test.go:376: # NAN ChangeLog ** FAIL 2018/07/31 23:09:06 Failed: exit status 1 ``` I've tried two other times and the message on the last line (after "cshared_test.go:376") changed all times, suggesting some random values were being read from fd 30. I've tracked this change to the issue #23784 and CL 108537 (https://golang.org/cl/108537). I've recompiled the binaries to use fd 100 like it was originally and I got the tests to pass. I'm testing Go on the new Google Pixelbook and it seems that fd 30 is being used already. I wonder if instead of choosing an arbitrary number we could have a more safe way to select the fd? Or use another technique to run this test?
non_priority
misc cgo testcshared test failure on google pixelbook what version of go are you using go version go version linux does this issue reproduce with the latest release yes what operating system and processor architecture are you using go env go env goarch gobin gocache home danielapetruzalek cache go build goexe gohostarch gohostos linux goos linux gopath home danielapetruzalek go gorace goroot usr local go gotmpdir gotooldir usr local go pkg tool linux gccgo gccgo cc gcc cxx g cgo enabled cgo cflags g cgo cppflags cgo cxxflags g cgo fflags g cgo ldflags g pkg config pkg config gogccflags fpic pthread fmessage length fdebug prefix map tmp go tmp go build gno record gcc switches what did you do sh cd go src all bash what did you expect to see all tests passed what did you see instead misc cgo testcshared fail testunexportedsymbols cshared test go run cshared test go run cshared test go run cshared test go nan changelog fail failed exit status i ve tried two other times and the message on the last line after cshared test go changed all times suggesting some random values were being read from fd i ve tracked this change to the issue and cl i ve recompiled the binaries to use fd like it was originally and i got the tests to pass i m testing go on the new google pixelbook and it seems that fd is being used already i wonder if instead of choosing an arbitrary number we could have a more safe way to select the fd or use another technique to run this test
0
124,987
17,795,505,657
IssuesEvent
2021-08-31 21:34:16
ghc-dev/Peter-Martinez
https://api.github.com/repos/ghc-dev/Peter-Martinez
opened
CVE-2020-14332 (Medium) detected in ansible-2.9.9.tar.gz
security vulnerability
## CVE-2020-14332 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p></summary> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: Peter-Martinez/requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Peter-Martinez/commit/1c63cb595605e9dc037eb78ecbd48f6ce38a52c2">1c63cb595605e9dc037eb78ecbd48f6ce38a52c2</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality. <p>Publish Date: 2020-09-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14332>CVE-2020-14332</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332</a></p> <p>Release Date: 2020-07-21</p> <p>Fix Resolution: 2.8.14,2.9.12</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"ansible","packageVersion":"2.9.9","packageFilePaths":["/requirements.txt"],"isTransitiveDependency":false,"dependencyTree":"ansible:2.9.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.8.14,2.9.12"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-14332","vulnerabilityDetails":"A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14332","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-14332 (Medium) detected in ansible-2.9.9.tar.gz - ## CVE-2020-14332 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p></summary> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: Peter-Martinez/requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Peter-Martinez/commit/1c63cb595605e9dc037eb78ecbd48f6ce38a52c2">1c63cb595605e9dc037eb78ecbd48f6ce38a52c2</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality. <p>Publish Date: 2020-09-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14332>CVE-2020-14332</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332</a></p> <p>Release Date: 2020-07-21</p> <p>Fix Resolution: 2.8.14,2.9.12</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"ansible","packageVersion":"2.9.9","packageFilePaths":["/requirements.txt"],"isTransitiveDependency":false,"dependencyTree":"ansible:2.9.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.8.14,2.9.12"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-14332","vulnerabilityDetails":"A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14332","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in ansible tar gz cve medium severity vulnerability vulnerable library ansible tar gz radically simple it automation library home page a href path to dependency file peter martinez requirements txt path to vulnerable library requirements txt dependency hierarchy x ansible tar gz vulnerable library found in head commit a href found in base branch master vulnerability details a flaw was found in the ansible engine when using module args tasks executed with check mode check mode do not properly neutralize sensitive data exposed in the event data this flaw allows unauthorized users to read this data the highest threat from this vulnerability is to confidentiality publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree ansible isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails a flaw was found in the ansible engine when using module args tasks executed with check mode check mode do not properly neutralize sensitive data exposed in the event data this flaw allows unauthorized users to read this data the highest threat from this vulnerability is to confidentiality vulnerabilityurl
0
239,230
19,830,258,803
IssuesEvent
2022-01-20 11:12:34
ml-lib/CodeLib
https://api.github.com/repos/ml-lib/CodeLib
opened
[Feature]: Random forest timeseries method
feature tests
### Is your feature request related to a problem? Please describe. Time series method to predict the next n intervals. ### Describe the solution you'd like Add a time series method for building forecasting models with/without exogenous variables using Random forest. ### Expected input(s) ```python df: pandas.DataFrame y_var: List[str] x_var: List[str] method: Union[str] param: Dict ``` ### Expected output(s) ```python fit predict ``` ### Additional context _No response_ ### Acceptance criteria Integration tests: - [ ] Ensure that predictions is not flat after a certain intervals. ### Version v0.4.0
1.0
[Feature]: Random forest timeseries method - ### Is your feature request related to a problem? Please describe. Time series method to predict the next n intervals. ### Describe the solution you'd like Add a time series method for building forecasting models with/without exogenous variables using Random forest. ### Expected input(s) ```python df: pandas.DataFrame y_var: List[str] x_var: List[str] method: Union[str] param: Dict ``` ### Expected output(s) ```python fit predict ``` ### Additional context _No response_ ### Acceptance criteria Integration tests: - [ ] Ensure that predictions is not flat after a certain intervals. ### Version v0.4.0
non_priority
random forest timeseries method is your feature request related to a problem please describe time series method to predict the next n intervals describe the solution you d like add a time series method for building forecasting models with without exogenous variables using random forest expected input s python df pandas dataframe y var list x var list method union param dict expected output s python fit predict additional context no response acceptance criteria integration tests ensure that predictions is not flat after a certain intervals version
0
239,785
26,232,080,894
IssuesEvent
2023-01-05 01:45:09
RG4421/marketplace-sample-apps
https://api.github.com/repos/RG4421/marketplace-sample-apps
opened
CVE-2022-0691 (High) detected in url-parse-1.5.1.tgz
security vulnerability
## CVE-2022-0691 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>url-parse-1.5.1.tgz</b></p></summary> <p>Small footprint URL parser that works seamlessly across Node.js and browser environments</p> <p>Library home page: <a href="https://registry.npmjs.org/url-parse/-/url-parse-1.5.1.tgz">https://registry.npmjs.org/url-parse/-/url-parse-1.5.1.tgz</a></p> <p>Path to dependency file: /Freshworks-Samples/Freshdesk/sample_cti_app/middleware/package.json</p> <p>Path to vulnerable library: /Freshworks-Samples/Freshdesk/sample_cti_app/middleware/node_modules/url-parse/package.json</p> <p> Dependency Hierarchy: - twilio-3.57.0.tgz (Root Library) - :x: **url-parse-1.5.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/RG4421/marketplace-sample-apps/commit/04f99bf65a102dcd5e8ae3d1916dfccdb07addec">04f99bf65a102dcd5e8ae3d1916dfccdb07addec</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9. <p>Publish Date: 2022-02-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-0691>CVE-2022-0691</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0691">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0691</a></p> <p>Release Date: 2022-02-21</p> <p>Fix Resolution (url-parse): 1.5.9</p> <p>Direct dependency fix Resolution (twilio): 3.58.0</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue
True
CVE-2022-0691 (High) detected in url-parse-1.5.1.tgz - ## CVE-2022-0691 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>url-parse-1.5.1.tgz</b></p></summary> <p>Small footprint URL parser that works seamlessly across Node.js and browser environments</p> <p>Library home page: <a href="https://registry.npmjs.org/url-parse/-/url-parse-1.5.1.tgz">https://registry.npmjs.org/url-parse/-/url-parse-1.5.1.tgz</a></p> <p>Path to dependency file: /Freshworks-Samples/Freshdesk/sample_cti_app/middleware/package.json</p> <p>Path to vulnerable library: /Freshworks-Samples/Freshdesk/sample_cti_app/middleware/node_modules/url-parse/package.json</p> <p> Dependency Hierarchy: - twilio-3.57.0.tgz (Root Library) - :x: **url-parse-1.5.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/RG4421/marketplace-sample-apps/commit/04f99bf65a102dcd5e8ae3d1916dfccdb07addec">04f99bf65a102dcd5e8ae3d1916dfccdb07addec</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9. <p>Publish Date: 2022-02-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-0691>CVE-2022-0691</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0691">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0691</a></p> <p>Release Date: 2022-02-21</p> <p>Fix Resolution (url-parse): 1.5.9</p> <p>Direct dependency fix Resolution (twilio): 3.58.0</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue
non_priority
cve high detected in url parse tgz cve high severity vulnerability vulnerable library url parse tgz small footprint url parser that works seamlessly across node js and browser environments library home page a href path to dependency file freshworks samples freshdesk sample cti app middleware package json path to vulnerable library freshworks samples freshdesk sample cti app middleware node modules url parse package json dependency hierarchy twilio tgz root library x url parse tgz vulnerable library found in head commit a href found in base branch master vulnerability details authorization bypass through user controlled key in npm url parse prior to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution url parse direct dependency fix resolution twilio rescue worker helmet automatic remediation is available for this issue
0
11,133
16,487,839,427
IssuesEvent
2021-05-24 20:54:01
slsa-framework/slsa
https://api.github.com/repos/slsa-framework/slsa
opened
Add new level between SLSA 1 and 2?
requirements slsa 1
It would be good to have a very low-barrier-to-entry first level that is basically "Is it signed at all" and perhaps "must be signed in an interoperable format." That is roughly what we have right now. It would be useful to have an intermediate level that says: - Must be generated by the platform. - Must specify top-level sources. SLSA 2 is too high because it requires build isolation, which is much harder to do.
1.0
Add new level between SLSA 1 and 2? - It would be good to have a very low-barrier-to-entry first level that is basically "Is it signed at all" and perhaps "must be signed in an interoperable format." That is roughly what we have right now. It would be useful to have an intermediate level that says: - Must be generated by the platform. - Must specify top-level sources. SLSA 2 is too high because it requires build isolation, which is much harder to do.
non_priority
add new level between slsa and it would be good to have a very low barrier to entry first level that is basically is it signed at all and perhaps must be signed in an interoperable format that is roughly what we have right now it would be useful to have an intermediate level that says must be generated by the platform must specify top level sources slsa is too high because it requires build isolation which is much harder to do
0
18,909
6,656,597,912
IssuesEvent
2017-09-29 21:19:00
EightShapes/esds-build
https://api.github.com/repos/EightShapes/esds-build
opened
Expose hook to set markdown filter wrapper
v1 [Build]
Many projects want to wrap markdown blocks of text in something like `<div class="long-form-text">` A default wrapper can currently be set on an instance-by-instance basis: `{% filter markdown(true) %}` Which wraps the text with: `<div class="esds-markdown-wrap">` but it's inconvenient to add the true flag to each instance and the class should be configurable.
1.0
Expose hook to set markdown filter wrapper - Many projects want to wrap markdown blocks of text in something like `<div class="long-form-text">` A default wrapper can currently be set on an instance-by-instance basis: `{% filter markdown(true) %}` Which wraps the text with: `<div class="esds-markdown-wrap">` but it's inconvenient to add the true flag to each instance and the class should be configurable.
non_priority
expose hook to set markdown filter wrapper many projects want to wrap markdown blocks of text in something like a default wrapper can currently be set on an instance by instance basis filter markdown true which wraps the text with but it s inconvenient to add the true flag to each instance and the class should be configurable
0
60,310
7,330,798,062
IssuesEvent
2018-03-05 11:10:06
Microsoft/AL
https://api.github.com/repos/Microsoft/AL
closed
Groups and actions cannot have the same name
bydesign
Created an Action Group named Resources and then created an Action named Resources under that. That is not possible: ![image](https://user-images.githubusercontent.com/33752561/36944590-3727fcd2-1fa0-11e8-8c5b-39184027638b.png)
1.0
Groups and actions cannot have the same name - Created an Action Group named Resources and then created an Action named Resources under that. That is not possible: ![image](https://user-images.githubusercontent.com/33752561/36944590-3727fcd2-1fa0-11e8-8c5b-39184027638b.png)
non_priority
groups and actions cannot have the same name created an action group named resources and then created an action named resources under that that is not possible
0
128,842
17,627,784,954
IssuesEvent
2021-08-19 01:37:52
outline/outline
https://api.github.com/repos/outline/outline
closed
Team switcher in account menu
enhancement design needed
Functionality-wise this should work the same as the switcher on the marketing website – reading the logged-in teams from the `getoutline.com` cookie and displaying a switcher to change domains.
1.0
Team switcher in account menu - Functionality-wise this should work the same as the switcher on the marketing website – reading the logged-in teams from the `getoutline.com` cookie and displaying a switcher to change domains.
non_priority
team switcher in account menu functionality wise this should work the same as the switcher on the marketing website – reading the logged in teams from the getoutline com cookie and displaying a switcher to change domains
0
4,905
11,828,685,668
IssuesEvent
2020-03-22 08:53:35
mpostol/PO.Common
https://api.github.com/repos/mpostol/PO.Common
closed
ItemDescriber merge the code with `DAServerConfiguration`
Architecture :hammer:
- [ ] move the code to the folder ItemDescriber - [ ] fix references in CommServer.ItemDescriberEditor
1.0
ItemDescriber merge the code with `DAServerConfiguration` - - [ ] move the code to the folder ItemDescriber - [ ] fix references in CommServer.ItemDescriberEditor
non_priority
itemdescriber merge the code with daserverconfiguration move the code to the folder itemdescriber fix references in commserver itemdescribereditor
0
141,011
21,334,315,040
IssuesEvent
2022-04-18 12:48:06
comment-reboot/blog-comments-list
https://api.github.com/repos/comment-reboot/blog-comments-list
opened
Gws使用说明 | 打码匠
Gitalk /post/gws-design-instruction/
https://blog.ibyte.me/post/gws-design-instruction/ Share computer science and technology, Golang, Rust, distributed systems, system design articles.
1.0
Gws使用说明 | 打码匠 - https://blog.ibyte.me/post/gws-design-instruction/ Share computer science and technology, Golang, Rust, distributed systems, system design articles.
non_priority
gws使用说明 打码匠 share computer science and technology golang rust distributed systems system design articles
0
21,712
4,733,990,369
IssuesEvent
2016-10-19 13:02:20
ELVIS-Project/vis-framework
https://api.github.com/repos/ELVIS-Project/vis-framework
closed
WorkflowManager.load() for Many Types
Status: TESTING Status: UNKNOWN Type: DOCUMENTATION Type: ENHANCEMENT
We should allow importing previous results with the ``load()`` method. At minimum, this should be HDF5 and pickle. It must be clear that this won't load the metadata, and that the ``WorkflowManager`` will not make sure you're loading results that correspond to the pieces. But we should check, if the results are piece-by-piece, that they have the right number of pieces. While we're at it, make ``'pieces'`` the default instruction.
1.0
WorkflowManager.load() for Many Types - We should allow importing previous results with the ``load()`` method. At minimum, this should be HDF5 and pickle. It must be clear that this won't load the metadata, and that the ``WorkflowManager`` will not make sure you're loading results that correspond to the pieces. But we should check, if the results are piece-by-piece, that they have the right number of pieces. While we're at it, make ``'pieces'`` the default instruction.
non_priority
workflowmanager load for many types we should allow importing previous results with the load method at minimum this should be and pickle it must be clear that this won t load the metadata and that the workflowmanager will not make sure you re loading results that correspond to the pieces but we should check if the results are piece by piece that they have the right number of pieces while we re at it make pieces the default instruction
0
104,496
11,412,299,435
IssuesEvent
2020-02-01 12:15:16
squadcastHQ/squadcast-support
https://api.github.com/repos/squadcastHQ/squadcast-support
closed
Add Custom Certificate for Status Pages
documentation
**Is your feature request related to a problem you are facing? Please describe.** The current status pages use the statuspage.io certificate which causes a browser warning on CNAME entry **Describe the ideal solution that could solve this problem for you** Provide the ability to provide our own ssl certificate or automatically generate one using something like Let's Encrypt **What alternatives did you consider?** None. Reverse proxy will not work for subscription notifications **Additional Context** None
1.0
Add Custom Certificate for Status Pages - **Is your feature request related to a problem you are facing? Please describe.** The current status pages use the statuspage.io certificate which causes a browser warning on CNAME entry **Describe the ideal solution that could solve this problem for you** Provide the ability to provide our own ssl certificate or automatically generate one using something like Let's Encrypt **What alternatives did you consider?** None. Reverse proxy will not work for subscription notifications **Additional Context** None
non_priority
add custom certificate for status pages is your feature request related to a problem you are facing please describe the current status pages use the statuspage io certificate which causes a browser warning on cname entry describe the ideal solution that could solve this problem for you provide the ability to provide our own ssl certificate or automatically generate one using something like let s encrypt what alternatives did you consider none reverse proxy will not work for subscription notifications additional context none
0
99,709
21,030,469,469
IssuesEvent
2022-03-31 00:25:58
withfig/fig
https://api.github.com/repos/withfig/fig
opened
Feels weird when used with default autocomplete
codebase:autocomplete-app type:usability
> The conflicting ui presence of both zsh’s autocompletes and figs felt off. I agree with this - after disabling shell autocomplete entirely, Fig _feels_ way better. Possibly solutions: * Prompt to disable autocomplete - hard to implement, wouldn't come across well * Prompt to enable only-show-on-tab - should implement #995 first
1.0
Feels weird when used with default autocomplete - > The conflicting ui presence of both zsh’s autocompletes and figs felt off. I agree with this - after disabling shell autocomplete entirely, Fig _feels_ way better. Possibly solutions: * Prompt to disable autocomplete - hard to implement, wouldn't come across well * Prompt to enable only-show-on-tab - should implement #995 first
non_priority
feels weird when used with default autocomplete the conflicting ui presence of both zsh’s autocompletes and figs felt off i agree with this after disabling shell autocomplete entirely fig feels way better possibly solutions prompt to disable autocomplete hard to implement wouldn t come across well prompt to enable only show on tab should implement first
0
265,089
23,146,434,353
IssuesEvent
2022-07-29 01:42:28
MPMG-DCC-UFMG/F01
https://api.github.com/repos/MPMG-DCC-UFMG/F01
closed
Teste de generalizacao para a tag Servidores - Proventos de pensão - Várzea da Palma
generalization test development template-Síntese tecnologia informatica subtag-Proventos de Pensão tag-Servidores
DoD: Realizar o teste de Generalização do validador da tag Servidores - Proventos de pensão para o Município de Várzea da Palma.
1.0
Teste de generalizacao para a tag Servidores - Proventos de pensão - Várzea da Palma - DoD: Realizar o teste de Generalização do validador da tag Servidores - Proventos de pensão para o Município de Várzea da Palma.
non_priority
teste de generalizacao para a tag servidores proventos de pensão várzea da palma dod realizar o teste de generalização do validador da tag servidores proventos de pensão para o município de várzea da palma
0
83,637
10,333,231,941
IssuesEvent
2019-09-03 04:19:46
fga-desenho-2019-2/Wiki
https://api.github.com/repos/fga-desenho-2019-2/Wiki
closed
Síntese dos requisitos elicitados
Elicitação depende de outra issue documentation
## Síntese dos requisitos elicitados ## Descrição da Issue Realizar a síntese dos requisitos elicitados e reunir os mais viáveis. ### Tasks: - [x] Realizar a síntese dos requisitos; - [x] Notificar a equipe para selecionar os requisitos viáveis; - [x] Documentar para colocar no backlog. ### Relacionada às issue: #28 #29 #30 #31 #32 #33
1.0
Síntese dos requisitos elicitados - ## Síntese dos requisitos elicitados ## Descrição da Issue Realizar a síntese dos requisitos elicitados e reunir os mais viáveis. ### Tasks: - [x] Realizar a síntese dos requisitos; - [x] Notificar a equipe para selecionar os requisitos viáveis; - [x] Documentar para colocar no backlog. ### Relacionada às issue: #28 #29 #30 #31 #32 #33
non_priority
síntese dos requisitos elicitados síntese dos requisitos elicitados descrição da issue realizar a síntese dos requisitos elicitados e reunir os mais viáveis tasks realizar a síntese dos requisitos notificar a equipe para selecionar os requisitos viáveis documentar para colocar no backlog relacionada às issue
0
345,625
30,828,196,577
IssuesEvent
2023-08-01 22:05:50
elastic/elasticsearch
https://api.github.com/repos/elastic/elasticsearch
opened
[CI] QueryPhaseTests testTerminateAfterEarlyTermination failing
>test-failure Team:Search
This test was removed from `main` here: https://github.com/elastic/elasticsearch/pull/96889/files#diff-fa29efb3d0d151af522aeb021b5f331ac53f64a0033daf639360943425808d1dL351 However, 8.8 is failing. Were changes introduced that were back-ported, breaking this test? **Build scan:** https://gradle-enterprise.elastic.co/s/6fljliuz3xbxw/tests/:server:test/org.elasticsearch.search.query.QueryPhaseTests/testTerminateAfterEarlyTermination **Reproduction line:** ``` ./gradlew ':server:test' --tests "org.elasticsearch.search.query.QueryPhaseTests.testTerminateAfterEarlyTermination" -Dtests.seed=F849236E04A9265D -Dtests.locale=en-SG -Dtests.timezone=MIT -Druntime.java=17 ``` **Applicable branches:** 8.9 **Reproduces locally?:** Yes **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.search.query.QueryPhaseTests&tests.test=testTerminateAfterEarlyTermination **Failure excerpt:** ``` java.lang.AssertionError: Expected: <1L> but: was <5L> at __randomizedtesting.SeedInfo.seed([F849236E04A9265D:6EED9AF90D9B5A34]:0) at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18) at org.junit.Assert.assertThat(Assert.java:956) at org.junit.Assert.assertThat(Assert.java:923) at org.elasticsearch.search.query.QueryPhaseTests.testTerminateAfterEarlyTermination(QueryPhaseTests.java:400) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48) at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850) at java.lang.Thread.run(Thread.java:833) ```
1.0
[CI] QueryPhaseTests testTerminateAfterEarlyTermination failing - This test was removed from `main` here: https://github.com/elastic/elasticsearch/pull/96889/files#diff-fa29efb3d0d151af522aeb021b5f331ac53f64a0033daf639360943425808d1dL351 However, 8.8 is failing. Were changes introduced that were back-ported, breaking this test? **Build scan:** https://gradle-enterprise.elastic.co/s/6fljliuz3xbxw/tests/:server:test/org.elasticsearch.search.query.QueryPhaseTests/testTerminateAfterEarlyTermination **Reproduction line:** ``` ./gradlew ':server:test' --tests "org.elasticsearch.search.query.QueryPhaseTests.testTerminateAfterEarlyTermination" -Dtests.seed=F849236E04A9265D -Dtests.locale=en-SG -Dtests.timezone=MIT -Druntime.java=17 ``` **Applicable branches:** 8.9 **Reproduces locally?:** Yes **Failure history:** https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.search.query.QueryPhaseTests&tests.test=testTerminateAfterEarlyTermination **Failure excerpt:** ``` java.lang.AssertionError: Expected: <1L> but: was <5L> at __randomizedtesting.SeedInfo.seed([F849236E04A9265D:6EED9AF90D9B5A34]:0) at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18) at org.junit.Assert.assertThat(Assert.java:956) at org.junit.Assert.assertThat(Assert.java:923) at org.elasticsearch.search.query.QueryPhaseTests.testTerminateAfterEarlyTermination(QueryPhaseTests.java:400) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2) at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:568) at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758) at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946) at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982) at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48) at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45) at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390) at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843) at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490) at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955) at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840) at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891) at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902) at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53) at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43) at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44) at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60) at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47) at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36) at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390) at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850) at java.lang.Thread.run(Thread.java:833) ```
non_priority
queryphasetests testterminateafterearlytermination failing this test was removed from main here however is failing were changes introduced that were back ported breaking this test build scan reproduction line gradlew server test tests org elasticsearch search query queryphasetests testterminateafterearlytermination dtests seed dtests locale en sg dtests timezone mit druntime java applicable branches reproduces locally yes failure history failure excerpt java lang assertionerror expected but was at randomizedtesting seedinfo seed at org hamcrest matcherassert assertthat matcherassert java at org junit assert assertthat assert java at org junit assert assertthat assert java at org elasticsearch search query queryphasetests testterminateafterearlytermination queryphasetests java at jdk internal reflect nativemethodaccessorimpl nativemethodaccessorimpl java at jdk internal reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at jdk internal reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at com carrotsearch randomizedtesting randomizedrunner invoke randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testrulesetupteardownchained evaluate testrulesetupteardownchained java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at org apache lucene tests util testrulethreadandtestname evaluate testrulethreadandtestname java at org apache lucene tests util testruleignoreaftermaxfailures evaluate testruleignoreaftermaxfailures java at org apache lucene tests util testrulemarkfailure evaluate testrulemarkfailure java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting threadleakcontrol statementrunner run threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol forktimeoutingtask threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol evaluate threadleakcontrol java at com carrotsearch randomizedtesting randomizedrunner runsingletest randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testrulestoreclassname evaluate testrulestoreclassname java at com carrotsearch randomizedtesting rules noshadowingoroverridesonmethodsrule evaluate noshadowingoroverridesonmethodsrule java at com carrotsearch randomizedtesting rules noshadowingoroverridesonmethodsrule evaluate noshadowingoroverridesonmethodsrule java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testruleassertionsrequired evaluate testruleassertionsrequired java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at org apache lucene tests util testrulemarkfailure evaluate testrulemarkfailure java at org apache lucene tests util testruleignoreaftermaxfailures evaluate testruleignoreaftermaxfailures java at org apache lucene tests util testruleignoretestsuites evaluate testruleignoretestsuites java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting threadleakcontrol statementrunner run threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol lambda forktimeoutingtask threadleakcontrol java at java lang thread run thread java
0
150,849
19,634,016,695
IssuesEvent
2022-01-08 01:11:24
TreyM-WSS/concord
https://api.github.com/repos/TreyM-WSS/concord
opened
CVE-2022-0122 (Medium) detected in node-forge-0.9.0.tgz
security vulnerability
## CVE-2022-0122 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.9.0.tgz</b></p></summary> <p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz</a></p> <p>Path to dependency file: /console2/package.json</p> <p>Path to vulnerable library: /console2/node_modules/node-forge/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.4.1.tgz (Root Library) - webpack-dev-server-3.10.3.tgz - selfsigned-1.10.7.tgz - :x: **node-forge-0.9.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> forge is vulnerable to URL Redirection to Untrusted Site <p>Publish Date: 2022-01-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0122>CVE-2022-0122</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/">https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/</a></p> <p>Release Date: 2022-01-06</p> <p>Fix Resolution: forge - v1.0.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"node-forge","packageVersion":"0.9.0","packageFilePaths":["/console2/package.json"],"isTransitiveDependency":true,"dependencyTree":"react-scripts:3.4.1;webpack-dev-server:3.10.3;selfsigned:1.10.7;node-forge:0.9.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"forge - v1.0.0","isBinary":false}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2022-0122","vulnerabilityDetails":"forge is vulnerable to URL Redirection to Untrusted Site","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0122","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2022-0122 (Medium) detected in node-forge-0.9.0.tgz - ## CVE-2022-0122 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.9.0.tgz</b></p></summary> <p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz</a></p> <p>Path to dependency file: /console2/package.json</p> <p>Path to vulnerable library: /console2/node_modules/node-forge/package.json</p> <p> Dependency Hierarchy: - react-scripts-3.4.1.tgz (Root Library) - webpack-dev-server-3.10.3.tgz - selfsigned-1.10.7.tgz - :x: **node-forge-0.9.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> forge is vulnerable to URL Redirection to Untrusted Site <p>Publish Date: 2022-01-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0122>CVE-2022-0122</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/">https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/</a></p> <p>Release Date: 2022-01-06</p> <p>Fix Resolution: forge - v1.0.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"node-forge","packageVersion":"0.9.0","packageFilePaths":["/console2/package.json"],"isTransitiveDependency":true,"dependencyTree":"react-scripts:3.4.1;webpack-dev-server:3.10.3;selfsigned:1.10.7;node-forge:0.9.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"forge - v1.0.0","isBinary":false}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2022-0122","vulnerabilityDetails":"forge is vulnerable to URL Redirection to Untrusted Site","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0122","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in node forge tgz cve medium severity vulnerability vulnerable library node forge tgz javascript implementations of network transports cryptography ciphers pki message digests and various utilities library home page a href path to dependency file package json path to vulnerable library node modules node forge package json dependency hierarchy react scripts tgz root library webpack dev server tgz selfsigned tgz x node forge tgz vulnerable library vulnerability details forge is vulnerable to url redirection to untrusted site publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution forge isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree react scripts webpack dev server selfsigned node forge isminimumfixversionavailable true minimumfixversion forge isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails forge is vulnerable to url redirection to untrusted site vulnerabilityurl
0
448,093
31,766,771,616
IssuesEvent
2023-09-12 09:15:00
SpikeInterface/probeinterface
https://api.github.com/repos/SpikeInterface/probeinterface
closed
Add list of common adapter connectors and headstages available to probe.wiring_to_device in the documentation
documentation
Hi, I'd like to use `probe.wiring_to_device` to map the channel indices. The [documentation](https://probeinterface.readthedocs.io/en/main/examples/ex_11_automatic_wiring.html) does not list what adapters and headstages are available. Would it be possible to add that list to the documentation? Thanks
1.0
Add list of common adapter connectors and headstages available to probe.wiring_to_device in the documentation - Hi, I'd like to use `probe.wiring_to_device` to map the channel indices. The [documentation](https://probeinterface.readthedocs.io/en/main/examples/ex_11_automatic_wiring.html) does not list what adapters and headstages are available. Would it be possible to add that list to the documentation? Thanks
non_priority
add list of common adapter connectors and headstages available to probe wiring to device in the documentation hi i d like to use probe wiring to device to map the channel indices the does not list what adapters and headstages are available would it be possible to add that list to the documentation thanks
0
136,096
19,704,495,713
IssuesEvent
2022-01-12 20:15:45
quantumlib/Cirq
https://api.github.com/repos/quantumlib/Cirq
opened
Is there a use case for StateVectorStepResult.set_state()
kind/design-issue
**Is your design idea/issue related to a use case or problem? Please describe.** `StateVectorStepResult.set_state()` and `DensityMatrixStepResult.set_state()` allow replacing the running simulation state with a new one. This ends up requiring a fair amount of code overhead to maintain. But I'm not sure this if this is a useful function, as it seems a user could just start a new simulation on the remaining circuit and the existing state. I'm guessing this function is just an artifact of an old design. If so, I think we should remove it. **Describe your design idea/issue** Deprecate this function, take advantage of cleanups it allows (StateVectorStepResult would no longer have to contain a simulator. SimulatorBase.core_iterator should no longer have to set sim_state after yielding the step result).
