Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1
value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3
values | title stringlengths 1 957 | labels stringlengths 4 795 | body stringlengths 1 259k | index stringclasses 12
values | text_combine stringlengths 96 259k | label stringclasses 2
values | text stringlengths 96 252k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
338,079 | 30,279,303,423 | IssuesEvent | 2023-07-07 23:56:18 | ValveSoftware/steam-for-linux | https://api.github.com/repos/ValveSoftware/steam-for-linux | closed | Chat window displays Hebrew letters in reversed order. | reviewed Steam client localization Need Retest | when Chatting with my friends in Hebrew, the letter order is displayed reversed, for example:
instead of seeing אני מסכים איתך
you see: ךתיא םיכסמ ינא
the only problem is the display, when typing it sends correctly.
My friends who tried Steam Linux confirmed it.
| 1.0 | Chat window displays Hebrew letters in reversed order. - when Chatting with my friends in Hebrew, the letter order is displayed reversed, for example:
instead of seeing אני מסכים איתך
you see: ךתיא םיכסמ ינא
the only problem is the display, when typing it sends correctly.
My friends who tried Steam Linux confirmed it.
| non_priority | chat window displays hebrew letters in reversed order when chatting with my friends in hebrew the letter order is displayed reversed for example instead of seeing אני מסכים איתך you see ךתיא םיכסמ ינא the only problem is the display when typing it sends correctly my friends who tried steam linux confirmed it | 0 |
314,696 | 23,533,472,180 | IssuesEvent | 2022-08-19 17:47:32 | kevin218/Eureka | https://api.github.com/repos/kevin218/Eureka | closed | Eureka flowchart | documentation enhancement | I think it would be useful to have some kind of flow chart or visual guide to all of the moving pieces in eureka, because there are a lot! It doesn't have to be super fancy, just something that outlines what's done in S1, S2, S3, and what tools are available in S4 and S5. | 1.0 | Eureka flowchart - I think it would be useful to have some kind of flow chart or visual guide to all of the moving pieces in eureka, because there are a lot! It doesn't have to be super fancy, just something that outlines what's done in S1, S2, S3, and what tools are available in S4 and S5. | non_priority | eureka flowchart i think it would be useful to have some kind of flow chart or visual guide to all of the moving pieces in eureka because there are a lot it doesn t have to be super fancy just something that outlines what s done in and what tools are available in and | 0 |
86,920 | 8,053,467,311 | IssuesEvent | 2018-08-01 23:10:48 | golang/go | https://api.github.com/repos/golang/go | closed | misc/cgo/testcshared: test failure on Google Pixelbook | NeedsInvestigation Testing | ### What version of Go are you using (`go version`)?
```
go version go1.10.3 linux/amd64
```
### Does this issue reproduce with the latest release?
Yes.
### What operating system and processor architecture are you using (`go env`)?
```
$ go env
GOARCH="amd64"
GOBIN=""
GOCACHE="/home/danielapetruzalek/.cache/go-build"
GOEXE=""
GOHOSTARCH="amd64"
GOHOSTOS="linux"
GOOS="linux"
GOPATH="/home/danielapetruzalek/go"
GORACE=""
GOROOT="/usr/local/go"
GOTMPDIR=""
GOTOOLDIR="/usr/local/go/pkg/tool/linux_amd64"
GCCGO="gccgo"
CC="gcc"
CXX="g++"
CGO_ENABLED="1"
CGO_CFLAGS="-g -O2"
CGO_CPPFLAGS=""
CGO_CXXFLAGS="-g -O2"
CGO_FFLAGS="-g -O2"
CGO_LDFLAGS="-g -O2"
PKG_CONFIG="pkg-config"
GOGCCFLAGS="-fPIC -m64 -pthread -fmessage-length=0 -fdebug-prefix-map=/tmp/go-build074359831=/tmp/go-build -gno-record-gcc-switches"
```
### What did you do?
```sh
cd go/src
./all.bash
```
### What did you expect to see?
```
ALL TESTS PASSED
```
### What did you see instead?
```
##### ../misc/cgo/testcshared
--- FAIL: TestUnexportedSymbols (0.64s)
cshared_test.go:353: run: [go build -buildmode=c-shared -installsuffix testcshared -o libgo2.so libgo2]
cshared_test.go:367: run: [gcc -fPIC -m64 -pthread -fmessage-length=0 -fdebug-prefix-map=/tmp/go-build783986620=/tmp/go-build -gno-record-gcc-switches -I pkg/linux_amd64_shared -o testp2 main2.c -Wl,--no-as-needed libgo2.so]
cshared_test.go:373: run: [./testp2]
cshared_test.go:376: # NAN ChangeLog
**
FAIL
2018/07/31 23:09:06 Failed: exit status 1
```
I've tried two other times and the message on the last line (after "cshared_test.go:376") changed all times, suggesting some random values were being read from fd 30. I've tracked this change to the issue #23784 and CL 108537 (https://golang.org/cl/108537).
I've recompiled the binaries to use fd 100 like it was originally and I got the tests to pass.
I'm testing Go on the new Google Pixelbook and it seems that fd 30 is being used already. I wonder if instead of choosing an arbitrary number we could have a more safe way to select the fd? Or use another technique to run this test? | 1.0 | misc/cgo/testcshared: test failure on Google Pixelbook - ### What version of Go are you using (`go version`)?
```
go version go1.10.3 linux/amd64
```
### Does this issue reproduce with the latest release?
Yes.
### What operating system and processor architecture are you using (`go env`)?
```
$ go env
GOARCH="amd64"
GOBIN=""
GOCACHE="/home/danielapetruzalek/.cache/go-build"
GOEXE=""
GOHOSTARCH="amd64"
GOHOSTOS="linux"
GOOS="linux"
GOPATH="/home/danielapetruzalek/go"
GORACE=""
GOROOT="/usr/local/go"
GOTMPDIR=""
GOTOOLDIR="/usr/local/go/pkg/tool/linux_amd64"
GCCGO="gccgo"
CC="gcc"
CXX="g++"
CGO_ENABLED="1"
CGO_CFLAGS="-g -O2"
CGO_CPPFLAGS=""
CGO_CXXFLAGS="-g -O2"
CGO_FFLAGS="-g -O2"
CGO_LDFLAGS="-g -O2"
PKG_CONFIG="pkg-config"
GOGCCFLAGS="-fPIC -m64 -pthread -fmessage-length=0 -fdebug-prefix-map=/tmp/go-build074359831=/tmp/go-build -gno-record-gcc-switches"
```
### What did you do?
```sh
cd go/src
./all.bash
```
### What did you expect to see?
```
ALL TESTS PASSED
```
### What did you see instead?
```
##### ../misc/cgo/testcshared
--- FAIL: TestUnexportedSymbols (0.64s)
cshared_test.go:353: run: [go build -buildmode=c-shared -installsuffix testcshared -o libgo2.so libgo2]
cshared_test.go:367: run: [gcc -fPIC -m64 -pthread -fmessage-length=0 -fdebug-prefix-map=/tmp/go-build783986620=/tmp/go-build -gno-record-gcc-switches -I pkg/linux_amd64_shared -o testp2 main2.c -Wl,--no-as-needed libgo2.so]
cshared_test.go:373: run: [./testp2]
cshared_test.go:376: # NAN ChangeLog
**
FAIL
2018/07/31 23:09:06 Failed: exit status 1
```
I've tried two other times and the message on the last line (after "cshared_test.go:376") changed all times, suggesting some random values were being read from fd 30. I've tracked this change to the issue #23784 and CL 108537 (https://golang.org/cl/108537).
I've recompiled the binaries to use fd 100 like it was originally and I got the tests to pass.
I'm testing Go on the new Google Pixelbook and it seems that fd 30 is being used already. I wonder if instead of choosing an arbitrary number we could have a more safe way to select the fd? Or use another technique to run this test? | non_priority | misc cgo testcshared test failure on google pixelbook what version of go are you using go version go version linux does this issue reproduce with the latest release yes what operating system and processor architecture are you using go env go env goarch gobin gocache home danielapetruzalek cache go build goexe gohostarch gohostos linux goos linux gopath home danielapetruzalek go gorace goroot usr local go gotmpdir gotooldir usr local go pkg tool linux gccgo gccgo cc gcc cxx g cgo enabled cgo cflags g cgo cppflags cgo cxxflags g cgo fflags g cgo ldflags g pkg config pkg config gogccflags fpic pthread fmessage length fdebug prefix map tmp go tmp go build gno record gcc switches what did you do sh cd go src all bash what did you expect to see all tests passed what did you see instead misc cgo testcshared fail testunexportedsymbols cshared test go run cshared test go run cshared test go run cshared test go nan changelog fail failed exit status i ve tried two other times and the message on the last line after cshared test go changed all times suggesting some random values were being read from fd i ve tracked this change to the issue and cl i ve recompiled the binaries to use fd like it was originally and i got the tests to pass i m testing go on the new google pixelbook and it seems that fd is being used already i wonder if instead of choosing an arbitrary number we could have a more safe way to select the fd or use another technique to run this test | 0 |
124,987 | 17,795,505,657 | IssuesEvent | 2021-08-31 21:34:16 | ghc-dev/Peter-Martinez | https://api.github.com/repos/ghc-dev/Peter-Martinez | opened | CVE-2020-14332 (Medium) detected in ansible-2.9.9.tar.gz | security vulnerability | ## CVE-2020-14332 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p></summary>
<p>Radically simple IT automation</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p>
<p>Path to dependency file: Peter-Martinez/requirements.txt</p>
<p>Path to vulnerable library: /requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **ansible-2.9.9.tar.gz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Peter-Martinez/commit/1c63cb595605e9dc037eb78ecbd48f6ce38a52c2">1c63cb595605e9dc037eb78ecbd48f6ce38a52c2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.
<p>Publish Date: 2020-09-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14332>CVE-2020-14332</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: 2.8.14,2.9.12</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"ansible","packageVersion":"2.9.9","packageFilePaths":["/requirements.txt"],"isTransitiveDependency":false,"dependencyTree":"ansible:2.9.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.8.14,2.9.12"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-14332","vulnerabilityDetails":"A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14332","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-14332 (Medium) detected in ansible-2.9.9.tar.gz - ## CVE-2020-14332 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p></summary>
<p>Radically simple IT automation</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p>
<p>Path to dependency file: Peter-Martinez/requirements.txt</p>
<p>Path to vulnerable library: /requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **ansible-2.9.9.tar.gz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Peter-Martinez/commit/1c63cb595605e9dc037eb78ecbd48f6ce38a52c2">1c63cb595605e9dc037eb78ecbd48f6ce38a52c2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.
<p>Publish Date: 2020-09-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14332>CVE-2020-14332</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: 2.8.14,2.9.12</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"ansible","packageVersion":"2.9.9","packageFilePaths":["/requirements.txt"],"isTransitiveDependency":false,"dependencyTree":"ansible:2.9.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.8.14,2.9.12"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-14332","vulnerabilityDetails":"A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14332","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in ansible tar gz cve medium severity vulnerability vulnerable library ansible tar gz radically simple it automation library home page a href path to dependency file peter martinez requirements txt path to vulnerable library requirements txt dependency hierarchy x ansible tar gz vulnerable library found in head commit a href found in base branch master vulnerability details a flaw was found in the ansible engine when using module args tasks executed with check mode check mode do not properly neutralize sensitive data exposed in the event data this flaw allows unauthorized users to read this data the highest threat from this vulnerability is to confidentiality publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree ansible isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails a flaw was found in the ansible engine when using module args tasks executed with check mode check mode do not properly neutralize sensitive data exposed in the event data this flaw allows unauthorized users to read this data the highest threat from this vulnerability is to confidentiality vulnerabilityurl | 0 |
239,230 | 19,830,258,803 | IssuesEvent | 2022-01-20 11:12:34 | ml-lib/CodeLib | https://api.github.com/repos/ml-lib/CodeLib | opened | [Feature]: Random forest timeseries method | feature tests | ### Is your feature request related to a problem? Please describe.
Time series method to predict the next n intervals.
### Describe the solution you'd like
Add a time series method for building forecasting models with/without exogenous variables using Random forest.
### Expected input(s)
```python
df: pandas.DataFrame
y_var: List[str]
x_var: List[str]
method: Union[str]
param: Dict
```
### Expected output(s)
```python
fit
predict
```
### Additional context
_No response_
### Acceptance criteria
Integration tests:
- [ ] Ensure that predictions is not flat after a certain intervals.
### Version
v0.4.0 | 1.0 | [Feature]: Random forest timeseries method - ### Is your feature request related to a problem? Please describe.
Time series method to predict the next n intervals.
### Describe the solution you'd like
Add a time series method for building forecasting models with/without exogenous variables using Random forest.
### Expected input(s)
```python
df: pandas.DataFrame
y_var: List[str]
x_var: List[str]
method: Union[str]
param: Dict
```
### Expected output(s)
```python
fit
predict
```
### Additional context
_No response_
### Acceptance criteria
Integration tests:
- [ ] Ensure that predictions is not flat after a certain intervals.
### Version
v0.4.0 | non_priority | random forest timeseries method is your feature request related to a problem please describe time series method to predict the next n intervals describe the solution you d like add a time series method for building forecasting models with without exogenous variables using random forest expected input s python df pandas dataframe y var list x var list method union param dict expected output s python fit predict additional context no response acceptance criteria integration tests ensure that predictions is not flat after a certain intervals version | 0 |
239,785 | 26,232,080,894 | IssuesEvent | 2023-01-05 01:45:09 | RG4421/marketplace-sample-apps | https://api.github.com/repos/RG4421/marketplace-sample-apps | opened | CVE-2022-0691 (High) detected in url-parse-1.5.1.tgz | security vulnerability | ## CVE-2022-0691 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>url-parse-1.5.1.tgz</b></p></summary>
<p>Small footprint URL parser that works seamlessly across Node.js and browser environments</p>
<p>Library home page: <a href="https://registry.npmjs.org/url-parse/-/url-parse-1.5.1.tgz">https://registry.npmjs.org/url-parse/-/url-parse-1.5.1.tgz</a></p>
<p>Path to dependency file: /Freshworks-Samples/Freshdesk/sample_cti_app/middleware/package.json</p>
<p>Path to vulnerable library: /Freshworks-Samples/Freshdesk/sample_cti_app/middleware/node_modules/url-parse/package.json</p>
<p>
Dependency Hierarchy:
- twilio-3.57.0.tgz (Root Library)
- :x: **url-parse-1.5.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/RG4421/marketplace-sample-apps/commit/04f99bf65a102dcd5e8ae3d1916dfccdb07addec">04f99bf65a102dcd5e8ae3d1916dfccdb07addec</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.
<p>Publish Date: 2022-02-21
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-0691>CVE-2022-0691</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0691">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0691</a></p>
<p>Release Date: 2022-02-21</p>
<p>Fix Resolution (url-parse): 1.5.9</p>
<p>Direct dependency fix Resolution (twilio): 3.58.0</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue | True | CVE-2022-0691 (High) detected in url-parse-1.5.1.tgz - ## CVE-2022-0691 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>url-parse-1.5.1.tgz</b></p></summary>
<p>Small footprint URL parser that works seamlessly across Node.js and browser environments</p>
<p>Library home page: <a href="https://registry.npmjs.org/url-parse/-/url-parse-1.5.1.tgz">https://registry.npmjs.org/url-parse/-/url-parse-1.5.1.tgz</a></p>
<p>Path to dependency file: /Freshworks-Samples/Freshdesk/sample_cti_app/middleware/package.json</p>
<p>Path to vulnerable library: /Freshworks-Samples/Freshdesk/sample_cti_app/middleware/node_modules/url-parse/package.json</p>
<p>
Dependency Hierarchy:
- twilio-3.57.0.tgz (Root Library)
- :x: **url-parse-1.5.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/RG4421/marketplace-sample-apps/commit/04f99bf65a102dcd5e8ae3d1916dfccdb07addec">04f99bf65a102dcd5e8ae3d1916dfccdb07addec</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.
<p>Publish Date: 2022-02-21
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-0691>CVE-2022-0691</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0691">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0691</a></p>
<p>Release Date: 2022-02-21</p>
<p>Fix Resolution (url-parse): 1.5.9</p>
<p>Direct dependency fix Resolution (twilio): 3.58.0</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue | non_priority | cve high detected in url parse tgz cve high severity vulnerability vulnerable library url parse tgz small footprint url parser that works seamlessly across node js and browser environments library home page a href path to dependency file freshworks samples freshdesk sample cti app middleware package json path to vulnerable library freshworks samples freshdesk sample cti app middleware node modules url parse package json dependency hierarchy twilio tgz root library x url parse tgz vulnerable library found in head commit a href found in base branch master vulnerability details authorization bypass through user controlled key in npm url parse prior to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution url parse direct dependency fix resolution twilio rescue worker helmet automatic remediation is available for this issue | 0 |
11,133 | 16,487,839,427 | IssuesEvent | 2021-05-24 20:54:01 | slsa-framework/slsa | https://api.github.com/repos/slsa-framework/slsa | opened | Add new level between SLSA 1 and 2? | requirements slsa 1 | It would be good to have a very low-barrier-to-entry first level that is basically "Is it signed at all" and perhaps "must be signed in an interoperable format." That is roughly what we have right now.
It would be useful to have an intermediate level that says:
- Must be generated by the platform.
- Must specify top-level sources.
SLSA 2 is too high because it requires build isolation, which is much harder to do. | 1.0 | Add new level between SLSA 1 and 2? - It would be good to have a very low-barrier-to-entry first level that is basically "Is it signed at all" and perhaps "must be signed in an interoperable format." That is roughly what we have right now.
It would be useful to have an intermediate level that says:
- Must be generated by the platform.
- Must specify top-level sources.
SLSA 2 is too high because it requires build isolation, which is much harder to do. | non_priority | add new level between slsa and it would be good to have a very low barrier to entry first level that is basically is it signed at all and perhaps must be signed in an interoperable format that is roughly what we have right now it would be useful to have an intermediate level that says must be generated by the platform must specify top level sources slsa is too high because it requires build isolation which is much harder to do | 0 |
18,909 | 6,656,597,912 | IssuesEvent | 2017-09-29 21:19:00 | EightShapes/esds-build | https://api.github.com/repos/EightShapes/esds-build | opened | Expose hook to set markdown filter wrapper | v1 [Build] | Many projects want to wrap markdown blocks of text in something like `<div class="long-form-text">`
A default wrapper can currently be set on an instance-by-instance basis:
`{% filter markdown(true) %}`
Which wraps the text with: `<div class="esds-markdown-wrap">` but it's inconvenient to add the true flag to each instance and the class should be configurable. | 1.0 | Expose hook to set markdown filter wrapper - Many projects want to wrap markdown blocks of text in something like `<div class="long-form-text">`
A default wrapper can currently be set on an instance-by-instance basis:
`{% filter markdown(true) %}`
Which wraps the text with: `<div class="esds-markdown-wrap">` but it's inconvenient to add the true flag to each instance and the class should be configurable. | non_priority | expose hook to set markdown filter wrapper many projects want to wrap markdown blocks of text in something like a default wrapper can currently be set on an instance by instance basis filter markdown true which wraps the text with but it s inconvenient to add the true flag to each instance and the class should be configurable | 0 |
60,310 | 7,330,798,062 | IssuesEvent | 2018-03-05 11:10:06 | Microsoft/AL | https://api.github.com/repos/Microsoft/AL | closed | Groups and actions cannot have the same name | bydesign | Created an Action Group named Resources and then created an Action named Resources under that.