1.0
Is there a use case for StateVectorStepResult.set_state() - **Is your design idea/issue related to a use case or problem? Please describe.** `StateVectorStepResult.set_state()` and `DensityMatrixStepResult.set_state()` allow replacing the running simulation state with a new one. This ends up requiring a fair amount of code overhead to maintain. But I'm not sure this if this is a useful function, as it seems a user could just start a new simulation on the remaining circuit and the existing state. I'm guessing this function is just an artifact of an old design. If so, I think we should remove it. **Describe your design idea/issue** Deprecate this function, take advantage of cleanups it allows (StateVectorStepResult would no longer have to contain a simulator. SimulatorBase.core_iterator should no longer have to set sim_state after yielding the step result).
non_priority
is there a use case for statevectorstepresult set state is your design idea issue related to a use case or problem please describe statevectorstepresult set state and densitymatrixstepresult set state allow replacing the running simulation state with a new one this ends up requiring a fair amount of code overhead to maintain but i m not sure this if this is a useful function as it seems a user could just start a new simulation on the remaining circuit and the existing state i m guessing this function is just an artifact of an old design if so i think we should remove it describe your design idea issue deprecate this function take advantage of cleanups it allows statevectorstepresult would no longer have to contain a simulator simulatorbase core iterator should no longer have to set sim state after yielding the step result
0
51,858
6,552,804,772
IssuesEvent
2017-09-05 19:50:11
unicef/etools-issues
https://api.github.com/repos/unicef/etools-issues
opened
Reference numbers get truncated
bug PD/SSFA TOR PMP PMP-Redesign
It seems that wherever there are legacy PCA numbers that are long, the PD number gets truncated. example (from Jordan - NORWEGIAN REFUGEE COUNCIL. PCA: NRC PCA 06 (2013-2017) PD: NRC PCA 06 (2013/SHPD2017145 I would expect that the PD ref number is: NRC PCA 06 (2013-2017)/SHPD2017145
1.0
Reference numbers get truncated - It seems that wherever there are legacy PCA numbers that are long, the PD number gets truncated. example (from Jordan - NORWEGIAN REFUGEE COUNCIL. PCA: NRC PCA 06 (2013-2017) PD: NRC PCA 06 (2013/SHPD2017145 I would expect that the PD ref number is: NRC PCA 06 (2013-2017)/SHPD2017145
non_priority
reference numbers get truncated it seems that wherever there are legacy pca numbers that are long the pd number gets truncated example from jordan norwegian refugee council pca nrc pca pd nrc pca i would expect that the pd ref number is nrc pca
0
147,839
19,525,912,511
IssuesEvent
2021-12-30 07:41:31
devopsadmin12/Demo-WebGoat
https://api.github.com/repos/devopsadmin12/Demo-WebGoat
opened
CVE-2020-36187 (High) detected in jackson-databind-2.0.4.jar
security vulnerability
## CVE-2020-36187 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.0.4.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /pository/com/fasterxml/jackson/core/jackson-databind/2.0.4/jackson-databind-2.0.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.0.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/devopsadmin12/Demo-WebGoat/commit/33d44d74e792bca0b99107b33bb318711d68de4c">33d44d74e792bca0b99107b33bb318711d68de4c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource. <p>Publish Date: 2021-01-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187>CVE-2020-36187</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2997">https://github.com/FasterXML/jackson-databind/issues/2997</a></p> <p>Release Date: 2021-01-06</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-36187 (High) detected in jackson-databind-2.0.4.jar - ## CVE-2020-36187 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.0.4.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /pository/com/fasterxml/jackson/core/jackson-databind/2.0.4/jackson-databind-2.0.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.0.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/devopsadmin12/Demo-WebGoat/commit/33d44d74e792bca0b99107b33bb318711d68de4c">33d44d74e792bca0b99107b33bb318711d68de4c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource. <p>Publish Date: 2021-01-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187>CVE-2020-36187</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2997">https://github.com/FasterXML/jackson-databind/issues/2997</a></p> <p>Release Date: 2021-01-06</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api path to dependency file pom xml path to vulnerable library pository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp dbcp datasources sharedpooldatasource publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
0
259,709
19,618,437,974
IssuesEvent
2022-01-07 01:04:32
barbushin/php-imap
https://api.github.com/repos/barbushin/php-imap
closed
getListingFolders and uidvalidity
question documentation
Hi, I tried to use `getListingFolders` of the 'Mailbox' class which calls `listOfMailboxes` of the 'Imap' class which in turn uses the `imap_list` function which returns a simple list of paths and not the properties described in the function (messages, recent , unseen, uidnext, and uidvalidity). So I think the function should be changed or the description corrected. ```php array:5 [▼ 0 => "{in.postassl.it:993/imap/ssl}INBOX" 1 => "{in.postassl.it:993/imap/ssl}INBOX.Sent" 2 => "{in.postassl.it:993/imap/ssl}INBOX.Drafts" 3 => "{in.postassl.it:993/imap/ssl}INBOX.Trash" 4 => "{in.postassl.it:993/imap/ssl}INBOX.Spam" ] ``` The only way I have found to get the uidvalidity is to use the 'statusMailbox' function after changing folder: ```php $mailboxes = $this->mailbox->getMailboxes(); foreach ($mailboxes as $mailbox) { $this->mailbox->switchMailbox($mailbox['fullpath']); $status = $this->mailbox->statusMailbox(); echo $status->uidvalidity; } ``` However, this step is very slow and in the presence of many folders is not ideal. Why do I need uidvalidity? Because I think the only way to get the uniqueness of an email is to combine the 3 fields folder_name + folder_uidvalidity + email_uid. So my questions are: - is there a faster way to get the uidvalidity of the folder? - is there another combination to obtain the uniqueness of an email (at the moment I use message_id which however does not seem to be always present and unique on a global level)? Thanks Alessandro
1.0
getListingFolders and uidvalidity - Hi, I tried to use `getListingFolders` of the 'Mailbox' class which calls `listOfMailboxes` of the 'Imap' class which in turn uses the `imap_list` function which returns a simple list of paths and not the properties described in the function (messages, recent , unseen, uidnext, and uidvalidity). So I think the function should be changed or the description corrected. ```php array:5 [▼ 0 => "{in.postassl.it:993/imap/ssl}INBOX" 1 => "{in.postassl.it:993/imap/ssl}INBOX.Sent" 2 => "{in.postassl.it:993/imap/ssl}INBOX.Drafts" 3 => "{in.postassl.it:993/imap/ssl}INBOX.Trash" 4 => "{in.postassl.it:993/imap/ssl}INBOX.Spam" ] ``` The only way I have found to get the uidvalidity is to use the 'statusMailbox' function after changing folder: ```php $mailboxes = $this->mailbox->getMailboxes(); foreach ($mailboxes as $mailbox) { $this->mailbox->switchMailbox($mailbox['fullpath']); $status = $this->mailbox->statusMailbox(); echo $status->uidvalidity; } ``` However, this step is very slow and in the presence of many folders is not ideal. Why do I need uidvalidity? Because I think the only way to get the uniqueness of an email is to combine the 3 fields folder_name + folder_uidvalidity + email_uid. So my questions are: - is there a faster way to get the uidvalidity of the folder? - is there another combination to obtain the uniqueness of an email (at the moment I use message_id which however does not seem to be always present and unique on a global level)? Thanks Alessandro
non_priority
getlistingfolders and uidvalidity hi i tried to use getlistingfolders of the mailbox class which calls listofmailboxes of the imap class which in turn uses the imap list function which returns a simple list of paths and not the properties described in the function messages recent unseen uidnext and uidvalidity so i think the function should be changed or the description corrected php array ▼ in postassl it imap ssl inbox in postassl it imap ssl inbox sent in postassl it imap ssl inbox drafts in postassl it imap ssl inbox trash in postassl it imap ssl inbox spam the only way i have found to get the uidvalidity is to use the statusmailbox function after changing folder php mailboxes this mailbox getmailboxes foreach mailboxes as mailbox this mailbox switchmailbox mailbox status this mailbox statusmailbox echo status uidvalidity however this step is very slow and in the presence of many folders is not ideal why do i need uidvalidity because i think the only way to get the uniqueness of an email is to combine the fields folder name folder uidvalidity email uid so my questions are is there a faster way to get the uidvalidity of the folder is there another combination to obtain the uniqueness of an email at the moment i use message id which however does not seem to be always present and unique on a global level thanks alessandro
0
10,036
6,547,686,364
IssuesEvent
2017-09-04 15:55:43
brave/browser-laptop
https://api.github.com/repos/brave/browser-laptop
closed
Brave update bar is misaligned
feature/navbar feature/notificationbar regression usability
noticed this on OSX when updating from 0.15.x release to 0.16.6: ![screen shot 2017-06-09 at 8 34 01 am](https://user-images.githubusercontent.com/549654/26994670-5de5c7a6-4d1d-11e7-922e-57cee0330821.png)
True
Brave update bar is misaligned - noticed this on OSX when updating from 0.15.x release to 0.16.6: ![screen shot 2017-06-09 at 8 34 01 am](https://user-images.githubusercontent.com/549654/26994670-5de5c7a6-4d1d-11e7-922e-57cee0330821.png)
non_priority
brave update bar is misaligned noticed this on osx when updating from x release to
0
275,039
30,188,403,785
IssuesEvent
2023-07-04 13:40:00
gabriel-milan/denoising-autoencoder
https://api.github.com/repos/gabriel-milan/denoising-autoencoder
opened
CVE-2021-37670 (Medium) detected in tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl
Mend: dependency security vulnerability
## CVE-2021-37670 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/aa/fd/993aa1333eb54d9f000863fe8ec61e41d12eb833dea51484c76c038718b5/tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/aa/fd/993aa1333eb54d9f000863fe8ec61e41d12eb833dea51484c76c038718b5/tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl</a></p> <p>Path to dependency file: /training/requirements.txt</p> <p>Path to vulnerable library: /training/requirements.txt</p> <p> Dependency Hierarchy: - :x: **tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/gabriel-milan/denoising-autoencoder/commit/22186005a9ff5cf052b53f8bb5aa092b9ea8a670">22186005a9ff5cf052b53f8bb5aa092b9ea8a670</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.UpperBound`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/searchsorted_op.cc#L85-L104) does not validate the rank of `sorted_input` argument. A similar issue occurs in `tf.raw_ops.LowerBound`. We have patched the issue in GitHub commit 42459e4273c2e47a3232cc16c4f4fff3b3a35c38. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. <p>Publish Date: 2021-08-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-37670>CVE-2021-37670</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7</a></p> <p>Release Date: 2021-08-12</p> <p>Fix Resolution: 2.5.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-37670 (Medium) detected in tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl - ## CVE-2021-37670 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/aa/fd/993aa1333eb54d9f000863fe8ec61e41d12eb833dea51484c76c038718b5/tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/aa/fd/993aa1333eb54d9f000863fe8ec61e41d12eb833dea51484c76c038718b5/tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl</a></p> <p>Path to dependency file: /training/requirements.txt</p> <p>Path to vulnerable library: /training/requirements.txt</p> <p> Dependency Hierarchy: - :x: **tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/gabriel-milan/denoising-autoencoder/commit/22186005a9ff5cf052b53f8bb5aa092b9ea8a670">22186005a9ff5cf052b53f8bb5aa092b9ea8a670</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.UpperBound`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/searchsorted_op.cc#L85-L104) does not validate the rank of `sorted_input` argument. A similar issue occurs in `tf.raw_ops.LowerBound`. We have patched the issue in GitHub commit 42459e4273c2e47a3232cc16c4f4fff3b3a35c38. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. <p>Publish Date: 2021-08-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-37670>CVE-2021-37670</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7</a></p> <p>Release Date: 2021-08-12</p> <p>Fix Resolution: 2.5.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in tensorflow whl cve medium severity vulnerability vulnerable library tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file training requirements txt path to vulnerable library training requirements txt dependency hierarchy x tensorflow whl vulnerable library found in head commit a href found in base branch master vulnerability details tensorflow is an end to end open source platform for machine learning in affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to tf raw ops upperbound the does not validate the rank of sorted input argument a similar issue occurs in tf raw ops lowerbound we have patched the issue in github commit the fix will be included in tensorflow we will also cherrypick this commit on tensorflow tensorflow and tensorflow as these are also affected and still in supported range publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
22,670
3,792,055,465
IssuesEvent
2016-03-22 07:41:02
Roy2014Kimi/JI3U47XFP7X25PCEAD3LMVXQ
https://api.github.com/repos/Roy2014Kimi/JI3U47XFP7X25PCEAD3LMVXQ
closed
bM0Pq1uM19GxJiMbTEQejCAPuQ3bcLrDtdYoRXx17Ylp0DMzV/37XIZC+F5YiiKTGdITSAjsMKZ2oCtGU6YbrRQLl+JX/18r66lAB08yKbtqyrbzubt8UVsPtvy6WQHF4YmpQO0Z84YOtTbLMc/exl2ofqZ3TF1qV7S2weyGyXg=
design
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
1.0
bM0Pq1uM19GxJiMbTEQejCAPuQ3bcLrDtdYoRXx17Ylp0DMzV/37XIZC+F5YiiKTGdITSAjsMKZ2oCtGU6YbrRQLl+JX/18r66lAB08yKbtqyrbzubt8UVsPtvy6WQHF4YmpQO0Z84YOtTbLMc/exl2ofqZ3TF1qV7S2weyGyXg= - 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
non_priority
jx rv fkoejuetqy zy f kyrpuzcyxiizshlomn ozt kt vf l cno yr c z
0
360,561
25,296,415,484
IssuesEvent
2022-11-17 07:09:03
WordPress/Documentation-Issue-Tracker
https://api.github.com/repos/WordPress/Documentation-Issue-Tracker
closed
Plugin handbook: Incorrect formatted code snippets on "Custom Settings Page" page
developer documentation tracking issue plugins
## Issue Description Some code snippet on https://developer.wordpress.org/plugins/settings/custom-settings-page/ are incorrect formatted. ## Example of an incorrect formatted code snippet <img width="675" alt="Screenshot 2022-11-05 at 13 51 55" src="https://user-images.githubusercontent.com/3323310/200106894-b0b02c4c-7b4d-466e-905a-18b3478ae19b.png"> ## URL of the Page with the Issue - https://developer.wordpress.org/plugins/settings/custom-settings-page/ ## Section of Page with the issue - [ ] https://developer.wordpress.org/plugins/settings/custom-settings-page/ ## Why is this a problem? These code snippets might have been created before the existence of the Code Syntax Block. ## Suggested Fix Using the same Code Syntax Block, as used for working code snippets such as https://developer.wordpress.org/themes/block-themes/converting-a-classic-theme-to-a-block-theme/#adding-block-template-parts-in-classic-themes, should solve this problem.
1.0
Plugin handbook: Incorrect formatted code snippets on "Custom Settings Page" page - ## Issue Description Some code snippet on https://developer.wordpress.org/plugins/settings/custom-settings-page/ are incorrect formatted. ## Example of an incorrect formatted code snippet <img width="675" alt="Screenshot 2022-11-05 at 13 51 55" src="https://user-images.githubusercontent.com/3323310/200106894-b0b02c4c-7b4d-466e-905a-18b3478ae19b.png"> ## URL of the Page with the Issue - https://developer.wordpress.org/plugins/settings/custom-settings-page/ ## Section of Page with the issue - [ ] https://developer.wordpress.org/plugins/settings/custom-settings-page/ ## Why is this a problem? These code snippets might have been created before the existence of the Code Syntax Block. ## Suggested Fix Using the same Code Syntax Block, as used for working code snippets such as https://developer.wordpress.org/themes/block-themes/converting-a-classic-theme-to-a-block-theme/#adding-block-template-parts-in-classic-themes, should solve this problem.
non_priority
plugin handbook incorrect formatted code snippets on custom settings page page issue description some code snippet on are incorrect formatted example of an incorrect formatted code snippet img width alt screenshot at src url of the page with the issue section of page with the issue why is this a problem these code snippets might have been created before the existence of the code syntax block suggested fix using the same code syntax block as used for working code snippets such as should solve this problem
0
2,837
3,205,654,344
IssuesEvent
2015-10-04 09:04:02
Tiendil/the-tale
https://api.github.com/repos/Tiendil/the-tale
opened
Лингвистика: синхронизировать вёрстку форм редактирования слов
comp_linguistics cont_usability est_simple type_improvement
вёрстка блоков со всеми формами и блоков с вырезанными формами сейчас не совпадает
True
Лингвистика: синхронизировать вёрстку форм редактирования слов - вёрстка блоков со всеми формами и блоков с вырезанными формами сейчас не совпадает
non_priority
лингвистика синхронизировать вёрстку форм редактирования слов вёрстка блоков со всеми формами и блоков с вырезанными формами сейчас не совпадает
0
34,126
7,787,241,205
IssuesEvent
2018-06-06 21:40:58
AdoptOpenJDK/openjdk-build
https://api.github.com/repos/AdoptOpenJDK/openjdk-build
opened
Move exec block in jenkins job into Github for all code-tool jobs
code-tools enhancement refactoring
The executable part of all the code-tools jobs in Jenkins should be moved to a git-repo just like `openjdk-build`. This includes the below jobs under the [Dependencies](https://ci.adoptopenjdk.net/view/Dependencies/) tab: - https://ci.adoptopenjdk.net/view/Dependencies/job/asmtools/ - https://ci.adoptopenjdk.net/view/Dependencies/job/jcov/ - https://ci.adoptopenjdk.net/view/Dependencies/job/jtharness/ - https://ci.adoptopenjdk.net/view/Dependencies/job/jtreg/ - https://ci.adoptopenjdk.net/view/Dependencies/job/sigtest/
1.0
Move exec block in jenkins job into Github for all code-tool jobs - The executable part of all the code-tools jobs in Jenkins should be moved to a git-repo just like `openjdk-build`. This includes the below jobs under the [Dependencies](https://ci.adoptopenjdk.net/view/Dependencies/) tab: - https://ci.adoptopenjdk.net/view/Dependencies/job/asmtools/ - https://ci.adoptopenjdk.net/view/Dependencies/job/jcov/ - https://ci.adoptopenjdk.net/view/Dependencies/job/jtharness/ - https://ci.adoptopenjdk.net/view/Dependencies/job/jtreg/ - https://ci.adoptopenjdk.net/view/Dependencies/job/sigtest/
non_priority
move exec block in jenkins job into github for all code tool jobs the executable part of all the code tools jobs in jenkins should be moved to a git repo just like openjdk build this includes the below jobs under the tab
0
4,764
3,882,707,725
IssuesEvent
2016-04-13 11:02:18
lionheart/openradar-mirror
https://api.github.com/repos/lionheart/openradar-mirror
opened
20695771: Cannot export developer profile
classification:ui/usability reproducible:always status:open
#### Description Summary: Xcode cannot export developer profile making cross team development impossible Steps to Reproduce: Prefs > Account > Export Accounts, save name, fail Expected Results: Export to a file Actual Results: Error: Could not export identity from the keychain Console: 4/24/15 5:50:44.155 PM Xcode[49946]: Error, Could not export identity from the keychain: The user name or passphrase you entered is not correct. Except I did not enter a username, and it was previously working fine. Regression: This worked on previous versions of xcode. Notes: Provide additional information, such as references to related problems, workarounds and relevant attachments. - Product Version: 6.3.1 (6D1002) Created: 2015-04-25T00:53:38.943330 Originated: 2015-04-24T17:53:00 Open Radar Link: http://www.openradar.me/20695771
True
20695771: Cannot export developer profile - #### Description Summary: Xcode cannot export developer profile making cross team development impossible Steps to Reproduce: Prefs > Account > Export Accounts, save name, fail Expected Results: Export to a file Actual Results: Error: Could not export identity from the keychain Console: 4/24/15 5:50:44.155 PM Xcode[49946]: Error, Could not export identity from the keychain: The user name or passphrase you entered is not correct. Except I did not enter a username, and it was previously working fine. Regression: This worked on previous versions of xcode. Notes: Provide additional information, such as references to related problems, workarounds and relevant attachments. - Product Version: 6.3.1 (6D1002) Created: 2015-04-25T00:53:38.943330 Originated: 2015-04-24T17:53:00 Open Radar Link: http://www.openradar.me/20695771
non_priority
cannot export developer profile description summary xcode cannot export developer profile making cross team development impossible steps to reproduce prefs account export accounts save name fail expected results export to a file actual results error could not export identity from the keychain console pm xcode error could not export identity from the keychain the user name or passphrase you entered is not correct except i did not enter a username and it was previously working fine regression this worked on previous versions of xcode notes provide additional information such as references to related problems workarounds and relevant attachments product version created originated open radar link
0
387,013
26,710,533,276
IssuesEvent
2023-01-27 23:07:12
redhat-et/apex
https://api.github.com/repos/redhat-et/apex
closed
Update docs to no longer reference docker-compose
documentation
Recent changes dropped support for docker-compose, but it's still referenced a lot in docs. ``` $ git grep compose | wc -l 29 ``` All of these places need to be updated to reflect the updated development workflow.
1.0
Update docs to no longer reference docker-compose - Recent changes dropped support for docker-compose, but it's still referenced a lot in docs. ``` $ git grep compose | wc -l 29 ``` All of these places need to be updated to reflect the updated development workflow.