That is not possible:

| 1.0 | Groups and actions cannot have the same name - Created an Action Group named Resources and then created an Action named Resources under that.
That is not possible:

| non_priority | groups and actions cannot have the same name created an action group named resources and then created an action named resources under that that is not possible | 0 |
128,842 | 17,627,784,954 | IssuesEvent | 2021-08-19 01:37:52 | outline/outline | https://api.github.com/repos/outline/outline | closed | Team switcher in account menu | enhancement design needed | Functionality-wise this should work the same as the switcher on the marketing website – reading the logged-in teams from the `getoutline.com` cookie and displaying a switcher to change domains. | 1.0 | Team switcher in account menu - Functionality-wise this should work the same as the switcher on the marketing website – reading the logged-in teams from the `getoutline.com` cookie and displaying a switcher to change domains. | non_priority | team switcher in account menu functionality wise this should work the same as the switcher on the marketing website – reading the logged in teams from the getoutline com cookie and displaying a switcher to change domains | 0 |
4,905 | 11,828,685,668 | IssuesEvent | 2020-03-22 08:53:35 | mpostol/PO.Common | https://api.github.com/repos/mpostol/PO.Common | closed | ItemDescriber merge the code with `DAServerConfiguration` | Architecture :hammer: | - [ ] move the code to the folder ItemDescriber
- [ ] fix references in CommServer.ItemDescriberEditor | 1.0 | ItemDescriber merge the code with `DAServerConfiguration` - - [ ] move the code to the folder ItemDescriber
- [ ] fix references in CommServer.ItemDescriberEditor | non_priority | itemdescriber merge the code with daserverconfiguration move the code to the folder itemdescriber fix references in commserver itemdescribereditor | 0 |
141,011 | 21,334,315,040 | IssuesEvent | 2022-04-18 12:48:06 | comment-reboot/blog-comments-list | https://api.github.com/repos/comment-reboot/blog-comments-list | opened | Gws使用说明 | 打码匠 | Gitalk /post/gws-design-instruction/ | https://blog.ibyte.me/post/gws-design-instruction/
Share computer science and technology, Golang, Rust, distributed systems, system design articles. | 1.0 | Gws使用说明 | 打码匠 - https://blog.ibyte.me/post/gws-design-instruction/
Share computer science and technology, Golang, Rust, distributed systems, system design articles. | non_priority | gws使用说明 打码匠 share computer science and technology golang rust distributed systems system design articles | 0 |
21,712 | 4,733,990,369 | IssuesEvent | 2016-10-19 13:02:20 | ELVIS-Project/vis-framework | https://api.github.com/repos/ELVIS-Project/vis-framework | closed | WorkflowManager.load() for Many Types | Status: TESTING Status: UNKNOWN Type: DOCUMENTATION Type: ENHANCEMENT | We should allow importing previous results with the ``load()`` method. At minimum, this should be HDF5 and pickle. It must be clear that this won't load the metadata, and that the ``WorkflowManager`` will not make sure you're loading results that correspond to the pieces. But we should check, if the results are piece-by-piece, that they have the right number of pieces.
While we're at it, make ``'pieces'`` the default instruction. | 1.0 | WorkflowManager.load() for Many Types - We should allow importing previous results with the ``load()`` method. At minimum, this should be HDF5 and pickle. It must be clear that this won't load the metadata, and that the ``WorkflowManager`` will not make sure you're loading results that correspond to the pieces. But we should check, if the results are piece-by-piece, that they have the right number of pieces.
While we're at it, make ``'pieces'`` the default instruction. | non_priority | workflowmanager load for many types we should allow importing previous results with the load method at minimum this should be and pickle it must be clear that this won t load the metadata and that the workflowmanager will not make sure you re loading results that correspond to the pieces but we should check if the results are piece by piece that they have the right number of pieces while we re at it make pieces the default instruction | 0 |
104,496 | 11,412,299,435 | IssuesEvent | 2020-02-01 12:15:16 | squadcastHQ/squadcast-support | https://api.github.com/repos/squadcastHQ/squadcast-support | closed | Add Custom Certificate for Status Pages | documentation | **Is your feature request related to a problem you are facing? Please describe.**
The current status pages use the statuspage.io certificate which causes a browser warning on CNAME entry
**Describe the ideal solution that could solve this problem for you**
Provide the ability to provide our own ssl certificate or automatically generate one using something like Let's Encrypt
**What alternatives did you consider?**
None. Reverse proxy will not work for subscription notifications
**Additional Context**
None
| 1.0 | Add Custom Certificate for Status Pages - **Is your feature request related to a problem you are facing? Please describe.**
The current status pages use the statuspage.io certificate which causes a browser warning on CNAME entry
**Describe the ideal solution that could solve this problem for you**
Provide the ability to provide our own ssl certificate or automatically generate one using something like Let's Encrypt
**What alternatives did you consider?**
None. Reverse proxy will not work for subscription notifications
**Additional Context**
None
| non_priority | add custom certificate for status pages is your feature request related to a problem you are facing please describe the current status pages use the statuspage io certificate which causes a browser warning on cname entry describe the ideal solution that could solve this problem for you provide the ability to provide our own ssl certificate or automatically generate one using something like let s encrypt what alternatives did you consider none reverse proxy will not work for subscription notifications additional context none | 0 |
99,709 | 21,030,469,469 | IssuesEvent | 2022-03-31 00:25:58 | withfig/fig | https://api.github.com/repos/withfig/fig | opened | Feels weird when used with default autocomplete | codebase:autocomplete-app type:usability | > The conflicting ui presence of both zsh’s autocompletes and figs felt off.
I agree with this - after disabling shell autocomplete entirely, Fig _feels_ way better.
Possibly solutions:
* Prompt to disable autocomplete - hard to implement, wouldn't come across well
* Prompt to enable only-show-on-tab - should implement #995 first | 1.0 | Feels weird when used with default autocomplete - > The conflicting ui presence of both zsh’s autocompletes and figs felt off.
I agree with this - after disabling shell autocomplete entirely, Fig _feels_ way better.
Possibly solutions:
* Prompt to disable autocomplete - hard to implement, wouldn't come across well
* Prompt to enable only-show-on-tab - should implement #995 first | non_priority | feels weird when used with default autocomplete the conflicting ui presence of both zsh’s autocompletes and figs felt off i agree with this after disabling shell autocomplete entirely fig feels way better possibly solutions prompt to disable autocomplete hard to implement wouldn t come across well prompt to enable only show on tab should implement first | 0 |
265,089 | 23,146,434,353 | IssuesEvent | 2022-07-29 01:42:28 | MPMG-DCC-UFMG/F01 | https://api.github.com/repos/MPMG-DCC-UFMG/F01 | closed | Teste de generalizacao para a tag Servidores - Proventos de pensão - Várzea da Palma | generalization test development template-Síntese tecnologia informatica subtag-Proventos de Pensão tag-Servidores | DoD: Realizar o teste de Generalização do validador da tag Servidores - Proventos de pensão para o Município de Várzea da Palma. | 1.0 | Teste de generalizacao para a tag Servidores - Proventos de pensão - Várzea da Palma - DoD: Realizar o teste de Generalização do validador da tag Servidores - Proventos de pensão para o Município de Várzea da Palma. | non_priority | teste de generalizacao para a tag servidores proventos de pensão várzea da palma dod realizar o teste de generalização do validador da tag servidores proventos de pensão para o município de várzea da palma | 0 |
83,637 | 10,333,231,941 | IssuesEvent | 2019-09-03 04:19:46 | fga-desenho-2019-2/Wiki | https://api.github.com/repos/fga-desenho-2019-2/Wiki | closed | Síntese dos requisitos elicitados | Elicitação depende de outra issue documentation | ## Síntese dos requisitos elicitados
## Descrição da Issue
Realizar a síntese dos requisitos elicitados e reunir os mais viáveis.
### Tasks:
- [x] Realizar a síntese dos requisitos;
- [x] Notificar a equipe para selecionar os requisitos viáveis;
- [x] Documentar para colocar no backlog.
### Relacionada às issue: #28 #29 #30 #31 #32 #33 | 1.0 | Síntese dos requisitos elicitados - ## Síntese dos requisitos elicitados
## Descrição da Issue
Realizar a síntese dos requisitos elicitados e reunir os mais viáveis.
### Tasks:
- [x] Realizar a síntese dos requisitos;
- [x] Notificar a equipe para selecionar os requisitos viáveis;
- [x] Documentar para colocar no backlog.
### Relacionada às issue: #28 #29 #30 #31 #32 #33 | non_priority | síntese dos requisitos elicitados síntese dos requisitos elicitados descrição da issue realizar a síntese dos requisitos elicitados e reunir os mais viáveis tasks realizar a síntese dos requisitos notificar a equipe para selecionar os requisitos viáveis documentar para colocar no backlog relacionada às issue | 0 |
345,625 | 30,828,196,577 | IssuesEvent | 2023-08-01 22:05:50 | elastic/elasticsearch | https://api.github.com/repos/elastic/elasticsearch | opened | [CI] QueryPhaseTests testTerminateAfterEarlyTermination failing | >test-failure Team:Search | This test was removed from `main` here: https://github.com/elastic/elasticsearch/pull/96889/files#diff-fa29efb3d0d151af522aeb021b5f331ac53f64a0033daf639360943425808d1dL351
However, 8.8 is failing. Were changes introduced that were back-ported, breaking this test?
**Build scan:**
https://gradle-enterprise.elastic.co/s/6fljliuz3xbxw/tests/:server:test/org.elasticsearch.search.query.QueryPhaseTests/testTerminateAfterEarlyTermination
**Reproduction line:**
```
./gradlew ':server:test' --tests "org.elasticsearch.search.query.QueryPhaseTests.testTerminateAfterEarlyTermination" -Dtests.seed=F849236E04A9265D -Dtests.locale=en-SG -Dtests.timezone=MIT -Druntime.java=17
```
**Applicable branches:**
8.9
**Reproduces locally?:**
Yes
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.search.query.QueryPhaseTests&tests.test=testTerminateAfterEarlyTermination
**Failure excerpt:**
```
java.lang.AssertionError:
Expected: <1L>
but: was <5L>
at __randomizedtesting.SeedInfo.seed([F849236E04A9265D:6EED9AF90D9B5A34]:0)
at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18)
at org.junit.Assert.assertThat(Assert.java:956)
at org.junit.Assert.assertThat(Assert.java:923)
at org.elasticsearch.search.query.QueryPhaseTests.testTerminateAfterEarlyTermination(QueryPhaseTests.java:400)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
at java.lang.Thread.run(Thread.java:833)
``` | 1.0 | [CI] QueryPhaseTests testTerminateAfterEarlyTermination failing - This test was removed from `main` here: https://github.com/elastic/elasticsearch/pull/96889/files#diff-fa29efb3d0d151af522aeb021b5f331ac53f64a0033daf639360943425808d1dL351
However, 8.8 is failing. Were changes introduced that were back-ported, breaking this test?
**Build scan:**
https://gradle-enterprise.elastic.co/s/6fljliuz3xbxw/tests/:server:test/org.elasticsearch.search.query.QueryPhaseTests/testTerminateAfterEarlyTermination
**Reproduction line:**
```
./gradlew ':server:test' --tests "org.elasticsearch.search.query.QueryPhaseTests.testTerminateAfterEarlyTermination" -Dtests.seed=F849236E04A9265D -Dtests.locale=en-SG -Dtests.timezone=MIT -Druntime.java=17
```
**Applicable branches:**
8.9
**Reproduces locally?:**
Yes
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.search.query.QueryPhaseTests&tests.test=testTerminateAfterEarlyTermination
**Failure excerpt:**
```
java.lang.AssertionError:
Expected: <1L>
but: was <5L>
at __randomizedtesting.SeedInfo.seed([F849236E04A9265D:6EED9AF90D9B5A34]:0)
at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18)
at org.junit.Assert.assertThat(Assert.java:956)
at org.junit.Assert.assertThat(Assert.java:923)
at org.elasticsearch.search.query.QueryPhaseTests.testTerminateAfterEarlyTermination(QueryPhaseTests.java:400)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(NativeMethodAccessorImpl.java:-2)
at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
at java.lang.Thread.run(Thread.java:833)
``` | non_priority | queryphasetests testterminateafterearlytermination failing this test was removed from main here however is failing were changes introduced that were back ported breaking this test build scan reproduction line gradlew server test tests org elasticsearch search query queryphasetests testterminateafterearlytermination dtests seed dtests locale en sg dtests timezone mit druntime java applicable branches reproduces locally yes failure history failure excerpt java lang assertionerror expected but was at randomizedtesting seedinfo seed at org hamcrest matcherassert assertthat matcherassert java at org junit assert assertthat assert java at org junit assert assertthat assert java at org elasticsearch search query queryphasetests testterminateafterearlytermination queryphasetests java at jdk internal reflect nativemethodaccessorimpl nativemethodaccessorimpl java at jdk internal reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at jdk internal reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at com carrotsearch randomizedtesting randomizedrunner invoke randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testrulesetupteardownchained evaluate testrulesetupteardownchained java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at org apache lucene tests util testrulethreadandtestname evaluate testrulethreadandtestname java at org apache lucene tests util testruleignoreaftermaxfailures evaluate testruleignoreaftermaxfailures java at org apache lucene tests util testrulemarkfailure evaluate testrulemarkfailure java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting threadleakcontrol statementrunner run threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol forktimeoutingtask threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol evaluate threadleakcontrol java at com carrotsearch randomizedtesting randomizedrunner runsingletest randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testrulestoreclassname evaluate testrulestoreclassname java at com carrotsearch randomizedtesting rules noshadowingoroverridesonmethodsrule evaluate noshadowingoroverridesonmethodsrule java at com carrotsearch randomizedtesting rules noshadowingoroverridesonmethodsrule evaluate noshadowingoroverridesonmethodsrule java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testruleassertionsrequired evaluate testruleassertionsrequired java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at org apache lucene tests util testrulemarkfailure evaluate testrulemarkfailure java at org apache lucene tests util testruleignoreaftermaxfailures evaluate testruleignoreaftermaxfailures java at org apache lucene tests util testruleignoretestsuites evaluate testruleignoretestsuites java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting threadleakcontrol statementrunner run threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol lambda forktimeoutingtask threadleakcontrol java at java lang thread run thread java | 0 |
150,849 | 19,634,016,695 | IssuesEvent | 2022-01-08 01:11:24 | TreyM-WSS/concord | https://api.github.com/repos/TreyM-WSS/concord | opened | CVE-2022-0122 (Medium) detected in node-forge-0.9.0.tgz | security vulnerability | ## CVE-2022-0122 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.9.0.tgz</b></p></summary>
<p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz</a></p>
<p>Path to dependency file: /console2/package.json</p>
<p>Path to vulnerable library: /console2/node_modules/node-forge/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-3.4.1.tgz (Root Library)
- webpack-dev-server-3.10.3.tgz
- selfsigned-1.10.7.tgz
- :x: **node-forge-0.9.0.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
forge is vulnerable to URL Redirection to Untrusted Site
<p>Publish Date: 2022-01-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0122>CVE-2022-0122</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/">https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/</a></p>
<p>Release Date: 2022-01-06</p>
<p>Fix Resolution: forge - v1.0.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"node-forge","packageVersion":"0.9.0","packageFilePaths":["/console2/package.json"],"isTransitiveDependency":true,"dependencyTree":"react-scripts:3.4.1;webpack-dev-server:3.10.3;selfsigned:1.10.7;node-forge:0.9.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"forge - v1.0.0","isBinary":false}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2022-0122","vulnerabilityDetails":"forge is vulnerable to URL Redirection to Untrusted Site","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0122","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2022-0122 (Medium) detected in node-forge-0.9.0.tgz - ## CVE-2022-0122 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-forge-0.9.0.tgz</b></p></summary>
<p>JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz">https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz</a></p>
<p>Path to dependency file: /console2/package.json</p>
<p>Path to vulnerable library: /console2/node_modules/node-forge/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-3.4.1.tgz (Root Library)
- webpack-dev-server-3.10.3.tgz
- selfsigned-1.10.7.tgz
- :x: **node-forge-0.9.0.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
forge is vulnerable to URL Redirection to Untrusted Site
<p>Publish Date: 2022-01-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0122>CVE-2022-0122</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/">https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/</a></p>
<p>Release Date: 2022-01-06</p>
<p>Fix Resolution: forge - v1.0.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"node-forge","packageVersion":"0.9.0","packageFilePaths":["/console2/package.json"],"isTransitiveDependency":true,"dependencyTree":"react-scripts:3.4.1;webpack-dev-server:3.10.3;selfsigned:1.10.7;node-forge:0.9.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"forge - v1.0.0","isBinary":false}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2022-0122","vulnerabilityDetails":"forge is vulnerable to URL Redirection to Untrusted Site","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0122","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in node forge tgz cve medium severity vulnerability vulnerable library node forge tgz javascript implementations of network transports cryptography ciphers pki message digests and various utilities library home page a href path to dependency file package json path to vulnerable library node modules node forge package json dependency hierarchy react scripts tgz root library webpack dev server tgz selfsigned tgz x node forge tgz vulnerable library vulnerability details forge is vulnerable to url redirection to untrusted site publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution forge isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree react scripts webpack dev server selfsigned node forge isminimumfixversionavailable true minimumfixversion forge isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails forge is vulnerable to url redirection to untrusted site vulnerabilityurl | 0 |
448,093 | 31,766,771,616 | IssuesEvent | 2023-09-12 09:15:00 | SpikeInterface/probeinterface | https://api.github.com/repos/SpikeInterface/probeinterface | closed | Add list of common adapter connectors and headstages available to probe.wiring_to_device in the documentation | documentation | Hi,
I'd like to use `probe.wiring_to_device` to map the channel indices. The [documentation](https://probeinterface.readthedocs.io/en/main/examples/ex_11_automatic_wiring.html) does not list what adapters and headstages are available. Would it be possible to add that list to the documentation?
Thanks | 1.0 | Add list of common adapter connectors and headstages available to probe.wiring_to_device in the documentation - Hi,
I'd like to use `probe.wiring_to_device` to map the channel indices. The [documentation](https://probeinterface.readthedocs.io/en/main/examples/ex_11_automatic_wiring.html) does not list what adapters and headstages are available. Would it be possible to add that list to the documentation?
Thanks | non_priority | add list of common adapter connectors and headstages available to probe wiring to device in the documentation hi i d like to use probe wiring to device to map the channel indices the does not list what adapters and headstages are available would it be possible to add that list to the documentation thanks | 0 |
136,096 | 19,704,495,713 | IssuesEvent | 2022-01-12 20:15:45 | quantumlib/Cirq | https://api.github.com/repos/quantumlib/Cirq | opened | Is there a use case for StateVectorStepResult.set_state() | kind/design-issue | **Is your design idea/issue related to a use case or problem? Please describe.**
`StateVectorStepResult.set_state()` and `DensityMatrixStepResult.set_state()` allow replacing the running simulation state with a new one. This ends up requiring a fair amount of code overhead to maintain. But I'm not sure this if this is a useful function, as it seems a user could just start a new simulation on the remaining circuit and the existing state. I'm guessing this function is just an artifact of an old design. If so, I think we should remove it.
**Describe your design idea/issue**
Deprecate this function, take advantage of cleanups it allows (StateVectorStepResult would no longer have to contain a simulator. SimulatorBase.core_iterator should no longer have to set sim_state after yielding the step result). | 1.0 | Is there a use case for StateVectorStepResult.set_state() - **Is your design idea/issue related to a use case or problem? Please describe.**
`StateVectorStepResult.set_state()` and `DensityMatrixStepResult.set_state()` allow replacing the running simulation state with a new one. This ends up requiring a fair amount of code overhead to maintain. But I'm not sure this if this is a useful function, as it seems a user could just start a new simulation on the remaining circuit and the existing state. I'm guessing this function is just an artifact of an old design. If so, I think we should remove it.
**Describe your design idea/issue**
Deprecate this function, take advantage of cleanups it allows (StateVectorStepResult would no longer have to contain a simulator. SimulatorBase.core_iterator should no longer have to set sim_state after yielding the step result). | non_priority | is there a use case for statevectorstepresult set state is your design idea issue related to a use case or problem please describe statevectorstepresult set state and densitymatrixstepresult set state allow replacing the running simulation state with a new one this ends up requiring a fair amount of code overhead to maintain but i m not sure this if this is a useful function as it seems a user could just start a new simulation on the remaining circuit and the existing state i m guessing this function is just an artifact of an old design if so i think we should remove it describe your design idea issue deprecate this function take advantage of cleanups it allows statevectorstepresult would no longer have to contain a simulator simulatorbase core iterator should no longer have to set sim state after yielding the step result | 0 |
51,858 | 6,552,804,772 | IssuesEvent | 2017-09-05 19:50:11 | unicef/etools-issues | https://api.github.com/repos/unicef/etools-issues | opened | Reference numbers get truncated | bug PD/SSFA TOR PMP PMP-Redesign | It seems that wherever there are legacy PCA numbers that are long, the PD number gets truncated.
example (from Jordan - NORWEGIAN REFUGEE COUNCIL.
PCA: NRC PCA 06 (2013-2017)
PD: NRC PCA 06 (2013/SHPD2017145
I would expect that the PD ref number is: NRC PCA 06 (2013-2017)/SHPD2017145
| 1.0 | Reference numbers get truncated - It seems that wherever there are legacy PCA numbers that are long, the PD number gets truncated.
example (from Jordan - NORWEGIAN REFUGEE COUNCIL.
PCA: NRC PCA 06 (2013-2017)
PD: NRC PCA 06 (2013/SHPD2017145
I would expect that the PD ref number is: NRC PCA 06 (2013-2017)/SHPD2017145
| non_priority | reference numbers get truncated it seems that wherever there are legacy pca numbers that are long the pd number gets truncated example from jordan norwegian refugee council pca nrc pca pd nrc pca i would expect that the pd ref number is nrc pca | 0 |
147,839 | 19,525,912,511 | IssuesEvent | 2021-12-30 07:41:31 | devopsadmin12/Demo-WebGoat | https://api.github.com/repos/devopsadmin12/Demo-WebGoat | opened | CVE-2020-36187 (High) detected in jackson-databind-2.0.4.jar | security vulnerability | ## CVE-2020-36187 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.0.4.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /pository/com/fasterxml/jackson/core/jackson-databind/2.0.4/jackson-databind-2.0.4.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.0.4.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/devopsadmin12/Demo-WebGoat/commit/33d44d74e792bca0b99107b33bb318711d68de4c">33d44d74e792bca0b99107b33bb318711d68de4c</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.
<p>Publish Date: 2021-01-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187>CVE-2020-36187</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2997">https://github.com/FasterXML/jackson-databind/issues/2997</a></p>
<p>Release Date: 2021-01-06</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-36187 (High) detected in jackson-databind-2.0.4.jar - ## CVE-2020-36187 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.0.4.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /pository/com/fasterxml/jackson/core/jackson-databind/2.0.4/jackson-databind-2.0.4.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.0.4.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/devopsadmin12/Demo-WebGoat/commit/33d44d74e792bca0b99107b33bb318711d68de4c">33d44d74e792bca0b99107b33bb318711d68de4c</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.
<p>Publish Date: 2021-01-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36187>CVE-2020-36187</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2997">https://github.com/FasterXML/jackson-databind/issues/2997</a></p>
<p>Release Date: 2021-01-06</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api path to dependency file pom xml path to vulnerable library pository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp dbcp datasources sharedpooldatasource publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource | 0 |
259,709 | 19,618,437,974 | IssuesEvent | 2022-01-07 01:04:32 | barbushin/php-imap | https://api.github.com/repos/barbushin/php-imap | closed | getListingFolders and uidvalidity | question documentation | Hi,
I tried to use `getListingFolders` of the 'Mailbox' class which calls `listOfMailboxes` of the 'Imap' class which in turn uses the `imap_list` function which returns a simple list of paths and not the properties described in the function (messages, recent , unseen, uidnext, and uidvalidity).
So I think the function should be changed or the description corrected.
```php
array:5 [▼
0 => "{in.postassl.it:993/imap/ssl}INBOX"
1 => "{in.postassl.it:993/imap/ssl}INBOX.Sent"
2 => "{in.postassl.it:993/imap/ssl}INBOX.Drafts"
3 => "{in.postassl.it:993/imap/ssl}INBOX.Trash"
4 => "{in.postassl.it:993/imap/ssl}INBOX.Spam"
]
```
The only way I have found to get the uidvalidity is to use the 'statusMailbox' function after changing folder:
```php
$mailboxes = $this->mailbox->getMailboxes();
foreach ($mailboxes as $mailbox) {
$this->mailbox->switchMailbox($mailbox['fullpath']);
$status = $this->mailbox->statusMailbox();
echo $status->uidvalidity;
}
```
However, this step is very slow and in the presence of many folders is not ideal.
Why do I need uidvalidity? Because I think the only way to get the uniqueness of an email is to combine the 3 fields folder_name + folder_uidvalidity + email_uid.
So my questions are:
- is there a faster way to get the uidvalidity of the folder?
- is there another combination to obtain the uniqueness of an email (at the moment I use message_id which however does not seem to be always present and unique on a global level)?
Thanks
Alessandro | 1.0 | getListingFolders and uidvalidity - Hi,
I tried to use `getListingFolders` of the 'Mailbox' class which calls `listOfMailboxes` of the 'Imap' class which in turn uses the `imap_list` function which returns a simple list of paths and not the properties described in the function (messages, recent , unseen, uidnext, and uidvalidity).
So I think the function should be changed or the description corrected.
```php
array:5 [▼
0 => "{in.postassl.it:993/imap/ssl}INBOX"
1 => "{in.postassl.it:993/imap/ssl}INBOX.Sent"
2 => "{in.postassl.it:993/imap/ssl}INBOX.Drafts"
3 => "{in.postassl.it:993/imap/ssl}INBOX.Trash"
4 => "{in.postassl.it:993/imap/ssl}INBOX.Spam"
]
```
The only way I have found to get the uidvalidity is to use the 'statusMailbox' function after changing folder:
```php
$mailboxes = $this->mailbox->getMailboxes();
foreach ($mailboxes as $mailbox) {
$this->mailbox->switchMailbox($mailbox['fullpath']);
$status = $this->mailbox->statusMailbox();
echo $status->uidvalidity;
}
```
However, this step is very slow and in the presence of many folders is not ideal.
Why do I need uidvalidity? Because I think the only way to get the uniqueness of an email is to combine the 3 fields folder_name + folder_uidvalidity + email_uid.
So my questions are:
- is there a faster way to get the uidvalidity of the folder?
- is there another combination to obtain the uniqueness of an email (at the moment I use message_id which however does not seem to be always present and unique on a global level)?
Thanks
Alessandro | non_priority | getlistingfolders and uidvalidity hi i tried to use getlistingfolders of the mailbox class which calls listofmailboxes of the imap class which in turn uses the imap list function which returns a simple list of paths and not the properties described in the function messages recent unseen uidnext and uidvalidity so i think the function should be changed or the description corrected php array ▼ in postassl it imap ssl inbox in postassl it imap ssl inbox sent in postassl it imap ssl inbox drafts in postassl it imap ssl inbox trash in postassl it imap ssl inbox spam the only way i have found to get the uidvalidity is to use the statusmailbox function after changing folder php mailboxes this mailbox getmailboxes foreach mailboxes as mailbox this mailbox switchmailbox mailbox status this mailbox statusmailbox echo status uidvalidity however this step is very slow and in the presence of many folders is not ideal why do i need uidvalidity because i think the only way to get the uniqueness of an email is to combine the fields folder name folder uidvalidity email uid so my questions are is there a faster way to get the uidvalidity of the folder is there another combination to obtain the uniqueness of an email at the moment i use message id which however does not seem to be always present and unique on a global level thanks alessandro | 0 |
10,036 | 6,547,686,364 | IssuesEvent | 2017-09-04 15:55:43 | brave/browser-laptop | https://api.github.com/repos/brave/browser-laptop | closed | Brave update bar is misaligned | feature/navbar feature/notificationbar regression usability | noticed this on OSX when updating from 0.15.x release to 0.16.6:

| True | Brave update bar is misaligned - noticed this on OSX when updating from 0.15.x release to 0.16.6:

| non_priority | brave update bar is misaligned noticed this on osx when updating from x release to | 0 |
275,039 | 30,188,403,785 | IssuesEvent | 2023-07-04 13:40:00 | gabriel-milan/denoising-autoencoder | https://api.github.com/repos/gabriel-milan/denoising-autoencoder | opened | CVE-2021-37670 (Medium) detected in tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl | Mend: dependency security vulnerability | ## CVE-2021-37670 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learning framework for everyone.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/aa/fd/993aa1333eb54d9f000863fe8ec61e41d12eb833dea51484c76c038718b5/tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/aa/fd/993aa1333eb54d9f000863fe8ec61e41d12eb833dea51484c76c038718b5/tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl</a></p>
<p>Path to dependency file: /training/requirements.txt</p>
<p>Path to vulnerable library: /training/requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/gabriel-milan/denoising-autoencoder/commit/22186005a9ff5cf052b53f8bb5aa092b9ea8a670">22186005a9ff5cf052b53f8bb5aa092b9ea8a670</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.UpperBound`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/searchsorted_op.cc#L85-L104) does not validate the rank of `sorted_input` argument. A similar issue occurs in `tf.raw_ops.LowerBound`. We have patched the issue in GitHub commit 42459e4273c2e47a3232cc16c4f4fff3b3a35c38. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
<p>Publish Date: 2021-08-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-37670>CVE-2021-37670</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7</a></p>
<p>Release Date: 2021-08-12</p>
<p>Fix Resolution: 2.5.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-37670 (Medium) detected in tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl - ## CVE-2021-37670 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learning framework for everyone.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/aa/fd/993aa1333eb54d9f000863fe8ec61e41d12eb833dea51484c76c038718b5/tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/aa/fd/993aa1333eb54d9f000863fe8ec61e41d12eb833dea51484c76c038718b5/tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl</a></p>
<p>Path to dependency file: /training/requirements.txt</p>
<p>Path to vulnerable library: /training/requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **tensorflow-2.5.0-cp37-cp37m-manylinux2010_x86_64.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/gabriel-milan/denoising-autoencoder/commit/22186005a9ff5cf052b53f8bb5aa092b9ea8a670">22186005a9ff5cf052b53f8bb5aa092b9ea8a670</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.UpperBound`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/searchsorted_op.cc#L85-L104) does not validate the rank of `sorted_input` argument. A similar issue occurs in `tf.raw_ops.LowerBound`. We have patched the issue in GitHub commit 42459e4273c2e47a3232cc16c4f4fff3b3a35c38. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
<p>Publish Date: 2021-08-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-37670>CVE-2021-37670</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9697-98pf-4rw7</a></p>
<p>Release Date: 2021-08-12</p>
<p>Fix Resolution: 2.5.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in tensorflow whl cve medium severity vulnerability vulnerable library tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file training requirements txt path to vulnerable library training requirements txt dependency hierarchy x tensorflow whl vulnerable library found in head commit a href found in base branch master vulnerability details tensorflow is an end to end open source platform for machine learning in affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to tf raw ops upperbound the does not validate the rank of sorted input argument a similar issue occurs in tf raw ops lowerbound we have patched the issue in github commit the fix will be included in tensorflow we will also cherrypick this commit on tensorflow tensorflow and tensorflow as these are also affected and still in supported range publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
22,670 | 3,792,055,465 | IssuesEvent | 2016-03-22 07:41:02 | Roy2014Kimi/JI3U47XFP7X25PCEAD3LMVXQ | https://api.github.com/repos/Roy2014Kimi/JI3U47XFP7X25PCEAD3LMVXQ | closed | bM0Pq1uM19GxJiMbTEQejCAPuQ3bcLrDtdYoRXx17Ylp0DMzV/37XIZC+F5YiiKTGdITSAjsMKZ2oCtGU6YbrRQLl+JX/18r66lAB08yKbtqyrbzubt8UVsPtvy6WQHF4YmpQO0Z84YOtTbLMc/exl2ofqZ3TF1qV7S2weyGyXg= | design | 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 | 1.0 | bM0Pq1uM19GxJiMbTEQejCAPuQ3bcLrDtdYoRXx17Ylp0DMzV/37XIZC+F5YiiKTGdITSAjsMKZ2oCtGU6YbrRQLl+JX/18r66lAB08yKbtqyrbzubt8UVsPtvy6WQHF4YmpQO0Z84YOtTbLMc/exl2ofqZ3TF1qV7S2weyGyXg= - 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 | non_priority | jx rv fkoejuetqy zy f kyrpuzcyxiizshlomn ozt kt vf l cno yr c z | 0 |
360,561 | 25,296,415,484 | IssuesEvent | 2022-11-17 07:09:03 | WordPress/Documentation-Issue-Tracker | https://api.github.com/repos/WordPress/Documentation-Issue-Tracker | closed | Plugin handbook: Incorrect formatted code snippets on "Custom Settings Page" page | developer documentation tracking issue plugins | ## Issue Description
Some code snippet on https://developer.wordpress.org/plugins/settings/custom-settings-page/ are incorrect formatted.
## Example of an incorrect formatted code snippet
<img width="675" alt="Screenshot 2022-11-05 at 13 51 55" src="https://user-images.githubusercontent.com/3323310/200106894-b0b02c4c-7b4d-466e-905a-18b3478ae19b.png">
## URL of the Page with the Issue
- https://developer.wordpress.org/plugins/settings/custom-settings-page/
## Section of Page with the issue
- [ ] https://developer.wordpress.org/plugins/settings/custom-settings-page/
## Why is this a problem?
These code snippets might have been created before the existence of the Code Syntax Block.
## Suggested Fix
Using the same Code Syntax Block, as used for working code snippets such as https://developer.wordpress.org/themes/block-themes/converting-a-classic-theme-to-a-block-theme/#adding-block-template-parts-in-classic-themes, should solve this problem. | 1.0 | Plugin handbook: Incorrect formatted code snippets on "Custom Settings Page" page - ## Issue Description
Some code snippet on https://developer.wordpress.org/plugins/settings/custom-settings-page/ are incorrect formatted.
## Example of an incorrect formatted code snippet
<img width="675" alt="Screenshot 2022-11-05 at 13 51 55" src="https://user-images.githubusercontent.com/3323310/200106894-b0b02c4c-7b4d-466e-905a-18b3478ae19b.png">
## URL of the Page with the Issue
- https://developer.wordpress.org/plugins/settings/custom-settings-page/
## Section of Page with the issue
- [ ] https://developer.wordpress.org/plugins/settings/custom-settings-page/
## Why is this a problem?
These code snippets might have been created before the existence of the Code Syntax Block.