non_priority
update docs to no longer reference docker compose recent changes dropped support for docker compose but it s still referenced a lot in docs git grep compose wc l all of these places need to be updated to reflect the updated development workflow
0
41,285
10,695,850,136
IssuesEvent
2019-10-23 13:45:50
microsoft/WindowsTemplateStudio
https://api.github.com/repos/microsoft/WindowsTemplateStudio
opened
Build dev.templates.tests.full_20191023.1 failed
bug vsts-build
## Build dev.templates.tests.full_20191023.1 - **Build result:** `failed` - **Build queued:** 10/23/2019 5:00:01 AM - **Build duration:** 525.35 minutes ### Details Build [dev.templates.tests.full_20191023.1](https://winappstudio.visualstudio.com/web/build.aspx?pcguid=a4ef43be-68ce-4195-a619-079b4d9834c2&builduri=vstfs%3a%2f%2f%2fBuild%2fBuild%2f31540) failed + xunit.console.exe : BuildCompleteProjectWithAllRightClickItemsWithForcedLoginAsync(projectType: "TabbedNav", framework: "CodeBehind", platform: "Uwp", language: "C#") [FAIL] At pbatch:27 char:27 + + CategoryInfo : NotSpecified: ( BuildComple...e: "C#") [FAIL]:String) [], RemoteException + FullyQualifiedErrorId : NativeCommandError + PSComputerName : [localhost] BuildCompleteProjectWithAllRightClickItemsWithForcedLoginAsync(projectType: "MenuBar", framework: "CodeBehind", platform: "Uwp", language: "C#") [FAIL] BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "SplitView", framework: "CodeBehind", platform: "Uwp", language: "VisualBasic") [FAIL] xunit.console.exe : BuildAllPagesAndFeaturesAsync(projectType: "TabbedNav", framework: "MVVMLight", platform: "Uwp", language: "VisualBasic") [FAIL] At pbatch:27 char:27 + + CategoryInfo : NotSpecified: ( BuildAllPag...lBasic") [FAIL]:String) [], RemoteException + FullyQualifiedErrorId : NativeCommandError + PSComputerName : [localhost] BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "Blank", framework: "CodeBehind", platform: "Uwp", language: "VisualBasic") [FAIL] BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "TabbedNav", framework: "CodeBehind", platform: "Uwp", language: "VisualBasic") [FAIL] BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "SplitView", framework: "MVVMLight", platform: "Uwp", language: "C#") [FAIL] xunit.console.exe : NotSpecified: (:String) [], RemoteException At pbatch:27 char:27 + + CategoryInfo : NotSpecified: (:String) [], RemoteException + FullyQualifiedErrorId : NativeCommandError + PSComputerName : [localhost] Unhandled Exception: System.AccessViolationException: Attempted to read or write protected memory. This is often an indication that other memory is corrupt. at NuGet.Packaging.NuspecReader.GetFlags(String flags) at NuGet.Packaging.NuspecReader.GetPackageDependencies(IEnumerable`1 nodes, Boolean useStrictVersionCheck) at NuGet.Packaging.NuspecReader.<GetDependencyGroups>d__29.MoveNext() at System.Collections.Generic.List`1..ctor(IEnumerable`1 collection) at System.Linq.Enumerable.ToList[TSource](IEnumerable`1 source) at NuGet.Protocol.Core.Types.FindPackageByIdDependencyInfo..ctor(PackageIdentity packageIdentity, IEnumerable`1 dependencyGroups, IEnumerable`1 frameworkReferenceGroups) at NuGet.Protocol.Core.Types.FindPackageByIdResource.GetDependencyInfo(NuspecReader reader) at NuGet.Protocol.LocalV3FindPackageByIdResource.<>c.<GetDependencyInfoAsync>b__15_0(NuspecReader nuspecReader) at NuGet.Protocol.LocalV3FindPackageByIdResource.ProcessNuspecReader[T](String id, NuGetVersion version, Func`2 process) at NuGet.Protocol.LocalV3FindPackageByIdResource.GetDependencyInfoAsync(String id, NuGetVersion version, SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken) at NuGet.Commands.SourceRepositoryDependencyProvider.<GetDependenciesCoreAsync>d__22.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.SourceRepositoryDependencyProvider.GetDependenciesCoreAsync(LibraryIdentity match, NuGetFramework targetFramework, SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken) at NuGet.Commands.SourceRepositoryDependencyProvider.<>c__DisplayClass21_0.<<GetDependenciesAsync>b__0>d.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.SourceRepositoryDependencyProvider.<>c__DisplayClass21_0.<GetDependenciesAsync>b__0() at System.Lazy`1.CreateValue() at System.Lazy`1.LazyInitValue() at System.Lazy`1.get_Value() at NuGet.Commands.SourceRepositoryDependencyProvider.<GetDependenciesAsync>d__21.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.SourceRepositoryDependencyProvider.GetDependenciesAsync(LibraryIdentity libraryIdentity, NuGetFramework targetFramework, SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken) at NuGet.DependencyResolver.ResolverUtility.<CreateGraphItemAsync>d__2.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.DependencyResolver.ResolverUtility.CreateGraphItemAsync(RemoteMatch match, NuGetFramework framework, SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken) at NuGet.DependencyResolver.ResolverUtility.<FindLibraryEntryAsync>d__1.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.DependencyResolver.ResolverUtility.FindLibraryEntryAsync(LibraryRange libraryRange, NuGetFramework framework, String runtimeIdentifier, GraphEdge`1 outerEdge, RemoteWalkContext context, CancellationToken cancellationToken) at NuGet.DependencyResolver.ResolverUtility.<>c__DisplayClass0_0.<FindLibraryCachedAsync>b__0(LibraryRangeCacheKey cacheKey) at System.Collections.Concurrent.ConcurrentDictionary`2.GetOrAdd(TKey key, Func`2 valueFactory) at NuGet.DependencyResolver.ResolverUtility.FindLibraryCachedAsync(ConcurrentDictionary`2 cache, LibraryRange libraryRange, NuGetFramework framework, String runtimeIdentifier, GraphEdge`1 outerEdge, RemoteWalkContext context, CancellationToken cancellationToken) at NuGet.DependencyResolver.RemoteDependencyWalker.<CreateGraphNode>d__3.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGe t.DependencyResolver.RemoteDependencyWalker.CreateGraphNode(LibraryRange libraryRange, NuGetFramework framework, String runtimeName, RuntimeGraph runtimeGraph, Func`2 predicate, GraphEdge`1 outerEdge) at NuGet.DependencyResolver.RemoteDependencyWalker.<CreateGraphNode>d__3.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.DependencyResolver.RemoteDependencyWalker.CreateGraphNode(LibraryRange libraryRange, NuGetFramework framework, String runtimeName, RuntimeGraph runtimeGraph, Func`2 predicate, GraphEdge`1 outerEdge) at NuGet.DependencyResolver.RemoteDependencyWalker.WalkAsync(LibraryRange library, NuGetFramework framework, String runtimeIdentifier, RuntimeGraph runtimeGraph, Boolean recursive) at NuGet.Commands.ProjectRestoreCommand.<WalkDependenciesAsync>d__10.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.ProjectRestoreCommand.WalkDependenciesAsync(LibraryRange projectRange, NuGetFramework framework, String runtimeIdentifier, RuntimeGraph runtimeGraph, RemoteDependencyWalker walker, RemoteWalkContext context, CancellationToken token) at NuGet.Commands.ProjectRestoreCommand.WalkDependenciesAsync(LibraryRange projectRange, NuGetFramework framework, RemoteDependencyWalker walker, RemoteWalkContext context, CancellationToken token) at NuGet.Commands.ProjectRestoreCommand.<TryRestoreAsync>d__8.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.ProjectRestoreCommand.TryRestoreAsync(LibraryRange projectRange, IEnumerable`1 frameworkRuntimePairs, NuGetv3LocalRepository userPackageFolder, IReadOnlyList`1 fallbackPackageFolders, RemoteDependencyWalker remoteWalker, RemoteWalkContext context, Boolean forceRuntimeGraphCreation, CancellationToken token, TelemetryActivity telemetryActivity) at NuGet.Commands.RestoreCommand.<ExecuteRestoreAsync>d__47.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.RestoreCommand.ExecuteRestoreAsync(NuGetv3LocalRepository userPackageFolder, IReadOnlyList`1 fallbackPackageFolders, RemoteWalkContext context, CancellationToken token, TelemetryActivity telemetryActivity) at NuGet.Commands.RestoreCommand.<ExecuteAsync>d__32.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.RestoreCommand.ExecuteAsync(CancellationToken token) at NuGet.Commands.RestoreRunner.<ExecuteAsync>d__7.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.RestoreRunner.ExecuteAsync(RestoreSummaryRequest summaryRequest, CancellationToken token) at NuGet.Commands.RestoreRunner.<ExecuteAndCommitAsync>d__6.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.RestoreRunner.ExecuteAndCommitAsync(RestoreSummaryRequest summaryRequest, CancellationToken token) at NuGet.Commands.RestoreRunner.<>c__DisplayClass2_1.<RunAsync>b__0() at System.Threading.Tasks.Task`1.InnerInvoke() at System.Threading.Tasks.Task.Execute() at System.Threading.Tasks.Task.ExecutionContextCallback(Object obj) at System.Threading.ExecutionContext.RunInternal(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx) at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx) at System.Threading.Tasks.Task.ExecuteWithThreadLocal(Task& currentTaskSlot) at System.Threading.Tasks.Task.ExecuteEntry(Boolean bPreventDoubleExecution) at System.Threading.Tasks.Task.System.Threading.IThreadPoolWorkItem.ExecuteWorkItem() at System.T hreading.ThreadPoolWorkQueue.Dis********ch() at System.Threading._ThreadPoolWaitCallback.PerformWaitCallback() BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "SplitView", framework: "MVVMBasic", platform: "Uwp", language: "C#") [FAIL] BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "MenuBar", framework: "CodeBehind", platform: "Uwp", language: "VisualBasic") [FAIL] BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "Blank", framework: "MVVMLight", platform: "Uwp", language: "C#") [FAIL] Not enough memory resources are available to process this command. Not enough memory resources are available to process this command. The syntax of the command is incorrect. BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "Blank", framework: "MVVMBasic", platform: "Uwp", language: "C#") [FAIL] BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "TabbedNav", framework: "MVVMBasic", platform: "Uwp", language: "C#") [FAIL] BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "MenuBar", framework: "MVVMBasic", platform: "Uwp", language: "C#") [FAIL] BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "SplitView", framework: "MVVMBasic", platform: "Uwp", language: "VisualBasic") [FAIL] BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "Blank", framework: "MVVMBasic", platform: "Uwp", language: "VisualBasic") [FAIL] BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "TabbedNav", framework: "MVVMBasic", platform: "Uwp", language: "VisualBasic") [FAIL] + Process completed with exit code 24 and had 1 error(s) written to the error stream. Find detailed information in the [build log files]()
1.0
Build dev.templates.tests.full_20191023.1 failed - ## Build dev.templates.tests.full_20191023.1 - **Build result:** `failed` - **Build queued:** 10/23/2019 5:00:01 AM - **Build duration:** 525.35 minutes ### Details Build [dev.templates.tests.full_20191023.1](https://winappstudio.visualstudio.com/web/build.aspx?pcguid=a4ef43be-68ce-4195-a619-079b4d9834c2&builduri=vstfs%3a%2f%2f%2fBuild%2fBuild%2f31540) failed + xunit.console.exe : BuildCompleteProjectWithAllRightClickItemsWithForcedLoginAsync(projectType: "TabbedNav", framework: "CodeBehind", platform: "Uwp", language: "C#") [FAIL] At pbatch:27 char:27 + + CategoryInfo : NotSpecified: ( BuildComple...e: "C#") [FAIL]:String) [], RemoteException + FullyQualifiedErrorId : NativeCommandError + PSComputerName : [localhost] BuildCompleteProjectWithAllRightClickItemsWithForcedLoginAsync(projectType: "MenuBar", framework: "CodeBehind", platform: "Uwp", language: "C#") [FAIL] BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "SplitView", framework: "CodeBehind", platform: "Uwp", language: "VisualBasic") [FAIL] xunit.console.exe : BuildAllPagesAndFeaturesAsync(projectType: "TabbedNav", framework: "MVVMLight", platform: "Uwp", language: "VisualBasic") [FAIL] At pbatch:27 char:27 + + CategoryInfo : NotSpecified: ( BuildAllPag...lBasic") [FAIL]:String) [], RemoteException + FullyQualifiedErrorId : NativeCommandError + PSComputerName : [localhost] BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "Blank", framework: "CodeBehind", platform: "Uwp", language: "VisualBasic") [FAIL] BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "TabbedNav", framework: "CodeBehind", platform: "Uwp", language: "VisualBasic") [FAIL] BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "SplitView", framework: "MVVMLight", platform: "Uwp", language: "C#") [FAIL] xunit.console.exe : NotSpecified: (:String) [], RemoteException At pbatch:27 char:27 + + CategoryInfo : NotSpecified: (:String) [], RemoteException + FullyQualifiedErrorId : NativeCommandError + PSComputerName : [localhost] Unhandled Exception: System.AccessViolationException: Attempted to read or write protected memory. This is often an indication that other memory is corrupt. at NuGet.Packaging.NuspecReader.GetFlags(String flags) at NuGet.Packaging.NuspecReader.GetPackageDependencies(IEnumerable`1 nodes, Boolean useStrictVersionCheck) at NuGet.Packaging.NuspecReader.<GetDependencyGroups>d__29.MoveNext() at System.Collections.Generic.List`1..ctor(IEnumerable`1 collection) at System.Linq.Enumerable.ToList[TSource](IEnumerable`1 source) at NuGet.Protocol.Core.Types.FindPackageByIdDependencyInfo..ctor(PackageIdentity packageIdentity, IEnumerable`1 dependencyGroups, IEnumerable`1 frameworkReferenceGroups) at NuGet.Protocol.Core.Types.FindPackageByIdResource.GetDependencyInfo(NuspecReader reader) at NuGet.Protocol.LocalV3FindPackageByIdResource.<>c.<GetDependencyInfoAsync>b__15_0(NuspecReader nuspecReader) at NuGet.Protocol.LocalV3FindPackageByIdResource.ProcessNuspecReader[T](String id, NuGetVersion version, Func`2 process) at NuGet.Protocol.LocalV3FindPackageByIdResource.GetDependencyInfoAsync(String id, NuGetVersion version, SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken) at NuGet.Commands.SourceRepositoryDependencyProvider.<GetDependenciesCoreAsync>d__22.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.SourceRepositoryDependencyProvider.GetDependenciesCoreAsync(LibraryIdentity match, NuGetFramework targetFramework, SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken) at NuGet.Commands.SourceRepositoryDependencyProvider.<>c__DisplayClass21_0.<<GetDependenciesAsync>b__0>d.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.SourceRepositoryDependencyProvider.<>c__DisplayClass21_0.<GetDependenciesAsync>b__0() at System.Lazy`1.CreateValue() at System.Lazy`1.LazyInitValue() at System.Lazy`1.get_Value() at NuGet.Commands.SourceRepositoryDependencyProvider.<GetDependenciesAsync>d__21.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.SourceRepositoryDependencyProvider.GetDependenciesAsync(LibraryIdentity libraryIdentity, NuGetFramework targetFramework, SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken) at NuGet.DependencyResolver.ResolverUtility.<CreateGraphItemAsync>d__2.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.DependencyResolver.ResolverUtility.CreateGraphItemAsync(RemoteMatch match, NuGetFramework framework, SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken) at NuGet.DependencyResolver.ResolverUtility.<FindLibraryEntryAsync>d__1.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.DependencyResolver.ResolverUtility.FindLibraryEntryAsync(LibraryRange libraryRange, NuGetFramework framework, String runtimeIdentifier, GraphEdge`1 outerEdge, RemoteWalkContext context, CancellationToken cancellationToken) at NuGet.DependencyResolver.ResolverUtility.<>c__DisplayClass0_0.<FindLibraryCachedAsync>b__0(LibraryRangeCacheKey cacheKey) at System.Collections.Concurrent.ConcurrentDictionary`2.GetOrAdd(TKey key, Func`2 valueFactory) at NuGet.DependencyResolver.ResolverUtility.FindLibraryCachedAsync(ConcurrentDictionary`2 cache, LibraryRange libraryRange, NuGetFramework framework, String runtimeIdentifier, GraphEdge`1 outerEdge, RemoteWalkContext context, CancellationToken cancellationToken) at NuGet.DependencyResolver.RemoteDependencyWalker.<CreateGraphNode>d__3.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGe t.DependencyResolver.RemoteDependencyWalker.CreateGraphNode(LibraryRange libraryRange, NuGetFramework framework, String runtimeName, RuntimeGraph runtimeGraph, Func`2 predicate, GraphEdge`1 outerEdge) at NuGet.DependencyResolver.RemoteDependencyWalker.<CreateGraphNode>d__3.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.DependencyResolver.RemoteDependencyWalker.CreateGraphNode(LibraryRange libraryRange, NuGetFramework framework, String runtimeName, RuntimeGraph runtimeGraph, Func`2 predicate, GraphEdge`1 outerEdge) at NuGet.DependencyResolver.RemoteDependencyWalker.WalkAsync(LibraryRange library, NuGetFramework framework, String runtimeIdentifier, RuntimeGraph runtimeGraph, Boolean recursive) at NuGet.Commands.ProjectRestoreCommand.<WalkDependenciesAsync>d__10.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.ProjectRestoreCommand.WalkDependenciesAsync(LibraryRange projectRange, NuGetFramework framework, String runtimeIdentifier, RuntimeGraph runtimeGraph, RemoteDependencyWalker walker, RemoteWalkContext context, CancellationToken token) at NuGet.Commands.ProjectRestoreCommand.WalkDependenciesAsync(LibraryRange projectRange, NuGetFramework framework, RemoteDependencyWalker walker, RemoteWalkContext context, CancellationToken token) at NuGet.Commands.ProjectRestoreCommand.<TryRestoreAsync>d__8.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.ProjectRestoreCommand.TryRestoreAsync(LibraryRange projectRange, IEnumerable`1 frameworkRuntimePairs, NuGetv3LocalRepository userPackageFolder, IReadOnlyList`1 fallbackPackageFolders, RemoteDependencyWalker remoteWalker, RemoteWalkContext context, Boolean forceRuntimeGraphCreation, CancellationToken token, TelemetryActivity telemetryActivity) at NuGet.Commands.RestoreCommand.<ExecuteRestoreAsync>d__47.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.RestoreCommand.ExecuteRestoreAsync(NuGetv3LocalRepository userPackageFolder, IReadOnlyList`1 fallbackPackageFolders, RemoteWalkContext context, CancellationToken token, TelemetryActivity telemetryActivity) at NuGet.Commands.RestoreCommand.<ExecuteAsync>d__32.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.RestoreCommand.ExecuteAsync(CancellationToken token) at NuGet.Commands.RestoreRunner.<ExecuteAsync>d__7.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.RestoreRunner.ExecuteAsync(RestoreSummaryRequest summaryRequest, CancellationToken token) at NuGet.Commands.RestoreRunner.<ExecuteAndCommitAsync>d__6.MoveNext() at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine) at NuGet.Commands.RestoreRunner.ExecuteAndCommitAsync(RestoreSummaryRequest summaryRequest, CancellationToken token) at NuGet.Commands.RestoreRunner.<>c__DisplayClass2_1.<RunAsync>b__0() at System.Threading.Tasks.Task`1.InnerInvoke() at System.Threading.Tasks.Task.Execute() at System.Threading.Tasks.Task.ExecutionContextCallback(Object obj) at System.Threading.ExecutionContext.RunInternal(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx) at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx) at System.Threading.Tasks.Task.ExecuteWithThreadLocal(Task& currentTaskSlot) at System.Threading.Tasks.Task.ExecuteEntry(Boolean bPreventDoubleExecution) at System.Threading.Tasks.Task.System.Threading.IThreadPoolWorkItem.ExecuteWorkItem() at System.T hreading.ThreadPoolWorkQueue.Dis********ch() at System.Threading._ThreadPoolWaitCallback.PerformWaitCallback() BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "SplitView", framework: "MVVMBasic", platform: "Uwp", language: "C#") [FAIL] BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "MenuBar", framework: "CodeBehind", platform: "Uwp", language: "VisualBasic") [FAIL] BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "Blank", framework: "MVVMLight", platform: "Uwp", language: "C#") [FAIL] Not enough memory resources are available to process this command. Not enough memory resources are available to process this command. The syntax of the command is incorrect. BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "Blank", framework: "MVVMBasic", platform: "Uwp", language: "C#") [FAIL] BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "TabbedNav", framework: "MVVMBasic", platform: "Uwp", language: "C#") [FAIL] BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "MenuBar", framework: "MVVMBasic", platform: "Uwp", language: "C#") [FAIL] BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "SplitView", framework: "MVVMBasic", platform: "Uwp", language: "VisualBasic") [FAIL] BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "Blank", framework: "MVVMBasic", platform: "Uwp", language: "VisualBasic") [FAIL] BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "TabbedNav", framework: "MVVMBasic", platform: "Uwp", language: "VisualBasic") [FAIL] + Process completed with exit code 24 and had 1 error(s) written to the error stream. Find detailed information in the [build log files]()
non_priority
build dev templates tests full failed build dev templates tests full build result failed build queued am build duration minutes details build failed xunit console exe buildcompleteprojectwithallrightclickitemswithforcedloginasync projecttype tabbednav framework codebehind platform uwp language c at pbatch char categoryinfo notspecified buildcomple e c string remoteexception fullyqualifiederrorid nativecommanderror pscomputername buildcompleteprojectwithallrightclickitemswithforcedloginasync projecttype menubar framework codebehind platform uwp language c buildcompleteprojectwithallrightclickitemswithforcedlogin vbasync projecttype splitview framework codebehind platform uwp language visualbasic xunit console exe buildallpagesandfeaturesasync projecttype tabbednav framework mvvmlight platform uwp language visualbasic at pbatch char categoryinfo notspecified buildallpag lbasic string remoteexception fullyqualifiederrorid nativecommanderror pscomputername buildcompleteprojectwithallrightclickitemswithforcedlogin vbasync projecttype blank framework codebehind platform uwp language visualbasic buildcompleteprojectwithallrightclickitemswithforcedlogin vbasync projecttype tabbednav framework codebehind platform uwp language visualbasic buildallpagesandfeaturesthenruntestsasync projecttype splitview framework mvvmlight platform uwp language c xunit console exe notspecified string remoteexception at pbatch char categoryinfo notspecified string remoteexception fullyqualifiederrorid nativecommanderror pscomputername unhandled exception system accessviolationexception attempted to read or write protected memory this is often an indication that other memory is corrupt at nuget packaging nuspecreader getflags string flags at nuget packaging nuspecreader getpackagedependencies ienumerable nodes boolean usestrictversioncheck at nuget packaging nuspecreader d movenext at system collections generic list ctor ienumerable collection at system linq enumerable tolist ienumerable source at nuget protocol core types findpackagebyiddependencyinfo ctor packageidentity packageidentity ienumerable dependencygroups ienumerable frameworkreferencegroups at nuget protocol core types findpackagebyidresource getdependencyinfo nuspecreader reader at nuget protocol c b nuspecreader nuspecreader at nuget protocol processnuspecreader string id nugetversion version func process at nuget protocol getdependencyinfoasync string id nugetversion version sourcecachecontext cachecontext ilogger logger cancellationtoken cancellationtoken at nuget commands sourcerepositorydependencyprovider d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands sourcerepositorydependencyprovider getdependenciescoreasync libraryidentity match nugetframework targetframework sourcecachecontext cachecontext ilogger logger cancellationtoken cancellationtoken at nuget commands sourcerepositorydependencyprovider c b d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands sourcerepositorydependencyprovider c b at system lazy createvalue at system lazy lazyinitvalue at system lazy get value at nuget commands sourcerepositorydependencyprovider d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands sourcerepositorydependencyprovider getdependenciesasync libraryidentity libraryidentity nugetframework targetframework sourcecachecontext cachecontext ilogger logger cancellationtoken cancellationtoken at nuget dependencyresolver resolverutility d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget dependencyresolver resolverutility creategraphitemasync remotematch match nugetframework framework sourcecachecontext cachecontext ilogger logger cancellationtoken cancellationtoken at nuget dependencyresolver resolverutility d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget dependencyresolver resolverutility findlibraryentryasync libraryrange libraryrange nugetframework framework string runtimeidentifier graphedge outeredge remotewalkcontext context cancellationtoken cancellationtoken at nuget dependencyresolver resolverutility c b libraryrangecachekey cachekey at system collections concurrent concurrentdictionary getoradd tkey key func valuefactory at nuget dependencyresolver resolverutility findlibrarycachedasync concurrentdictionary cache libraryrange libraryrange nugetframework framework string runtimeidentifier graphedge outeredge remotewalkcontext context cancellationtoken cancellationtoken at nuget dependencyresolver remotedependencywalker d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuge t dependencyresolver remotedependencywalker creategraphnode libraryrange libraryrange nugetframework framework string runtimename runtimegraph runtimegraph func predicate graphedge outeredge at nuget dependencyresolver remotedependencywalker d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget dependencyresolver remotedependencywalker creategraphnode libraryrange libraryrange nugetframework framework string runtimename runtimegraph runtimegraph func predicate graphedge outeredge at nuget dependencyresolver remotedependencywalker walkasync libraryrange library nugetframework framework string runtimeidentifier runtimegraph runtimegraph boolean recursive at nuget commands projectrestorecommand d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands projectrestorecommand walkdependenciesasync libraryrange projectrange nugetframework framework string runtimeidentifier runtimegraph runtimegraph remotedependencywalker walker remotewalkcontext context cancellationtoken token at nuget commands projectrestorecommand walkdependenciesasync libraryrange projectrange nugetframework framework remotedependencywalker walker remotewalkcontext context cancellationtoken token at nuget commands projectrestorecommand d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands projectrestorecommand tryrestoreasync libraryrange projectrange ienumerable frameworkruntimepairs userpackagefolder ireadonlylist fallbackpackagefolders remotedependencywalker remotewalker remotewalkcontext context boolean forceruntimegraphcreation cancellationtoken token telemetryactivity telemetryactivity at nuget commands restorecommand d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands restorecommand executerestoreasync userpackagefolder ireadonlylist fallbackpackagefolders remotewalkcontext context cancellationtoken token telemetryactivity telemetryactivity at nuget commands restorecommand d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands restorecommand executeasync cancellationtoken token at nuget commands restorerunner d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands restorerunner executeasync restoresummaryrequest summaryrequest cancellationtoken token at nuget commands restorerunner d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands restorerunner executeandcommitasync restoresummaryrequest summaryrequest cancellationtoken token at nuget commands restorerunner c b at system threading tasks task innerinvoke at system threading tasks task execute at system threading tasks task executioncontextcallback object obj at system threading executioncontext runinternal executioncontext executioncontext contextcallback callback object state boolean preservesyncctx at system threading executioncontext run executioncontext executioncontext contextcallback callback object state boolean preservesyncctx at system threading tasks task executewiththreadlocal task currenttaskslot at system threading tasks task executeentry boolean bpreventdoubleexecution at system threading tasks task system threading ithreadpoolworkitem executeworkitem at system t hreading threadpoolworkqueue dis ch at system threading threadpoolwaitcallback performwaitcallback buildallpagesandfeaturesthenruntestsasync projecttype splitview framework mvvmbasic platform uwp language c buildcompleteprojectwithallrightclickitemswithforcedlogin vbasync projecttype menubar framework codebehind platform uwp language visualbasic buildallpagesandfeaturesthenruntestsasync projecttype blank framework mvvmlight platform uwp language c not enough memory resources are available to process this command not enough memory resources are available to process this command the syntax of the command is incorrect buildallpagesandfeaturesthenruntestsasync projecttype blank framework mvvmbasic platform uwp language c buildallpagesandfeaturesthenruntestsasync projecttype tabbednav framework mvvmbasic platform uwp language c buildallpagesandfeaturesthenruntestsasync projecttype menubar framework mvvmbasic platform uwp language c buildallpagesandfeaturesthenruntestsasync projecttype splitview framework mvvmbasic platform uwp language visualbasic buildallpagesandfeaturesthenruntestsasync projecttype blank framework mvvmbasic platform uwp language visualbasic buildallpagesandfeaturesthenruntestsasync projecttype tabbednav framework mvvmbasic platform uwp language visualbasic process completed with exit code and had error s written to the error stream find detailed information in the
0
950
2,783,724,969
IssuesEvent
2015-05-07 02:46:26
jkomoros/sudoku
https://api.github.com/repos/jkomoros/sudoku
opened
Analysis should cache the solves in phase 2 for performance reasons
analysis performance
keyed off recid, with a cache that is blown away every.... when?
True
Analysis should cache the solves in phase 2 for performance reasons - keyed off recid, with a cache that is blown away every.... when?