## Suggested Fix
Using the same Code Syntax Block, as used for working code snippets such as https://developer.wordpress.org/themes/block-themes/converting-a-classic-theme-to-a-block-theme/#adding-block-template-parts-in-classic-themes, should solve this problem. | non_priority | plugin handbook incorrect formatted code snippets on custom settings page page issue description some code snippet on are incorrect formatted example of an incorrect formatted code snippet img width alt screenshot at src url of the page with the issue section of page with the issue why is this a problem these code snippets might have been created before the existence of the code syntax block suggested fix using the same code syntax block as used for working code snippets such as should solve this problem | 0 |
2,837 | 3,205,654,344 | IssuesEvent | 2015-10-04 09:04:02 | Tiendil/the-tale | https://api.github.com/repos/Tiendil/the-tale | opened | Лингвистика: синхронизировать вёрстку форм редактирования слов | comp_linguistics cont_usability est_simple type_improvement | вёрстка блоков со всеми формами и блоков с вырезанными формами сейчас не совпадает | True | Лингвистика: синхронизировать вёрстку форм редактирования слов - вёрстка блоков со всеми формами и блоков с вырезанными формами сейчас не совпадает | non_priority | лингвистика синхронизировать вёрстку форм редактирования слов вёрстка блоков со всеми формами и блоков с вырезанными формами сейчас не совпадает | 0 |
34,126 | 7,787,241,205 | IssuesEvent | 2018-06-06 21:40:58 | AdoptOpenJDK/openjdk-build | https://api.github.com/repos/AdoptOpenJDK/openjdk-build | opened | Move exec block in jenkins job into Github for all code-tool jobs | code-tools enhancement refactoring | The executable part of all the code-tools jobs in Jenkins should be moved to a git-repo just like `openjdk-build`. This includes the below jobs under the [Dependencies](https://ci.adoptopenjdk.net/view/Dependencies/) tab:
- https://ci.adoptopenjdk.net/view/Dependencies/job/asmtools/
- https://ci.adoptopenjdk.net/view/Dependencies/job/jcov/
- https://ci.adoptopenjdk.net/view/Dependencies/job/jtharness/
- https://ci.adoptopenjdk.net/view/Dependencies/job/jtreg/
- https://ci.adoptopenjdk.net/view/Dependencies/job/sigtest/
| 1.0 | Move exec block in jenkins job into Github for all code-tool jobs - The executable part of all the code-tools jobs in Jenkins should be moved to a git-repo just like `openjdk-build`. This includes the below jobs under the [Dependencies](https://ci.adoptopenjdk.net/view/Dependencies/) tab:
- https://ci.adoptopenjdk.net/view/Dependencies/job/asmtools/
- https://ci.adoptopenjdk.net/view/Dependencies/job/jcov/
- https://ci.adoptopenjdk.net/view/Dependencies/job/jtharness/
- https://ci.adoptopenjdk.net/view/Dependencies/job/jtreg/
- https://ci.adoptopenjdk.net/view/Dependencies/job/sigtest/
| non_priority | move exec block in jenkins job into github for all code tool jobs the executable part of all the code tools jobs in jenkins should be moved to a git repo just like openjdk build this includes the below jobs under the tab | 0 |
4,764 | 3,882,707,725 | IssuesEvent | 2016-04-13 11:02:18 | lionheart/openradar-mirror | https://api.github.com/repos/lionheart/openradar-mirror | opened | 20695771: Cannot export developer profile | classification:ui/usability reproducible:always status:open | #### Description
Summary:
Xcode cannot export developer profile making cross team development impossible
Steps to Reproduce:
Prefs > Account > Export Accounts, save name, fail
Expected Results:
Export to a file
Actual Results:
Error: Could not export identity from the keychain
Console:
4/24/15 5:50:44.155 PM Xcode[49946]: Error, Could not export identity from the keychain: The user name or passphrase you entered is not correct.
Except I did not enter a username, and it was previously working fine.
Regression:
This worked on previous versions of xcode.
Notes:
Provide additional information, such as references to related problems, workarounds and relevant attachments.
-
Product Version: 6.3.1 (6D1002)
Created: 2015-04-25T00:53:38.943330
Originated: 2015-04-24T17:53:00
Open Radar Link: http://www.openradar.me/20695771 | True | 20695771: Cannot export developer profile - #### Description
Summary:
Xcode cannot export developer profile making cross team development impossible
Steps to Reproduce:
Prefs > Account > Export Accounts, save name, fail
Expected Results:
Export to a file
Actual Results:
Error: Could not export identity from the keychain
Console:
4/24/15 5:50:44.155 PM Xcode[49946]: Error, Could not export identity from the keychain: The user name or passphrase you entered is not correct.
Except I did not enter a username, and it was previously working fine.
Regression:
This worked on previous versions of xcode.
Notes:
Provide additional information, such as references to related problems, workarounds and relevant attachments.
-
Product Version: 6.3.1 (6D1002)
Created: 2015-04-25T00:53:38.943330
Originated: 2015-04-24T17:53:00
Open Radar Link: http://www.openradar.me/20695771 | non_priority | cannot export developer profile description summary xcode cannot export developer profile making cross team development impossible steps to reproduce prefs account export accounts save name fail expected results export to a file actual results error could not export identity from the keychain console pm xcode error could not export identity from the keychain the user name or passphrase you entered is not correct except i did not enter a username and it was previously working fine regression this worked on previous versions of xcode notes provide additional information such as references to related problems workarounds and relevant attachments product version created originated open radar link | 0 |
387,013 | 26,710,533,276 | IssuesEvent | 2023-01-27 23:07:12 | redhat-et/apex | https://api.github.com/repos/redhat-et/apex | closed | Update docs to no longer reference docker-compose | documentation | Recent changes dropped support for docker-compose, but it's still referenced a lot in docs.
```
$ git grep compose | wc -l
29
```
All of these places need to be updated to reflect the updated development workflow. | 1.0 | Update docs to no longer reference docker-compose - Recent changes dropped support for docker-compose, but it's still referenced a lot in docs.
```
$ git grep compose | wc -l
29
```
All of these places need to be updated to reflect the updated development workflow. | non_priority | update docs to no longer reference docker compose recent changes dropped support for docker compose but it s still referenced a lot in docs git grep compose wc l all of these places need to be updated to reflect the updated development workflow | 0 |
41,285 | 10,695,850,136 | IssuesEvent | 2019-10-23 13:45:50 | microsoft/WindowsTemplateStudio | https://api.github.com/repos/microsoft/WindowsTemplateStudio | opened | Build dev.templates.tests.full_20191023.1 failed | bug vsts-build | ## Build dev.templates.tests.full_20191023.1
- **Build result:** `failed`
- **Build queued:** 10/23/2019 5:00:01 AM
- **Build duration:** 525.35 minutes
### Details
Build [dev.templates.tests.full_20191023.1](https://winappstudio.visualstudio.com/web/build.aspx?pcguid=a4ef43be-68ce-4195-a619-079b4d9834c2&builduri=vstfs%3a%2f%2f%2fBuild%2fBuild%2f31540) failed
+ xunit.console.exe : BuildCompleteProjectWithAllRightClickItemsWithForcedLoginAsync(projectType: "TabbedNav",
framework: "CodeBehind", platform: "Uwp", language: "C#") [FAIL]
At pbatch:27 char:27
+
+ CategoryInfo : NotSpecified: ( BuildComple...e: "C#") [FAIL]:String) [], RemoteException
+ FullyQualifiedErrorId : NativeCommandError
+ PSComputerName : [localhost]
BuildCompleteProjectWithAllRightClickItemsWithForcedLoginAsync(projectType: "MenuBar", framework: "CodeBehind",
platform: "Uwp", language: "C#") [FAIL]
BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "SplitView", framework:
"CodeBehind", platform: "Uwp", language: "VisualBasic") [FAIL]
xunit.console.exe : BuildAllPagesAndFeaturesAsync(projectType: "TabbedNav", framework: "MVVMLight", platform:
"Uwp", language: "VisualBasic") [FAIL]
At pbatch:27 char:27
+
+ CategoryInfo : NotSpecified: ( BuildAllPag...lBasic") [FAIL]:String) [], RemoteException
+ FullyQualifiedErrorId : NativeCommandError
+ PSComputerName : [localhost]
BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "Blank", framework: "CodeBehind",
platform: "Uwp", language: "VisualBasic") [FAIL]
BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "TabbedNav", framework:
"CodeBehind", platform: "Uwp", language: "VisualBasic") [FAIL]
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "SplitView", framework: "MVVMLight", platform: "Uwp",
language: "C#") [FAIL]
xunit.console.exe : NotSpecified: (:String) [], RemoteException
At pbatch:27 char:27
+
+ CategoryInfo : NotSpecified: (:String) [], RemoteException
+ FullyQualifiedErrorId : NativeCommandError
+ PSComputerName : [localhost]
Unhandled Exception:
System.AccessViolationException: Attempted to read or write protected memory. This is often an indication that other
memory is corrupt.
at NuGet.Packaging.NuspecReader.GetFlags(String flags)
at NuGet.Packaging.NuspecReader.GetPackageDependencies(IEnumerable`1 nodes, Boolean useStrictVersionCheck)
at NuGet.Packaging.NuspecReader.<GetDependencyGroups>d__29.MoveNext()
at System.Collections.Generic.List`1..ctor(IEnumerable`1 collection)
at System.Linq.Enumerable.ToList[TSource](IEnumerable`1 source)
at NuGet.Protocol.Core.Types.FindPackageByIdDependencyInfo..ctor(PackageIdentity packageIdentity, IEnumerable`1
dependencyGroups, IEnumerable`1 frameworkReferenceGroups)
at NuGet.Protocol.Core.Types.FindPackageByIdResource.GetDependencyInfo(NuspecReader reader)
at NuGet.Protocol.LocalV3FindPackageByIdResource.<>c.<GetDependencyInfoAsync>b__15_0(NuspecReader nuspecReader)
at NuGet.Protocol.LocalV3FindPackageByIdResource.ProcessNuspecReader[T](String id, NuGetVersion version, Func`2
process)
at NuGet.Protocol.LocalV3FindPackageByIdResource.GetDependencyInfoAsync(String id, NuGetVersion version,
SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken)
at NuGet.Commands.SourceRepositoryDependencyProvider.<GetDependenciesCoreAsync>d__22.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.SourceRepositoryDependencyProvider.GetDependenciesCoreAsync(LibraryIdentity match, NuGetFramework
targetFramework, SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken)
at NuGet.Commands.SourceRepositoryDependencyProvider.<>c__DisplayClass21_0.<<GetDependenciesAsync>b__0>d.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.SourceRepositoryDependencyProvider.<>c__DisplayClass21_0.<GetDependenciesAsync>b__0()
at System.Lazy`1.CreateValue()
at System.Lazy`1.LazyInitValue()
at System.Lazy`1.get_Value()
at NuGet.Commands.SourceRepositoryDependencyProvider.<GetDependenciesAsync>d__21.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.SourceRepositoryDependencyProvider.GetDependenciesAsync(LibraryIdentity libraryIdentity,
NuGetFramework targetFramework, SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken)
at NuGet.DependencyResolver.ResolverUtility.<CreateGraphItemAsync>d__2.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.DependencyResolver.ResolverUtility.CreateGraphItemAsync(RemoteMatch match, NuGetFramework framework,
SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken)
at NuGet.DependencyResolver.ResolverUtility.<FindLibraryEntryAsync>d__1.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.DependencyResolver.ResolverUtility.FindLibraryEntryAsync(LibraryRange libraryRange, NuGetFramework
framework, String runtimeIdentifier, GraphEdge`1 outerEdge, RemoteWalkContext context, CancellationToken
cancellationToken)
at NuGet.DependencyResolver.ResolverUtility.<>c__DisplayClass0_0.<FindLibraryCachedAsync>b__0(LibraryRangeCacheKey
cacheKey)
at System.Collections.Concurrent.ConcurrentDictionary`2.GetOrAdd(TKey key, Func`2 valueFactory)
at NuGet.DependencyResolver.ResolverUtility.FindLibraryCachedAsync(ConcurrentDictionary`2 cache, LibraryRange
libraryRange, NuGetFramework framework, String runtimeIdentifier, GraphEdge`1 outerEdge, RemoteWalkContext context,
CancellationToken cancellationToken)
at NuGet.DependencyResolver.RemoteDependencyWalker.<CreateGraphNode>d__3.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGe
t.DependencyResolver.RemoteDependencyWalker.CreateGraphNode(LibraryRange libraryRange, NuGetFramework framework,
String runtimeName, RuntimeGraph runtimeGraph, Func`2 predicate, GraphEdge`1 outerEdge)
at NuGet.DependencyResolver.RemoteDependencyWalker.<CreateGraphNode>d__3.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.DependencyResolver.RemoteDependencyWalker.CreateGraphNode(LibraryRange libraryRange, NuGetFramework
framework, String runtimeName, RuntimeGraph runtimeGraph, Func`2 predicate, GraphEdge`1 outerEdge)
at NuGet.DependencyResolver.RemoteDependencyWalker.WalkAsync(LibraryRange library, NuGetFramework framework, String
runtimeIdentifier, RuntimeGraph runtimeGraph, Boolean recursive)
at NuGet.Commands.ProjectRestoreCommand.<WalkDependenciesAsync>d__10.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.ProjectRestoreCommand.WalkDependenciesAsync(LibraryRange projectRange, NuGetFramework framework,
String runtimeIdentifier, RuntimeGraph runtimeGraph, RemoteDependencyWalker walker, RemoteWalkContext context,
CancellationToken token)
at NuGet.Commands.ProjectRestoreCommand.WalkDependenciesAsync(LibraryRange projectRange, NuGetFramework framework,
RemoteDependencyWalker walker, RemoteWalkContext context, CancellationToken token)
at NuGet.Commands.ProjectRestoreCommand.<TryRestoreAsync>d__8.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.ProjectRestoreCommand.TryRestoreAsync(LibraryRange projectRange, IEnumerable`1
frameworkRuntimePairs, NuGetv3LocalRepository userPackageFolder, IReadOnlyList`1 fallbackPackageFolders,
RemoteDependencyWalker remoteWalker, RemoteWalkContext context, Boolean forceRuntimeGraphCreation, CancellationToken
token, TelemetryActivity telemetryActivity)
at NuGet.Commands.RestoreCommand.<ExecuteRestoreAsync>d__47.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.RestoreCommand.ExecuteRestoreAsync(NuGetv3LocalRepository userPackageFolder, IReadOnlyList`1
fallbackPackageFolders, RemoteWalkContext context, CancellationToken token, TelemetryActivity telemetryActivity)
at NuGet.Commands.RestoreCommand.<ExecuteAsync>d__32.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.RestoreCommand.ExecuteAsync(CancellationToken token)
at NuGet.Commands.RestoreRunner.<ExecuteAsync>d__7.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.RestoreRunner.ExecuteAsync(RestoreSummaryRequest summaryRequest, CancellationToken token)
at NuGet.Commands.RestoreRunner.<ExecuteAndCommitAsync>d__6.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.RestoreRunner.ExecuteAndCommitAsync(RestoreSummaryRequest summaryRequest, CancellationToken token)
at NuGet.Commands.RestoreRunner.<>c__DisplayClass2_1.<RunAsync>b__0()
at System.Threading.Tasks.Task`1.InnerInvoke()
at System.Threading.Tasks.Task.Execute()
at System.Threading.Tasks.Task.ExecutionContextCallback(Object obj)
at System.Threading.ExecutionContext.RunInternal(ExecutionContext executionContext, ContextCallback callback,
Object state, Boolean preserveSyncCtx)
at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state,
Boolean preserveSyncCtx)
at System.Threading.Tasks.Task.ExecuteWithThreadLocal(Task& currentTaskSlot)
at System.Threading.Tasks.Task.ExecuteEntry(Boolean bPreventDoubleExecution)
at System.Threading.Tasks.Task.System.Threading.IThreadPoolWorkItem.ExecuteWorkItem()
at System.T
hreading.ThreadPoolWorkQueue.Dis********ch()
at System.Threading._ThreadPoolWaitCallback.PerformWaitCallback()
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "SplitView", framework: "MVVMBasic", platform: "Uwp",
language: "C#") [FAIL]
BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "MenuBar", framework: "CodeBehind",
platform: "Uwp", language: "VisualBasic") [FAIL]
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "Blank", framework: "MVVMLight", platform: "Uwp", language:
"C#") [FAIL]
Not enough memory resources are available to process this command.
Not enough memory resources are available to process this command.
The syntax of the command is incorrect.
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "Blank", framework: "MVVMBasic", platform: "Uwp", language:
"C#") [FAIL]
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "TabbedNav", framework: "MVVMBasic", platform: "Uwp",
language: "C#") [FAIL]
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "MenuBar", framework: "MVVMBasic", platform: "Uwp",
language: "C#") [FAIL]
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "SplitView", framework: "MVVMBasic", platform: "Uwp",
language: "VisualBasic") [FAIL]
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "Blank", framework: "MVVMBasic", platform: "Uwp", language:
"VisualBasic") [FAIL]
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "TabbedNav", framework: "MVVMBasic", platform: "Uwp",
language: "VisualBasic") [FAIL]
+ Process completed with exit code 24 and had 1 error(s) written to the error stream.
Find detailed information in the [build log files]()
| 1.0 | Build dev.templates.tests.full_20191023.1 failed - ## Build dev.templates.tests.full_20191023.1
- **Build result:** `failed`
- **Build queued:** 10/23/2019 5:00:01 AM
- **Build duration:** 525.35 minutes
### Details
Build [dev.templates.tests.full_20191023.1](https://winappstudio.visualstudio.com/web/build.aspx?pcguid=a4ef43be-68ce-4195-a619-079b4d9834c2&builduri=vstfs%3a%2f%2f%2fBuild%2fBuild%2f31540) failed
+ xunit.console.exe : BuildCompleteProjectWithAllRightClickItemsWithForcedLoginAsync(projectType: "TabbedNav",
framework: "CodeBehind", platform: "Uwp", language: "C#") [FAIL]
At pbatch:27 char:27
+
+ CategoryInfo : NotSpecified: ( BuildComple...e: "C#") [FAIL]:String) [], RemoteException
+ FullyQualifiedErrorId : NativeCommandError
+ PSComputerName : [localhost]
BuildCompleteProjectWithAllRightClickItemsWithForcedLoginAsync(projectType: "MenuBar", framework: "CodeBehind",
platform: "Uwp", language: "C#") [FAIL]
BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "SplitView", framework:
"CodeBehind", platform: "Uwp", language: "VisualBasic") [FAIL]
xunit.console.exe : BuildAllPagesAndFeaturesAsync(projectType: "TabbedNav", framework: "MVVMLight", platform:
"Uwp", language: "VisualBasic") [FAIL]
At pbatch:27 char:27
+
+ CategoryInfo : NotSpecified: ( BuildAllPag...lBasic") [FAIL]:String) [], RemoteException
+ FullyQualifiedErrorId : NativeCommandError
+ PSComputerName : [localhost]
BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "Blank", framework: "CodeBehind",
platform: "Uwp", language: "VisualBasic") [FAIL]
BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "TabbedNav", framework:
"CodeBehind", platform: "Uwp", language: "VisualBasic") [FAIL]
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "SplitView", framework: "MVVMLight", platform: "Uwp",
language: "C#") [FAIL]
xunit.console.exe : NotSpecified: (:String) [], RemoteException
At pbatch:27 char:27
+
+ CategoryInfo : NotSpecified: (:String) [], RemoteException
+ FullyQualifiedErrorId : NativeCommandError
+ PSComputerName : [localhost]
Unhandled Exception:
System.AccessViolationException: Attempted to read or write protected memory. This is often an indication that other
memory is corrupt.