non_priority
analysis should cache the solves in phase for performance reasons keyed off recid with a cache that is blown away every when
0
211,091
16,168,249,689
IssuesEvent
2021-05-01 23:38:21
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
opened
roachtest: tpchvec/perf_no_stats failed
C-test-failure O-roachtest O-robot branch-master release-blocker
roachtest.tpchvec/perf_no_stats [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2944550&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=2944550&tab=artifacts#/tpchvec/perf_no_stats) on master @ [684e753c15f3fc58df79b6ea70e7b6715eae4835](https://github.com/cockroachdb/cockroach/commits/684e753c15f3fc58df79b6ea70e7b6715eae4835): ``` The test failed on branch=master, cloud=gce: test artifacts and logs in: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/artifacts/tpchvec/perf_no_stats/run_1 tpchvec.go:637,tpchvec.go:685,test_runner.go:777: unrecognized version: v21.2.0-alpha.00000000-135-g684e753c15 (1) attached stack trace -- stack trace: | main.toCRDBVersion | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpchvec.go:52 | main.runTPCHVec | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpchvec.go:635 | main.registerTPCHVec.func4 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpchvec.go:685 | main.(*testRunner).runTest.func2 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/test_runner.go:777 | runtime.goexit | /usr/local/go/src/runtime/asm_amd64.s:1374 Wraps: (2) unrecognized version: v21.2.0-alpha.00000000-135-g684e753c15 Error types: (1) *withstack.withStack (2) *errutil.leafError ``` <details><summary>Reproduce</summary> <p> <p>To reproduce, try: ```bash # From https://go.crdb.dev/p/roachstress, perhaps edited lightly. caffeinate ./roachstress.sh tpchvec/perf_no_stats ``` </p> </p> </details> /cc @cockroachdb/sql-queries <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*tpchvec/perf_no_stats.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
2.0
roachtest: tpchvec/perf_no_stats failed - roachtest.tpchvec/perf_no_stats [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2944550&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=2944550&tab=artifacts#/tpchvec/perf_no_stats) on master @ [684e753c15f3fc58df79b6ea70e7b6715eae4835](https://github.com/cockroachdb/cockroach/commits/684e753c15f3fc58df79b6ea70e7b6715eae4835): ``` The test failed on branch=master, cloud=gce: test artifacts and logs in: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/artifacts/tpchvec/perf_no_stats/run_1 tpchvec.go:637,tpchvec.go:685,test_runner.go:777: unrecognized version: v21.2.0-alpha.00000000-135-g684e753c15 (1) attached stack trace -- stack trace: | main.toCRDBVersion | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpchvec.go:52 | main.runTPCHVec | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpchvec.go:635 | main.registerTPCHVec.func4 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpchvec.go:685 | main.(*testRunner).runTest.func2 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/test_runner.go:777 | runtime.goexit | /usr/local/go/src/runtime/asm_amd64.s:1374 Wraps: (2) unrecognized version: v21.2.0-alpha.00000000-135-g684e753c15 Error types: (1) *withstack.withStack (2) *errutil.leafError ``` <details><summary>Reproduce</summary> <p> <p>To reproduce, try: ```bash # From https://go.crdb.dev/p/roachstress, perhaps edited lightly. caffeinate ./roachstress.sh tpchvec/perf_no_stats ``` </p> </p> </details> /cc @cockroachdb/sql-queries <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*tpchvec/perf_no_stats.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
non_priority
roachtest tpchvec perf no stats failed roachtest tpchvec perf no stats with on master the test failed on branch master cloud gce test artifacts and logs in home agent work go src github com cockroachdb cockroach artifacts tpchvec perf no stats run tpchvec go tpchvec go test runner go unrecognized version alpha attached stack trace stack trace main tocrdbversion home agent work go src github com cockroachdb cockroach pkg cmd roachtest tpchvec go main runtpchvec home agent work go src github com cockroachdb cockroach pkg cmd roachtest tpchvec go main registertpchvec home agent work go src github com cockroachdb cockroach pkg cmd roachtest tpchvec go main testrunner runtest home agent work go src github com cockroachdb cockroach pkg cmd roachtest test runner go runtime goexit usr local go src runtime asm s wraps unrecognized version alpha error types withstack withstack errutil leaferror reproduce to reproduce try bash from perhaps edited lightly caffeinate roachstress sh tpchvec perf no stats cc cockroachdb sql queries
0
258,119
27,563,856,865
IssuesEvent
2023-03-08 01:11:23
samqws-marketing/walmartlabs-concord
https://api.github.com/repos/samqws-marketing/walmartlabs-concord
opened
bcpkix-jdk15on-1.64.jar: 1 vulnerabilities (highest severity is: 5.9)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bcpkix-jdk15on-1.64.jar</b></p></summary> <p></p> <p>Path to dependency file: /k8s/agent-operator/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.64/bcprov-jdk15on-1.64.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/walmartlabs-concord/commit/97d18a56dfc9d482e0ac2ae24230edd85457b90b">97d18a56dfc9d482e0ac2ae24230edd85457b90b</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (bcpkix-jdk15on version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2020-15522](https://www.mend.io/vulnerability-database/CVE-2020-15522) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | bcprov-jdk15on-1.64.jar | Transitive | 1.66 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-15522</summary> ### Vulnerable Library - <b>bcprov-jdk15on-1.64.jar</b></p> <p>The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for Java 5 to Java 11.</p> <p>Library home page: <a href="https://www.bouncycastle.org/java.html">https://www.bouncycastle.org/java.html</a></p> <p>Path to dependency file: /k8s/agent-operator/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.64/bcprov-jdk15on-1.64.jar</p> <p> Dependency Hierarchy: - bcpkix-jdk15on-1.64.jar (Root Library) - :x: **bcprov-jdk15on-1.64.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/walmartlabs-concord/commit/97d18a56dfc9d482e0ac2ae24230edd85457b90b">97d18a56dfc9d482e0ac2ae24230edd85457b90b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures. <p>Publish Date: 2021-05-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-15522>CVE-2020-15522</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15522">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15522</a></p> <p>Release Date: 2021-05-20</p> <p>Fix Resolution (org.bouncycastle:bcprov-jdk15on): 1.66</p> <p>Direct dependency fix Resolution (org.bouncycastle:bcpkix-jdk15on): 1.66</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
True
bcpkix-jdk15on-1.64.jar: 1 vulnerabilities (highest severity is: 5.9) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bcpkix-jdk15on-1.64.jar</b></p></summary> <p></p> <p>Path to dependency file: /k8s/agent-operator/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.64/bcprov-jdk15on-1.64.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/walmartlabs-concord/commit/97d18a56dfc9d482e0ac2ae24230edd85457b90b">97d18a56dfc9d482e0ac2ae24230edd85457b90b</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (bcpkix-jdk15on version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2020-15522](https://www.mend.io/vulnerability-database/CVE-2020-15522) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | bcprov-jdk15on-1.64.jar | Transitive | 1.66 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-15522</summary> ### Vulnerable Library - <b>bcprov-jdk15on-1.64.jar</b></p> <p>The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for Java 5 to Java 11.</p> <p>Library home page: <a href="https://www.bouncycastle.org/java.html">https://www.bouncycastle.org/java.html</a></p> <p>Path to dependency file: /k8s/agent-operator/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.64/bcprov-jdk15on-1.64.jar</p> <p> Dependency Hierarchy: - bcpkix-jdk15on-1.64.jar (Root Library) - :x: **bcprov-jdk15on-1.64.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/walmartlabs-concord/commit/97d18a56dfc9d482e0ac2ae24230edd85457b90b">97d18a56dfc9d482e0ac2ae24230edd85457b90b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures. <p>Publish Date: 2021-05-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-15522>CVE-2020-15522</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15522">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15522</a></p> <p>Release Date: 2021-05-20</p> <p>Fix Resolution (org.bouncycastle:bcprov-jdk15on): 1.66</p> <p>Direct dependency fix Resolution (org.bouncycastle:bcpkix-jdk15on): 1.66</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
non_priority
bcpkix jar vulnerabilities highest severity is vulnerable library bcpkix jar path to dependency file agent operator pom xml path to vulnerable library home wss scanner repository org bouncycastle bcprov bcprov jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in bcpkix version remediation available medium bcprov jar transitive details cve vulnerable library bcprov jar the bouncy castle crypto package is a java implementation of cryptographic algorithms this jar contains jce provider and lightweight api for the bouncy castle cryptography apis for java to java library home page a href path to dependency file agent operator pom xml path to vulnerable library home wss scanner repository org bouncycastle bcprov bcprov jar dependency hierarchy bcpkix jar root library x bcprov jar vulnerable library found in head commit a href found in base branch master vulnerability details bouncy castle bc java before bc c net before bc fja before and bc fna before have a timing issue within the ec math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ecdsa signatures publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org bouncycastle bcprov direct dependency fix resolution org bouncycastle bcpkix rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
0
54,622
13,788,646,703
IssuesEvent
2020-10-09 07:35:24
hazelcast/hazelcast
https://api.github.com/repos/hazelcast/hazelcast
closed
Losing data after promoting from lite member to data member
Module: IMap Source: Community Team: Core Type: Defect
**Description** We are losing data from distributed map in the event of a node failure in 3 node cluster with backup count set to 1. This is due to the use of the lite members and promoting them to data member. **To Reproduce** Steps to reproduce the behavior: 1. Start the cluster with 3 nodes - **all nodes are configured as lite members** 2. Set backup count for the map to 1 3. Wait until cluster is up and running 4. Promote all members to data members - calling `hzlInstance.cluster.promoteLocalLiteMember()` 5. Insert 1000 records into the distributed map 6. Kill one node - `hzlInstance.lifecycleService.terminate()` 7. Count number of records in the distributed map **Actual result:** Data is lost even with backup count set to 1. There is not 1000 records in the map. **Expected behavior:** No data is lost after one node is down. There will be 1000 records in the map. **Additional context** - This happens on Hazelcast version 4.0.3. - Works as expected on version 3.10.2. - Java 11 - Windows **Failing unit test written in Kotlin:** ```Kotlin import com.hazelcast.config.Config import com.hazelcast.config.MergePolicyConfig import com.hazelcast.core.Hazelcast import com.hazelcast.spi.merge.DiscardMergePolicy import org.junit.jupiter.api.Test import kotlin.test.assertEquals import kotlin.test.assertTrue class HazelcastTest { @Test fun `hazelcast bug unit test`() { val numberOfRecordsInsertedIntoMap = 1000 // start first hazelcast instance as lite member val firstHazelcastInstance = Hazelcast.newHazelcastInstance(createConfig(5701)) Thread.sleep(10000) assertTrue(firstHazelcastInstance.lifecycleService.isRunning) // start second and third hazelcast instances as lite member val secondHazelcastInstance = Hazelcast.newHazelcastInstance(createConfig(5702)) val thirdHazelcastInstance = Hazelcast.newHazelcastInstance(createConfig(5703)) Thread.sleep(10000) assertTrue(secondHazelcastInstance.lifecycleService.isRunning) assertTrue(thirdHazelcastInstance.lifecycleService.isRunning) // promote all instances to data members firstHazelcastInstance.cluster.promoteLocalLiteMember() secondHazelcastInstance.cluster.promoteLocalLiteMember() thirdHazelcastInstance.cluster.promoteLocalLiteMember() // give cluster some time Thread.sleep(5000) // check if cluster is in good shape assertTrue(firstHazelcastInstance.partitionService.isClusterSafe) // insert some dummy data into the testing map val testMap = firstHazelcastInstance.getMap<String, String>("test-map") for (i in 1..numberOfRecordsInsertedIntoMap) { testMap["key$i"] = "value$i" } // check all data is correctly inserted assertEquals(numberOfRecordsInsertedIntoMap, testMap.size) // kill second instance (simulate node down) secondHazelcastInstance.lifecycleService.terminate() // wait Thread.sleep(2000) // backup count for the map is set to 1 // even with 1 node down no data loss is expected assertEquals(numberOfRecordsInsertedIntoMap, firstHazelcastInstance.getMap<String, String>("test-map").size) assertEquals(numberOfRecordsInsertedIntoMap, thirdHazelcastInstance.getMap<String, String>("test-map").size) } private fun createConfig(port: Int): Config { val config = Config() // start instance as lite member config.isLiteMember = true // cluster name config.clusterName = "TestClusterName" // network configuration config.networkConfig.port = port config.networkConfig.isPortAutoIncrement = false config.networkConfig.isReuseAddress = true config.networkConfig.restApiConfig.isEnabled = false config.networkConfig.join.multicastConfig.isEnabled = false config.networkConfig.join.tcpIpConfig.isEnabled = true config.networkConfig.join.tcpIpConfig.addMember("127.0.0.1:5701") config.networkConfig.join.tcpIpConfig.addMember("127.0.0.1:5702") config.networkConfig.join.tcpIpConfig.addMember("127.0.0.1:5703") // map configuration val defaultMapConfig = config.getMapConfig("default") defaultMapConfig.backupCount = 1 defaultMapConfig.mergePolicyConfig = MergePolicyConfig(DiscardMergePolicy::class.java.canonicalName, MergePolicyConfig.DEFAULT_BATCH_SIZE) config.addMapConfig(defaultMapConfig) return config } } ``` _We are using lite members to count members in the cluster and then we have some logic if we want to become a full data member or not._
1.0
Losing data after promoting from lite member to data member - **Description** We are losing data from distributed map in the event of a node failure in 3 node cluster with backup count set to 1. This is due to the use of the lite members and promoting them to data member. **To Reproduce** Steps to reproduce the behavior: 1. Start the cluster with 3 nodes - **all nodes are configured as lite members** 2. Set backup count for the map to 1 3. Wait until cluster is up and running 4. Promote all members to data members - calling `hzlInstance.cluster.promoteLocalLiteMember()` 5. Insert 1000 records into the distributed map 6. Kill one node - `hzlInstance.lifecycleService.terminate()` 7. Count number of records in the distributed map **Actual result:** Data is lost even with backup count set to 1. There is not 1000 records in the map. **Expected behavior:** No data is lost after one node is down. There will be 1000 records in the map. **Additional context** - This happens on Hazelcast version 4.0.3. - Works as expected on version 3.10.2. - Java 11 - Windows **Failing unit test written in Kotlin:** ```Kotlin import com.hazelcast.config.Config import com.hazelcast.config.MergePolicyConfig import com.hazelcast.core.Hazelcast import com.hazelcast.spi.merge.DiscardMergePolicy import org.junit.jupiter.api.Test import kotlin.test.assertEquals import kotlin.test.assertTrue class HazelcastTest { @Test fun `hazelcast bug unit test`() { val numberOfRecordsInsertedIntoMap = 1000 // start first hazelcast instance as lite member val firstHazelcastInstance = Hazelcast.newHazelcastInstance(createConfig(5701)) Thread.sleep(10000) assertTrue(firstHazelcastInstance.lifecycleService.isRunning) // start second and third hazelcast instances as lite member val secondHazelcastInstance = Hazelcast.newHazelcastInstance(createConfig(5702)) val thirdHazelcastInstance = Hazelcast.newHazelcastInstance(createConfig(5703)) Thread.sleep(10000) assertTrue(secondHazelcastInstance.lifecycleService.isRunning) assertTrue(thirdHazelcastInstance.lifecycleService.isRunning) // promote all instances to data members firstHazelcastInstance.cluster.promoteLocalLiteMember() secondHazelcastInstance.cluster.promoteLocalLiteMember() thirdHazelcastInstance.cluster.promoteLocalLiteMember() // give cluster some time Thread.sleep(5000) // check if cluster is in good shape assertTrue(firstHazelcastInstance.partitionService.isClusterSafe) // insert some dummy data into the testing map val testMap = firstHazelcastInstance.getMap<String, String>("test-map") for (i in 1..numberOfRecordsInsertedIntoMap) { testMap["key$i"] = "value$i" } // check all data is correctly inserted assertEquals(numberOfRecordsInsertedIntoMap, testMap.size) // kill second instance (simulate node down) secondHazelcastInstance.lifecycleService.terminate() // wait Thread.sleep(2000) // backup count for the map is set to 1 // even with 1 node down no data loss is expected assertEquals(numberOfRecordsInsertedIntoMap, firstHazelcastInstance.getMap<String, String>("test-map").size) assertEquals(numberOfRecordsInsertedIntoMap, thirdHazelcastInstance.getMap<String, String>("test-map").size) } private fun createConfig(port: Int): Config { val config = Config() // start instance as lite member config.isLiteMember = true // cluster name config.clusterName = "TestClusterName" // network configuration config.networkConfig.port = port config.networkConfig.isPortAutoIncrement = false config.networkConfig.isReuseAddress = true config.networkConfig.restApiConfig.isEnabled = false config.networkConfig.join.multicastConfig.isEnabled = false config.networkConfig.join.tcpIpConfig.isEnabled = true config.networkConfig.join.tcpIpConfig.addMember("127.0.0.1:5701") config.networkConfig.join.tcpIpConfig.addMember("127.0.0.1:5702") config.networkConfig.join.tcpIpConfig.addMember("127.0.0.1:5703") // map configuration val defaultMapConfig = config.getMapConfig("default") defaultMapConfig.backupCount = 1 defaultMapConfig.mergePolicyConfig = MergePolicyConfig(DiscardMergePolicy::class.java.canonicalName, MergePolicyConfig.DEFAULT_BATCH_SIZE) config.addMapConfig(defaultMapConfig) return config } } ``` _We are using lite members to count members in the cluster and then we have some logic if we want to become a full data member or not._
non_priority
losing data after promoting from lite member to data member description we are losing data from distributed map in the event of a node failure in node cluster with backup count set to this is due to the use of the lite members and promoting them to data member to reproduce steps to reproduce the behavior start the cluster with nodes all nodes are configured as lite members set backup count for the map to wait until cluster is up and running promote all members to data members calling hzlinstance cluster promotelocallitemember insert records into the distributed map kill one node hzlinstance lifecycleservice terminate count number of records in the distributed map actual result data is lost even with backup count set to there is not records in the map expected behavior no data is lost after one node is down there will be records in the map additional context this happens on hazelcast version works as expected on version java windows failing unit test written in kotlin kotlin import com hazelcast config config import com hazelcast config mergepolicyconfig import com hazelcast core hazelcast import com hazelcast spi merge discardmergepolicy import org junit jupiter api test import kotlin test assertequals import kotlin test asserttrue class hazelcasttest test fun hazelcast bug unit test val numberofrecordsinsertedintomap start first hazelcast instance as lite member val firsthazelcastinstance hazelcast newhazelcastinstance createconfig thread sleep asserttrue firsthazelcastinstance lifecycleservice isrunning start second and third hazelcast instances as lite member val secondhazelcastinstance hazelcast newhazelcastinstance createconfig val thirdhazelcastinstance hazelcast newhazelcastinstance createconfig thread sleep asserttrue secondhazelcastinstance lifecycleservice isrunning asserttrue thirdhazelcastinstance lifecycleservice isrunning promote all instances to data members firsthazelcastinstance cluster promotelocallitemember secondhazelcastinstance cluster promotelocallitemember thirdhazelcastinstance cluster promotelocallitemember give cluster some time thread sleep check if cluster is in good shape asserttrue firsthazelcastinstance partitionservice isclustersafe insert some dummy data into the testing map val testmap firsthazelcastinstance getmap test map for i in numberofrecordsinsertedintomap testmap value i check all data is correctly inserted assertequals numberofrecordsinsertedintomap testmap size kill second instance simulate node down secondhazelcastinstance lifecycleservice terminate wait thread sleep backup count for the map is set to even with node down no data loss is expected assertequals numberofrecordsinsertedintomap firsthazelcastinstance getmap test map size assertequals numberofrecordsinsertedintomap thirdhazelcastinstance getmap test map size private fun createconfig port int config val config config start instance as lite member config islitemember true cluster name config clustername testclustername network configuration config networkconfig port port config networkconfig isportautoincrement false config networkconfig isreuseaddress true config networkconfig restapiconfig isenabled false config networkconfig join multicastconfig isenabled false config networkconfig join tcpipconfig isenabled true config networkconfig join tcpipconfig addmember config networkconfig join tcpipconfig addmember config networkconfig join tcpipconfig addmember map configuration val defaultmapconfig config getmapconfig default defaultmapconfig backupcount defaultmapconfig mergepolicyconfig mergepolicyconfig discardmergepolicy class java canonicalname mergepolicyconfig default batch size config addmapconfig defaultmapconfig return config we are using lite members to count members in the cluster and then we have some logic if we want to become a full data member or not
0
228,426
17,461,224,682
IssuesEvent
2021-08-06 10:44:45
eclipse/jetty.project
https://api.github.com/repos/eclipse/jetty.project
closed
Jetty 10 documentation generating .png files within src directory.
Documentation
**Jetty version** 10.0.x **Description** In the operations-guide directory I'm getting a lot of generated .png .svg files. These files should probably be generated in the target directory so they're ignored by git. ``` Lachlan@Lachlans-MBP: ~/webtide/src/jetty-10.0.x/jetty-documentation/src/main/asciidoc/operations-guide (jetty-10.0.x-5229-WebSocketDocumentation)^1 [513]: ls -la total 272 drwxr-xr-x 35 Lachlan staff 1120 Dec 3 17:04 . drwxr-xr-x 8 Lachlan staff 256 Oct 6 11:02 .. drwxr-xr-x 3 Lachlan staff 96 Dec 3 17:02 .asciidoctor -rw-r--r-- 1 Lachlan staff 210 Sep 24 08:47 .asciidoctorconfig drwxr-xr-x 3 Lachlan staff 96 Nov 11 09:26 annotations drwxr-xr-x 8 Lachlan staff 256 Dec 3 10:34 begin drwxr-xr-x 3 Lachlan staff 96 Sep 24 08:47 contexts drwxr-xr-x 10 Lachlan staff 320 Nov 11 09:26 deploy -rw-r--r-- 1 Lachlan staff 8179 Dec 3 17:04 diag-2830e38460d606111888c5df2a645163.png -rw-r--r-- 1 Lachlan staff 3293 Dec 3 17:04 diag-2830e38460d606111888c5df2a645163.svg -rw-r--r-- 1 Lachlan staff 8136 Dec 3 17:04 diag-70817cc5c7137abc9759cdcd3edbb658.png -rw-r--r-- 1 Lachlan staff 3021 Dec 3 17:04 diag-70817cc5c7137abc9759cdcd3edbb658.svg -rw-r--r-- 1 Lachlan staff 8090 Dec 3 17:04 diag-7387dfbb6f9fb9cfa951a697aca488a8.png -rw-r--r-- 1 Lachlan staff 2919 Dec 3 17:04 diag-7387dfbb6f9fb9cfa951a697aca488a8.svg -rw-r--r-- 1 Lachlan staff 20939 Dec 3 17:04 diag-8a7fb4bb9c84453a4bf01a24558e8026.png -rw-r--r-- 1 Lachlan staff 7211 Dec 3 17:04 diag-8a7fb4bb9c84453a4bf01a24558e8026.svg -rw-r--r-- 1 Lachlan staff 17220 Dec 3 17:04 diag-9f323b812fd1edc8217715ca0c2ba8e9.png -rw-r--r-- 1 Lachlan staff 2975 Dec 3 17:04 diag-9f323b812fd1edc8217715ca0c2ba8e9.svg -rw-r--r-- 1 Lachlan staff 21137 Dec 3 17:04 diag-e2488cc783b3434076c5a44ee7f19a2b.png -rw-r--r-- 1 Lachlan staff 7188 Dec 3 17:04 diag-e2488cc783b3434076c5a44ee7f19a2b.svg -rw-r--r-- 1 Lachlan staff 1508 Dec 3 17:02 index.adoc ... ```
1.0
Jetty 10 documentation generating .png files within src directory. - **Jetty version** 10.0.x **Description** In the operations-guide directory I'm getting a lot of generated .png .svg files. These files should probably be generated in the target directory so they're ignored by git. ``` Lachlan@Lachlans-MBP: ~/webtide/src/jetty-10.0.x/jetty-documentation/src/main/asciidoc/operations-guide (jetty-10.0.x-5229-WebSocketDocumentation)^1 [513]: ls -la total 272 drwxr-xr-x 35 Lachlan staff 1120 Dec 3 17:04 . drwxr-xr-x 8 Lachlan staff 256 Oct 6 11:02 .. drwxr-xr-x 3 Lachlan staff 96 Dec 3 17:02 .asciidoctor -rw-r--r-- 1 Lachlan staff 210 Sep 24 08:47 .asciidoctorconfig drwxr-xr-x 3 Lachlan staff 96 Nov 11 09:26 annotations drwxr-xr-x 8 Lachlan staff 256 Dec 3 10:34 begin drwxr-xr-x 3 Lachlan staff 96 Sep 24 08:47 contexts drwxr-xr-x 10 Lachlan staff 320 Nov 11 09:26 deploy -rw-r--r-- 1 Lachlan staff 8179 Dec 3 17:04 diag-2830e38460d606111888c5df2a645163.png -rw-r--r-- 1 Lachlan staff 3293 Dec 3 17:04 diag-2830e38460d606111888c5df2a645163.svg -rw-r--r-- 1 Lachlan staff 8136 Dec 3 17:04 diag-70817cc5c7137abc9759cdcd3edbb658.png -rw-r--r-- 1 Lachlan staff 3021 Dec 3 17:04 diag-70817cc5c7137abc9759cdcd3edbb658.svg -rw-r--r-- 1 Lachlan staff 8090 Dec 3 17:04 diag-7387dfbb6f9fb9cfa951a697aca488a8.png -rw-r--r-- 1 Lachlan staff 2919 Dec 3 17:04 diag-7387dfbb6f9fb9cfa951a697aca488a8.svg -rw-r--r-- 1 Lachlan staff 20939 Dec 3 17:04 diag-8a7fb4bb9c84453a4bf01a24558e8026.png -rw-r--r-- 1 Lachlan staff 7211 Dec 3 17:04 diag-8a7fb4bb9c84453a4bf01a24558e8026.svg -rw-r--r-- 1 Lachlan staff 17220 Dec 3 17:04 diag-9f323b812fd1edc8217715ca0c2ba8e9.png -rw-r--r-- 1 Lachlan staff 2975 Dec 3 17:04 diag-9f323b812fd1edc8217715ca0c2ba8e9.svg -rw-r--r-- 1 Lachlan staff 21137 Dec 3 17:04 diag-e2488cc783b3434076c5a44ee7f19a2b.png -rw-r--r-- 1 Lachlan staff 7188 Dec 3 17:04 diag-e2488cc783b3434076c5a44ee7f19a2b.svg -rw-r--r-- 1 Lachlan staff 1508 Dec 3 17:02 index.adoc ... ```
non_priority
jetty documentation generating png files within src directory jetty version x description in the operations guide directory i m getting a lot of generated png svg files these files should probably be generated in the target directory so they re ignored by git lachlan lachlans mbp webtide src jetty x jetty documentation src main asciidoc operations guide jetty x websocketdocumentation ls la total drwxr xr x lachlan staff dec drwxr xr x lachlan staff oct drwxr xr x lachlan staff dec asciidoctor rw r r lachlan staff sep asciidoctorconfig drwxr xr x lachlan staff nov annotations drwxr xr x lachlan staff dec begin drwxr xr x lachlan staff sep contexts drwxr xr x lachlan staff nov deploy rw r r lachlan staff dec diag png rw r r lachlan staff dec diag svg rw r r lachlan staff dec diag png rw r r lachlan staff dec diag svg rw r r lachlan staff dec diag png rw r r lachlan staff dec diag svg rw r r lachlan staff dec diag png rw r r lachlan staff dec diag svg rw r r lachlan staff dec diag png rw r r lachlan staff dec diag svg rw r r lachlan staff dec diag png rw r r lachlan staff dec diag svg rw r r lachlan staff dec index adoc
0
27,540
4,059,011,842
IssuesEvent
2016-05-25 07:56:20
PatMyhub/SR3SPJTOQHQB6632J2KU643C
https://api.github.com/repos/PatMyhub/SR3SPJTOQHQB6632J2KU643C
closed
Xj/EWF26T8EWwHKfybMbmq7rw+vMqjvw9RUMeZ6WX/C3nxCGnblykMW6l5OipunJ7PM0Ke1KRT/wi7HYuwdhu8Aus0F/HxX40tCprhZJJxDw+76bqNu5R6TAaRl88u4qd/hrI/tu+rR/c5nNKIywDWlNfYDsFJwJiCx++ef564U=
design
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
1.0
Xj/EWF26T8EWwHKfybMbmq7rw+vMqjvw9RUMeZ6WX/C3nxCGnblykMW6l5OipunJ7PM0Ke1KRT/wi7HYuwdhu8Aus0F/HxX40tCprhZJJxDw+76bqNu5R6TAaRl88u4qd/hrI/tu+rR/c5nNKIywDWlNfYDsFJwJiCx++ef564U= - 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
non_priority
xj hri tu rr pcdqyhwfaq ha atpg jcs f qs
0
199,052
15,732,671,634
IssuesEvent
2021-03-29 18:35:05
AY2021S2-CS2103-W16-3/tp
https://api.github.com/repos/AY2021S2-CS2103-W16-3/tp
opened
💡 Update user stories in developer guide
type::documentation
### Describe the issue *What is the problem, if any? What is the desired behavior?* Use cases are currently either invalid (due to deprecated commands), or less pertinent to target audience (i.e. welfare IC). To update. ________________________________________________________________ ### Additional context *Describe possible and/or alternative solutions, to highlight required scope of work.*
1.0
💡 Update user stories in developer guide - ### Describe the issue *What is the problem, if any? What is the desired behavior?* Use cases are currently either invalid (due to deprecated commands), or less pertinent to target audience (i.e. welfare IC). To update. ________________________________________________________________ ### Additional context *Describe possible and/or alternative solutions, to highlight required scope of work.*
non_priority
💡 update user stories in developer guide describe the issue what is the problem if any what is the desired behavior use cases are currently either invalid due to deprecated commands or less pertinent to target audience i e welfare ic to update additional context describe possible and or alternative solutions to highlight required scope of work
0
438,990
30,672,530,175
IssuesEvent
2023-07-26 00:31:14
Isaaccna/Github-Blog
https://api.github.com/repos/Isaaccna/Github-Blog
opened
Arquitetura da aplicação
documentation
Definimos como arquitetura as técnicas e os padrões usados para projetar e desenvolver uma aplicação. Ela fornece um roadmap e práticas recomendadas a serem seguidos durante esse desenvolvimento para que você tenha uma aplicação bem-estruturada. Os padrões de design de software ajudam no desenvolvimento de uma aplicação. Eles descrevem uma solução reproduzível para um problema. Os padrões podem ser vinculados para criar arquiteturas de aplicação mais genéricas. Em vez de criar a arquitetura do zero, você pode usar padrões de design existentes, garantindo que tudo funcione da maneira correta. O serviços de front-end e back-end fazem parte da arquitetura da aplicação. O desenvolvimento de front-end tem como foco a experiência do usuário da aplicação, já o de back-end se concentra em fornecer acesso aos dados, serviços e outros sistemas existentes responsáveis pelo funcionamento dela. A arquitetura é o ponto de partida ou o roadmap para desenvolver uma aplicação. No entanto, você precisa escolher determinados aspectos de implementação não definidos em uma arquitetura. Por exemplo, como uma etapa inicial, escolha a linguagem de programação para escrever a aplicação. Há muitas linguagens de programação usadas no desenvolvimento de softwares. Algumas delas são utilizadas na criação de determinados tipos de aplicações, como o Swift para aplicações mobile ou o JavaScript para desenvolvimento de front-end. Atualmente, o uso do JavaScript com HTML e CSS é uma das linguagens de programação mais populares para desenvolvimento de aplicação web. Outras linguagens de programação conhecidas incluem o Ruby, Python, TypeScript, Java, PHP, SQL, entre outras. A opção mais apropriada para você depende do tipo da aplicação, dos recursos de desenvolvimento disponíveis e dos requisitos. Tradicionalmente, as aplicações eram escritas como uma unidade de código em que todos os componentes tinham os mesmos recursos e espaço de memória. Esse tipo de arquitetura é conhecido como um monólito. Já as arquiteturas modernas de aplicação costumam ser mais levemente acopladas. Elas usam microsserviços e interfaces de programação de aplicações (APIs) para conectar serviços, oferecendo a base para as aplicações nativas em nuvem. Com o desenvolvimento nativo em nuvem, você acelera a criação de novas aplicações, otimiza as existentes e oferece uma experiência de gerenciamento automatizada e desenvolvimento consistente em nuvens privadas, públicas e híbridas.
1.0
Arquitetura da aplicação - Definimos como arquitetura as técnicas e os padrões usados para projetar e desenvolver uma aplicação. Ela fornece um roadmap e práticas recomendadas a serem seguidos durante esse desenvolvimento para que você tenha uma aplicação bem-estruturada. Os padrões de design de software ajudam no desenvolvimento de uma aplicação. Eles descrevem uma solução reproduzível para um problema. Os padrões podem ser vinculados para criar arquiteturas de aplicação mais genéricas. Em vez de criar a arquitetura do zero, você pode usar padrões de design existentes, garantindo que tudo funcione da maneira correta. O serviços de front-end e back-end fazem parte da arquitetura da aplicação. O desenvolvimento de front-end tem como foco a experiência do usuário da aplicação, já o de back-end se concentra em fornecer acesso aos dados, serviços e outros sistemas existentes responsáveis pelo funcionamento dela. A arquitetura é o ponto de partida ou o roadmap para desenvolver uma aplicação. No entanto, você precisa escolher determinados aspectos de implementação não definidos em uma arquitetura. Por exemplo, como uma etapa inicial, escolha a linguagem de programação para escrever a aplicação. Há muitas linguagens de programação usadas no desenvolvimento de softwares. Algumas delas são utilizadas na criação de determinados tipos de aplicações, como o Swift para aplicações mobile ou o JavaScript para desenvolvimento de front-end. Atualmente, o uso do JavaScript com HTML e CSS é uma das linguagens de programação mais populares para desenvolvimento de aplicação web. Outras linguagens de programação conhecidas incluem o Ruby, Python, TypeScript, Java, PHP, SQL, entre outras. A opção mais apropriada para você depende do tipo da aplicação, dos recursos de desenvolvimento disponíveis e dos requisitos. Tradicionalmente, as aplicações eram escritas como uma unidade de código em que todos os componentes tinham os mesmos recursos e espaço de memória. Esse tipo de arquitetura é conhecido como um monólito. Já as arquiteturas modernas de aplicação costumam ser mais levemente acopladas. Elas usam microsserviços e interfaces de programação de aplicações (APIs) para conectar serviços, oferecendo a base para as aplicações nativas em nuvem. Com o desenvolvimento nativo em nuvem, você acelera a criação de novas aplicações, otimiza as existentes e oferece uma experiência de gerenciamento automatizada e desenvolvimento consistente em nuvens privadas, públicas e híbridas.
non_priority
arquitetura da aplicação definimos como arquitetura as técnicas e os padrões usados para projetar e desenvolver uma aplicação ela fornece um roadmap e práticas recomendadas a serem seguidos durante esse desenvolvimento para que você tenha uma aplicação bem estruturada os padrões de design de software ajudam no desenvolvimento de uma aplicação eles descrevem uma solução reproduzível para um problema os padrões podem ser vinculados para criar arquiteturas de aplicação mais genéricas em vez de criar a arquitetura do zero você pode usar padrões de design existentes garantindo que tudo funcione da maneira correta o serviços de front end e back end fazem parte da arquitetura da aplicação o desenvolvimento de front end tem como foco a experiência do usuário da aplicação já o de back end se concentra em fornecer acesso aos dados serviços e outros sistemas existentes responsáveis pelo funcionamento dela a arquitetura é o ponto de partida ou o roadmap para desenvolver uma aplicação no entanto você precisa escolher determinados aspectos de implementação não definidos em uma arquitetura por exemplo como uma etapa inicial escolha a linguagem de programação para escrever a aplicação há muitas linguagens de programação usadas no desenvolvimento de softwares algumas delas são utilizadas na criação de determinados tipos de aplicações como o swift para aplicações mobile ou o javascript para desenvolvimento de front end atualmente o uso do javascript com html e css é uma das linguagens de programação mais populares para desenvolvimento de aplicação web outras linguagens de programação conhecidas incluem o ruby python typescript java php sql entre outras a opção mais apropriada para você depende do tipo da aplicação dos recursos de desenvolvimento disponíveis e dos requisitos tradicionalmente as aplicações eram escritas como uma unidade de código em que todos os componentes tinham os mesmos recursos e espaço de memória esse tipo de arquitetura é conhecido como um monólito já as arquiteturas modernas de aplicação costumam ser mais levemente acopladas elas usam microsserviços e interfaces de programação de aplicações apis para conectar serviços oferecendo a base para as aplicações nativas em nuvem com o desenvolvimento nativo em nuvem você acelera a criação de novas aplicações otimiza as existentes e oferece uma experiência de gerenciamento automatizada e desenvolvimento consistente em nuvens privadas públicas e híbridas
0
25,538
11,188,281,812
IssuesEvent
2020-01-02 03:54:28
eugenetriguba/of
https://api.github.com/repos/eugenetriguba/of
opened
Change authentication to not store passwords
enhancement security
The current way to authenticate to be able to send emails uses Gmail, and the username and password for that account is in a JSON file. This should be changed to a more secure authentication method.
True
Change authentication to not store passwords - The current way to authenticate to be able to send emails uses Gmail, and the username and password for that account is in a JSON file. This should be changed to a more secure authentication method.
non_priority
change authentication to not store passwords the current way to authenticate to be able to send emails uses gmail and the username and password for that account is in a json file this should be changed to a more secure authentication method
0
378,585
26,327,600,022
IssuesEvent
2023-01-10 08:16:31
eclipse/rdf4j
https://api.github.com/repos/eclipse/rdf4j
opened
Javadoc fix missing refs and 'lt' rendering
📶 enhancement website / documentation
### Current Behavior Generating javadoc yields a few warnings on missing references and issues with '<' not being escaped ### Expected Behavior Fix the missing references and rendering issues ### Steps To Reproduce _No response_ ### Version 4.2.2 ### Are you interested in contributing a solution yourself? Yes ### Anything else? _No response_
1.0
Javadoc fix missing refs and 'lt' rendering - ### Current Behavior Generating javadoc yields a few warnings on missing references and issues with '<' not being escaped ### Expected Behavior Fix the missing references and rendering issues ### Steps To Reproduce _No response_ ### Version 4.2.2 ### Are you interested in contributing a solution yourself? Yes ### Anything else? _No response_
non_priority
javadoc fix missing refs and lt rendering current behavior generating javadoc yields a few warnings on missing references and issues with not being escaped expected behavior fix the missing references and rendering issues steps to reproduce no response version are you interested in contributing a solution yourself yes anything else no response
0
5,310
3,198,588,710
IssuesEvent
2015-10-01 13:07:21
Yoast/wordpress-seo
https://api.github.com/repos/Yoast/wordpress-seo
closed
Making util for wp_json_encode
code-review enhancement
Instead of checking every where it's better to make a wrapper method for the `json_encode` / `wp_json_encode`. This prevent checking if the method exists everywhere.
1.0
Making util for wp_json_encode - Instead of checking every where it's better to make a wrapper method for the `json_encode` / `wp_json_encode`. This prevent checking if the method exists everywhere.
non_priority
making util for wp json encode instead of checking every where it s better to make a wrapper method for the json encode wp json encode this prevent checking if the method exists everywhere
0
87,385
10,905,976,871
IssuesEvent
2019-11-20 11:55:33
microsoft/vscode
https://api.github.com/repos/microsoft/vscode
closed
Inconsistent key binding for Go Back command (workbench.action.navigateBack) between VS on Linux, VS on Windows, VS 2019 on Windows
*as-designed
<!-- Please search existing issues to avoid creating duplicates. --> <!-- Also please test using the latest insiders build to make sure your issue has not already been fixed: https://code.visualstudio.com/insiders/ --> <!-- Use Help > Report Issue to prefill these. --> - VSCode Version: all - OS Version: all Steps to Reproduce: 1. Want to to jump cursor to previous location 2. Think about what OS you're on 3. Try a bunch of key combinations because can't remember which binding is for which OS 4. Oh it's that one 5. Sad <!-- Launch with `code --disable-extensions` to check. --> Does this issue occur when all extensions are disabled?: Yes/No yes
1.0
Inconsistent key binding for Go Back command (workbench.action.navigateBack) between VS on Linux, VS on Windows, VS 2019 on Windows - <!-- Please search existing issues to avoid creating duplicates. --> <!-- Also please test using the latest insiders build to make sure your issue has not already been fixed: https://code.visualstudio.com/insiders/ --> <!-- Use Help > Report Issue to prefill these. --> - VSCode Version: all - OS Version: all Steps to Reproduce: 1. Want to to jump cursor to previous location 2. Think about what OS you're on 3. Try a bunch of key combinations because can't remember which binding is for which OS 4. Oh it's that one 5. Sad <!-- Launch with `code --disable-extensions` to check. --> Does this issue occur when all extensions are disabled?: Yes/No yes
non_priority
inconsistent key binding for go back command workbench action navigateback between vs on linux vs on windows vs on windows report issue to prefill these vscode version all os version all steps to reproduce want to to jump cursor to previous location think about what os you re on try a bunch of key combinations because can t remember which binding is for which os oh it s that one sad does this issue occur when all extensions are disabled yes no yes
0
342,469
24,743,719,549
IssuesEvent
2022-10-21 07:59:03
PPang-Delivery/PPang-Delivery
https://api.github.com/repos/PPang-Delivery/PPang-Delivery
closed
:sparkles: feat: 채팅 기능 구현
documentation enhancement
- [ ] 채팅기능 구조 조사 - [ ] Firebase 기초 문법 숙지(로그인, 데이터 추가 및 읽기) - [x] Figma study - [x] 맵 팝업창에서 팡해요 리스트로 뷰 전환 - [ ] 채팡해요 단체 채팅방 리스트만들기 - [ ] 개인 dm 채팅방 리스트만들기 - [ ] 채팅방 구현
1.0
:sparkles: feat: 채팅 기능 구현 - - [ ] 채팅기능 구조 조사 - [ ] Firebase 기초 문법 숙지(로그인, 데이터 추가 및 읽기) - [x] Figma study - [x] 맵 팝업창에서 팡해요 리스트로 뷰 전환 - [ ] 채팡해요 단체 채팅방 리스트만들기 - [ ] 개인 dm 채팅방 리스트만들기 - [ ] 채팅방 구현
non_priority
sparkles feat 채팅 기능 구현 채팅기능 구조 조사 firebase 기초 문법 숙지 로그인 데이터 추가 및 읽기 figma study 맵 팝업창에서 팡해요 리스트로 뷰 전환 채팡해요 단체 채팅방 리스트만들기 개인 dm 채팅방 리스트만들기 채팅방 구현
0
286,619
21,582,163,852
IssuesEvent
2022-05-02 19:59:35
CSE112-sp22-group9/cse112-sp22-group9
https://api.github.com/repos/CSE112-sp22-group9/cse112-sp22-group9
opened
Changing documention for source/Index
documentation issue
## Name and Email - Name: Justin Ramirez - Email: jmr002@ucsd.edu ## Complexity of Issue (Scale from 1-5) - 1 ## Issue Description - Updating comments/style, minor cleanup for files in source/Index/ ### Make sure to label this issue with the 'issue' label!
1.0
Changing documention for source/Index - ## Name and Email - Name: Justin Ramirez - Email: jmr002@ucsd.edu ## Complexity of Issue (Scale from 1-5) - 1 ## Issue Description - Updating comments/style, minor cleanup for files in source/Index/ ### Make sure to label this issue with the 'issue' label!
non_priority
changing documention for source index name and email name justin ramirez email ucsd edu complexity of issue scale from issue description updating comments style minor cleanup for files in source index make sure to label this issue with the issue label
0
36,635
4,745,878,159
IssuesEvent
2016-10-21 09:04:11
CreatorDev/openwrt
https://api.github.com/repos/CreatorDev/openwrt
opened
Add documentation regarding Wi-Fi and 6LoWPAN interference
p: medium s: design t: documentation
@nikhil-zinjurde-imgtec - We should make developers of Ci40 and Creator Kit aware of the reasons for having Wi-Fi and 6LoWPAN on channels far away from each other. We should also mention the default channel (i.e. 26) being used for our demo applications
1.0
Add documentation regarding Wi-Fi and 6LoWPAN interference - @nikhil-zinjurde-imgtec - We should make developers of Ci40 and Creator Kit aware of the reasons for having Wi-Fi and 6LoWPAN on channels far away from each other. We should also mention the default channel (i.e. 26) being used for our demo applications
non_priority
add documentation regarding wi fi and interference nikhil zinjurde imgtec we should make developers of and creator kit aware of the reasons for having wi fi and on channels far away from each other we should also mention the default channel i e being used for our demo applications
0
22,135
15,018,332,931
IssuesEvent
2021-02-01 12:04:44
airyhq/airy
https://api.github.com/repos/airyhq/airy
closed
Flexible cpu and ram resources for the Vagrant box at bootstrap
infrastructure
Currently the resources that Airy core is bootstrapped with are hard-coded in `/infrastructure/Vagrantfile`. As core can now be deployed without the optional components by default, we need to make this values flexible, so that people can specify different values, at bootstrap time. Example: ``` ./scripts/bootstrap.sh How much cores do you want to use (default: 4, minimum: 2): 2 How much RAM (GB) do you want to use (default 7, minimum: 3): 4 ``` We also need to specify which are the minimal values we accept. Probably 2 for cores and 3 for GB ram. Also we can retrieve information for the machine where the Vagrant box will be created, so that we can make appropriate recommendations. - [ ] Overwrite default cpus and memory with env variables - [ ] Prompt the user to specify values - [ ] Print available system resources - [ ] Check whether it is possible to run the platform
1.0
Flexible cpu and ram resources for the Vagrant box at bootstrap - Currently the resources that Airy core is bootstrapped with are hard-coded in `/infrastructure/Vagrantfile`. As core can now be deployed without the optional components by default, we need to make this values flexible, so that people can specify different values, at bootstrap time. Example: ``` ./scripts/bootstrap.sh How much cores do you want to use (default: 4, minimum: 2): 2 How much RAM (GB) do you want to use (default 7, minimum: 3): 4 ``` We also need to specify which are the minimal values we accept. Probably 2 for cores and 3 for GB ram. Also we can retrieve information for the machine where the Vagrant box will be created, so that we can make appropriate recommendations. - [ ] Overwrite default cpus and memory with env variables - [ ] Prompt the user to specify values - [ ] Print available system resources - [ ] Check whether it is possible to run the platform
non_priority
flexible cpu and ram resources for the vagrant box at bootstrap currently the resources that airy core is bootstrapped with are hard coded in infrastructure vagrantfile as core can now be deployed without the optional components by default we need to make this values flexible so that people can specify different values at bootstrap time example scripts bootstrap sh how much cores do you want to use default minimum how much ram gb do you want to use default minimum we also need to specify which are the minimal values we accept probably for cores and for gb ram also we can retrieve information for the machine where the vagrant box will be created so that we can make appropriate recommendations overwrite default cpus and memory with env variables prompt the user to specify values print available system resources check whether it is possible to run the platform
0
379,866
26,391,008,482
IssuesEvent
2023-01-12 15:40:57
Qiskit-Extensions/quantum-serverless
https://api.github.com/repos/Qiskit-Extensions/quantum-serverless
closed
Docs: add state to groundstate demo tutorial
documentation good first issue
<!-- ⚠️ If you do not respect this template, your issue will be closed --> <!-- ⚠️ Make sure to browse the opened and closed issues to confirm this idea does not exist. --> ### What is the expected enhancement? Docs: add state to groundstate demo tutorial
1.0
Docs: add state to groundstate demo tutorial - <!-- ⚠️ If you do not respect this template, your issue will be closed --> <!-- ⚠️ Make sure to browse the opened and closed issues to confirm this idea does not exist. --> ### What is the expected enhancement? Docs: add state to groundstate demo tutorial
non_priority
docs add state to groundstate demo tutorial what is the expected enhancement docs add state to groundstate demo tutorial
0
72,635
31,768,996,631
IssuesEvent
2023-09-12 10:31:24
gauravrs18/issue_onboarding
https://api.github.com/repos/gauravrs18/issue_onboarding
closed
dev-angular-code-account-services-new-connection-component-activate-component -consumer-details-component -activate-component -first-meter-reading-component
CX-account-services
dev-angular-code-account-services-new-connection-component-activate-component -consumer-details-component -activate-component -first-meter-reading-component
1.0
dev-angular-code-account-services-new-connection-component-activate-component -consumer-details-component -activate-component -first-meter-reading-component - dev-angular-code-account-services-new-connection-component-activate-component -consumer-details-component -activate-component -first-meter-reading-component
non_priority
dev angular code account services new connection component activate component consumer details component activate component first meter reading component dev angular code account services new connection component activate component consumer details component activate component first meter reading component
0
93,893
11,826,406,993
IssuesEvent
2020-03-21 17:43:36
WorldHealthOrganization/app
https://api.github.com/repos/WorldHealthOrganization/app
closed
v0.1 Illustration Issues
blocked design
Issues raised during Eng/Design flow review: - The WHO-owned Protect Yourself assets have text baked into the images. [localization and accessibility] - Current WHO illustrations used in the v0.1 flow may be licensed in a way that is incompatible with our app. [legal] - We have only CDC and no WHO-approved Check Your Health assets. - Lack of illustrator resources.
1.0
v0.1 Illustration Issues - Issues raised during Eng/Design flow review: - The WHO-owned Protect Yourself assets have text baked into the images. [localization and accessibility] - Current WHO illustrations used in the v0.1 flow may be licensed in a way that is incompatible with our app. [legal] - We have only CDC and no WHO-approved Check Your Health assets. - Lack of illustrator resources.
non_priority
illustration issues issues raised during eng design flow review the who owned protect yourself assets have text baked into the images current who illustrations used in the flow may be licensed in a way that is incompatible with our app we have only cdc and no who approved check your health assets lack of illustrator resources
0
6,142
5,292,281,664
IssuesEvent
2017-02-09 01:29:10
dotnet/roslyn
https://api.github.com/repos/dotnet/roslyn
opened
Small method body cache disabled for deterministic builds
Area-Compilers Bug Tenet-Performance
The small method body cache is non-deterministic in the compiler. https://github.com/dotnet/roslyn/issues/7595 In order to work around this it is disabled during deterministic builds. This is functional but does result in a slight increase in IL size of the resulting binary. This bug tracks the effort to re-enable the small method body cache during deterministic builds.
True
Small method body cache disabled for deterministic builds - The small method body cache is non-deterministic in the compiler. https://github.com/dotnet/roslyn/issues/7595 In order to work around this it is disabled during deterministic builds. This is functional but does result in a slight increase in IL size of the resulting binary. This bug tracks the effort to re-enable the small method body cache during deterministic builds.
non_priority
small method body cache disabled for deterministic builds the small method body cache is non deterministic in the compiler in order to work around this it is disabled during deterministic builds this is functional but does result in a slight increase in il size of the resulting binary this bug tracks the effort to re enable the small method body cache during deterministic builds
0
297,211
22,344,959,876
IssuesEvent
2022-06-15 06:54:42
Egggggg/Marzipan
https://api.github.com/repos/Egggggg/Marzipan
opened
Expression variables guide
documentation
Expression variables need a guide to explain things like their variables and functions. This should include inline expressions.
1.0
Expression variables guide - Expression variables need a guide to explain things like their variables and functions. This should include inline expressions.
non_priority
expression variables guide expression variables need a guide to explain things like their variables and functions this should include inline expressions
0
28,821
23,511,880,092
IssuesEvent
2022-08-18 17:22:18
directus/docs
https://api.github.com/repos/directus/docs
opened
Dynamically link GitHub discussions
Infrastructure
For each section in the docs, dynamically link the relevant Github discussion.
1.0
Dynamically link GitHub discussions - For each section in the docs, dynamically link the relevant Github discussion.
non_priority
dynamically link github discussions for each section in the docs dynamically link the relevant github discussion
0
19,189
4,350,648,465
IssuesEvent
2016-07-31 11:38:11
borgbackup/borg
https://api.github.com/repos/borgbackup/borg
closed
document files cache entry age behaviour
documentation
https://github.com/borgbackup/borg/commit/b9952efd68163a909c05cdd3f2a5408e27dd5424 removed information about entry age behaviour. Create a new FAQ entry and document it (in a better way).
1.0
document files cache entry age behaviour - https://github.com/borgbackup/borg/commit/b9952efd68163a909c05cdd3f2a5408e27dd5424 removed information about entry age behaviour. Create a new FAQ entry and document it (in a better way).
non_priority
document files cache entry age behaviour removed information about entry age behaviour create a new faq entry and document it in a better way
0
377,289
26,244,833,346
IssuesEvent
2023-01-05 14:29:07
ethereum/sourcify
https://api.github.com/repos/ethereum/sourcify
opened
Update metadata Solidity docs, add CBOR fields Add playground to Solidity docs and keys used by the compiler
documentation
- [ ] Fix the ordering of the fields in the example given in docs. This does not reflect the compiler's ordering of fields. - [ ] Add the CBOR fields currently added by the compiler `ipfs`, `experimental` etc... - [ ] Add a reference to playground.sourcify.dev in the CBOR encoding section
1.0
Update metadata Solidity docs, add CBOR fields Add playground to Solidity docs and keys used by the compiler - - [ ] Fix the ordering of the fields in the example given in docs. This does not reflect the compiler's ordering of fields. - [ ] Add the CBOR fields currently added by the compiler `ipfs`, `experimental` etc... - [ ] Add a reference to playground.sourcify.dev in the CBOR encoding section
non_priority
update metadata solidity docs add cbor fields add playground to solidity docs and keys used by the compiler fix the ordering of the fields in the example given in docs this does not reflect the compiler s ordering of fields add the cbor fields currently added by the compiler ipfs experimental etc add a reference to playground sourcify dev in the cbor encoding section
0
213,902
24,022,532,586
IssuesEvent
2022-09-15 08:50:51
sast-automation-dev/dvna-25
https://api.github.com/repos/sast-automation-dev/dvna-25
opened
node-serialize-0.0.4.tgz: 1 vulnerabilities (highest severity is: 9.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-serialize-0.0.4.tgz</b></p></summary> <p>Serialize a object including it's function into a JSON.</p> <p>Library home page: <a href="https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz">https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/node-serialize/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/dvna-25/commit/7b2c46f684e2dab7219e5d6193b541bae4a53734">7b2c46f684e2dab7219e5d6193b541bae4a53734</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2017-5941](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-5941) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | node-serialize-0.0.4.tgz | Direct | N/A | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-5941</summary> ### Vulnerable Library - <b>node-serialize-0.0.4.tgz</b></p> <p>Serialize a object including it's function into a JSON.</p> <p>Library home page: <a href="https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz">https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/node-serialize/package.json</p> <p> Dependency Hierarchy: - :x: **node-serialize-0.0.4.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/dvna-25/commit/7b2c46f684e2dab7219e5d6193b541bae4a53734">7b2c46f684e2dab7219e5d6193b541bae4a53734</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in the node-serialize package 0.0.4 for Node.js. Untrusted data passed into the unserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE). <p>Publish Date: 2017-02-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-5941>CVE-2017-5941</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> </details>
True
node-serialize-0.0.4.tgz: 1 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-serialize-0.0.4.tgz</b></p></summary> <p>Serialize a object including it's function into a JSON.</p> <p>Library home page: <a href="https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz">https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/node-serialize/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/dvna-25/commit/7b2c46f684e2dab7219e5d6193b541bae4a53734">7b2c46f684e2dab7219e5d6193b541bae4a53734</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2017-5941](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-5941) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | node-serialize-0.0.4.tgz | Direct | N/A | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-5941</summary> ### Vulnerable Library - <b>node-serialize-0.0.4.tgz</b></p> <p>Serialize a object including it's function into a JSON.</p> <p>Library home page: <a href="https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz">https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/node-serialize/package.json</p> <p> Dependency Hierarchy: - :x: **node-serialize-0.0.4.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/dvna-25/commit/7b2c46f684e2dab7219e5d6193b541bae4a53734">7b2c46f684e2dab7219e5d6193b541bae4a53734</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> An issue was discovered in the node-serialize package 0.0.4 for Node.js. Untrusted data passed into the unserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE). <p>Publish Date: 2017-02-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-5941>CVE-2017-5941</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> </details>
non_priority
node serialize tgz vulnerabilities highest severity is vulnerable library node serialize tgz serialize a object including it s function into a json library home page a href path to dependency file package json path to vulnerable library node modules node serialize package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high node serialize tgz direct n a details cve vulnerable library node serialize tgz serialize a object including it s function into a json library home page a href path to dependency file package json path to vulnerable library node modules node serialize package json dependency hierarchy x node serialize tgz vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in the node serialize package for node js untrusted data passed into the unserialize function can be exploited to achieve arbitrary code execution by passing a javascript object with an immediately invoked function expression iife publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href
0
128,006
18,024,860,091
IssuesEvent
2021-09-17 02:12:37
scottstientjes/snipe-it
https://api.github.com/repos/scottstientjes/snipe-it
opened
CVE-2021-3795 (Medium) detected in semver-regex-1.0.0.tgz
security vulnerability
## CVE-2021-3795 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>semver-regex-1.0.0.tgz</b></p></summary> <p>Regular expression for matching semver versions</p> <p>Library home page: <a href="https://registry.npmjs.org/semver-regex/-/semver-regex-1.0.0.tgz">https://registry.npmjs.org/semver-regex/-/semver-regex-1.0.0.tgz</a></p> <p>Path to dependency file: snipe-it/package.json</p> <p>Path to vulnerable library: snipe-it/node_modules/semver-regex/package.json</p> <p> Dependency Hierarchy: - laravel-mix-2.1.11.tgz (Root Library) - img-loader-2.0.1.tgz - imagemin-gifsicle-5.2.0.tgz - gifsicle-3.0.4.tgz - bin-wrapper-3.0.2.tgz - bin-version-check-2.1.0.tgz - bin-version-1.0.4.tgz - find-versions-1.2.1.tgz - :x: **semver-regex-1.0.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> semver-regex is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3795>CVE-2021-3795</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1">https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1</a></p> <p>Release Date: 2021-09-15</p> <p>Fix Resolution: semver-regex - 3.1.3,4.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-3795 (Medium) detected in semver-regex-1.0.0.tgz - ## CVE-2021-3795 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>semver-regex-1.0.0.tgz</b></p></summary> <p>Regular expression for matching semver versions</p> <p>Library home page: <a href="https://registry.npmjs.org/semver-regex/-/semver-regex-1.0.0.tgz">https://registry.npmjs.org/semver-regex/-/semver-regex-1.0.0.tgz</a></p> <p>Path to dependency file: snipe-it/package.json</p> <p>Path to vulnerable library: snipe-it/node_modules/semver-regex/package.json</p> <p> Dependency Hierarchy: - laravel-mix-2.1.11.tgz (Root Library) - img-loader-2.0.1.tgz - imagemin-gifsicle-5.2.0.tgz - gifsicle-3.0.4.tgz - bin-wrapper-3.0.2.tgz - bin-version-check-2.1.0.tgz - bin-version-1.0.4.tgz - find-versions-1.2.1.tgz - :x: **semver-regex-1.0.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> semver-regex is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3795>CVE-2021-3795</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1">https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1</a></p> <p>Release Date: 2021-09-15</p> <p>Fix Resolution: semver-regex - 3.1.3,4.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in semver regex tgz cve medium severity vulnerability vulnerable library semver regex tgz regular expression for matching semver versions library home page a href path to dependency file snipe it package json path to vulnerable library snipe it node modules semver regex package json dependency hierarchy laravel mix tgz root library img loader tgz imagemin gifsicle tgz gifsicle tgz bin wrapper tgz bin version check tgz bin version tgz find versions tgz x semver regex tgz vulnerable library vulnerability details semver regex is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector n a attack complexity n a privileges required n a user interaction n a scope n a impact metrics confidentiality impact n a integrity impact n a availability impact n a for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution semver regex step up your open source security game with whitesource
0
261,993
22,785,114,064
IssuesEvent
2022-07-09 05:41:22
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
opened
ccl/streamingccl/streamclient: TestSinklessReplicationClient failed
C-test-failure O-robot branch-release-21.2
ccl/streamingccl/streamclient.TestSinklessReplicationClient [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=5695581&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=5695581&tab=artifacts#/) on release-21.2 @ [bce163fd3a462bc778405fb371470371d214e758](https://github.com/cockroachdb/cockroach/commits/bce163fd3a462bc778405fb371470371d214e758): ``` === RUN TestSinklessReplicationClient test_log_scope.go:79: test logs captured to: /go/src/github.com/cockroachdb/cockroach/artifacts/logTestSinklessReplicationClient078044924 test_log_scope.go:80: use -show-logs to present logs inline === CONT TestSinklessReplicationClient cockroach_sinkless_replication_client_test.go:128: -- test log scope end -- test logs left over in: /go/src/github.com/cockroachdb/cockroach/artifacts/logTestSinklessReplicationClient078044924 --- FAIL: TestSinklessReplicationClient (2.35s) === RUN TestSinklessReplicationClient/stream-address-disconnects replication_helpers.go:145: ran out of rows after processing 1 rows --- FAIL: TestSinklessReplicationClient/stream-address-disconnects (0.05s) ``` <details><summary>Reproduce</summary> <p> To reproduce, try: ```bash make stressrace TESTS=TestSinklessReplicationClient PKG=./pkg/ccl/streamingccl/streamclient TESTTIMEOUT=5m STRESSFLAGS='-timeout 5m' 2>&1 ``` Parameters in this failure: - GOFLAGS=-json </p> </details> /cc @cockroachdb/cdc pbardea <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestSinklessReplicationClient.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
1.0
ccl/streamingccl/streamclient: TestSinklessReplicationClient failed - ccl/streamingccl/streamclient.TestSinklessReplicationClient [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=5695581&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=5695581&tab=artifacts#/) on release-21.2 @ [bce163fd3a462bc778405fb371470371d214e758](https://github.com/cockroachdb/cockroach/commits/bce163fd3a462bc778405fb371470371d214e758): ``` === RUN TestSinklessReplicationClient test_log_scope.go:79: test logs captured to: /go/src/github.com/cockroachdb/cockroach/artifacts/logTestSinklessReplicationClient078044924 test_log_scope.go:80: use -show-logs to present logs inline === CONT TestSinklessReplicationClient cockroach_sinkless_replication_client_test.go:128: -- test log scope end -- test logs left over in: /go/src/github.com/cockroachdb/cockroach/artifacts/logTestSinklessReplicationClient078044924 --- FAIL: TestSinklessReplicationClient (2.35s) === RUN TestSinklessReplicationClient/stream-address-disconnects replication_helpers.go:145: ran out of rows after processing 1 rows --- FAIL: TestSinklessReplicationClient/stream-address-disconnects (0.05s) ``` <details><summary>Reproduce</summary> <p> To reproduce, try: ```bash make stressrace TESTS=TestSinklessReplicationClient PKG=./pkg/ccl/streamingccl/streamclient TESTTIMEOUT=5m STRESSFLAGS='-timeout 5m' 2>&1 ``` Parameters in this failure: - GOFLAGS=-json </p> </details> /cc @cockroachdb/cdc pbardea <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestSinklessReplicationClient.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
non_priority
ccl streamingccl streamclient testsinklessreplicationclient failed ccl streamingccl streamclient testsinklessreplicationclient with on release run testsinklessreplicationclient test log scope go test logs captured to go src github com cockroachdb cockroach artifacts test log scope go use show logs to present logs inline cont testsinklessreplicationclient cockroach sinkless replication client test go test log scope end test logs left over in go src github com cockroachdb cockroach artifacts fail testsinklessreplicationclient run testsinklessreplicationclient stream address disconnects replication helpers go ran out of rows after processing rows fail testsinklessreplicationclient stream address disconnects reproduce to reproduce try bash make stressrace tests testsinklessreplicationclient pkg pkg ccl streamingccl streamclient testtimeout stressflags timeout parameters in this failure goflags json cc cockroachdb cdc pbardea
0
39,815
8,689,585,275
IssuesEvent
2018-12-03 19:06:59
cosmos/cosmos-sdk
https://api.github.com/repos/cosmos/cosmos-sdk
opened
Store Refactor
code-hygiene core