at NuGet.Packaging.NuspecReader.GetFlags(String flags)
at NuGet.Packaging.NuspecReader.GetPackageDependencies(IEnumerable`1 nodes, Boolean useStrictVersionCheck)
at NuGet.Packaging.NuspecReader.<GetDependencyGroups>d__29.MoveNext()
at System.Collections.Generic.List`1..ctor(IEnumerable`1 collection)
at System.Linq.Enumerable.ToList[TSource](IEnumerable`1 source)
at NuGet.Protocol.Core.Types.FindPackageByIdDependencyInfo..ctor(PackageIdentity packageIdentity, IEnumerable`1
dependencyGroups, IEnumerable`1 frameworkReferenceGroups)
at NuGet.Protocol.Core.Types.FindPackageByIdResource.GetDependencyInfo(NuspecReader reader)
at NuGet.Protocol.LocalV3FindPackageByIdResource.<>c.<GetDependencyInfoAsync>b__15_0(NuspecReader nuspecReader)
at NuGet.Protocol.LocalV3FindPackageByIdResource.ProcessNuspecReader[T](String id, NuGetVersion version, Func`2
process)
at NuGet.Protocol.LocalV3FindPackageByIdResource.GetDependencyInfoAsync(String id, NuGetVersion version,
SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken)
at NuGet.Commands.SourceRepositoryDependencyProvider.<GetDependenciesCoreAsync>d__22.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.SourceRepositoryDependencyProvider.GetDependenciesCoreAsync(LibraryIdentity match, NuGetFramework
targetFramework, SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken)
at NuGet.Commands.SourceRepositoryDependencyProvider.<>c__DisplayClass21_0.<<GetDependenciesAsync>b__0>d.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.SourceRepositoryDependencyProvider.<>c__DisplayClass21_0.<GetDependenciesAsync>b__0()
at System.Lazy`1.CreateValue()
at System.Lazy`1.LazyInitValue()
at System.Lazy`1.get_Value()
at NuGet.Commands.SourceRepositoryDependencyProvider.<GetDependenciesAsync>d__21.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.SourceRepositoryDependencyProvider.GetDependenciesAsync(LibraryIdentity libraryIdentity,
NuGetFramework targetFramework, SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken)
at NuGet.DependencyResolver.ResolverUtility.<CreateGraphItemAsync>d__2.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.DependencyResolver.ResolverUtility.CreateGraphItemAsync(RemoteMatch match, NuGetFramework framework,
SourceCacheContext cacheContext, ILogger logger, CancellationToken cancellationToken)
at NuGet.DependencyResolver.ResolverUtility.<FindLibraryEntryAsync>d__1.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.DependencyResolver.ResolverUtility.FindLibraryEntryAsync(LibraryRange libraryRange, NuGetFramework
framework, String runtimeIdentifier, GraphEdge`1 outerEdge, RemoteWalkContext context, CancellationToken
cancellationToken)
at NuGet.DependencyResolver.ResolverUtility.<>c__DisplayClass0_0.<FindLibraryCachedAsync>b__0(LibraryRangeCacheKey
cacheKey)
at System.Collections.Concurrent.ConcurrentDictionary`2.GetOrAdd(TKey key, Func`2 valueFactory)
at NuGet.DependencyResolver.ResolverUtility.FindLibraryCachedAsync(ConcurrentDictionary`2 cache, LibraryRange
libraryRange, NuGetFramework framework, String runtimeIdentifier, GraphEdge`1 outerEdge, RemoteWalkContext context,
CancellationToken cancellationToken)
at NuGet.DependencyResolver.RemoteDependencyWalker.<CreateGraphNode>d__3.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGe
t.DependencyResolver.RemoteDependencyWalker.CreateGraphNode(LibraryRange libraryRange, NuGetFramework framework,
String runtimeName, RuntimeGraph runtimeGraph, Func`2 predicate, GraphEdge`1 outerEdge)
at NuGet.DependencyResolver.RemoteDependencyWalker.<CreateGraphNode>d__3.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.DependencyResolver.RemoteDependencyWalker.CreateGraphNode(LibraryRange libraryRange, NuGetFramework
framework, String runtimeName, RuntimeGraph runtimeGraph, Func`2 predicate, GraphEdge`1 outerEdge)
at NuGet.DependencyResolver.RemoteDependencyWalker.WalkAsync(LibraryRange library, NuGetFramework framework, String
runtimeIdentifier, RuntimeGraph runtimeGraph, Boolean recursive)
at NuGet.Commands.ProjectRestoreCommand.<WalkDependenciesAsync>d__10.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.ProjectRestoreCommand.WalkDependenciesAsync(LibraryRange projectRange, NuGetFramework framework,
String runtimeIdentifier, RuntimeGraph runtimeGraph, RemoteDependencyWalker walker, RemoteWalkContext context,
CancellationToken token)
at NuGet.Commands.ProjectRestoreCommand.WalkDependenciesAsync(LibraryRange projectRange, NuGetFramework framework,
RemoteDependencyWalker walker, RemoteWalkContext context, CancellationToken token)
at NuGet.Commands.ProjectRestoreCommand.<TryRestoreAsync>d__8.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.ProjectRestoreCommand.TryRestoreAsync(LibraryRange projectRange, IEnumerable`1
frameworkRuntimePairs, NuGetv3LocalRepository userPackageFolder, IReadOnlyList`1 fallbackPackageFolders,
RemoteDependencyWalker remoteWalker, RemoteWalkContext context, Boolean forceRuntimeGraphCreation, CancellationToken
token, TelemetryActivity telemetryActivity)
at NuGet.Commands.RestoreCommand.<ExecuteRestoreAsync>d__47.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.RestoreCommand.ExecuteRestoreAsync(NuGetv3LocalRepository userPackageFolder, IReadOnlyList`1
fallbackPackageFolders, RemoteWalkContext context, CancellationToken token, TelemetryActivity telemetryActivity)
at NuGet.Commands.RestoreCommand.<ExecuteAsync>d__32.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.RestoreCommand.ExecuteAsync(CancellationToken token)
at NuGet.Commands.RestoreRunner.<ExecuteAsync>d__7.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.RestoreRunner.ExecuteAsync(RestoreSummaryRequest summaryRequest, CancellationToken token)
at NuGet.Commands.RestoreRunner.<ExecuteAndCommitAsync>d__6.MoveNext()
at System.Runtime.CompilerServices.AsyncTaskMethodBuilder`1.Start[TStateMachine](TStateMachine& stateMachine)
at NuGet.Commands.RestoreRunner.ExecuteAndCommitAsync(RestoreSummaryRequest summaryRequest, CancellationToken token)
at NuGet.Commands.RestoreRunner.<>c__DisplayClass2_1.<RunAsync>b__0()
at System.Threading.Tasks.Task`1.InnerInvoke()
at System.Threading.Tasks.Task.Execute()
at System.Threading.Tasks.Task.ExecutionContextCallback(Object obj)
at System.Threading.ExecutionContext.RunInternal(ExecutionContext executionContext, ContextCallback callback,
Object state, Boolean preserveSyncCtx)
at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state,
Boolean preserveSyncCtx)
at System.Threading.Tasks.Task.ExecuteWithThreadLocal(Task& currentTaskSlot)
at System.Threading.Tasks.Task.ExecuteEntry(Boolean bPreventDoubleExecution)
at System.Threading.Tasks.Task.System.Threading.IThreadPoolWorkItem.ExecuteWorkItem()
at System.T
hreading.ThreadPoolWorkQueue.Dis********ch()
at System.Threading._ThreadPoolWaitCallback.PerformWaitCallback()
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "SplitView", framework: "MVVMBasic", platform: "Uwp",
language: "C#") [FAIL]
BuildCompleteProjectWithAllRightClickItemsWithForcedLogin_VBAsync(projectType: "MenuBar", framework: "CodeBehind",
platform: "Uwp", language: "VisualBasic") [FAIL]
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "Blank", framework: "MVVMLight", platform: "Uwp", language:
"C#") [FAIL]
Not enough memory resources are available to process this command.
Not enough memory resources are available to process this command.
The syntax of the command is incorrect.
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "Blank", framework: "MVVMBasic", platform: "Uwp", language:
"C#") [FAIL]
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "TabbedNav", framework: "MVVMBasic", platform: "Uwp",
language: "C#") [FAIL]
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "MenuBar", framework: "MVVMBasic", platform: "Uwp",
language: "C#") [FAIL]
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "SplitView", framework: "MVVMBasic", platform: "Uwp",
language: "VisualBasic") [FAIL]
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "Blank", framework: "MVVMBasic", platform: "Uwp", language:
"VisualBasic") [FAIL]
BuildAllPagesAndFeaturesThenRunTestsAsync(projectType: "TabbedNav", framework: "MVVMBasic", platform: "Uwp",
language: "VisualBasic") [FAIL]
+ Process completed with exit code 24 and had 1 error(s) written to the error stream.
Find detailed information in the [build log files]()
| non_priority | build dev templates tests full failed build dev templates tests full build result failed build queued am build duration minutes details build failed xunit console exe buildcompleteprojectwithallrightclickitemswithforcedloginasync projecttype tabbednav framework codebehind platform uwp language c at pbatch char categoryinfo notspecified buildcomple e c string remoteexception fullyqualifiederrorid nativecommanderror pscomputername buildcompleteprojectwithallrightclickitemswithforcedloginasync projecttype menubar framework codebehind platform uwp language c buildcompleteprojectwithallrightclickitemswithforcedlogin vbasync projecttype splitview framework codebehind platform uwp language visualbasic xunit console exe buildallpagesandfeaturesasync projecttype tabbednav framework mvvmlight platform uwp language visualbasic at pbatch char categoryinfo notspecified buildallpag lbasic string remoteexception fullyqualifiederrorid nativecommanderror pscomputername buildcompleteprojectwithallrightclickitemswithforcedlogin vbasync projecttype blank framework codebehind platform uwp language visualbasic buildcompleteprojectwithallrightclickitemswithforcedlogin vbasync projecttype tabbednav framework codebehind platform uwp language visualbasic buildallpagesandfeaturesthenruntestsasync projecttype splitview framework mvvmlight platform uwp language c xunit console exe notspecified string remoteexception at pbatch char categoryinfo notspecified string remoteexception fullyqualifiederrorid nativecommanderror pscomputername unhandled exception system accessviolationexception attempted to read or write protected memory this is often an indication that other memory is corrupt at nuget packaging nuspecreader getflags string flags at nuget packaging nuspecreader getpackagedependencies ienumerable nodes boolean usestrictversioncheck at nuget packaging nuspecreader d movenext at system collections generic list ctor ienumerable collection at system linq enumerable tolist ienumerable source at nuget protocol core types findpackagebyiddependencyinfo ctor packageidentity packageidentity ienumerable dependencygroups ienumerable frameworkreferencegroups at nuget protocol core types findpackagebyidresource getdependencyinfo nuspecreader reader at nuget protocol c b nuspecreader nuspecreader at nuget protocol processnuspecreader string id nugetversion version func process at nuget protocol getdependencyinfoasync string id nugetversion version sourcecachecontext cachecontext ilogger logger cancellationtoken cancellationtoken at nuget commands sourcerepositorydependencyprovider d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands sourcerepositorydependencyprovider getdependenciescoreasync libraryidentity match nugetframework targetframework sourcecachecontext cachecontext ilogger logger cancellationtoken cancellationtoken at nuget commands sourcerepositorydependencyprovider c b d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands sourcerepositorydependencyprovider c b at system lazy createvalue at system lazy lazyinitvalue at system lazy get value at nuget commands sourcerepositorydependencyprovider d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands sourcerepositorydependencyprovider getdependenciesasync libraryidentity libraryidentity nugetframework targetframework sourcecachecontext cachecontext ilogger logger cancellationtoken cancellationtoken at nuget dependencyresolver resolverutility d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget dependencyresolver resolverutility creategraphitemasync remotematch match nugetframework framework sourcecachecontext cachecontext ilogger logger cancellationtoken cancellationtoken at nuget dependencyresolver resolverutility d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget dependencyresolver resolverutility findlibraryentryasync libraryrange libraryrange nugetframework framework string runtimeidentifier graphedge outeredge remotewalkcontext context cancellationtoken cancellationtoken at nuget dependencyresolver resolverutility c b libraryrangecachekey cachekey at system collections concurrent concurrentdictionary getoradd tkey key func valuefactory at nuget dependencyresolver resolverutility findlibrarycachedasync concurrentdictionary cache libraryrange libraryrange nugetframework framework string runtimeidentifier graphedge outeredge remotewalkcontext context cancellationtoken cancellationtoken at nuget dependencyresolver remotedependencywalker d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuge t dependencyresolver remotedependencywalker creategraphnode libraryrange libraryrange nugetframework framework string runtimename runtimegraph runtimegraph func predicate graphedge outeredge at nuget dependencyresolver remotedependencywalker d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget dependencyresolver remotedependencywalker creategraphnode libraryrange libraryrange nugetframework framework string runtimename runtimegraph runtimegraph func predicate graphedge outeredge at nuget dependencyresolver remotedependencywalker walkasync libraryrange library nugetframework framework string runtimeidentifier runtimegraph runtimegraph boolean recursive at nuget commands projectrestorecommand d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands projectrestorecommand walkdependenciesasync libraryrange projectrange nugetframework framework string runtimeidentifier runtimegraph runtimegraph remotedependencywalker walker remotewalkcontext context cancellationtoken token at nuget commands projectrestorecommand walkdependenciesasync libraryrange projectrange nugetframework framework remotedependencywalker walker remotewalkcontext context cancellationtoken token at nuget commands projectrestorecommand d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands projectrestorecommand tryrestoreasync libraryrange projectrange ienumerable frameworkruntimepairs userpackagefolder ireadonlylist fallbackpackagefolders remotedependencywalker remotewalker remotewalkcontext context boolean forceruntimegraphcreation cancellationtoken token telemetryactivity telemetryactivity at nuget commands restorecommand d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands restorecommand executerestoreasync userpackagefolder ireadonlylist fallbackpackagefolders remotewalkcontext context cancellationtoken token telemetryactivity telemetryactivity at nuget commands restorecommand d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands restorecommand executeasync cancellationtoken token at nuget commands restorerunner d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands restorerunner executeasync restoresummaryrequest summaryrequest cancellationtoken token at nuget commands restorerunner d movenext at system runtime compilerservices asynctaskmethodbuilder start tstatemachine statemachine at nuget commands restorerunner executeandcommitasync restoresummaryrequest summaryrequest cancellationtoken token at nuget commands restorerunner c b at system threading tasks task innerinvoke at system threading tasks task execute at system threading tasks task executioncontextcallback object obj at system threading executioncontext runinternal executioncontext executioncontext contextcallback callback object state boolean preservesyncctx at system threading executioncontext run executioncontext executioncontext contextcallback callback object state boolean preservesyncctx at system threading tasks task executewiththreadlocal task currenttaskslot at system threading tasks task executeentry boolean bpreventdoubleexecution at system threading tasks task system threading ithreadpoolworkitem executeworkitem at system t hreading threadpoolworkqueue dis ch at system threading threadpoolwaitcallback performwaitcallback buildallpagesandfeaturesthenruntestsasync projecttype splitview framework mvvmbasic platform uwp language c buildcompleteprojectwithallrightclickitemswithforcedlogin vbasync projecttype menubar framework codebehind platform uwp language visualbasic buildallpagesandfeaturesthenruntestsasync projecttype blank framework mvvmlight platform uwp language c not enough memory resources are available to process this command not enough memory resources are available to process this command the syntax of the command is incorrect buildallpagesandfeaturesthenruntestsasync projecttype blank framework mvvmbasic platform uwp language c buildallpagesandfeaturesthenruntestsasync projecttype tabbednav framework mvvmbasic platform uwp language c buildallpagesandfeaturesthenruntestsasync projecttype menubar framework mvvmbasic platform uwp language c buildallpagesandfeaturesthenruntestsasync projecttype splitview framework mvvmbasic platform uwp language visualbasic buildallpagesandfeaturesthenruntestsasync projecttype blank framework mvvmbasic platform uwp language visualbasic buildallpagesandfeaturesthenruntestsasync projecttype tabbednav framework mvvmbasic platform uwp language visualbasic process completed with exit code and had error s written to the error stream find detailed information in the | 0 |
950 | 2,783,724,969 | IssuesEvent | 2015-05-07 02:46:26 | jkomoros/sudoku | https://api.github.com/repos/jkomoros/sudoku | opened | Analysis should cache the solves in phase 2 for performance reasons | analysis performance | keyed off recid, with a cache that is blown away every.... when? | True | Analysis should cache the solves in phase 2 for performance reasons - keyed off recid, with a cache that is blown away every.... when? | non_priority | analysis should cache the solves in phase for performance reasons keyed off recid with a cache that is blown away every when | 0 |
211,091 | 16,168,249,689 | IssuesEvent | 2021-05-01 23:38:21 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | opened | roachtest: tpchvec/perf_no_stats failed | C-test-failure O-roachtest O-robot branch-master release-blocker | roachtest.tpchvec/perf_no_stats [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2944550&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=2944550&tab=artifacts#/tpchvec/perf_no_stats) on master @ [684e753c15f3fc58df79b6ea70e7b6715eae4835](https://github.com/cockroachdb/cockroach/commits/684e753c15f3fc58df79b6ea70e7b6715eae4835):
```
The test failed on branch=master, cloud=gce:
test artifacts and logs in: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/artifacts/tpchvec/perf_no_stats/run_1
tpchvec.go:637,tpchvec.go:685,test_runner.go:777: unrecognized version: v21.2.0-alpha.00000000-135-g684e753c15
(1) attached stack trace
-- stack trace:
| main.toCRDBVersion
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpchvec.go:52
| main.runTPCHVec
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpchvec.go:635
| main.registerTPCHVec.func4
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpchvec.go:685
| main.(*testRunner).runTest.func2
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/test_runner.go:777
| runtime.goexit
| /usr/local/go/src/runtime/asm_amd64.s:1374
Wraps: (2) unrecognized version: v21.2.0-alpha.00000000-135-g684e753c15
Error types: (1) *withstack.withStack (2) *errutil.leafError
```
<details><summary>Reproduce</summary>
<p>
<p>To reproduce, try:
```bash
# From https://go.crdb.dev/p/roachstress, perhaps edited lightly.
caffeinate ./roachstress.sh tpchvec/perf_no_stats
```
</p>
</p>
</details>
/cc @cockroachdb/sql-queries
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*tpchvec/perf_no_stats.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
| 2.0 | roachtest: tpchvec/perf_no_stats failed - roachtest.tpchvec/perf_no_stats [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2944550&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=2944550&tab=artifacts#/tpchvec/perf_no_stats) on master @ [684e753c15f3fc58df79b6ea70e7b6715eae4835](https://github.com/cockroachdb/cockroach/commits/684e753c15f3fc58df79b6ea70e7b6715eae4835):
```
The test failed on branch=master, cloud=gce:
test artifacts and logs in: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/artifacts/tpchvec/perf_no_stats/run_1
tpchvec.go:637,tpchvec.go:685,test_runner.go:777: unrecognized version: v21.2.0-alpha.00000000-135-g684e753c15
(1) attached stack trace
-- stack trace:
| main.toCRDBVersion
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpchvec.go:52
| main.runTPCHVec
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpchvec.go:635
| main.registerTPCHVec.func4
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tpchvec.go:685
| main.(*testRunner).runTest.func2
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/test_runner.go:777
| runtime.goexit
| /usr/local/go/src/runtime/asm_amd64.s:1374
Wraps: (2) unrecognized version: v21.2.0-alpha.00000000-135-g684e753c15
Error types: (1) *withstack.withStack (2) *errutil.leafError
```
<details><summary>Reproduce</summary>
<p>
<p>To reproduce, try:
```bash
# From https://go.crdb.dev/p/roachstress, perhaps edited lightly.
caffeinate ./roachstress.sh tpchvec/perf_no_stats
```
</p>
</p>
</details>
/cc @cockroachdb/sql-queries
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*tpchvec/perf_no_stats.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
| non_priority | roachtest tpchvec perf no stats failed roachtest tpchvec perf no stats with on master the test failed on branch master cloud gce test artifacts and logs in home agent work go src github com cockroachdb cockroach artifacts tpchvec perf no stats run tpchvec go tpchvec go test runner go unrecognized version alpha attached stack trace stack trace main tocrdbversion home agent work go src github com cockroachdb cockroach pkg cmd roachtest tpchvec go main runtpchvec home agent work go src github com cockroachdb cockroach pkg cmd roachtest tpchvec go main registertpchvec home agent work go src github com cockroachdb cockroach pkg cmd roachtest tpchvec go main testrunner runtest home agent work go src github com cockroachdb cockroach pkg cmd roachtest test runner go runtime goexit usr local go src runtime asm s wraps unrecognized version alpha error types withstack withstack errutil leaferror reproduce to reproduce try bash from perhaps edited lightly caffeinate roachstress sh tpchvec perf no stats cc cockroachdb sql queries | 0 |
258,119 | 27,563,856,865 | IssuesEvent | 2023-03-08 01:11:23 | samqws-marketing/walmartlabs-concord | https://api.github.com/repos/samqws-marketing/walmartlabs-concord | opened | bcpkix-jdk15on-1.64.jar: 1 vulnerabilities (highest severity is: 5.9) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bcpkix-jdk15on-1.64.jar</b></p></summary>
<p></p>
<p>Path to dependency file: /k8s/agent-operator/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.64/bcprov-jdk15on-1.64.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/walmartlabs-concord/commit/97d18a56dfc9d482e0ac2ae24230edd85457b90b">97d18a56dfc9d482e0ac2ae24230edd85457b90b</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (bcpkix-jdk15on version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2020-15522](https://www.mend.io/vulnerability-database/CVE-2020-15522) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | bcprov-jdk15on-1.64.jar | Transitive | 1.66 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-15522</summary>
### Vulnerable Library - <b>bcprov-jdk15on-1.64.jar</b></p>
<p>The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for Java 5 to Java 11.</p>
<p>Library home page: <a href="https://www.bouncycastle.org/java.html">https://www.bouncycastle.org/java.html</a></p>
<p>Path to dependency file: /k8s/agent-operator/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.64/bcprov-jdk15on-1.64.jar</p>
<p>
Dependency Hierarchy:
- bcpkix-jdk15on-1.64.jar (Root Library)
- :x: **bcprov-jdk15on-1.64.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/walmartlabs-concord/commit/97d18a56dfc9d482e0ac2ae24230edd85457b90b">97d18a56dfc9d482e0ac2ae24230edd85457b90b</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.
<p>Publish Date: 2021-05-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-15522>CVE-2020-15522</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.9</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15522">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15522</a></p>
<p>Release Date: 2021-05-20</p>
<p>Fix Resolution (org.bouncycastle:bcprov-jdk15on): 1.66</p>
<p>Direct dependency fix Resolution (org.bouncycastle:bcpkix-jdk15on): 1.66</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | True | bcpkix-jdk15on-1.64.jar: 1 vulnerabilities (highest severity is: 5.9) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bcpkix-jdk15on-1.64.jar</b></p></summary>
<p></p>
<p>Path to dependency file: /k8s/agent-operator/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.64/bcprov-jdk15on-1.64.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/walmartlabs-concord/commit/97d18a56dfc9d482e0ac2ae24230edd85457b90b">97d18a56dfc9d482e0ac2ae24230edd85457b90b</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (bcpkix-jdk15on version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2020-15522](https://www.mend.io/vulnerability-database/CVE-2020-15522) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | bcprov-jdk15on-1.64.jar | Transitive | 1.66 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-15522</summary>
### Vulnerable Library - <b>bcprov-jdk15on-1.64.jar</b></p>
<p>The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for Java 5 to Java 11.</p>
<p>Library home page: <a href="https://www.bouncycastle.org/java.html">https://www.bouncycastle.org/java.html</a></p>
<p>Path to dependency file: /k8s/agent-operator/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.64/bcprov-jdk15on-1.64.jar</p>
<p>
Dependency Hierarchy:
- bcpkix-jdk15on-1.64.jar (Root Library)
- :x: **bcprov-jdk15on-1.64.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/walmartlabs-concord/commit/97d18a56dfc9d482e0ac2ae24230edd85457b90b">97d18a56dfc9d482e0ac2ae24230edd85457b90b</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.
<p>Publish Date: 2021-05-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-15522>CVE-2020-15522</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.9</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15522">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15522</a></p>
<p>Release Date: 2021-05-20</p>
<p>Fix Resolution (org.bouncycastle:bcprov-jdk15on): 1.66</p>
<p>Direct dependency fix Resolution (org.bouncycastle:bcpkix-jdk15on): 1.66</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | non_priority | bcpkix jar vulnerabilities highest severity is vulnerable library bcpkix jar path to dependency file agent operator pom xml path to vulnerable library home wss scanner repository org bouncycastle bcprov bcprov jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in bcpkix version remediation available medium bcprov jar transitive details cve vulnerable library bcprov jar the bouncy castle crypto package is a java implementation of cryptographic algorithms this jar contains jce provider and lightweight api for the bouncy castle cryptography apis for java to java library home page a href path to dependency file agent operator pom xml path to vulnerable library home wss scanner repository org bouncycastle bcprov bcprov jar dependency hierarchy bcpkix jar root library x bcprov jar vulnerable library found in head commit a href found in base branch master vulnerability details bouncy castle bc java before bc c net before bc fja before and bc fna before have a timing issue within the ec math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ecdsa signatures publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org bouncycastle bcprov direct dependency fix resolution org bouncycastle bcpkix rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue | 0 |
54,622 | 13,788,646,703 | IssuesEvent | 2020-10-09 07:35:24 | hazelcast/hazelcast | https://api.github.com/repos/hazelcast/hazelcast | closed | Losing data after promoting from lite member to data member | Module: IMap Source: Community Team: Core Type: Defect | **Description**
We are losing data from distributed map in the event of a node failure in 3 node cluster with backup count set to 1. This is due to the use of the lite members and promoting them to data member.
**To Reproduce**
Steps to reproduce the behavior:
1. Start the cluster with 3 nodes - **all nodes are configured as lite members**
2. Set backup count for the map to 1
3. Wait until cluster is up and running
4. Promote all members to data members - calling `hzlInstance.cluster.promoteLocalLiteMember()`
5. Insert 1000 records into the distributed map
6. Kill one node - `hzlInstance.lifecycleService.terminate()`
7. Count number of records in the distributed map
**Actual result:**
Data is lost even with backup count set to 1.
There is not 1000 records in the map.
**Expected behavior:**
No data is lost after one node is down. There will be 1000 records in the map.
**Additional context**
- This happens on Hazelcast version 4.0.3.
- Works as expected on version 3.10.2.
- Java 11
- Windows
**Failing unit test written in Kotlin:**
```Kotlin
import com.hazelcast.config.Config
import com.hazelcast.config.MergePolicyConfig
import com.hazelcast.core.Hazelcast
import com.hazelcast.spi.merge.DiscardMergePolicy
import org.junit.jupiter.api.Test
import kotlin.test.assertEquals
import kotlin.test.assertTrue
class HazelcastTest {
@Test
fun `hazelcast bug unit test`() {
val numberOfRecordsInsertedIntoMap = 1000
// start first hazelcast instance as lite member
val firstHazelcastInstance = Hazelcast.newHazelcastInstance(createConfig(5701))
Thread.sleep(10000)
assertTrue(firstHazelcastInstance.lifecycleService.isRunning)
// start second and third hazelcast instances as lite member
val secondHazelcastInstance = Hazelcast.newHazelcastInstance(createConfig(5702))
val thirdHazelcastInstance = Hazelcast.newHazelcastInstance(createConfig(5703))
Thread.sleep(10000)
assertTrue(secondHazelcastInstance.lifecycleService.isRunning)
assertTrue(thirdHazelcastInstance.lifecycleService.isRunning)
// promote all instances to data members
firstHazelcastInstance.cluster.promoteLocalLiteMember()
secondHazelcastInstance.cluster.promoteLocalLiteMember()
thirdHazelcastInstance.cluster.promoteLocalLiteMember()
// give cluster some time
Thread.sleep(5000)
// check if cluster is in good shape
assertTrue(firstHazelcastInstance.partitionService.isClusterSafe)
// insert some dummy data into the testing map
val testMap = firstHazelcastInstance.getMap<String, String>("test-map")
for (i in 1..numberOfRecordsInsertedIntoMap) {
testMap["key$i"] = "value$i"
}
// check all data is correctly inserted
assertEquals(numberOfRecordsInsertedIntoMap, testMap.size)
// kill second instance (simulate node down)
secondHazelcastInstance.lifecycleService.terminate()
// wait
Thread.sleep(2000)
// backup count for the map is set to 1
// even with 1 node down no data loss is expected
assertEquals(numberOfRecordsInsertedIntoMap, firstHazelcastInstance.getMap<String, String>("test-map").size)
assertEquals(numberOfRecordsInsertedIntoMap, thirdHazelcastInstance.getMap<String, String>("test-map").size)
}
private fun createConfig(port: Int): Config {
val config = Config()
// start instance as lite member
config.isLiteMember = true
// cluster name
config.clusterName = "TestClusterName"
// network configuration
config.networkConfig.port = port
config.networkConfig.isPortAutoIncrement = false
config.networkConfig.isReuseAddress = true
config.networkConfig.restApiConfig.isEnabled = false
config.networkConfig.join.multicastConfig.isEnabled = false
config.networkConfig.join.tcpIpConfig.isEnabled = true
config.networkConfig.join.tcpIpConfig.addMember("127.0.0.1:5701")
config.networkConfig.join.tcpIpConfig.addMember("127.0.0.1:5702")
config.networkConfig.join.tcpIpConfig.addMember("127.0.0.1:5703")
// map configuration
val defaultMapConfig = config.getMapConfig("default")
defaultMapConfig.backupCount = 1
defaultMapConfig.mergePolicyConfig = MergePolicyConfig(DiscardMergePolicy::class.java.canonicalName, MergePolicyConfig.DEFAULT_BATCH_SIZE)
config.addMapConfig(defaultMapConfig)
return config
}
}
```
_We are using lite members to count members in the cluster and then we have some logic if we want to become a full data member or not._
| 1.0 | Losing data after promoting from lite member to data member - **Description**
We are losing data from distributed map in the event of a node failure in 3 node cluster with backup count set to 1. This is due to the use of the lite members and promoting them to data member.
**To Reproduce**
Steps to reproduce the behavior:
1. Start the cluster with 3 nodes - **all nodes are configured as lite members**
2. Set backup count for the map to 1
3. Wait until cluster is up and running
4. Promote all members to data members - calling `hzlInstance.cluster.promoteLocalLiteMember()`
5. Insert 1000 records into the distributed map
6. Kill one node - `hzlInstance.lifecycleService.terminate()`
7. Count number of records in the distributed map
**Actual result:**
Data is lost even with backup count set to 1.
There is not 1000 records in the map.
**Expected behavior:**
No data is lost after one node is down. There will be 1000 records in the map.
**Additional context**
- This happens on Hazelcast version 4.0.3.
- Works as expected on version 3.10.2.
- Java 11
- Windows
**Failing unit test written in Kotlin:**
```Kotlin
import com.hazelcast.config.Config
import com.hazelcast.config.MergePolicyConfig
import com.hazelcast.core.Hazelcast
import com.hazelcast.spi.merge.DiscardMergePolicy
import org.junit.jupiter.api.Test
import kotlin.test.assertEquals
import kotlin.test.assertTrue
class HazelcastTest {
@Test
fun `hazelcast bug unit test`() {
val numberOfRecordsInsertedIntoMap = 1000
// start first hazelcast instance as lite member
val firstHazelcastInstance = Hazelcast.newHazelcastInstance(createConfig(5701))
Thread.sleep(10000)
assertTrue(firstHazelcastInstance.lifecycleService.isRunning)
// start second and third hazelcast instances as lite member
val secondHazelcastInstance = Hazelcast.newHazelcastInstance(createConfig(5702))
val thirdHazelcastInstance = Hazelcast.newHazelcastInstance(createConfig(5703))
Thread.sleep(10000)
assertTrue(secondHazelcastInstance.lifecycleService.isRunning)
assertTrue(thirdHazelcastInstance.lifecycleService.isRunning)
// promote all instances to data members
firstHazelcastInstance.cluster.promoteLocalLiteMember()
secondHazelcastInstance.cluster.promoteLocalLiteMember()
thirdHazelcastInstance.cluster.promoteLocalLiteMember()
// give cluster some time
Thread.sleep(5000)
// check if cluster is in good shape
assertTrue(firstHazelcastInstance.partitionService.isClusterSafe)
// insert some dummy data into the testing map
val testMap = firstHazelcastInstance.getMap<String, String>("test-map")
for (i in 1..numberOfRecordsInsertedIntoMap) {
testMap["key$i"] = "value$i"
}
// check all data is correctly inserted
assertEquals(numberOfRecordsInsertedIntoMap, testMap.size)
// kill second instance (simulate node down)
secondHazelcastInstance.lifecycleService.terminate()
// wait
Thread.sleep(2000)
// backup count for the map is set to 1
// even with 1 node down no data loss is expected
assertEquals(numberOfRecordsInsertedIntoMap, firstHazelcastInstance.getMap<String, String>("test-map").size)
assertEquals(numberOfRecordsInsertedIntoMap, thirdHazelcastInstance.getMap<String, String>("test-map").size)
}
private fun createConfig(port: Int): Config {
val config = Config()
// start instance as lite member
config.isLiteMember = true
// cluster name
config.clusterName = "TestClusterName"
// network configuration
config.networkConfig.port = port
config.networkConfig.isPortAutoIncrement = false
config.networkConfig.isReuseAddress = true
config.networkConfig.restApiConfig.isEnabled = false
config.networkConfig.join.multicastConfig.isEnabled = false
config.networkConfig.join.tcpIpConfig.isEnabled = true
config.networkConfig.join.tcpIpConfig.addMember("127.0.0.1:5701")
config.networkConfig.join.tcpIpConfig.addMember("127.0.0.1:5702")
config.networkConfig.join.tcpIpConfig.addMember("127.0.0.1:5703")
// map configuration
val defaultMapConfig = config.getMapConfig("default")
defaultMapConfig.backupCount = 1
defaultMapConfig.mergePolicyConfig = MergePolicyConfig(DiscardMergePolicy::class.java.canonicalName, MergePolicyConfig.DEFAULT_BATCH_SIZE)
config.addMapConfig(defaultMapConfig)
return config
}
}
```
_We are using lite members to count members in the cluster and then we have some logic if we want to become a full data member or not._
| non_priority | losing data after promoting from lite member to data member description we are losing data from distributed map in the event of a node failure in node cluster with backup count set to this is due to the use of the lite members and promoting them to data member to reproduce steps to reproduce the behavior start the cluster with nodes all nodes are configured as lite members set backup count for the map to wait until cluster is up and running promote all members to data members calling hzlinstance cluster promotelocallitemember insert records into the distributed map kill one node hzlinstance lifecycleservice terminate count number of records in the distributed map actual result data is lost even with backup count set to there is not records in the map expected behavior no data is lost after one node is down there will be records in the map additional context this happens on hazelcast version works as expected on version java windows failing unit test written in kotlin kotlin import com hazelcast config config import com hazelcast config mergepolicyconfig import com hazelcast core hazelcast import com hazelcast spi merge discardmergepolicy import org junit jupiter api test import kotlin test assertequals import kotlin test asserttrue class hazelcasttest test fun hazelcast bug unit test val numberofrecordsinsertedintomap start first hazelcast instance as lite member val firsthazelcastinstance hazelcast newhazelcastinstance createconfig thread sleep asserttrue firsthazelcastinstance lifecycleservice isrunning start second and third hazelcast instances as lite member val secondhazelcastinstance hazelcast newhazelcastinstance createconfig val thirdhazelcastinstance hazelcast newhazelcastinstance createconfig thread sleep asserttrue secondhazelcastinstance lifecycleservice isrunning asserttrue thirdhazelcastinstance lifecycleservice isrunning promote all instances to data members firsthazelcastinstance cluster promotelocallitemember secondhazelcastinstance cluster promotelocallitemember thirdhazelcastinstance cluster promotelocallitemember give cluster some time thread sleep check if cluster is in good shape asserttrue firsthazelcastinstance partitionservice isclustersafe insert some dummy data into the testing map val testmap firsthazelcastinstance getmap test map for i in numberofrecordsinsertedintomap testmap value i check all data is correctly inserted assertequals numberofrecordsinsertedintomap testmap size kill second instance simulate node down secondhazelcastinstance lifecycleservice terminate wait thread sleep backup count for the map is set to even with node down no data loss is expected assertequals numberofrecordsinsertedintomap firsthazelcastinstance getmap test map size assertequals numberofrecordsinsertedintomap thirdhazelcastinstance getmap test map size private fun createconfig port int config val config config start instance as lite member config islitemember true cluster name config clustername testclustername network configuration config networkconfig port port config networkconfig isportautoincrement false config networkconfig isreuseaddress true config networkconfig restapiconfig isenabled false config networkconfig join multicastconfig isenabled false config networkconfig join tcpipconfig isenabled true config networkconfig join tcpipconfig addmember config networkconfig join tcpipconfig addmember config networkconfig join tcpipconfig addmember map configuration val defaultmapconfig config getmapconfig default defaultmapconfig backupcount defaultmapconfig mergepolicyconfig mergepolicyconfig discardmergepolicy class java canonicalname mergepolicyconfig default batch size config addmapconfig defaultmapconfig return config we are using lite members to count members in the cluster and then we have some logic if we want to become a full data member or not | 0 |
228,426 | 17,461,224,682 | IssuesEvent | 2021-08-06 10:44:45 | eclipse/jetty.project | https://api.github.com/repos/eclipse/jetty.project | closed | Jetty 10 documentation generating .png files within src directory. | Documentation | **Jetty version**
10.0.x
**Description**
In the operations-guide directory I'm getting a lot of generated .png .svg files. These files should probably be generated in the target directory so they're ignored by git.