The `store/` is quite large and the parts are deeply interconnected with each other, so refactoring will be split into three parts: ### 1. Move store types to separate folders #2309 Each store type, such as `rootmultistore.go`, `iavlstore.go`, will be moved into separated folders, for example, `rootmulti/store.go`, `iavl/store.go`. Actual types will be named `Store`, making them exposed and easily accessible from external code - the caller can use `iavl.Store` for example. We cannot use `KVStore.Gas()` and `KVStore.Prefix()` now, since it causes import cycle between `store/prefix` and `store/gas`. For now we remove those methods and use `gas.NewStore` and `prefix.NewStore` directly. The dependency of `store` on `types` will be inverted, meaning that `types/store.go`, `types/gas.go`, `types/queryable.go` and part of `types/errors.go` will be moved to `store/types/`, and `types/store.go` will reexport them. But in the first PR, only `types/store.go` and `types/gas.go` will be moved. WIP on #2985 ### 2. Simplify store interfaces Currently the interfaces in `types/store.go` have multiple layers of embedding which is hard to analyze. The second PR will simplify it to two-layer structure. ``` KVStore CommitStore MultiStore ^ / \ / \ / \ | / \ / \ / \ | embeds CacheKVStore CommitKVStore CommitMultiStore CacheMultiStore * ``` It will also contain #2824. (Should it also be applied on `gas`?) Also, instead of using `StoreType`, which is an enum type `rootmulti.Store` switches internally, we associate the `StoreKey` and `KVStore`/`MultiStore` implementation so the multistore can also mount third-party store type (needs discussion). `StoreKey` will be split into `KVStoreKey` and `MultiStoreKey`, making it typesafe when accessing on substores and to prepare on future recursive multistore implementation. ### 3. Invert dependency Because some of the error types are used by both `store/*` and the outside, we have to duplicate the error types from `types/` to `store/types/`. This PR will move `types/errors.go` and `types/queryable.go` to `store/types/`. The primitive version can be found in #2344
1.0
Store Refactor - The `store/` is quite large and the parts are deeply interconnected with each other, so refactoring will be split into three parts: ### 1. Move store types to separate folders #2309 Each store type, such as `rootmultistore.go`, `iavlstore.go`, will be moved into separated folders, for example, `rootmulti/store.go`, `iavl/store.go`. Actual types will be named `Store`, making them exposed and easily accessible from external code - the caller can use `iavl.Store` for example. We cannot use `KVStore.Gas()` and `KVStore.Prefix()` now, since it causes import cycle between `store/prefix` and `store/gas`. For now we remove those methods and use `gas.NewStore` and `prefix.NewStore` directly. The dependency of `store` on `types` will be inverted, meaning that `types/store.go`, `types/gas.go`, `types/queryable.go` and part of `types/errors.go` will be moved to `store/types/`, and `types/store.go` will reexport them. But in the first PR, only `types/store.go` and `types/gas.go` will be moved. WIP on #2985 ### 2. Simplify store interfaces Currently the interfaces in `types/store.go` have multiple layers of embedding which is hard to analyze. The second PR will simplify it to two-layer structure. ``` KVStore CommitStore MultiStore ^ / \ / \ / \ | / \ / \ / \ | embeds CacheKVStore CommitKVStore CommitMultiStore CacheMultiStore * ``` It will also contain #2824. (Should it also be applied on `gas`?) Also, instead of using `StoreType`, which is an enum type `rootmulti.Store` switches internally, we associate the `StoreKey` and `KVStore`/`MultiStore` implementation so the multistore can also mount third-party store type (needs discussion). `StoreKey` will be split into `KVStoreKey` and `MultiStoreKey`, making it typesafe when accessing on substores and to prepare on future recursive multistore implementation. ### 3. Invert dependency Because some of the error types are used by both `store/*` and the outside, we have to duplicate the error types from `types/` to `store/types/`. This PR will move `types/errors.go` and `types/queryable.go` to `store/types/`. The primitive version can be found in #2344
non_priority
store refactor the store is quite large and the parts are deeply interconnected with each other so refactoring will be split into three parts move store types to separate folders each store type such as rootmultistore go iavlstore go will be moved into separated folders for example rootmulti store go iavl store go actual types will be named store making them exposed and easily accessible from external code the caller can use iavl store for example we cannot use kvstore gas and kvstore prefix now since it causes import cycle between store prefix and store gas for now we remove those methods and use gas newstore and prefix newstore directly the dependency of store on types will be inverted meaning that types store go types gas go types queryable go and part of types errors go will be moved to store types and types store go will reexport them but in the first pr only types store go and types gas go will be moved wip on simplify store interfaces currently the interfaces in types store go have multiple layers of embedding which is hard to analyze the second pr will simplify it to two layer structure kvstore commitstore multistore embeds cachekvstore commitkvstore commitmultistore cachemultistore it will also contain should it also be applied on gas also instead of using storetype which is an enum type rootmulti store switches internally we associate the storekey and kvstore multistore implementation so the multistore can also mount third party store type needs discussion storekey will be split into kvstorekey and multistorekey making it typesafe when accessing on substores and to prepare on future recursive multistore implementation invert dependency because some of the error types are used by both store and the outside we have to duplicate the error types from types to store types this pr will move types errors go and types queryable go to store types the primitive version can be found in
0
214,958
16,620,033,600
IssuesEvent
2021-06-02 22:39:28
kubernetes/kubernetes
https://api.github.com/repos/kubernetes/kubernetes
closed
[Failing Test][sig-cluster-lifecycle] ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21
kind/failing-test needs-triage sig/cluster-lifecycle
<!-- Please only use this template for submitting reports about continuously failing tests or jobs in Kubernetes CI --> #### Which jobs are failing: [kubeadm-kinder-latest-on-1-21](https://testgrid.k8s.io/sig-release-master-informing#kubeadm-kinder-latest-on-1-21&width=20) #### Which test(s) are failing: - ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21 - task-06-e2e-kubeadm #### Since when has it been failing: 18.05.2021 Failing started with commit e338438b7 after some successful test iterations #### Testgrid link: - [Testgrid](https://testgrid.k8s.io/sig-release-master-informing#kubeadm-kinder-latest-on-1-21&width=20) - [Spyglass on ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21 ](https://prow.k8s.io/view/gs/kubernetes-jenkins/logs/ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21/1397575241361788928) - [Spyglass on task-06-e2e-kubeadm](https://prow.k8s.io/view/gs/kubernetes-jenkins/logs/ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21/1395245098811265024) #### Reason for failure: ``` _output/local/go/src/k8s.io/kubernetes/test/e2e_kubeadm/kubeadm_config_test.go:59 Expected <map[string]string | len:1>: { "ClusterConfiguration": "apiServer:\n certSANs:\n - localhost\n - 172.17.0.3\n extraArgs:\n authorization-mode: Node,RBAC\n timeoutForControlPlane: 4m0s\napiVersion: kubeadm.k8s.io/v1beta3\ncertificatesDir: /etc/kubernetes/pki\nclusterName: kinder-xony\ncontrolPlaneEndpoint: 172.17.0.7:6443\ncontrollerManager:\n extraArgs:\n enable-hostpath-provisioner: \"true\"\ndns: {}\netcd:\n local:\n dataDir: /var/lib/etcd\nimageRepository: k8s.gcr.io\nkind: ClusterConfiguration\nkubernetesVersion: v1.21.2-rc.0.5+e338438b72e4af\nnetworking:\n dnsDomain: cluster.local\n podSubnet: 192.168.0.0/16\n serviceSubnet: 10.96.0.0/12\nscheduler: {}\n", } to have key <string>: ClusterStatus _output/local/go/src/k8s.io/kubernetes/test/e2e_kubeadm/kubeadm_config_test.go:63 ``` #### Anything else we need to know:
1.0
[Failing Test][sig-cluster-lifecycle] ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21 - <!-- Please only use this template for submitting reports about continuously failing tests or jobs in Kubernetes CI --> #### Which jobs are failing: [kubeadm-kinder-latest-on-1-21](https://testgrid.k8s.io/sig-release-master-informing#kubeadm-kinder-latest-on-1-21&width=20) #### Which test(s) are failing: - ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21 - task-06-e2e-kubeadm #### Since when has it been failing: 18.05.2021 Failing started with commit e338438b7 after some successful test iterations #### Testgrid link: - [Testgrid](https://testgrid.k8s.io/sig-release-master-informing#kubeadm-kinder-latest-on-1-21&width=20) - [Spyglass on ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21 ](https://prow.k8s.io/view/gs/kubernetes-jenkins/logs/ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21/1397575241361788928) - [Spyglass on task-06-e2e-kubeadm](https://prow.k8s.io/view/gs/kubernetes-jenkins/logs/ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21/1395245098811265024) #### Reason for failure: ``` _output/local/go/src/k8s.io/kubernetes/test/e2e_kubeadm/kubeadm_config_test.go:59 Expected <map[string]string | len:1>: { "ClusterConfiguration": "apiServer:\n certSANs:\n - localhost\n - 172.17.0.3\n extraArgs:\n authorization-mode: Node,RBAC\n timeoutForControlPlane: 4m0s\napiVersion: kubeadm.k8s.io/v1beta3\ncertificatesDir: /etc/kubernetes/pki\nclusterName: kinder-xony\ncontrolPlaneEndpoint: 172.17.0.7:6443\ncontrollerManager:\n extraArgs:\n enable-hostpath-provisioner: \"true\"\ndns: {}\netcd:\n local:\n dataDir: /var/lib/etcd\nimageRepository: k8s.gcr.io\nkind: ClusterConfiguration\nkubernetesVersion: v1.21.2-rc.0.5+e338438b72e4af\nnetworking:\n dnsDomain: cluster.local\n podSubnet: 192.168.0.0/16\n serviceSubnet: 10.96.0.0/12\nscheduler: {}\n", } to have key <string>: ClusterStatus _output/local/go/src/k8s.io/kubernetes/test/e2e_kubeadm/kubeadm_config_test.go:63 ``` #### Anything else we need to know:
non_priority
ci kubernetes kubeadm kinder latest on which jobs are failing which test s are failing ci kubernetes kubeadm kinder latest on task kubeadm since when has it been failing failing started with commit after some successful test iterations testgrid link reason for failure output local go src io kubernetes test kubeadm kubeadm config test go expected clusterconfiguration apiserver n certsans n localhost n n extraargs n authorization mode node rbac n timeoutforcontrolplane napiversion kubeadm io ncertificatesdir etc kubernetes pki nclustername kinder xony ncontrolplaneendpoint ncontrollermanager n extraargs n enable hostpath provisioner true ndns netcd n local n datadir var lib etcd nimagerepository gcr io nkind clusterconfiguration nkubernetesversion rc nnetworking n dnsdomain cluster local n podsubnet n servicesubnet nscheduler n to have key clusterstatus output local go src io kubernetes test kubeadm kubeadm config test go anything else we need to know
0
346,101
24,886,549,622
IssuesEvent
2022-10-28 08:17:04
jsincorporated/ped
https://api.github.com/repos/jsincorporated/ped
opened
Feature list in UG is disorganised
type.DocumentationBug severity.Low
Maybe it is possible to divide the features into categories (appointments, bills, patient features etc) <!--session: 1666944149785-97cbf685-57d9-45ad-a313-8435d03f2880--> <!--Version: Web v3.4.4-->
1.0
Feature list in UG is disorganised - Maybe it is possible to divide the features into categories (appointments, bills, patient features etc) <!--session: 1666944149785-97cbf685-57d9-45ad-a313-8435d03f2880--> <!--Version: Web v3.4.4-->
non_priority
feature list in ug is disorganised maybe it is possible to divide the features into categories appointments bills patient features etc
0
433,283
30,321,450,391
IssuesEvent
2023-07-10 19:34:48
ArkhamX2/StudendaUI
https://api.github.com/repos/ArkhamX2/StudendaUI
opened
QA Frontend
bug documentation enhancement
Реализация всех видов тестирования пользовательского интерфейса Автоматизация тестирования Составление тест-плана, тест-кейсов, отчёта о тестировании Прохождение тест-кейсов
1.0
QA Frontend - Реализация всех видов тестирования пользовательского интерфейса Автоматизация тестирования Составление тест-плана, тест-кейсов, отчёта о тестировании Прохождение тест-кейсов
non_priority
qa frontend реализация всех видов тестирования пользовательского интерфейса автоматизация тестирования составление тест плана тест кейсов отчёта о тестировании прохождение тест кейсов
0
30,528
14,593,571,247
IssuesEvent
2020-12-19 23:39:11
ppy/osu
https://api.github.com/repos/ppy/osu
closed
Changing the volume during gameplay/in the results screen causes lag
area:gameplay type:performance
**Describe the bug:** Changing the volume with the scroll wheel while in the results screen lags/freezes the game. How much it lags appears to be directly related to the length of the beatmap. On a 12 second beatmap, there is a spike on the update graph but no noticeable slowdown. On a 1:27 beatmap, there are major slowdowns. On a 4 minute beatmap it hangs for seconds after stopping the intense scrolling **Screenshots or videos showing encountered issue:** https://www.youtube.com/watch?v=gEq3Ngf18jY 12 second map lag is at 0:44 1 minute 27 second map lag is at 7:22 4 minute map lag is at 5:15 Game settings are at 7:45 **osu!lazer version:** 2019.913.0
True
Changing the volume during gameplay/in the results screen causes lag - **Describe the bug:** Changing the volume with the scroll wheel while in the results screen lags/freezes the game. How much it lags appears to be directly related to the length of the beatmap. On a 12 second beatmap, there is a spike on the update graph but no noticeable slowdown. On a 1:27 beatmap, there are major slowdowns. On a 4 minute beatmap it hangs for seconds after stopping the intense scrolling **Screenshots or videos showing encountered issue:** https://www.youtube.com/watch?v=gEq3Ngf18jY 12 second map lag is at 0:44 1 minute 27 second map lag is at 7:22 4 minute map lag is at 5:15 Game settings are at 7:45 **osu!lazer version:** 2019.913.0
non_priority
changing the volume during gameplay in the results screen causes lag describe the bug changing the volume with the scroll wheel while in the results screen lags freezes the game how much it lags appears to be directly related to the length of the beatmap on a second beatmap there is a spike on the update graph but no noticeable slowdown on a beatmap there are major slowdowns on a minute beatmap it hangs for seconds after stopping the intense scrolling screenshots or videos showing encountered issue second map lag is at minute second map lag is at minute map lag is at game settings are at osu lazer version
0
79,157
15,159,088,613
IssuesEvent
2021-02-12 03:08:19
heclak/community-a4e-c
https://api.github.com/repos/heclak/community-a4e-c
closed
Compatibility with the new Supercarrier Module?
Code/EFM DCS/Limitation Feature Request
**Is your feature request related to a problem? Please describe.** No, other than currently it is only compatible with the Stennis, and only under certain circumstances. (according to the guide, anyway, if this is not the case, the guide may need to be updated). **Describe the solution you'd like** Can the Skyhawk be made compatible with the new Supercarrier module? **Describe alternatives you've considered** Nil **Additional context** Currently have issues gettig the plane to sit still on a moving carrier (or should I say, moving with the carrier instead of moving backwards under the carrier, regardless of the orientation on the carrier), and the inability for the system to recognise that the aircraft is able to hook into the catapult despite being in the correct location and direction (unless a runway start is specified).
1.0
Compatibility with the new Supercarrier Module? - **Is your feature request related to a problem? Please describe.** No, other than currently it is only compatible with the Stennis, and only under certain circumstances. (according to the guide, anyway, if this is not the case, the guide may need to be updated). **Describe the solution you'd like** Can the Skyhawk be made compatible with the new Supercarrier module? **Describe alternatives you've considered** Nil **Additional context** Currently have issues gettig the plane to sit still on a moving carrier (or should I say, moving with the carrier instead of moving backwards under the carrier, regardless of the orientation on the carrier), and the inability for the system to recognise that the aircraft is able to hook into the catapult despite being in the correct location and direction (unless a runway start is specified).
non_priority
compatibility with the new supercarrier module is your feature request related to a problem please describe no other than currently it is only compatible with the stennis and only under certain circumstances according to the guide anyway if this is not the case the guide may need to be updated describe the solution you d like can the skyhawk be made compatible with the new supercarrier module describe alternatives you ve considered nil additional context currently have issues gettig the plane to sit still on a moving carrier or should i say moving with the carrier instead of moving backwards under the carrier regardless of the orientation on the carrier and the inability for the system to recognise that the aircraft is able to hook into the catapult despite being in the correct location and direction unless a runway start is specified
0
104,545
8,974,928,463
IssuesEvent
2019-01-30 02:36:57
nodejs/node
https://api.github.com/repos/nodejs/node
closed
Consistent failure of test-http-client-timeout-option-with-agent
CI / flaky test http test
Every time I run the suite I see this failure: ``` === release test-http-client-timeout-option-with-agent === Path: parallel/test-http-client-timeout-option-with-agent assert.js:351 throw err; ^ AssertionError [ERR_ASSERTION]: duration 2992ms less than timeout 3000ms at ClientRequest.req.on.common.mustCall (node/test/parallel/test-http-client-timeout-option-with-agent.js:46:12) at ClientRequest.<anonymous> (node/test/common/index.js:368:15) at ClientRequest.emit (events.js:197:13) at Socket.emitRequestTimeout (_http_client.js:666:40) at Object.onceWrapper (events.js:285:13) at Socket.emit (events.js:197:13) at Socket._onTimeout (net.js:422:8) at listOnTimeout (timers.js:324:15) at processTimers (timers.js:268:5) Command: out/Release/node node/test/parallel/test-http-client-timeout-option-with-agent.js ``` cc @Trott who messed with the timers in this test last
2.0
Consistent failure of test-http-client-timeout-option-with-agent - Every time I run the suite I see this failure: ``` === release test-http-client-timeout-option-with-agent === Path: parallel/test-http-client-timeout-option-with-agent assert.js:351 throw err; ^ AssertionError [ERR_ASSERTION]: duration 2992ms less than timeout 3000ms at ClientRequest.req.on.common.mustCall (node/test/parallel/test-http-client-timeout-option-with-agent.js:46:12) at ClientRequest.<anonymous> (node/test/common/index.js:368:15) at ClientRequest.emit (events.js:197:13) at Socket.emitRequestTimeout (_http_client.js:666:40) at Object.onceWrapper (events.js:285:13) at Socket.emit (events.js:197:13) at Socket._onTimeout (net.js:422:8) at listOnTimeout (timers.js:324:15) at processTimers (timers.js:268:5) Command: out/Release/node node/test/parallel/test-http-client-timeout-option-with-agent.js ``` cc @Trott who messed with the timers in this test last
non_priority
consistent failure of test http client timeout option with agent every time i run the suite i see this failure release test http client timeout option with agent path parallel test http client timeout option with agent assert js throw err assertionerror duration less than timeout at clientrequest req on common mustcall node test parallel test http client timeout option with agent js at clientrequest node test common index js at clientrequest emit events js at socket emitrequesttimeout http client js at object oncewrapper events js at socket emit events js at socket ontimeout net js at listontimeout timers js at processtimers timers js command out release node node test parallel test http client timeout option with agent js cc trott who messed with the timers in this test last
0
40,775
10,577,841,355
IssuesEvent
2019-10-07 21:01:51
google/blockly
https://api.github.com/repos/google/blockly
closed
Build FieldDate as auxiliary .js file
component: build process component: demos component: fields
<!-- - Thanks for opening an issue for us! Before you open an issue, - please check if a similar issue exists or has been closed before. - - If you're asking a question about how to use Blockly in your application, - please ask questions on the mailing list, instead of filing issues: - https://groups.google.com/forum/#!forum/blockly --> ### Problem statement FieldDate requires significant parts of the closure libraries that are not used by other parts of Blockly. As such, it bloats the library. The solution to date has been to comment out the field in default builds. This has lead to a situation where we are expecting users to modify the code to take advantage of the feature (complicating the process for users to update their version of Blockly). This current solution has meant we rarely test with FieldDate. With the new Field registration methods, we can separate FieldDate and its dependencies as a auxiliary library. ### Proposed Solution * [ ] Update build.py to build field_date.js as it's own `_compressed.js` library. * [ ] Import this library into the playground and possibly other demos for testing.
1.0
Build FieldDate as auxiliary .js file - <!-- - Thanks for opening an issue for us! Before you open an issue, - please check if a similar issue exists or has been closed before. - - If you're asking a question about how to use Blockly in your application, - please ask questions on the mailing list, instead of filing issues: - https://groups.google.com/forum/#!forum/blockly --> ### Problem statement FieldDate requires significant parts of the closure libraries that are not used by other parts of Blockly. As such, it bloats the library. The solution to date has been to comment out the field in default builds. This has lead to a situation where we are expecting users to modify the code to take advantage of the feature (complicating the process for users to update their version of Blockly). This current solution has meant we rarely test with FieldDate. With the new Field registration methods, we can separate FieldDate and its dependencies as a auxiliary library. ### Proposed Solution * [ ] Update build.py to build field_date.js as it's own `_compressed.js` library. * [ ] Import this library into the playground and possibly other demos for testing.
non_priority
build fielddate as auxiliary js file thanks for opening an issue for us before you open an issue please check if a similar issue exists or has been closed before if you re asking a question about how to use blockly in your application please ask questions on the mailing list instead of filing issues problem statement fielddate requires significant parts of the closure libraries that are not used by other parts of blockly as such it bloats the library the solution to date has been to comment out the field in default builds this has lead to a situation where we are expecting users to modify the code to take advantage of the feature complicating the process for users to update their version of blockly this current solution has meant we rarely test with fielddate with the new field registration methods we can separate fielddate and its dependencies as a auxiliary library proposed solution update build py to build field date js as it s own compressed js library import this library into the playground and possibly other demos for testing
0
12,520
2,702,704,432
IssuesEvent
2015-04-06 11:25:20
hazelcast/hazelcast
https://api.github.com/repos/hazelcast/hazelcast
closed
[TEST-FAILURE] jsr107.tck.CachingTest failures
Team: Core Type: Defect
``` javax.cache.CacheException: Error opening URI [hazelcast] at com.hazelcast.cache.impl.AbstractHazelcastCachingProvider.getCacheManager(AbstractHazelcastCachingProvider.java:89) at com.hazelcast.cache.impl.AbstractHazelcastCachingProvider.getCacheManager(AbstractHazelcastCachingProvider.java:113) at com.hazelcast.cache.HazelcastCachingProvider.getCacheManager(HazelcastCachingProvider.java:153) ``` https://hazelcast-l337.ci.cloudbees.com/job/JCache-TCK-Client-maintenance/300/ org.jsr107.tck.CachingTest.getCacheManager_URI org.jsr107.tck.CachingTest.getCacheManager_nullUriParameter org.jsr107.tck.CachingTest.cachingProviderGetNonExistentCache org.jsr107.tck.CachingTest.getCacheManager_defaultURI org.jsr107.tck.CachingTest.getCacheManager_nonNullProperties org.jsr107.tck.CachingTest.getCacheManager_nullClassLoader org.jsr107.tck.CachingTest.getCacheManager_singleton org.jsr107.tck.CachingTest.getCacheNullValueClass org.jsr107.tck.CachingTest.cachingProviderGetCache
1.0
[TEST-FAILURE] jsr107.tck.CachingTest failures - ``` javax.cache.CacheException: Error opening URI [hazelcast] at com.hazelcast.cache.impl.AbstractHazelcastCachingProvider.getCacheManager(AbstractHazelcastCachingProvider.java:89) at com.hazelcast.cache.impl.AbstractHazelcastCachingProvider.getCacheManager(AbstractHazelcastCachingProvider.java:113) at com.hazelcast.cache.HazelcastCachingProvider.getCacheManager(HazelcastCachingProvider.java:153) ``` https://hazelcast-l337.ci.cloudbees.com/job/JCache-TCK-Client-maintenance/300/ org.jsr107.tck.CachingTest.getCacheManager_URI org.jsr107.tck.CachingTest.getCacheManager_nullUriParameter org.jsr107.tck.CachingTest.cachingProviderGetNonExistentCache org.jsr107.tck.CachingTest.getCacheManager_defaultURI org.jsr107.tck.CachingTest.getCacheManager_nonNullProperties org.jsr107.tck.CachingTest.getCacheManager_nullClassLoader org.jsr107.tck.CachingTest.getCacheManager_singleton org.jsr107.tck.CachingTest.getCacheNullValueClass org.jsr107.tck.CachingTest.cachingProviderGetCache
non_priority
tck cachingtest failures javax cache cacheexception error opening uri at com hazelcast cache impl abstracthazelcastcachingprovider getcachemanager abstracthazelcastcachingprovider java at com hazelcast cache impl abstracthazelcastcachingprovider getcachemanager abstracthazelcastcachingprovider java at com hazelcast cache hazelcastcachingprovider getcachemanager hazelcastcachingprovider java org tck cachingtest getcachemanager uri org tck cachingtest getcachemanager nulluriparameter org tck cachingtest cachingprovidergetnonexistentcache org tck cachingtest getcachemanager defaulturi org tck cachingtest getcachemanager nonnullproperties org tck cachingtest getcachemanager nullclassloader org tck cachingtest getcachemanager singleton org tck cachingtest getcachenullvalueclass org tck cachingtest cachingprovidergetcache
0
109,839
23,826,630,567
IssuesEvent
2022-09-05 15:23:59
WordPress/Documentation-Issue-Tracker
https://api.github.com/repos/WordPress/Documentation-Issue-Tracker
closed
Code Reference: More Info for WP_Rewrite links
code reference
## Issue Description The More Information section for WP_Rewrite has two links to itself. It looks very similar to the Rewrite API page, but actually has more details (but missing the info about `init` hook), yet it links to the API page in the Codex. There is also a link to a support article for Pretty Permalinks, but it doesn't link to that section of the article. ## URL of the Page with the Issue https://developer.wordpress.org/reference/classes/wp_rewrite/ ## Section of Page with the issue More Information ## Why is this a problem? The developer has to jump around to various pages that look alike but have slightly different information, in order to get everything needed to use the class. None of these pages indicates which parts apply only to the `post` post type. ## Suggested Fix Unlink the two places where `WP_Rewrite` links to this page. Change the Rewrite API link from Codex to https://developer.wordpress.org/apis/handbook/rewrite/ Consider mentioning the `init` hook and whether any of the Properties only apply to Posts. Add the fragment id for the Pretty Permalinks link.
1.0
Code Reference: More Info for WP_Rewrite links - ## Issue Description The More Information section for WP_Rewrite has two links to itself. It looks very similar to the Rewrite API page, but actually has more details (but missing the info about `init` hook), yet it links to the API page in the Codex. There is also a link to a support article for Pretty Permalinks, but it doesn't link to that section of the article. ## URL of the Page with the Issue https://developer.wordpress.org/reference/classes/wp_rewrite/ ## Section of Page with the issue More Information ## Why is this a problem? The developer has to jump around to various pages that look alike but have slightly different information, in order to get everything needed to use the class. None of these pages indicates which parts apply only to the `post` post type. ## Suggested Fix Unlink the two places where `WP_Rewrite` links to this page. Change the Rewrite API link from Codex to https://developer.wordpress.org/apis/handbook/rewrite/ Consider mentioning the `init` hook and whether any of the Properties only apply to Posts. Add the fragment id for the Pretty Permalinks link.
non_priority
code reference more info for wp rewrite links issue description the more information section for wp rewrite has two links to itself it looks very similar to the rewrite api page but actually has more details but missing the info about init hook yet it links to the api page in the codex there is also a link to a support article for pretty permalinks but it doesn t link to that section of the article url of the page with the issue section of page with the issue more information why is this a problem the developer has to jump around to various pages that look alike but have slightly different information in order to get everything needed to use the class none of these pages indicates which parts apply only to the post post type suggested fix unlink the two places where wp rewrite links to this page change the rewrite api link from codex to consider mentioning the init hook and whether any of the properties only apply to posts add the fragment id for the pretty permalinks link
0
5,157
26,269,262,630
IssuesEvent
2023-01-06 15:27:18
centerofci/mathesar
https://api.github.com/repos/centerofci/mathesar
closed
Support descriptions for tables on the frontend
type: enhancement work: frontend status: ready restricted: maintainers
* This issue is to track the implementation of descriptions for tables on the frontend.
True
Support descriptions for tables on the frontend - * This issue is to track the implementation of descriptions for tables on the frontend.
non_priority
support descriptions for tables on the frontend this issue is to track the implementation of descriptions for tables on the frontend
0
145,752
22,773,820,728
IssuesEvent
2022-07-08 12:41:00
EscolaDeSaudePublica/DesignLab
https://api.github.com/repos/EscolaDeSaudePublica/DesignLab
opened
Disponibilizar no ambiente virtual os clusters de todos os problemas
Oficina Design Sem Projeto Definido Prioridade Design: Alta
## **Objetivo** **Como** designer **Quero** Disponibilizar no ambiente virtual os clusters de todos os problemas **Para** possibilitar a consulta pelos colaboradores da ESP ## **Contexto** Com o fim do momento presencial da oficina, a etapa de pós-oficina possui entre suas entregas a disponibilização dos achados validados na oficina no ambiente virtual. ## **Escopo** - [ ] criar na seção de achados da oficina um espaço para apresentar todos os 13 cluster encontrados e validados na oficina
2.0
Disponibilizar no ambiente virtual os clusters de todos os problemas - ## **Objetivo** **Como** designer **Quero** Disponibilizar no ambiente virtual os clusters de todos os problemas **Para** possibilitar a consulta pelos colaboradores da ESP ## **Contexto** Com o fim do momento presencial da oficina, a etapa de pós-oficina possui entre suas entregas a disponibilização dos achados validados na oficina no ambiente virtual. ## **Escopo** - [ ] criar na seção de achados da oficina um espaço para apresentar todos os 13 cluster encontrados e validados na oficina
non_priority
disponibilizar no ambiente virtual os clusters de todos os problemas objetivo como designer quero disponibilizar no ambiente virtual os clusters de todos os problemas para possibilitar a consulta pelos colaboradores da esp contexto com o fim do momento presencial da oficina a etapa de pós oficina possui entre suas entregas a disponibilização dos achados validados na oficina no ambiente virtual escopo criar na seção de achados da oficina um espaço para apresentar todos os cluster encontrados e validados na oficina
0
70,908
15,158,435,669
IssuesEvent
2021-02-12 01:09:19
GooseWSS/node-express-realworld-example-app
https://api.github.com/repos/GooseWSS/node-express-realworld-example-app
opened
CVE-2021-26540 (Medium) detected in sanitize-html-1.18.2.tgz
security vulnerability
## CVE-2021-26540 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sanitize-html-1.18.2.tgz</b></p></summary> <p>Clean up user-submitted HTML, preserving whitelisted elements and whitelisted attributes on a per-element basis</p> <p>Library home page: <a href="https://registry.npmjs.org/sanitize-html/-/sanitize-html-1.18.2.tgz">https://registry.npmjs.org/sanitize-html/-/sanitize-html-1.18.2.tgz</a></p> <p>Path to dependency file: node-express-realworld-example-app/package.json</p> <p>Path to vulnerable library: node-express-realworld-example-app/node_modules/sanitize-html/package.json</p> <p> Dependency Hierarchy: - newman-3.10.0.tgz (Root Library) - postman-collection-3.1.1.tgz - :x: **sanitize-html-1.18.2.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\\example.com". <p>Publish Date: 2021-02-08 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-26540>CVE-2021-26540</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26540</a></p> <p>Release Date: 2021-02-08</p> <p>Fix Resolution: 2.3.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"sanitize-html","packageVersion":"1.18.2","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"newman:3.10.0;postman-collection:3.1.1;sanitize-html:1.18.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.3.2"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-26540","vulnerabilityDetails":"Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the \"allowedIframeHostnames\" option when the \"allowIframeRelativeUrls\" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with \"/\\\\example.com\".","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-26540","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-26540 (Medium) detected in sanitize-html-1.18.2.tgz - ## CVE-2021-26540 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sanitize-html-1.18.2.tgz</b></p></summary> <p>Clean up user-submitted HTML, preserving whitelisted elements and whitelisted attributes on a per-element basis</p> <p>Library home page: <a href="https://registry.npmjs.org/sanitize-html/-/sanitize-html-1.18.2.tgz">https://registry.npmjs.org/sanitize-html/-/sanitize-html-1.18.2.tgz</a></p> <p>Path to dependency file: node-express-realworld-example-app/package.json</p> <p>Path to vulnerable library: node-express-realworld-example-app/node_modules/sanitize-html/package.json</p> <p> Dependency Hierarchy: - newman-3.10.0.tgz (Root Library) - postman-collection-3.1.1.tgz - :x: **sanitize-html-1.18.2.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\\example.com". <p>Publish Date: 2021-02-08 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-26540>CVE-2021-26540</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26540</a></p> <p>Release Date: 2021-02-08</p> <p>Fix Resolution: 2.3.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"sanitize-html","packageVersion":"1.18.2","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"newman:3.10.0;postman-collection:3.1.1;sanitize-html:1.18.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.3.2"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-26540","vulnerabilityDetails":"Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the \"allowedIframeHostnames\" option when the \"allowIframeRelativeUrls\" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with \"/\\\\example.com\".","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-26540","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in sanitize html tgz cve medium severity vulnerability vulnerable library sanitize html tgz clean up user submitted html preserving whitelisted elements and whitelisted attributes on a per element basis library home page a href path to dependency file node express realworld example app package json path to vulnerable library node express realworld example app node modules sanitize html package json dependency hierarchy newman tgz root library postman collection tgz x sanitize html tgz vulnerable library found in base branch master vulnerability details apostrophe technologies sanitize html before does not properly validate the hostnames set by the allowediframehostnames option when the allowiframerelativeurls is set to true which allows attackers to bypass hostname whitelist for iframe element related using an src value that starts with example com publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree newman postman collection sanitize html isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails apostrophe technologies sanitize html before does not properly validate the hostnames set by the allowediframehostnames option when the allowiframerelativeurls is set to true which allows attackers to bypass hostname whitelist for iframe element related using an src value that starts with example com vulnerabilityurl
0
162,686
12,686,241,948
IssuesEvent
2020-06-20 09:42:32
Oldes/Rebol-issues
https://api.github.com/repos/Oldes/Rebol-issues
closed
Wish: add `enbase/part` and `debase/part`
Oldes.resolved Test.written Type.wish
So one can use these on large input stream without need to additionally `copy/part`. This: ```rebol enbase/part "hello" 16 2 ``` should be same like: ```rebol enbase copy/part "hello" 2 16 ```
1.0
Wish: add `enbase/part` and `debase/part` - So one can use these on large input stream without need to additionally `copy/part`. This: ```rebol enbase/part "hello" 16 2 ``` should be same like: ```rebol enbase copy/part "hello" 2 16 ```
non_priority
wish add enbase part and debase part so one can use these on large input stream without need to additionally copy part this rebol enbase part hello should be same like rebol enbase copy part hello
0
10,794
6,922,274,472
IssuesEvent
2017-11-30 02:13:05
spyder-ide/spyder
https://api.github.com/repos/spyder-ide/spyder
closed
Include PyQt5 as pip dependency
tag:Ux-usability type:Enhancement
Dear developers, I installed Spyder via pip and I noticed that PyQt5 and Matplotlib don't get installed automatically with the ```pip install spyder``` command. You probably don't want to include to much pip-dependencies into the spyder package but could you include at least one of the PyQts (either 4 or 5)? That would be helpful as Spyder needs one of those to work. Also I think that matplotlib seems as a pretty useful tool for spyder users, so could you include this as a dependency as well? Regards, Jakob ## Version and main components * Spyder Version: 3.2.4 * Python Version: 3.6.2 * Qt Versions: 5.9.1, PyQt5 5.9 on Linux ## Dependencies ``` pyflakes >=0.6.0 : 1.6.0 (OK) pycodestyle >=2.3: 2.3.1 (OK) pygments >=2.0 : 2.2.0 (OK) pandas >=0.13.1 : None (NOK) numpy >=1.7 : 1.13.3 (OK) sphinx >=0.6.6 : 1.6.5 (OK) rope >=0.9.4 : 0.10.7 (OK) jedi >=0.9.0 : 0.11.0 (OK) psutil >=0.3 : 5.4.1 (OK) nbconvert >=4.0 : 5.3.1 (OK) sympy >=0.7.3 : None (NOK) cython >=0.21 : None (NOK) qtconsole >=4.2.0: 4.3.1 (OK) IPython >=4.0 : 6.2.1 (OK) pylint >=0.25 : 1.7.4 (OK) ```
True
Include PyQt5 as pip dependency - Dear developers, I installed Spyder via pip and I noticed that PyQt5 and Matplotlib don't get installed automatically with the ```pip install spyder``` command. You probably don't want to include to much pip-dependencies into the spyder package but could you include at least one of the PyQts (either 4 or 5)? That would be helpful as Spyder needs one of those to work. Also I think that matplotlib seems as a pretty useful tool for spyder users, so could you include this as a dependency as well? Regards, Jakob ## Version and main components * Spyder Version: 3.2.4 * Python Version: 3.6.2 * Qt Versions: 5.9.1, PyQt5 5.9 on Linux ## Dependencies ``` pyflakes >=0.6.0 : 1.6.0 (OK) pycodestyle >=2.3: 2.3.1 (OK) pygments >=2.0 : 2.2.0 (OK) pandas >=0.13.1 : None (NOK) numpy >=1.7 : 1.13.3 (OK) sphinx >=0.6.6 : 1.6.5 (OK) rope >=0.9.4 : 0.10.7 (OK) jedi >=0.9.0 : 0.11.0 (OK) psutil >=0.3 : 5.4.1 (OK) nbconvert >=4.0 : 5.3.1 (OK) sympy >=0.7.3 : None (NOK) cython >=0.21 : None (NOK) qtconsole >=4.2.0: 4.3.1 (OK) IPython >=4.0 : 6.2.1 (OK) pylint >=0.25 : 1.7.4 (OK) ```
non_priority
include as pip dependency dear developers i installed spyder via pip and i noticed that and matplotlib don t get installed automatically with the pip install spyder command you probably don t want to include to much pip dependencies into the spyder package but could you include at least one of the pyqts either or that would be helpful as spyder needs one of those to work also i think that matplotlib seems as a pretty useful tool for spyder users so could you include this as a dependency as well regards jakob version and main components spyder version python version qt versions on linux dependencies pyflakes ok pycodestyle ok pygments ok pandas none nok numpy ok sphinx ok rope ok jedi ok psutil ok nbconvert ok sympy none nok cython none nok qtconsole ok ipython ok pylint ok
0
178,159
14,661,810,741
IssuesEvent
2020-12-29 05:12:46
JackCSheehan/text-game-engine
https://api.github.com/repos/JackCSheehan/text-game-engine
opened
Update pointer comments
documentation
Update comments that reference pointers where pointers are no longer used
1.0
Update pointer comments - Update comments that reference pointers where pointers are no longer used
non_priority
update pointer comments update comments that reference pointers where pointers are no longer used
0
304,460
26,277,898,139
IssuesEvent
2023-01-07 01:26:44
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
opened
sql: TestLogic_testserver_test_22_1_22_2 flaked due to empty conn string (master, x86 build)
C-test-failure T-sql-sessions
See flake[ here](https://teamcity.cockroachdb.com/viewLog.html?buildId=8222053&buildTypeId=Cockroach_BazelEssentialCi). Stack trace: ``` No pass/skip/fail event found for test === RUN TestLogic_testserver_test_22_1_22_2 test_log_scope.go:161: test logs captured to: /artifacts/tmp/_tmp/a0cd2ed7268f1ad03abb8f1d57f5fcc9/logTestLogic_testserver_test_22_1_22_22661895086 test_log_scope.go:79: use -show-logs to present logs inline panic: empty connection string goroutine 94 [running]: github.com/cockroachdb/cockroach-go/v2/testserver.(*testServerImpl).pollListeningURLFile(0xc0002fc900, 0x0) github.com/cockroachdb/cockroach-go/v2/testserver/external/com_github_cockroachdb_cockroach_go_v2/testserver/testserver.go:722 +0x765 github.com/cockroachdb/cockroach-go/v2/testserver.(*testServerImpl).StartNode.func1() github.com/cockroachdb/cockroach-go/v2/testserver/external/com_github_cockroachdb_cockroach_go_v2/testserver/testservernode.go:108 +0x2f created by github.com/cockroachdb/cockroach-go/v2/testserver.(*testServerImpl).StartNode github.com/cockroachdb/cockroach-go/v2/testserver/external/com_github_cockroachdb_cockroach_go_v2/testserver/testservernode.go:107 +0xcbb ```
1.0
sql: TestLogic_testserver_test_22_1_22_2 flaked due to empty conn string (master, x86 build) - See flake[ here](https://teamcity.cockroachdb.com/viewLog.html?buildId=8222053&buildTypeId=Cockroach_BazelEssentialCi). Stack trace: ``` No pass/skip/fail event found for test === RUN TestLogic_testserver_test_22_1_22_2 test_log_scope.go:161: test logs captured to: /artifacts/tmp/_tmp/a0cd2ed7268f1ad03abb8f1d57f5fcc9/logTestLogic_testserver_test_22_1_22_22661895086 test_log_scope.go:79: use -show-logs to present logs inline panic: empty connection string goroutine 94 [running]: github.com/cockroachdb/cockroach-go/v2/testserver.(*testServerImpl).pollListeningURLFile(0xc0002fc900, 0x0) github.com/cockroachdb/cockroach-go/v2/testserver/external/com_github_cockroachdb_cockroach_go_v2/testserver/testserver.go:722 +0x765 github.com/cockroachdb/cockroach-go/v2/testserver.(*testServerImpl).StartNode.func1() github.com/cockroachdb/cockroach-go/v2/testserver/external/com_github_cockroachdb_cockroach_go_v2/testserver/testservernode.go:108 +0x2f created by github.com/cockroachdb/cockroach-go/v2/testserver.(*testServerImpl).StartNode github.com/cockroachdb/cockroach-go/v2/testserver/external/com_github_cockroachdb_cockroach_go_v2/testserver/testservernode.go:107 +0xcbb ```
non_priority
sql testlogic testserver test flaked due to empty conn string master build see flake stack trace no pass skip fail event found for test run testlogic testserver test test log scope go test logs captured to artifacts tmp tmp logtestlogic testserver test test log scope go use show logs to present logs inline panic empty connection string goroutine github com cockroachdb cockroach go testserver testserverimpl polllisteningurlfile github com cockroachdb cockroach go testserver external com github cockroachdb cockroach go testserver testserver go github com cockroachdb cockroach go testserver testserverimpl startnode github com cockroachdb cockroach go testserver external com github cockroachdb cockroach go testserver testservernode go created by github com cockroachdb cockroach go testserver testserverimpl startnode github com cockroachdb cockroach go testserver external com github cockroachdb cockroach go testserver testservernode go
0
279,347
30,702,513,478
IssuesEvent
2023-07-27 01:36:40
nidhi7598/linux-3.0.35_CVE-2018-13405
https://api.github.com/repos/nidhi7598/linux-3.0.35_CVE-2018-13405
closed
CVE-2023-1838 (High) detected in linux-stable-rtv3.8.6 - autoclosed
Mend: dependency security vulnerability
## CVE-2023-1838 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/nidhi7598/linux-3.0.35_CVE-2018-13405/commit/662fbf6e1ed61fd353add2f52e2dd27e990364c7">662fbf6e1ed61fd353add2f52e2dd27e990364c7</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem. <p>Publish Date: 2023-04-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-1838>CVE-2023-1838</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2023-1838">https://www.linuxkernelcves.com/cves/CVE-2023-1838</a></p> <p>Release Date: 2023-04-05</p> <p>Fix Resolution: v4.19.245,v5.4.196,v5.10.118,v5.15.42,v5.17.10,v5.18,v5.18</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2023-1838 (High) detected in linux-stable-rtv3.8.6 - autoclosed - ## CVE-2023-1838 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/nidhi7598/linux-3.0.35_CVE-2018-13405/commit/662fbf6e1ed61fd353add2f52e2dd27e990364c7">662fbf6e1ed61fd353add2f52e2dd27e990364c7</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem. <p>Publish Date: 2023-04-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-1838>CVE-2023-1838</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2023-1838">https://www.linuxkernelcves.com/cves/CVE-2023-1838</a></p> <p>Release Date: 2023-04-05</p> <p>Fix Resolution: v4.19.245,v5.4.196,v5.10.118,v5.15.42,v5.17.10,v5.18,v5.18</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linux stable autoclosed cve high severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details a use after free flaw was found in vhost net set backend in drivers vhost net c in virtio network subcomponent in the linux kernel due to a double fget this flaw could allow a local attacker to crash the system and could even lead to a kernel information leak problem publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
278,508
24,159,832,473
IssuesEvent
2022-09-22 10:41:02
Kuadrant/testsuite
https://api.github.com/repos/Kuadrant/testsuite
closed
Add Redirect tests
good first issue test-case Kuadrant
https://github.com/Kuadrant/authorino/blob/main/docs/user-guides/deny-with-redirect-to-login.md Authority can deny unauthorized requests and then redirect them to a different page
1.0
Add Redirect tests - https://github.com/Kuadrant/authorino/blob/main/docs/user-guides/deny-with-redirect-to-login.md Authority can deny unauthorized requests and then redirect them to a different page
non_priority
add redirect tests authority can deny unauthorized requests and then redirect them to a different page
0
37,335
18,280,165,639
IssuesEvent
2021-10-05 01:30:21
spack/spack
https://api.github.com/repos/spack/spack
closed
Make Spack's compiler wrapper compatible with dash
performance shell-support
Currently, Spack's compiler wrapper is hardcoded to use `/bin/bash`. However, if we changed this to `/bin/sh` and made things POSIX compliant, systems like Ubuntu that default to `dash` could see ~~vast~~ slight improvements to build times for large, complex packages. If we changed it to `/usr/bin/env sh`, Spack users could install `dash` on other systems and add it to their `PATH`, although I don't know how much `env` will slow down runtimes. If no one else gets to this, I'll probably experiment with it eventually. I just wanted to make a dedicated issue before I forget. Related to #4048. Probably depends on #7604. See https://unix.stackexchange.com/questions/148035 for performance comparisons between common shells.
True
Make Spack's compiler wrapper compatible with dash - Currently, Spack's compiler wrapper is hardcoded to use `/bin/bash`. However, if we changed this to `/bin/sh` and made things POSIX compliant, systems like Ubuntu that default to `dash` could see ~~vast~~ slight improvements to build times for large, complex packages. If we changed it to `/usr/bin/env sh`, Spack users could install `dash` on other systems and add it to their `PATH`, although I don't know how much `env` will slow down runtimes. If no one else gets to this, I'll probably experiment with it eventually. I just wanted to make a dedicated issue before I forget. Related to #4048. Probably depends on #7604. See https://unix.stackexchange.com/questions/148035 for performance comparisons between common shells.
non_priority
make spack s compiler wrapper compatible with dash currently spack s compiler wrapper is hardcoded to use bin bash however if we changed this to bin sh and made things posix compliant systems like ubuntu that default to dash could see vast slight improvements to build times for large complex packages if we changed it to usr bin env sh spack users could install dash on other systems and add it to their path although i don t know how much env will slow down runtimes if no one else gets to this i ll probably experiment with it eventually i just wanted to make a dedicated issue before i forget related to probably depends on see for performance comparisons between common shells
0
116,937
15,027,709,976
IssuesEvent
2021-02-02 01:24:04
grommet/hpe-design-system
https://api.github.com/repos/grommet/hpe-design-system
closed
Tabs in Figma aren't adjusting correctly
bug design
<img width="727" alt="Screen Shot 2021-01-20 at 1 31 57 PM" src="https://user-images.githubusercontent.com/62117454/105251147-d03a3c00-5b2f-11eb-91c0-e4751954df5e.png"> Diane from CCS team pointed out that when changing the text in tabs, the base underline doesn't stretch proportionally to adjust to the width of the tabs. Convo: https://hpe.slack.com/archives/C04LMJWQT/p1611178744007600
1.0
Tabs in Figma aren't adjusting correctly - <img width="727" alt="Screen Shot 2021-01-20 at 1 31 57 PM" src="https://user-images.githubusercontent.com/62117454/105251147-d03a3c00-5b2f-11eb-91c0-e4751954df5e.png"> Diane from CCS team pointed out that when changing the text in tabs, the base underline doesn't stretch proportionally to adjust to the width of the tabs. Convo: https://hpe.slack.com/archives/C04LMJWQT/p1611178744007600
non_priority
tabs in figma aren t adjusting correctly img width alt screen shot at pm src diane from ccs team pointed out that when changing the text in tabs the base underline doesn t stretch proportionally to adjust to the width of the tabs convo
0
24,603
6,556,340,561
IssuesEvent
2017-09-06 13:51:08
numbbo/coco
https://api.github.com/repos/numbbo/coco
closed
Figures LaTeX templates messed up (matplotlib version 2.0)
Code-Postprocessing
While working on #1171, I realized that the recent changes in matplotlib with its new version 2.0 messed up almost all our figures within the LaTeX templates due to trimming and clipping (the HTML output seems okay). We should definitely check and adjust all templates and the postprocessing accordingly before the next BBOB workshop.
1.0
Figures LaTeX templates messed up (matplotlib version 2.0) - While working on #1171, I realized that the recent changes in matplotlib with its new version 2.0 messed up almost all our figures within the LaTeX templates due to trimming and clipping (the HTML output seems okay). We should definitely check and adjust all templates and the postprocessing accordingly before the next BBOB workshop.
non_priority
figures latex templates messed up matplotlib version while working on i realized that the recent changes in matplotlib with its new version messed up almost all our figures within the latex templates due to trimming and clipping the html output seems okay we should definitely check and adjust all templates and the postprocessing accordingly before the next bbob workshop
0
13,613
9,008,087,544
IssuesEvent
2019-02-05 01:57:10
apache/cloudstack
https://api.github.com/repos/apache/cloudstack
closed
CloudStack management java.security.ciphers has no effect on JVM process
security
The `/etc/cloudstack/management/java.security.ciphers` has no effect on the list of disabled TLS algorithms in the management server JVM process. For example, on port 8250 TLS1.0, 1.1 are still allowed/supported protocols. (Tested using `openssl s_client -connect localhost:8250 -tls1`) However, workaround exists to configure `jdk.tls.disabledAlgorithms` in the global security file: `$JRE_HOME/lib/security/java.security`. ##### ISSUE TYPE <!-- Pick one below and delete the rest --> * Bug Report ##### COMPONENT NAME <!-- Categorize the issue, e.g. API, VR, VPN, UI, etc. --> ~~~ Management Server ~~~ ##### CLOUDSTACK VERSION <!-- New line separated list of affected versions, commit ID for issues on master branch. --> ~~~ 4.11 ~~~ ##### CONFIGURATION <!-- Information about the configuration if relevant, e.g. basic network, advanced networking, etc. N/A otherwise -->
True
CloudStack management java.security.ciphers has no effect on JVM process - The `/etc/cloudstack/management/java.security.ciphers` has no effect on the list of disabled TLS algorithms in the management server JVM process. For example, on port 8250 TLS1.0, 1.1 are still allowed/supported protocols. (Tested using `openssl s_client -connect localhost:8250 -tls1`) However, workaround exists to configure `jdk.tls.disabledAlgorithms` in the global security file: `$JRE_HOME/lib/security/java.security`. ##### ISSUE TYPE <!-- Pick one below and delete the rest --> * Bug Report ##### COMPONENT NAME <!-- Categorize the issue, e.g. API, VR, VPN, UI, etc. --> ~~~ Management Server ~~~ ##### CLOUDSTACK VERSION <!-- New line separated list of affected versions, commit ID for issues on master branch. --> ~~~ 4.11 ~~~ ##### CONFIGURATION <!-- Information about the configuration if relevant, e.g. basic network, advanced networking, etc. N/A otherwise -->
non_priority
cloudstack management java security ciphers has no effect on jvm process the etc cloudstack management java security ciphers has no effect on the list of disabled tls algorithms in the management server jvm process for example on port are still allowed supported protocols tested using openssl s client connect localhost however workaround exists to configure jdk tls disabledalgorithms in the global security file jre home lib security java security issue type bug report component name categorize the issue e g api vr vpn ui etc management server cloudstack version new line separated list of affected versions commit id for issues on master branch configuration information about the configuration if relevant e g basic network advanced networking etc n a otherwise
0
716
2,570,210,602
IssuesEvent
2015-02-10 07:11:26
retailcoder/Rubberduck
https://api.github.com/repos/retailcoder/Rubberduck
closed
CodePaneExtensions.GetSelection can return an extraneous line
bug code-parsing
This is the real bug behind issue #173 *Extract Method selection is off by one*. It affects much more than just *Extract Method selection*.
1.0
CodePaneExtensions.GetSelection can return an extraneous line - This is the real bug behind issue #173 *Extract Method selection is off by one*. It affects much more than just *Extract Method selection*.
non_priority
codepaneextensions getselection can return an extraneous line this is the real bug behind issue extract method selection is off by one it affects much more than just extract method selection
0
31,446
11,940,660,330
IssuesEvent
2020-04-02 17:05:02
MicrosoftDocs/microsoft-365-docs
https://api.github.com/repos/MicrosoftDocs/microsoft-365-docs
closed
Missing documentation for MS Roadmap Featured ID: 60407 which is rolling out in production.
security
Missing documentation for MS Roadmap Featured ID: 60407 which is rolling out in production. Specifically we need the settings here: Navigate to "Security & Compliance\Threat Management\Policy\User Submissions\" Setting = "Set up a reporting mailbox" Setting = "Customize confirmation message" --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: cccec9e6-5bc6-bad8-a174-0f08716f365d * Version Independent ID: 8f10d2a4-4f84-1d19-8b45-b4fd858a4752 * Content: [What's new in Office 365 Advanced Threat Protection - Office 365](https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/whats-new-in-office-365-atp?view=o365-worldwide&source=docs) * Content Source: [microsoft-365/security/office-365-security/whats-new-in-office-365-atp.md](https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/security/office-365-security/whats-new-in-office-365-atp.md) * Service: **o365-seccomp** * GitHub Login: @denisebmsft * Microsoft Alias: **deniseb**
True
Missing documentation for MS Roadmap Featured ID: 60407 which is rolling out in production. - Missing documentation for MS Roadmap Featured ID: 60407 which is rolling out in production. Specifically we need the settings here: Navigate to "Security & Compliance\Threat Management\Policy\User Submissions\" Setting = "Set up a reporting mailbox" Setting = "Customize confirmation message" --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: cccec9e6-5bc6-bad8-a174-0f08716f365d * Version Independent ID: 8f10d2a4-4f84-1d19-8b45-b4fd858a4752 * Content: [What's new in Office 365 Advanced Threat Protection - Office 365](https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/whats-new-in-office-365-atp?view=o365-worldwide&source=docs) * Content Source: [microsoft-365/security/office-365-security/whats-new-in-office-365-atp.md](https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/security/office-365-security/whats-new-in-office-365-atp.md) * Service: **o365-seccomp** * GitHub Login: @denisebmsft * Microsoft Alias: **deniseb**
non_priority
missing documentation for ms roadmap featured id which is rolling out in production missing documentation for ms roadmap featured id which is rolling out in production specifically we need the settings here navigate to security compliance threat management policy user submissions setting set up a reporting mailbox setting customize confirmation message document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service seccomp github login denisebmsft microsoft alias deniseb
0
55,999
14,889,997,698
IssuesEvent
2021-01-20 22:17:26
STEllAR-GROUP/hpx
https://api.github.com/repos/STEllAR-GROUP/hpx
opened
Lock held while suspending
category: LCOs type: defect
@stevenrbrandt reported a 'lock being held' error in Phylanx here: https://github.com/STEllAR-GROUP/phylanx/issues/1307.
1.0
Lock held while suspending - @stevenrbrandt reported a 'lock being held' error in Phylanx here: https://github.com/STEllAR-GROUP/phylanx/issues/1307.
non_priority
lock held while suspending stevenrbrandt reported a lock being held error in phylanx here
0
4,696
3,069,273,322
IssuesEvent
2015-08-18 19:40:19
pyro-dragon/Riverwood
https://api.github.com/repos/pyro-dragon/Riverwood
opened
Read game save data- test
Code
A test to see how easy/hard it may be to read saved game data and restore to a saved state.
1.0
Read game save data- test - A test to see how easy/hard it may be to read saved game data and restore to a saved state.
non_priority
read game save data test a test to see how easy hard it may be to read saved game data and restore to a saved state
0
123,304
12,196,549,039
IssuesEvent
2020-04-29 19:16:29
TE-Temp/docusaurus
https://api.github.com/repos/TE-Temp/docusaurus
opened
Token Engineering 101
documentation
This is like https://github.com/TE-Temp/docusaurus/issues/5, but with content specifically for the beginning token engineer. It should take about a week of full time study to get through the material, so if they spend 5-10 hours a week on it they can get through it in the course of a semester. If there is more content than that, the least relevant information should be moved to #5!
1.0
Token Engineering 101 - This is like https://github.com/TE-Temp/docusaurus/issues/5, but with content specifically for the beginning token engineer. It should take about a week of full time study to get through the material, so if they spend 5-10 hours a week on it they can get through it in the course of a semester. If there is more content than that, the least relevant information should be moved to #5!
non_priority
token engineering this is like but with content specifically for the beginning token engineer it should take about a week of full time study to get through the material so if they spend hours a week on it they can get through it in the course of a semester if there is more content than that the least relevant information should be moved to
0
27,176
12,520,774,731
IssuesEvent
2020-06-03 16:23:26
cityofaustin/atd-data-tech
https://api.github.com/repos/cityofaustin/atd-data-tech
closed
Size Level of Effort for Citywide HR requests
Product: COVID-19 Time Tracking App Service: Apps Workgroup: HR
Can we scope the feasibility and level of effort to make the following updates to the COVID-19 Time Tracking app? - To put in a field to require supervisor email, that would then generate and email to the supervisor to notify them that there is a file for review? - If we were to make it optional for use Citywide and did not use the prefill feature how long would it take to roll out? - I am including an excel document (waiting for an updated csv with formatting) with fields that would need to be added in yellow and fields to be removed highlighted in blue, are these changes possible?