```
Lachlan@Lachlans-MBP: ~/webtide/src/jetty-10.0.x/jetty-documentation/src/main/asciidoc/operations-guide (jetty-10.0.x-5229-WebSocketDocumentation)^1
[513]: ls -la
total 272
drwxr-xr-x 35 Lachlan staff 1120 Dec 3 17:04 .
drwxr-xr-x 8 Lachlan staff 256 Oct 6 11:02 ..
drwxr-xr-x 3 Lachlan staff 96 Dec 3 17:02 .asciidoctor
-rw-r--r-- 1 Lachlan staff 210 Sep 24 08:47 .asciidoctorconfig
drwxr-xr-x 3 Lachlan staff 96 Nov 11 09:26 annotations
drwxr-xr-x 8 Lachlan staff 256 Dec 3 10:34 begin
drwxr-xr-x 3 Lachlan staff 96 Sep 24 08:47 contexts
drwxr-xr-x 10 Lachlan staff 320 Nov 11 09:26 deploy
-rw-r--r-- 1 Lachlan staff 8179 Dec 3 17:04 diag-2830e38460d606111888c5df2a645163.png
-rw-r--r-- 1 Lachlan staff 3293 Dec 3 17:04 diag-2830e38460d606111888c5df2a645163.svg
-rw-r--r-- 1 Lachlan staff 8136 Dec 3 17:04 diag-70817cc5c7137abc9759cdcd3edbb658.png
-rw-r--r-- 1 Lachlan staff 3021 Dec 3 17:04 diag-70817cc5c7137abc9759cdcd3edbb658.svg
-rw-r--r-- 1 Lachlan staff 8090 Dec 3 17:04 diag-7387dfbb6f9fb9cfa951a697aca488a8.png
-rw-r--r-- 1 Lachlan staff 2919 Dec 3 17:04 diag-7387dfbb6f9fb9cfa951a697aca488a8.svg
-rw-r--r-- 1 Lachlan staff 20939 Dec 3 17:04 diag-8a7fb4bb9c84453a4bf01a24558e8026.png
-rw-r--r-- 1 Lachlan staff 7211 Dec 3 17:04 diag-8a7fb4bb9c84453a4bf01a24558e8026.svg
-rw-r--r-- 1 Lachlan staff 17220 Dec 3 17:04 diag-9f323b812fd1edc8217715ca0c2ba8e9.png
-rw-r--r-- 1 Lachlan staff 2975 Dec 3 17:04 diag-9f323b812fd1edc8217715ca0c2ba8e9.svg
-rw-r--r-- 1 Lachlan staff 21137 Dec 3 17:04 diag-e2488cc783b3434076c5a44ee7f19a2b.png
-rw-r--r-- 1 Lachlan staff 7188 Dec 3 17:04 diag-e2488cc783b3434076c5a44ee7f19a2b.svg
-rw-r--r-- 1 Lachlan staff 1508 Dec 3 17:02 index.adoc
...
```
| 1.0 | Jetty 10 documentation generating .png files within src directory. - **Jetty version**
10.0.x
**Description**
In the operations-guide directory I'm getting a lot of generated .png .svg files. These files should probably be generated in the target directory so they're ignored by git.
```
Lachlan@Lachlans-MBP: ~/webtide/src/jetty-10.0.x/jetty-documentation/src/main/asciidoc/operations-guide (jetty-10.0.x-5229-WebSocketDocumentation)^1
[513]: ls -la
total 272
drwxr-xr-x 35 Lachlan staff 1120 Dec 3 17:04 .
drwxr-xr-x 8 Lachlan staff 256 Oct 6 11:02 ..
drwxr-xr-x 3 Lachlan staff 96 Dec 3 17:02 .asciidoctor
-rw-r--r-- 1 Lachlan staff 210 Sep 24 08:47 .asciidoctorconfig
drwxr-xr-x 3 Lachlan staff 96 Nov 11 09:26 annotations
drwxr-xr-x 8 Lachlan staff 256 Dec 3 10:34 begin
drwxr-xr-x 3 Lachlan staff 96 Sep 24 08:47 contexts
drwxr-xr-x 10 Lachlan staff 320 Nov 11 09:26 deploy
-rw-r--r-- 1 Lachlan staff 8179 Dec 3 17:04 diag-2830e38460d606111888c5df2a645163.png
-rw-r--r-- 1 Lachlan staff 3293 Dec 3 17:04 diag-2830e38460d606111888c5df2a645163.svg
-rw-r--r-- 1 Lachlan staff 8136 Dec 3 17:04 diag-70817cc5c7137abc9759cdcd3edbb658.png
-rw-r--r-- 1 Lachlan staff 3021 Dec 3 17:04 diag-70817cc5c7137abc9759cdcd3edbb658.svg
-rw-r--r-- 1 Lachlan staff 8090 Dec 3 17:04 diag-7387dfbb6f9fb9cfa951a697aca488a8.png
-rw-r--r-- 1 Lachlan staff 2919 Dec 3 17:04 diag-7387dfbb6f9fb9cfa951a697aca488a8.svg
-rw-r--r-- 1 Lachlan staff 20939 Dec 3 17:04 diag-8a7fb4bb9c84453a4bf01a24558e8026.png
-rw-r--r-- 1 Lachlan staff 7211 Dec 3 17:04 diag-8a7fb4bb9c84453a4bf01a24558e8026.svg
-rw-r--r-- 1 Lachlan staff 17220 Dec 3 17:04 diag-9f323b812fd1edc8217715ca0c2ba8e9.png
-rw-r--r-- 1 Lachlan staff 2975 Dec 3 17:04 diag-9f323b812fd1edc8217715ca0c2ba8e9.svg
-rw-r--r-- 1 Lachlan staff 21137 Dec 3 17:04 diag-e2488cc783b3434076c5a44ee7f19a2b.png
-rw-r--r-- 1 Lachlan staff 7188 Dec 3 17:04 diag-e2488cc783b3434076c5a44ee7f19a2b.svg
-rw-r--r-- 1 Lachlan staff 1508 Dec 3 17:02 index.adoc
...
```
| non_priority | jetty documentation generating png files within src directory jetty version x description in the operations guide directory i m getting a lot of generated png svg files these files should probably be generated in the target directory so they re ignored by git lachlan lachlans mbp webtide src jetty x jetty documentation src main asciidoc operations guide jetty x websocketdocumentation ls la total drwxr xr x lachlan staff dec drwxr xr x lachlan staff oct drwxr xr x lachlan staff dec asciidoctor rw r r lachlan staff sep asciidoctorconfig drwxr xr x lachlan staff nov annotations drwxr xr x lachlan staff dec begin drwxr xr x lachlan staff sep contexts drwxr xr x lachlan staff nov deploy rw r r lachlan staff dec diag png rw r r lachlan staff dec diag svg rw r r lachlan staff dec diag png rw r r lachlan staff dec diag svg rw r r lachlan staff dec diag png rw r r lachlan staff dec diag svg rw r r lachlan staff dec diag png rw r r lachlan staff dec diag svg rw r r lachlan staff dec diag png rw r r lachlan staff dec diag svg rw r r lachlan staff dec diag png rw r r lachlan staff dec diag svg rw r r lachlan staff dec index adoc | 0 |
27,540 | 4,059,011,842 | IssuesEvent | 2016-05-25 07:56:20 | PatMyhub/SR3SPJTOQHQB6632J2KU643C | https://api.github.com/repos/PatMyhub/SR3SPJTOQHQB6632J2KU643C | closed | Xj/EWF26T8EWwHKfybMbmq7rw+vMqjvw9RUMeZ6WX/C3nxCGnblykMW6l5OipunJ7PM0Ke1KRT/wi7HYuwdhu8Aus0F/HxX40tCprhZJJxDw+76bqNu5R6TAaRl88u4qd/hrI/tu+rR/c5nNKIywDWlNfYDsFJwJiCx++ef564U= | design | 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 | 1.0 | Xj/EWF26T8EWwHKfybMbmq7rw+vMqjvw9RUMeZ6WX/C3nxCGnblykMW6l5OipunJ7PM0Ke1KRT/wi7HYuwdhu8Aus0F/HxX40tCprhZJJxDw+76bqNu5R6TAaRl88u4qd/hrI/tu+rR/c5nNKIywDWlNfYDsFJwJiCx++ef564U= - oNZz9HXgGm75mNZCwZUQICnre9gDzyHpqip5shvi404SWYz157eTichfA8hnMpPGhSGxdQWcrLEJNIihjlgyTZEXU9JTqyTgyVOimYzMP9CVCL/E2gTKB0leZeZ5e/KsExI0e/1xLE3gbF/yZOJDe4UhsXUFnKyxCTSIoY5YMk1z6XdYbrsU8ANWjX0G/QFeYeoGbQTkEApO0WLTtRiwjPg8dPI13VqGwjMr5G10/LFH43zmM7QeLAaw1qUtfvDDhSGxdQWcrLEJNIihjlgyTUk/0/pCdqYhwFaQ/CBu83ogdvNQKV6x4oSfj6i+CgfODPu93c/Ha/zeHqbmS2bB0IUhsXUFnKyxCTSIoY5YMk277lJFM6NNQaT/TfXXxY2KvhghBAWNhziDCQp6RnrENi1hRjm12UrFOiJoSxz5vN0mvt7Gt0+HvL1olDkLMmnVhSGxdQWcrLEJNIihjlgyTfevh8tMNmavjLcHvdrGn7SgAf0U3Tzu+9gdv7qSccSPtNYn+T9eAkOpvKadDMbnA4UhsXUFnKyxCTSIoY5YMk2FIbF1BZyssQk0iKGOWDJN8WoYbxGGGE0AMPTqbzmAksC+2U4pj6a/HNlrLSy97nuoHKezKqqQkpjsxc0buErGhSGxdQWcrLEJNIihjlgyTXgfz6laBi8Vw/AtpG/v4bcGpLBbiL99wtn8C0jsZ7NHaDW2dnsHzmPfqm3/pG5NroUhsXUFnKyxCTSIoY5YMk2FIbF1BZyssQk0iKGOWDJNw8QXdjxtlUZ8dcR59tDG/nBCliBkUkzfKUyP0IVYaMztgQwVhQdhUIB4pfO3HNyghSGxdQWcrLEJNIihjlgyTfCYCboVw0DWlum5VK5F4wkdsbfcJI6+oL6CuvieEYCrhehz1ryk69GiF5H5NJrNXIUhsXUFnKyxCTSIoY5YMk2FIbF1BZyssQk0iKGOWDJNiI2jpe6ojlHGUy4X13QV7SBCEmJ2nTfUGbP/dCScnF4Eqi7+ODlNB5enDNBbhNFGhSGxdQWcrLEJNIihjlgyTRtY6NLwstmqsY7uxgZVBNkvun0jGnXRVNT4CXpdA4/9S4kYAapkucXwXlOHWJDmHoUhsXUFnKyxCTSIoY5YMk2FIbF1BZyssQk0iKGOWDJNQW7iOy4RuSXjJzxDpUkG1nn6YMDVHNETl5Sn7JpgLkRs7Gd/jCS+ghSl4FabFHWuhSGxdQWcrLEJNIihjlgyTaj1lVbOz2nNk3AYK91gAKpolXJzF9/7ewREhRT/H4mXe5+F/rdr9rIUopwHp5wzCoUhsXUFnKyxCTSIoY5YMk2FIbF1BZyssQk0iKGOWDJNithkO1iNkvGW1swOkCh6lODCrNBvmYLRHlKJoJIMDwvGKbElcUeh9diY2dvPK5iqh/wCZOlGc88079u9CpYsXsu8XcSLaCXJ2K2iTrG/DaDRg2xI7zSlPwAWwUHhHLMoMiG2/18frQRvwO/qcoEhu4UhsXUFnKyxCTSIoY5YMk2FIbF1BZyssQk0iKGOWDJNBTm8SBlYNbt2/qS+5DTQjy6vP5AgCra776u1H5YtOE9kBMt7P+doPq0QeGxsE7cL08+bPzbhwbzm45msEtbuHeR54BAqL0acnClcTwkeIZVtxL3y+rWSvoBUxdVu9jVdrPAS2l38KuiWZX1O9GyiBXnpNaO/CilDdoM3xs4Vr0CtOTr+ZRkJDv1zJqEVeWG4pzwgyLO+2E5iN71Hs2834Q== | non_priority | xj hri tu rr pcdqyhwfaq ha atpg jcs f qs | 0 |
199,052 | 15,732,671,634 | IssuesEvent | 2021-03-29 18:35:05 | AY2021S2-CS2103-W16-3/tp | https://api.github.com/repos/AY2021S2-CS2103-W16-3/tp | opened | 💡 Update user stories in developer guide | type::documentation | ### Describe the issue
*What is the problem, if any? What is the desired behavior?*
Use cases are currently either invalid (due to deprecated commands), or less pertinent to target audience (i.e. welfare IC). To update.
________________________________________________________________
### Additional context
*Describe possible and/or alternative solutions, to highlight required scope of work.*
| 1.0 | 💡 Update user stories in developer guide - ### Describe the issue
*What is the problem, if any? What is the desired behavior?*
Use cases are currently either invalid (due to deprecated commands), or less pertinent to target audience (i.e. welfare IC). To update.
________________________________________________________________
### Additional context
*Describe possible and/or alternative solutions, to highlight required scope of work.*
| non_priority | 💡 update user stories in developer guide describe the issue what is the problem if any what is the desired behavior use cases are currently either invalid due to deprecated commands or less pertinent to target audience i e welfare ic to update additional context describe possible and or alternative solutions to highlight required scope of work | 0 |
438,990 | 30,672,530,175 | IssuesEvent | 2023-07-26 00:31:14 | Isaaccna/Github-Blog | https://api.github.com/repos/Isaaccna/Github-Blog | opened | Arquitetura da aplicação | documentation | Definimos como arquitetura as técnicas e os padrões usados para projetar e desenvolver uma aplicação. Ela fornece um roadmap e práticas recomendadas a serem seguidos durante esse desenvolvimento para que você tenha uma aplicação bem-estruturada.
Os padrões de design de software ajudam no desenvolvimento de uma aplicação. Eles descrevem uma solução reproduzível para um problema.
Os padrões podem ser vinculados para criar arquiteturas de aplicação mais genéricas. Em vez de criar a arquitetura do zero, você pode usar padrões de design existentes, garantindo que tudo funcione da maneira correta.
O serviços de front-end e back-end fazem parte da arquitetura da aplicação. O desenvolvimento de front-end tem como foco a experiência do usuário da aplicação, já o de back-end se concentra em fornecer acesso aos dados, serviços e outros sistemas existentes responsáveis pelo funcionamento dela.
A arquitetura é o ponto de partida ou o roadmap para desenvolver uma aplicação. No entanto, você precisa escolher determinados aspectos de implementação não definidos em uma arquitetura. Por exemplo, como uma etapa inicial, escolha a linguagem de programação para escrever a aplicação.
Há muitas linguagens de programação usadas no desenvolvimento de softwares. Algumas delas são utilizadas na criação de determinados tipos de aplicações, como o Swift para aplicações mobile ou o JavaScript para desenvolvimento de front-end.
Atualmente, o uso do JavaScript com HTML e CSS é uma das linguagens de programação mais populares para desenvolvimento de aplicação web.
Outras linguagens de programação conhecidas incluem o Ruby, Python, TypeScript, Java, PHP, SQL, entre outras. A opção mais apropriada para você depende do tipo da aplicação, dos recursos de desenvolvimento disponíveis e dos requisitos.
Tradicionalmente, as aplicações eram escritas como uma unidade de código em que todos os componentes tinham os mesmos recursos e espaço de memória. Esse tipo de arquitetura é conhecido como um monólito.
Já as arquiteturas modernas de aplicação costumam ser mais levemente acopladas. Elas usam microsserviços e interfaces de programação de aplicações (APIs) para conectar serviços, oferecendo a base para as aplicações nativas em nuvem.
Com o desenvolvimento nativo em nuvem, você acelera a criação de novas aplicações, otimiza as existentes e oferece uma experiência de gerenciamento automatizada e desenvolvimento consistente em nuvens privadas, públicas e híbridas. | 1.0 | Arquitetura da aplicação - Definimos como arquitetura as técnicas e os padrões usados para projetar e desenvolver uma aplicação. Ela fornece um roadmap e práticas recomendadas a serem seguidos durante esse desenvolvimento para que você tenha uma aplicação bem-estruturada.
Os padrões de design de software ajudam no desenvolvimento de uma aplicação. Eles descrevem uma solução reproduzível para um problema.
Os padrões podem ser vinculados para criar arquiteturas de aplicação mais genéricas. Em vez de criar a arquitetura do zero, você pode usar padrões de design existentes, garantindo que tudo funcione da maneira correta.
O serviços de front-end e back-end fazem parte da arquitetura da aplicação. O desenvolvimento de front-end tem como foco a experiência do usuário da aplicação, já o de back-end se concentra em fornecer acesso aos dados, serviços e outros sistemas existentes responsáveis pelo funcionamento dela.
A arquitetura é o ponto de partida ou o roadmap para desenvolver uma aplicação. No entanto, você precisa escolher determinados aspectos de implementação não definidos em uma arquitetura. Por exemplo, como uma etapa inicial, escolha a linguagem de programação para escrever a aplicação.
Há muitas linguagens de programação usadas no desenvolvimento de softwares. Algumas delas são utilizadas na criação de determinados tipos de aplicações, como o Swift para aplicações mobile ou o JavaScript para desenvolvimento de front-end.
Atualmente, o uso do JavaScript com HTML e CSS é uma das linguagens de programação mais populares para desenvolvimento de aplicação web.
Outras linguagens de programação conhecidas incluem o Ruby, Python, TypeScript, Java, PHP, SQL, entre outras. A opção mais apropriada para você depende do tipo da aplicação, dos recursos de desenvolvimento disponíveis e dos requisitos.
Tradicionalmente, as aplicações eram escritas como uma unidade de código em que todos os componentes tinham os mesmos recursos e espaço de memória. Esse tipo de arquitetura é conhecido como um monólito.
Já as arquiteturas modernas de aplicação costumam ser mais levemente acopladas. Elas usam microsserviços e interfaces de programação de aplicações (APIs) para conectar serviços, oferecendo a base para as aplicações nativas em nuvem.