1.0
Size Level of Effort for Citywide HR requests - Can we scope the feasibility and level of effort to make the following updates to the COVID-19 Time Tracking app? - To put in a field to require supervisor email, that would then generate and email to the supervisor to notify them that there is a file for review? - If we were to make it optional for use Citywide and did not use the prefill feature how long would it take to roll out? - I am including an excel document (waiting for an updated csv with formatting) with fields that would need to be added in yellow and fields to be removed highlighted in blue, are these changes possible?
non_priority
size level of effort for citywide hr requests can we scope the feasibility and level of effort to make the following updates to the covid time tracking app to put in a field to require supervisor email that would then generate and email to the supervisor to notify them that there is a file for review if we were to make it optional for use citywide and did not use the prefill feature how long would it take to roll out i am including an excel document waiting for an updated csv with formatting with fields that would need to be added in yellow and fields to be removed highlighted in blue are these changes possible
0
247,133
26,688,631,425
IssuesEvent
2023-01-27 01:11:32
Nivaskumark/_beforeCVE-2020-0114-frameworks_base
https://api.github.com/repos/Nivaskumark/_beforeCVE-2020-0114-frameworks_base
opened
CVE-2023-20908 (Medium) detected in baseandroid-10.0.0_r14
security vulnerability
## CVE-2023-20908 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>baseandroid-10.0.0_r14</b></p></summary> <p> <p>Android framework classes and services</p> <p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/base>https://android.googlesource.com/platform/frameworks/base</a></p> <p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base/commit/39d22daf6461c11b79a0f843499e30dd2b12ceef">39d22daf6461c11b79a0f843499e30dd2b12ceef</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/SettingsProvider/src/com/android/providers/settings/SettingsState.java</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In several functions of SettingsState.java, there is a possible system crash loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239415861 <p>Publish Date: 2022-11-04 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-20908>CVE-2023-20908</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://android.googlesource.com/platform/frameworks/base/+/e144b7802e04841a22afcb5100ac46be5e595d82">https://android.googlesource.com/platform/frameworks/base/+/e144b7802e04841a22afcb5100ac46be5e595d82</a></p> <p>Release Date: 2022-11-04</p> <p>Fix Resolution: android-13.0.0_r19</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2023-20908 (Medium) detected in baseandroid-10.0.0_r14 - ## CVE-2023-20908 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>baseandroid-10.0.0_r14</b></p></summary> <p> <p>Android framework classes and services</p> <p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/base>https://android.googlesource.com/platform/frameworks/base</a></p> <p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base/commit/39d22daf6461c11b79a0f843499e30dd2b12ceef">39d22daf6461c11b79a0f843499e30dd2b12ceef</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/SettingsProvider/src/com/android/providers/settings/SettingsState.java</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In several functions of SettingsState.java, there is a possible system crash loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239415861 <p>Publish Date: 2022-11-04 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-20908>CVE-2023-20908</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://android.googlesource.com/platform/frameworks/base/+/e144b7802e04841a22afcb5100ac46be5e595d82">https://android.googlesource.com/platform/frameworks/base/+/e144b7802e04841a22afcb5100ac46be5e595d82</a></p> <p>Release Date: 2022-11-04</p> <p>Fix Resolution: android-13.0.0_r19</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in baseandroid cve medium severity vulnerability vulnerable library baseandroid android framework classes and services library home page a href found in head commit a href found in base branch master vulnerable source files settingsprovider src com android providers settings settingsstate java vulnerability details in several functions of settingsstate java there is a possible system crash loop due to resource exhaustion this could lead to local denial of service with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with mend
0
164,339
12,798,519,777
IssuesEvent
2020-07-02 14:03:05
elastic/elasticsearch
https://api.github.com/repos/elastic/elasticsearch
closed
Reproducible Failure in IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion
:Distributed/Recovery >test-failure Team:Distributed
Reproduces 100% of the time for me locally on master: ``` REPRODUCE WITH: ./gradlew ':server:test' --tests "org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion" -Dtests.seed=8F7E1836ED070021 -Dtests.security.manager=true -Dtests.locale=nl-BE -Dtests.timezone=Brazil/West -Druntime.java=14 org.elasticsearch.index.shard.IndexShardTests > testRestoreLocalHistoryFromTranslogOnPromotion FAILED java.lang.AssertionError: Expected: <12L> but: was <10L> at __randomizedtesting.SeedInfo.seed([8F7E1836ED070021:3FB466971CC634D8]:0) at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18) at org.junit.Assert.assertThat(Assert.java:956) at org.junit.Assert.assertThat(Assert.java:923) at org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion(IndexShardTests.java:1206) Suite: Test class org.elasticsearch.index.shard.IndexShardTests 1> [2020-06-16T06:07:53,046][INFO ][o.e.i.s.IndexShardTests ] [testRestoreLocalHistoryFromTranslogOnPromotion] before test 1> [2020-06-16T06:07:53,906][INFO ][o.e.i.s.IndexShard ] [org.elasticsearch.index.shard.IndexShardTests] [index][0] detected new primary with primary term [7], global checkpoint [12], max_seq_no [12] 1> [2020-06-16T06:07:53,911][INFO ][o.e.i.s.IndexShardTests ] [testRestoreLocalHistoryFromTranslogOnPromotion] after test 2> REPRODUCE WITH: ./gradlew ':server:test' --tests "org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion" -Dtests.seed=8F7E1836ED070021 -Dtests.security.manager=true -Dtests.locale=nl-BE -Dtests.timezone=Brazil/West -Druntime.java=14 2> java.lang.AssertionError: Expected: <12L> but: was <10L> at __randomizedtesting.SeedInfo.seed([8F7E1836ED070021:3FB466971CC634D8]:0) at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18) at org.junit.Assert.assertThat(Assert.java:956) at org.junit.Assert.assertThat(Assert.java:923) at org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion(IndexShardTests.java:1206) 2> NOTE: leaving temporary files on disk at: /home/brownbear/src/elasticsearch/server/build/testrun/test/temp/org.elasticsearch.index.shard.IndexShardTests_8F7E1836ED070021-003 2> NOTE: test params are: codec=Asserting(Lucene86): {}, docValues:{}, maxPointsInLeafNode=1049, maxMBSortInHeap=5.637758798428584, sim=Asserting(org.apache.lucene.search.similarities.AssertingSimilarity@251926d5), locale=nl-BE, timezone=Brazil/West 2> NOTE: Linux 5.4.0-37-generic amd64/AdoptOpenJDK 14.0.1 (64-bit)/cpus=16,threads=1,free=491558296,total=536870912 2> NOTE: All tests run in this JVM: [IndexShardTests] 1 test completed, 1 failed ```
1.0
Reproducible Failure in IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion - Reproduces 100% of the time for me locally on master: ``` REPRODUCE WITH: ./gradlew ':server:test' --tests "org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion" -Dtests.seed=8F7E1836ED070021 -Dtests.security.manager=true -Dtests.locale=nl-BE -Dtests.timezone=Brazil/West -Druntime.java=14 org.elasticsearch.index.shard.IndexShardTests > testRestoreLocalHistoryFromTranslogOnPromotion FAILED java.lang.AssertionError: Expected: <12L> but: was <10L> at __randomizedtesting.SeedInfo.seed([8F7E1836ED070021:3FB466971CC634D8]:0) at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18) at org.junit.Assert.assertThat(Assert.java:956) at org.junit.Assert.assertThat(Assert.java:923) at org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion(IndexShardTests.java:1206) Suite: Test class org.elasticsearch.index.shard.IndexShardTests 1> [2020-06-16T06:07:53,046][INFO ][o.e.i.s.IndexShardTests ] [testRestoreLocalHistoryFromTranslogOnPromotion] before test 1> [2020-06-16T06:07:53,906][INFO ][o.e.i.s.IndexShard ] [org.elasticsearch.index.shard.IndexShardTests] [index][0] detected new primary with primary term [7], global checkpoint [12], max_seq_no [12] 1> [2020-06-16T06:07:53,911][INFO ][o.e.i.s.IndexShardTests ] [testRestoreLocalHistoryFromTranslogOnPromotion] after test 2> REPRODUCE WITH: ./gradlew ':server:test' --tests "org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion" -Dtests.seed=8F7E1836ED070021 -Dtests.security.manager=true -Dtests.locale=nl-BE -Dtests.timezone=Brazil/West -Druntime.java=14 2> java.lang.AssertionError: Expected: <12L> but: was <10L> at __randomizedtesting.SeedInfo.seed([8F7E1836ED070021:3FB466971CC634D8]:0) at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18) at org.junit.Assert.assertThat(Assert.java:956) at org.junit.Assert.assertThat(Assert.java:923) at org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion(IndexShardTests.java:1206) 2> NOTE: leaving temporary files on disk at: /home/brownbear/src/elasticsearch/server/build/testrun/test/temp/org.elasticsearch.index.shard.IndexShardTests_8F7E1836ED070021-003 2> NOTE: test params are: codec=Asserting(Lucene86): {}, docValues:{}, maxPointsInLeafNode=1049, maxMBSortInHeap=5.637758798428584, sim=Asserting(org.apache.lucene.search.similarities.AssertingSimilarity@251926d5), locale=nl-BE, timezone=Brazil/West 2> NOTE: Linux 5.4.0-37-generic amd64/AdoptOpenJDK 14.0.1 (64-bit)/cpus=16,threads=1,free=491558296,total=536870912 2> NOTE: All tests run in this JVM: [IndexShardTests] 1 test completed, 1 failed ```
non_priority
reproducible failure in indexshardtests testrestorelocalhistoryfromtranslogonpromotion reproduces of the time for me locally on master reproduce with gradlew server test tests org elasticsearch index shard indexshardtests testrestorelocalhistoryfromtranslogonpromotion dtests seed dtests security manager true dtests locale nl be dtests timezone brazil west druntime java org elasticsearch index shard indexshardtests testrestorelocalhistoryfromtranslogonpromotion failed java lang assertionerror expected but was at randomizedtesting seedinfo seed at org hamcrest matcherassert assertthat matcherassert java at org junit assert assertthat assert java at org junit assert assertthat assert java at org elasticsearch index shard indexshardtests testrestorelocalhistoryfromtranslogonpromotion indexshardtests java suite test class org elasticsearch index shard indexshardtests before test detected new primary with primary term global checkpoint max seq no after test reproduce with gradlew server test tests org elasticsearch index shard indexshardtests testrestorelocalhistoryfromtranslogonpromotion dtests seed dtests security manager true dtests locale nl be dtests timezone brazil west druntime java java lang assertionerror expected but was at randomizedtesting seedinfo seed at org hamcrest matcherassert assertthat matcherassert java at org junit assert assertthat assert java at org junit assert assertthat assert java at org elasticsearch index shard indexshardtests testrestorelocalhistoryfromtranslogonpromotion indexshardtests java note leaving temporary files on disk at home brownbear src elasticsearch server build testrun test temp org elasticsearch index shard indexshardtests note test params are codec asserting docvalues maxpointsinleafnode maxmbsortinheap sim asserting org apache lucene search similarities assertingsimilarity locale nl be timezone brazil west note linux generic adoptopenjdk bit cpus threads free total note all tests run in this jvm test completed failed
0
93,270
8,406,858,269
IssuesEvent
2018-10-11 19:09:57
dotnet/roslyn
https://api.github.com/repos/dotnet/roslyn
closed
Handle null descriptor in DiagnosticAnalyzer.SupportedDiagnostics
4 - In Review Area-Analyzers Bug Integration-Test Tenet-Reliability
Likely cause of intermittent FailFast in integration tests: https://ci.dot.net/job/dotnet_roslyn/job/dev16.0.x/job/windows_debug_vs-integration_prtest/189/artifact/Binaries/Debug/UnitTests/Microsoft.VisualStudio.LanguageServices.IntegrationTests/xUnitResults/Screenshots/Unknown-RemotingException-16.23.36.DotNet.log ``` Description: The application requested process termination through System.Environment.FailFast(string message). Message: System.NullReferenceException: Object reference not set to an instance of an object. at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.AnalyzerExecutionContext.ComputeDescriptors(DiagnosticAnalyzer analyzer, AnalyzerExecutor analyzerExecutor) at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.AnalyzerExecutionContext.GetOrComputeDescriptors(DiagnosticAnalyzer analyzer, AnalyzerExecutor analyzerExecutor) at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.GetSupportedDiagnosticDescriptors(DiagnosticAnalyzer analyzer, AnalyzerExecutor analyzerExecutor) at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.IsDiagnosticAnalyzerSuppressed(DiagnosticAnalyzer analyzer, CompilationOptions options, Func`2 isCompilerAnalyzer, AnalyzerExecutor analyzerExecutor) at Microsoft.CodeAnalysis.Diagnostics.AnalyzerDriver.IsDiagnosticAnalyzerSuppressed(DiagnosticAnalyzer analyzer, CompilationOptions options, AnalyzerManager analyzerManager, AnalyzerExecutor analyzerExecutor) at Microsoft.CodeAnalysis.Diagnostics.AnalyzerDriver.<GetAnalyzerActionsAsync>d__105.MoveNext() ```
1.0
Handle null descriptor in DiagnosticAnalyzer.SupportedDiagnostics - Likely cause of intermittent FailFast in integration tests: https://ci.dot.net/job/dotnet_roslyn/job/dev16.0.x/job/windows_debug_vs-integration_prtest/189/artifact/Binaries/Debug/UnitTests/Microsoft.VisualStudio.LanguageServices.IntegrationTests/xUnitResults/Screenshots/Unknown-RemotingException-16.23.36.DotNet.log ``` Description: The application requested process termination through System.Environment.FailFast(string message). Message: System.NullReferenceException: Object reference not set to an instance of an object. at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.AnalyzerExecutionContext.ComputeDescriptors(DiagnosticAnalyzer analyzer, AnalyzerExecutor analyzerExecutor) at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.AnalyzerExecutionContext.GetOrComputeDescriptors(DiagnosticAnalyzer analyzer, AnalyzerExecutor analyzerExecutor) at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.GetSupportedDiagnosticDescriptors(DiagnosticAnalyzer analyzer, AnalyzerExecutor analyzerExecutor) at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.IsDiagnosticAnalyzerSuppressed(DiagnosticAnalyzer analyzer, CompilationOptions options, Func`2 isCompilerAnalyzer, AnalyzerExecutor analyzerExecutor) at Microsoft.CodeAnalysis.Diagnostics.AnalyzerDriver.IsDiagnosticAnalyzerSuppressed(DiagnosticAnalyzer analyzer, CompilationOptions options, AnalyzerManager analyzerManager, AnalyzerExecutor analyzerExecutor) at Microsoft.CodeAnalysis.Diagnostics.AnalyzerDriver.<GetAnalyzerActionsAsync>d__105.MoveNext() ```
non_priority
handle null descriptor in diagnosticanalyzer supporteddiagnostics likely cause of intermittent failfast in integration tests description the application requested process termination through system environment failfast string message message system nullreferenceexception object reference not set to an instance of an object at microsoft codeanalysis diagnostics analyzermanager analyzerexecutioncontext computedescriptors diagnosticanalyzer analyzer analyzerexecutor analyzerexecutor at microsoft codeanalysis diagnostics analyzermanager analyzerexecutioncontext getorcomputedescriptors diagnosticanalyzer analyzer analyzerexecutor analyzerexecutor at microsoft codeanalysis diagnostics analyzermanager getsupporteddiagnosticdescriptors diagnosticanalyzer analyzer analyzerexecutor analyzerexecutor at microsoft codeanalysis diagnostics analyzermanager isdiagnosticanalyzersuppressed diagnosticanalyzer analyzer compilationoptions options func iscompileranalyzer analyzerexecutor analyzerexecutor at microsoft codeanalysis diagnostics analyzerdriver isdiagnosticanalyzersuppressed diagnosticanalyzer analyzer compilationoptions options analyzermanager analyzermanager analyzerexecutor analyzerexecutor at microsoft codeanalysis diagnostics analyzerdriver d movenext
0
205,673
16,004,566,122
IssuesEvent
2021-04-20 00:17:54
Azure/azure-sdk-for-rust
https://api.github.com/repos/Azure/azure-sdk-for-rust
closed
crates.io links are outdated
documentation question
"Homepage" and "Repository" link to the old archived repository. "Documentation" is 404.
1.0
crates.io links are outdated - "Homepage" and "Repository" link to the old archived repository. "Documentation" is 404.
non_priority
crates io links are outdated homepage and repository link to the old archived repository documentation is
0
314,877
23,539,305,235
IssuesEvent
2022-08-20 05:51:54
gbowne1/spmssite
https://api.github.com/repos/gbowne1/spmssite
closed
Colors for FontAwesome Social Icons
bug documentation enhancement help wanted good first issue question
### Prerequisites - [X] I have read the [Contributing Guidelines](https://github.com/gbowne1/spmssite/blob/main/.github/CONTRIBUTING.md). - [X] I agree to follow the [Code of Conduct](https://github.com/gbowne1/spmssite/code-of-conduct). - [X] I have searched for [existing issues](https://github.com/gbowne1/spmssite/issues) that already report this problem, without success. ### Current Behavior There is no current styling for the social media icons in the footer. Add the colors from below. ### Expected Behavior ```css .fa-facebook { color: #1877f2; } .fa-github { color: #171515; } .fa-youtube { color: #ff0000; } .fa-discord { color: #5865f2; } .fa-reddit { color: #ff4500; } .ft-social-list li a :hover { color: #fff; } ``` ### Steps to Reproduce Try it :+1: :-)
1.0
Colors for FontAwesome Social Icons - ### Prerequisites - [X] I have read the [Contributing Guidelines](https://github.com/gbowne1/spmssite/blob/main/.github/CONTRIBUTING.md). - [X] I agree to follow the [Code of Conduct](https://github.com/gbowne1/spmssite/code-of-conduct). - [X] I have searched for [existing issues](https://github.com/gbowne1/spmssite/issues) that already report this problem, without success. ### Current Behavior There is no current styling for the social media icons in the footer. Add the colors from below. ### Expected Behavior ```css .fa-facebook { color: #1877f2; } .fa-github { color: #171515; } .fa-youtube { color: #ff0000; } .fa-discord { color: #5865f2; } .fa-reddit { color: #ff4500; } .ft-social-list li a :hover { color: #fff; } ``` ### Steps to Reproduce Try it :+1: :-)
non_priority
colors for fontawesome social icons prerequisites i have read the i agree to follow the i have searched for that already report this problem without success current behavior there is no current styling for the social media icons in the footer add the colors from below expected behavior css fa facebook color fa github color fa youtube color fa discord color fa reddit color ft social list li a hover color fff steps to reproduce try it
0
242,499
18,666,925,210
IssuesEvent
2021-10-30 01:29:22
ThienHi/Python-app-demo
https://api.github.com/repos/ThienHi/Python-app-demo
closed
Automated issue for commit: dc4fd6b07e5ec3ad55d0787f2c291c76d7b42d95
documentation
This issue was automatically created by the GitHub Action workflow **Django CI**. The commit hash was: _dc4fd6b07e5ec3ad55d0787f2c291c76d7b42d95_.
1.0
Automated issue for commit: dc4fd6b07e5ec3ad55d0787f2c291c76d7b42d95 - This issue was automatically created by the GitHub Action workflow **Django CI**. The commit hash was: _dc4fd6b07e5ec3ad55d0787f2c291c76d7b42d95_.
non_priority
automated issue for commit this issue was automatically created by the github action workflow django ci the commit hash was
0
275,342
20,918,336,991
IssuesEvent
2022-03-24 15:12:19
nexB/aboutcode
https://api.github.com/repos/nexB/aboutcode
opened
Improve how we references issues in commit message and code
documentation
### Description Today we use `#12` as a reference to an issue. When the code is move to another repo, 12 will point to another issue. We should consider switching to something using full URLs in code comments and this `Reference: https://github.com/nexB/dejacode/issues/1198` just above the signoff in commits
1.0
Improve how we references issues in commit message and code - ### Description Today we use `#12` as a reference to an issue. When the code is move to another repo, 12 will point to another issue. We should consider switching to something using full URLs in code comments and this `Reference: https://github.com/nexB/dejacode/issues/1198` just above the signoff in commits
non_priority
improve how we references issues in commit message and code description today we use as a reference to an issue when the code is move to another repo will point to another issue we should consider switching to something using full urls in code comments and this reference just above the signoff in commits
0
55,084
13,962,948,445
IssuesEvent
2020-10-25 12:01:32
gavarasana/spring-petclinic
https://api.github.com/repos/gavarasana/spring-petclinic
opened
CVE-2018-14040 (Medium) detected in bootstrap-3.3.6.jar
security vulnerability
## CVE-2018-14040 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.3.6.jar</b></p></summary> <p>WebJar for Bootstrap</p> <p>Library home page: <a href="http://webjars.org">http://webjars.org</a></p> <p>Path to dependency file: spring-petclinic/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/org/webjars/bootstrap/3.3.6/bootstrap-3.3.6.jar</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.3.6.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/gavarasana/spring-petclinic/commit/3535fb0922496f23d4915bd9ad24c8d3c8658c09">3535fb0922496f23d4915bd9ad24c8d3c8658c09</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. <p>Publish Date: 2018-07-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14040>CVE-2018-14040</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/twbs/bootstrap/pull/26630">https://github.com/twbs/bootstrap/pull/26630</a></p> <p>Release Date: 2018-07-13</p> <p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-14040 (Medium) detected in bootstrap-3.3.6.jar - ## CVE-2018-14040 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.3.6.jar</b></p></summary> <p>WebJar for Bootstrap</p> <p>Library home page: <a href="http://webjars.org">http://webjars.org</a></p> <p>Path to dependency file: spring-petclinic/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/org/webjars/bootstrap/3.3.6/bootstrap-3.3.6.jar</p> <p> Dependency Hierarchy: - :x: **bootstrap-3.3.6.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/gavarasana/spring-petclinic/commit/3535fb0922496f23d4915bd9ad24c8d3c8658c09">3535fb0922496f23d4915bd9ad24c8d3c8658c09</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. <p>Publish Date: 2018-07-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14040>CVE-2018-14040</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/twbs/bootstrap/pull/26630">https://github.com/twbs/bootstrap/pull/26630</a></p> <p>Release Date: 2018-07-13</p> <p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in bootstrap jar cve medium severity vulnerability vulnerable library bootstrap jar webjar for bootstrap library home page a href path to dependency file spring petclinic pom xml path to vulnerable library canner repository org webjars bootstrap bootstrap jar dependency hierarchy x bootstrap jar vulnerable library found in head commit a href found in base branch main vulnerability details in bootstrap before xss is possible in the collapse data parent attribute publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org webjars npm bootstrap org webjars bootstrap step up your open source security game with whitesource
0
163,262
20,327,179,765
IssuesEvent
2022-02-18 07:08:45
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
opened
mark SslProtocols.Tls and SslProtocols.Tls11 as obsolete
area-System.Net.Security breaking-change
We marked `Ssl2`and `Ssl3` as obsolete while ago. With recent push for more secure defaults and behavior and with recent Azure and `CipherSuitePolicy` changes I feel it is time to mark 1.0 and 1.1 as obsolete since industry no long consider them as safe. cc: @blowdart
True
mark SslProtocols.Tls and SslProtocols.Tls11 as obsolete - We marked `Ssl2`and `Ssl3` as obsolete while ago. With recent push for more secure defaults and behavior and with recent Azure and `CipherSuitePolicy` changes I feel it is time to mark 1.0 and 1.1 as obsolete since industry no long consider them as safe. cc: @blowdart
non_priority
mark sslprotocols tls and sslprotocols as obsolete we marked and as obsolete while ago with recent push for more secure defaults and behavior and with recent azure and ciphersuitepolicy changes i feel it is time to mark and as obsolete since industry no long consider them as safe cc blowdart
0
859
8,434,965,035
IssuesEvent
2018-10-17 11:50:16
DoESLiverpool/somebody-should
https://api.github.com/repos/DoESLiverpool/somebody-should
opened
Doorbots should generate an MQTT message for each one
System: Automation System: Doorbots
The message doesn't need to give names or serial numbers (unless the keyholder wants to). But an MQTT message would allow for some occupancy messages to be made and timing dashboards. Additionally we'd add in the fresh coffee and fresh water MQTT messages, which could be worked out on the node-red dashboard. (oh, and we need an tap-out doorbot)
1.0
Doorbots should generate an MQTT message for each one - The message doesn't need to give names or serial numbers (unless the keyholder wants to). But an MQTT message would allow for some occupancy messages to be made and timing dashboards. Additionally we'd add in the fresh coffee and fresh water MQTT messages, which could be worked out on the node-red dashboard. (oh, and we need an tap-out doorbot)
non_priority
doorbots should generate an mqtt message for each one the message doesn t need to give names or serial numbers unless the keyholder wants to but an mqtt message would allow for some occupancy messages to be made and timing dashboards additionally we d add in the fresh coffee and fresh water mqtt messages which could be worked out on the node red dashboard oh and we need an tap out doorbot
0
153,250
19,703,259,382
IssuesEvent
2022-01-12 18:51:49
rorymcentee-p/bitcoin-s
https://api.github.com/repos/rorymcentee-p/bitcoin-s
opened
CVE-2021-22569 (Medium) detected in protobuf-java-3.15.8.jar
security vulnerability
## CVE-2021-22569 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>protobuf-java-3.15.8.jar</b></p></summary> <p>Core Protocol Buffers library. Protocol Buffers are a way of encoding structured data in an efficient yet extensible format.</p> <p>Library home page: <a href="https://developers.google.com/protocol-buffers/">https://developers.google.com/protocol-buffers/</a></p> <p> Dependency Hierarchy: - bitcoin-s-testkit_2.13-1.7.0-179-1cbe5034-SNAPSHOT (Root Library) - bitcoin-s-lnd-rpc_2.13-1.7.0-179-1cbe5034-SNAPSHOT - scalapb-runtime_2.13-0.11.5.jar - :x: **protobuf-java-3.15.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/rorymcentee-p/bitcoin-s/commit/1cbe5034130b27cd3d6b9769c224667e0871208c">1cbe5034130b27cd3d6b9769c224667e0871208c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions. <p>Publish Date: 2022-01-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22569>CVE-2021-22569</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-wrvw-hg22-4m67">https://github.com/advisories/GHSA-wrvw-hg22-4m67</a></p> <p>Release Date: 2022-01-10</p> <p>Fix Resolution: com.google.protobuf:protobuf-java:3.16.1,3.18.2,3.19.2; com.google.protobuf:protobuf-kotlin:3.18.2,3.19.2; google-protobuf - 3.19.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.google.protobuf","packageName":"protobuf-java","packageVersion":"3.15.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"org.bitcoin-s:bitcoin-s-testkit_2.13:1.7.0-179-1cbe5034-SNAPSHOT;org.bitcoin-s:bitcoin-s-lnd-rpc_2.13:1.7.0-179-1cbe5034-SNAPSHOT;com.thesamet.scalapb:scalapb-runtime_2.13:0.11.5;com.google.protobuf:protobuf-java:3.15.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.google.protobuf:protobuf-java:3.16.1,3.18.2,3.19.2; com.google.protobuf:protobuf-kotlin:3.18.2,3.19.2; google-protobuf - 3.19.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-22569","vulnerabilityDetails":"An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22569","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"N/A","AC":"N/A","PR":"N/A","S":"N/A","C":"N/A","UI":"N/A","AV":"N/A","I":"N/A"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-22569 (Medium) detected in protobuf-java-3.15.8.jar - ## CVE-2021-22569 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>protobuf-java-3.15.8.jar</b></p></summary> <p>Core Protocol Buffers library. Protocol Buffers are a way of encoding structured data in an efficient yet extensible format.</p> <p>Library home page: <a href="https://developers.google.com/protocol-buffers/">https://developers.google.com/protocol-buffers/</a></p> <p> Dependency Hierarchy: - bitcoin-s-testkit_2.13-1.7.0-179-1cbe5034-SNAPSHOT (Root Library) - bitcoin-s-lnd-rpc_2.13-1.7.0-179-1cbe5034-SNAPSHOT - scalapb-runtime_2.13-0.11.5.jar - :x: **protobuf-java-3.15.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/rorymcentee-p/bitcoin-s/commit/1cbe5034130b27cd3d6b9769c224667e0871208c">1cbe5034130b27cd3d6b9769c224667e0871208c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions. <p>Publish Date: 2022-01-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22569>CVE-2021-22569</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-wrvw-hg22-4m67">https://github.com/advisories/GHSA-wrvw-hg22-4m67</a></p> <p>Release Date: 2022-01-10</p> <p>Fix Resolution: com.google.protobuf:protobuf-java:3.16.1,3.18.2,3.19.2; com.google.protobuf:protobuf-kotlin:3.18.2,3.19.2; google-protobuf - 3.19.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.google.protobuf","packageName":"protobuf-java","packageVersion":"3.15.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"org.bitcoin-s:bitcoin-s-testkit_2.13:1.7.0-179-1cbe5034-SNAPSHOT;org.bitcoin-s:bitcoin-s-lnd-rpc_2.13:1.7.0-179-1cbe5034-SNAPSHOT;com.thesamet.scalapb:scalapb-runtime_2.13:0.11.5;com.google.protobuf:protobuf-java:3.15.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.google.protobuf:protobuf-java:3.16.1,3.18.2,3.19.2; com.google.protobuf:protobuf-kotlin:3.18.2,3.19.2; google-protobuf - 3.19.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-22569","vulnerabilityDetails":"An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22569","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"N/A","AC":"N/A","PR":"N/A","S":"N/A","C":"N/A","UI":"N/A","AV":"N/A","I":"N/A"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in protobuf java jar cve medium severity vulnerability vulnerable library protobuf java jar core protocol buffers library protocol buffers are a way of encoding structured data in an efficient yet extensible format library home page a href dependency hierarchy bitcoin s testkit snapshot root library bitcoin s lnd rpc snapshot scalapb runtime jar x protobuf java jar vulnerable library found in head commit a href found in base branch master vulnerability details an issue in protobuf java allowed the interleaving of com google protobuf unknownfieldset fields in such a way that would be processed out of order a small malicious payload can occupy the parser for several minutes by creating large numbers of short lived objects that cause frequent repeated pauses we recommend upgrading libraries beyond the vulnerable versions publish date url a href cvss score details base score metrics exploitability metrics attack vector n a attack complexity n a privileges required n a user interaction n a scope n a impact metrics confidentiality impact n a integrity impact n a availability impact n a for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com google protobuf protobuf java com google protobuf protobuf kotlin google protobuf isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org bitcoin s bitcoin s testkit snapshot org bitcoin s bitcoin s lnd rpc snapshot com thesamet scalapb scalapb runtime com google protobuf protobuf java isminimumfixversionavailable true minimumfixversion com google protobuf protobuf java com google protobuf protobuf kotlin google protobuf isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails an issue in protobuf java allowed the interleaving of com google protobuf unknownfieldset fields in such a way that would be processed out of order a small malicious payload can occupy the parser for several minutes by creating large numbers of short lived objects that cause frequent repeated pauses we recommend upgrading libraries beyond the vulnerable versions vulnerabilityurl
0