Com o desenvolvimento nativo em nuvem, você acelera a criação de novas aplicações, otimiza as existentes e oferece uma experiência de gerenciamento automatizada e desenvolvimento consistente em nuvens privadas, públicas e híbridas. | non_priority | arquitetura da aplicação definimos como arquitetura as técnicas e os padrões usados para projetar e desenvolver uma aplicação ela fornece um roadmap e práticas recomendadas a serem seguidos durante esse desenvolvimento para que você tenha uma aplicação bem estruturada os padrões de design de software ajudam no desenvolvimento de uma aplicação eles descrevem uma solução reproduzível para um problema os padrões podem ser vinculados para criar arquiteturas de aplicação mais genéricas em vez de criar a arquitetura do zero você pode usar padrões de design existentes garantindo que tudo funcione da maneira correta o serviços de front end e back end fazem parte da arquitetura da aplicação o desenvolvimento de front end tem como foco a experiência do usuário da aplicação já o de back end se concentra em fornecer acesso aos dados serviços e outros sistemas existentes responsáveis pelo funcionamento dela a arquitetura é o ponto de partida ou o roadmap para desenvolver uma aplicação no entanto você precisa escolher determinados aspectos de implementação não definidos em uma arquitetura por exemplo como uma etapa inicial escolha a linguagem de programação para escrever a aplicação há muitas linguagens de programação usadas no desenvolvimento de softwares algumas delas são utilizadas na criação de determinados tipos de aplicações como o swift para aplicações mobile ou o javascript para desenvolvimento de front end atualmente o uso do javascript com html e css é uma das linguagens de programação mais populares para desenvolvimento de aplicação web outras linguagens de programação conhecidas incluem o ruby python typescript java php sql entre outras a opção mais apropriada para você depende do tipo da aplicação dos recursos de desenvolvimento disponíveis e dos requisitos tradicionalmente as aplicações eram escritas como uma unidade de código em que todos os componentes tinham os mesmos recursos e espaço de memória esse tipo de arquitetura é conhecido como um monólito já as arquiteturas modernas de aplicação costumam ser mais levemente acopladas elas usam microsserviços e interfaces de programação de aplicações apis para conectar serviços oferecendo a base para as aplicações nativas em nuvem com o desenvolvimento nativo em nuvem você acelera a criação de novas aplicações otimiza as existentes e oferece uma experiência de gerenciamento automatizada e desenvolvimento consistente em nuvens privadas públicas e híbridas | 0 |
25,538 | 11,188,281,812 | IssuesEvent | 2020-01-02 03:54:28 | eugenetriguba/of | https://api.github.com/repos/eugenetriguba/of | opened | Change authentication to not store passwords | enhancement security | The current way to authenticate to be able to send emails uses Gmail, and the username and password for that account is in a JSON file. This should be changed to a more secure authentication method. | True | Change authentication to not store passwords - The current way to authenticate to be able to send emails uses Gmail, and the username and password for that account is in a JSON file. This should be changed to a more secure authentication method. | non_priority | change authentication to not store passwords the current way to authenticate to be able to send emails uses gmail and the username and password for that account is in a json file this should be changed to a more secure authentication method | 0 |
378,585 | 26,327,600,022 | IssuesEvent | 2023-01-10 08:16:31 | eclipse/rdf4j | https://api.github.com/repos/eclipse/rdf4j | opened | Javadoc fix missing refs and 'lt' rendering | 📶 enhancement website / documentation | ### Current Behavior
Generating javadoc yields a few warnings on missing references and issues with '<' not being escaped
### Expected Behavior
Fix the missing references and rendering issues
### Steps To Reproduce
_No response_
### Version
4.2.2
### Are you interested in contributing a solution yourself?
Yes
### Anything else?
_No response_ | 1.0 | Javadoc fix missing refs and 'lt' rendering - ### Current Behavior
Generating javadoc yields a few warnings on missing references and issues with '<' not being escaped
### Expected Behavior
Fix the missing references and rendering issues
### Steps To Reproduce
_No response_
### Version
4.2.2
### Are you interested in contributing a solution yourself?
Yes
### Anything else?
_No response_ | non_priority | javadoc fix missing refs and lt rendering current behavior generating javadoc yields a few warnings on missing references and issues with not being escaped expected behavior fix the missing references and rendering issues steps to reproduce no response version are you interested in contributing a solution yourself yes anything else no response | 0 |
5,310 | 3,198,588,710 | IssuesEvent | 2015-10-01 13:07:21 | Yoast/wordpress-seo | https://api.github.com/repos/Yoast/wordpress-seo | closed | Making util for wp_json_encode | code-review enhancement | Instead of checking every where it's better to make a wrapper method for the `json_encode` / `wp_json_encode`. This prevent checking if the method exists everywhere. | 1.0 | Making util for wp_json_encode - Instead of checking every where it's better to make a wrapper method for the `json_encode` / `wp_json_encode`. This prevent checking if the method exists everywhere. | non_priority | making util for wp json encode instead of checking every where it s better to make a wrapper method for the json encode wp json encode this prevent checking if the method exists everywhere | 0 |
87,385 | 10,905,976,871 | IssuesEvent | 2019-11-20 11:55:33 | microsoft/vscode | https://api.github.com/repos/microsoft/vscode | closed | Inconsistent key binding for Go Back command (workbench.action.navigateBack) between VS on Linux, VS on Windows, VS 2019 on Windows | *as-designed | <!-- Please search existing issues to avoid creating duplicates. -->
<!-- Also please test using the latest insiders build to make sure your issue has not already been fixed: https://code.visualstudio.com/insiders/ -->
<!-- Use Help > Report Issue to prefill these. -->
- VSCode Version: all
- OS Version: all
Steps to Reproduce:
1. Want to to jump cursor to previous location
2. Think about what OS you're on
3. Try a bunch of key combinations because can't remember which binding is for which OS
4. Oh it's that one
5. Sad
<!-- Launch with `code --disable-extensions` to check. -->
Does this issue occur when all extensions are disabled?: Yes/No
yes | 1.0 | Inconsistent key binding for Go Back command (workbench.action.navigateBack) between VS on Linux, VS on Windows, VS 2019 on Windows - <!-- Please search existing issues to avoid creating duplicates. -->
<!-- Also please test using the latest insiders build to make sure your issue has not already been fixed: https://code.visualstudio.com/insiders/ -->
<!-- Use Help > Report Issue to prefill these. -->
- VSCode Version: all
- OS Version: all
Steps to Reproduce:
1. Want to to jump cursor to previous location
2. Think about what OS you're on
3. Try a bunch of key combinations because can't remember which binding is for which OS
4. Oh it's that one
5. Sad
<!-- Launch with `code --disable-extensions` to check. -->
Does this issue occur when all extensions are disabled?: Yes/No
yes | non_priority | inconsistent key binding for go back command workbench action navigateback between vs on linux vs on windows vs on windows report issue to prefill these vscode version all os version all steps to reproduce want to to jump cursor to previous location think about what os you re on try a bunch of key combinations because can t remember which binding is for which os oh it s that one sad does this issue occur when all extensions are disabled yes no yes | 0 |
342,469 | 24,743,719,549 | IssuesEvent | 2022-10-21 07:59:03 | PPang-Delivery/PPang-Delivery | https://api.github.com/repos/PPang-Delivery/PPang-Delivery | closed | :sparkles: feat: 채팅 기능 구현 | documentation enhancement | - [ ] 채팅기능 구조 조사
- [ ] Firebase 기초 문법 숙지(로그인, 데이터 추가 및 읽기)
- [x] Figma study
- [x] 맵 팝업창에서 팡해요 리스트로 뷰 전환
- [ ] 채팡해요 단체 채팅방 리스트만들기
- [ ] 개인 dm 채팅방 리스트만들기
- [ ] 채팅방 구현 | 1.0 | :sparkles: feat: 채팅 기능 구현 - - [ ] 채팅기능 구조 조사
- [ ] Firebase 기초 문법 숙지(로그인, 데이터 추가 및 읽기)
- [x] Figma study
- [x] 맵 팝업창에서 팡해요 리스트로 뷰 전환
- [ ] 채팡해요 단체 채팅방 리스트만들기
- [ ] 개인 dm 채팅방 리스트만들기
- [ ] 채팅방 구현 | non_priority | sparkles feat 채팅 기능 구현 채팅기능 구조 조사 firebase 기초 문법 숙지 로그인 데이터 추가 및 읽기 figma study 맵 팝업창에서 팡해요 리스트로 뷰 전환 채팡해요 단체 채팅방 리스트만들기 개인 dm 채팅방 리스트만들기 채팅방 구현 | 0 |
286,619 | 21,582,163,852 | IssuesEvent | 2022-05-02 19:59:35 | CSE112-sp22-group9/cse112-sp22-group9 | https://api.github.com/repos/CSE112-sp22-group9/cse112-sp22-group9 | opened | Changing documention for source/Index | documentation issue | ## Name and Email
- Name: Justin Ramirez
- Email: jmr002@ucsd.edu
## Complexity of Issue (Scale from 1-5)
- 1
## Issue Description
- Updating comments/style, minor cleanup for files in source/Index/
### Make sure to label this issue with the 'issue' label!
| 1.0 | Changing documention for source/Index - ## Name and Email
- Name: Justin Ramirez
- Email: jmr002@ucsd.edu
## Complexity of Issue (Scale from 1-5)
- 1
## Issue Description
- Updating comments/style, minor cleanup for files in source/Index/
### Make sure to label this issue with the 'issue' label!
| non_priority | changing documention for source index name and email name justin ramirez email ucsd edu complexity of issue scale from issue description updating comments style minor cleanup for files in source index make sure to label this issue with the issue label | 0 |
36,635 | 4,745,878,159 | IssuesEvent | 2016-10-21 09:04:11 | CreatorDev/openwrt | https://api.github.com/repos/CreatorDev/openwrt | opened | Add documentation regarding Wi-Fi and 6LoWPAN interference | p: medium s: design t: documentation | @nikhil-zinjurde-imgtec -
We should make developers of Ci40 and Creator Kit aware of the reasons for having Wi-Fi and 6LoWPAN on channels far away from each other. We should also mention the default channel (i.e. 26) being used for our demo applications | 1.0 | Add documentation regarding Wi-Fi and 6LoWPAN interference - @nikhil-zinjurde-imgtec -
We should make developers of Ci40 and Creator Kit aware of the reasons for having Wi-Fi and 6LoWPAN on channels far away from each other. We should also mention the default channel (i.e. 26) being used for our demo applications | non_priority | add documentation regarding wi fi and interference nikhil zinjurde imgtec we should make developers of and creator kit aware of the reasons for having wi fi and on channels far away from each other we should also mention the default channel i e being used for our demo applications | 0 |
22,135 | 15,018,332,931 | IssuesEvent | 2021-02-01 12:04:44 | airyhq/airy | https://api.github.com/repos/airyhq/airy | closed | Flexible cpu and ram resources for the Vagrant box at bootstrap | infrastructure | Currently the resources that Airy core is bootstrapped with are hard-coded in `/infrastructure/Vagrantfile`. As core can now be deployed without the optional components by default, we need to make this values flexible, so that people can specify different values, at bootstrap time.
Example:
```
./scripts/bootstrap.sh
How much cores do you want to use (default: 4, minimum: 2): 2
How much RAM (GB) do you want to use (default 7, minimum: 3): 4
```
We also need to specify which are the minimal values we accept. Probably 2 for cores and 3 for GB ram.
Also we can retrieve information for the machine where the Vagrant box will be created, so that we can make appropriate recommendations.
- [ ] Overwrite default cpus and memory with env variables
- [ ] Prompt the user to specify values
- [ ] Print available system resources
- [ ] Check whether it is possible to run the platform
| 1.0 | Flexible cpu and ram resources for the Vagrant box at bootstrap - Currently the resources that Airy core is bootstrapped with are hard-coded in `/infrastructure/Vagrantfile`. As core can now be deployed without the optional components by default, we need to make this values flexible, so that people can specify different values, at bootstrap time.
Example:
```
./scripts/bootstrap.sh
How much cores do you want to use (default: 4, minimum: 2): 2
How much RAM (GB) do you want to use (default 7, minimum: 3): 4
```
We also need to specify which are the minimal values we accept. Probably 2 for cores and 3 for GB ram.
Also we can retrieve information for the machine where the Vagrant box will be created, so that we can make appropriate recommendations.
- [ ] Overwrite default cpus and memory with env variables
- [ ] Prompt the user to specify values
- [ ] Print available system resources
- [ ] Check whether it is possible to run the platform
| non_priority | flexible cpu and ram resources for the vagrant box at bootstrap currently the resources that airy core is bootstrapped with are hard coded in infrastructure vagrantfile as core can now be deployed without the optional components by default we need to make this values flexible so that people can specify different values at bootstrap time example scripts bootstrap sh how much cores do you want to use default minimum how much ram gb do you want to use default minimum we also need to specify which are the minimal values we accept probably for cores and for gb ram also we can retrieve information for the machine where the vagrant box will be created so that we can make appropriate recommendations overwrite default cpus and memory with env variables prompt the user to specify values print available system resources check whether it is possible to run the platform | 0 |
379,866 | 26,391,008,482 | IssuesEvent | 2023-01-12 15:40:57 | Qiskit-Extensions/quantum-serverless | https://api.github.com/repos/Qiskit-Extensions/quantum-serverless | closed | Docs: add state to groundstate demo tutorial | documentation good first issue | <!-- ⚠️ If you do not respect this template, your issue will be closed -->
<!-- ⚠️ Make sure to browse the opened and closed issues to confirm this idea does not exist. -->
### What is the expected enhancement?
Docs: add state to groundstate demo tutorial | 1.0 | Docs: add state to groundstate demo tutorial - <!-- ⚠️ If you do not respect this template, your issue will be closed -->
<!-- ⚠️ Make sure to browse the opened and closed issues to confirm this idea does not exist. -->
### What is the expected enhancement?
Docs: add state to groundstate demo tutorial | non_priority | docs add state to groundstate demo tutorial what is the expected enhancement docs add state to groundstate demo tutorial | 0 |
72,635 | 31,768,996,631 | IssuesEvent | 2023-09-12 10:31:24 | gauravrs18/issue_onboarding | https://api.github.com/repos/gauravrs18/issue_onboarding | closed | dev-angular-code-account-services-new-connection-component-activate-component
-consumer-details-component
-activate-component
-first-meter-reading-component | CX-account-services | dev-angular-code-account-services-new-connection-component-activate-component
-consumer-details-component
-activate-component
-first-meter-reading-component | 1.0 | dev-angular-code-account-services-new-connection-component-activate-component
-consumer-details-component
-activate-component
-first-meter-reading-component - dev-angular-code-account-services-new-connection-component-activate-component
-consumer-details-component
-activate-component
-first-meter-reading-component | non_priority | dev angular code account services new connection component activate component consumer details component activate component first meter reading component dev angular code account services new connection component activate component consumer details component activate component first meter reading component | 0 |
93,893 | 11,826,406,993 | IssuesEvent | 2020-03-21 17:43:36 | WorldHealthOrganization/app | https://api.github.com/repos/WorldHealthOrganization/app | closed | v0.1 Illustration Issues | blocked design | Issues raised during Eng/Design flow review:
- The WHO-owned Protect Yourself assets have text baked into the images. [localization and accessibility]
- Current WHO illustrations used in the v0.1 flow may be licensed in a way that is incompatible with our app. [legal]
- We have only CDC and no WHO-approved Check Your Health assets.
- Lack of illustrator resources. | 1.0 | v0.1 Illustration Issues - Issues raised during Eng/Design flow review:
- The WHO-owned Protect Yourself assets have text baked into the images. [localization and accessibility]
- Current WHO illustrations used in the v0.1 flow may be licensed in a way that is incompatible with our app. [legal]
- We have only CDC and no WHO-approved Check Your Health assets.
- Lack of illustrator resources. | non_priority | illustration issues issues raised during eng design flow review the who owned protect yourself assets have text baked into the images current who illustrations used in the flow may be licensed in a way that is incompatible with our app we have only cdc and no who approved check your health assets lack of illustrator resources | 0 |
6,142 | 5,292,281,664 | IssuesEvent | 2017-02-09 01:29:10 | dotnet/roslyn | https://api.github.com/repos/dotnet/roslyn | opened | Small method body cache disabled for deterministic builds | Area-Compilers Bug Tenet-Performance | The small method body cache is non-deterministic in the compiler.
https://github.com/dotnet/roslyn/issues/7595
In order to work around this it is disabled during deterministic builds. This is functional but does result in a slight increase in IL size of the resulting binary. This bug tracks the effort to re-enable the small method body cache during deterministic builds. | True | Small method body cache disabled for deterministic builds - The small method body cache is non-deterministic in the compiler.
https://github.com/dotnet/roslyn/issues/7595
In order to work around this it is disabled during deterministic builds. This is functional but does result in a slight increase in IL size of the resulting binary. This bug tracks the effort to re-enable the small method body cache during deterministic builds. | non_priority | small method body cache disabled for deterministic builds the small method body cache is non deterministic in the compiler in order to work around this it is disabled during deterministic builds this is functional but does result in a slight increase in il size of the resulting binary this bug tracks the effort to re enable the small method body cache during deterministic builds | 0 |
297,211 | 22,344,959,876 | IssuesEvent | 2022-06-15 06:54:42 | Egggggg/Marzipan | https://api.github.com/repos/Egggggg/Marzipan | opened | Expression variables guide | documentation | Expression variables need a guide to explain things like their variables and functions. This should include inline expressions. | 1.0 | Expression variables guide - Expression variables need a guide to explain things like their variables and functions. This should include inline expressions. | non_priority | expression variables guide expression variables need a guide to explain things like their variables and functions this should include inline expressions | 0 |
28,821 | 23,511,880,092 | IssuesEvent | 2022-08-18 17:22:18 | directus/docs | https://api.github.com/repos/directus/docs | opened | Dynamically link GitHub discussions | Infrastructure | For each section in the docs, dynamically link the relevant Github discussion.
| 1.0 | Dynamically link GitHub discussions - For each section in the docs, dynamically link the relevant Github discussion.
| non_priority | dynamically link github discussions for each section in the docs dynamically link the relevant github discussion | 0 |
19,189 | 4,350,648,465 | IssuesEvent | 2016-07-31 11:38:11 | borgbackup/borg | https://api.github.com/repos/borgbackup/borg | closed | document files cache entry age behaviour | documentation | https://github.com/borgbackup/borg/commit/b9952efd68163a909c05cdd3f2a5408e27dd5424 removed information about entry age behaviour.
Create a new FAQ entry and document it (in a better way). | 1.0 | document files cache entry age behaviour - https://github.com/borgbackup/borg/commit/b9952efd68163a909c05cdd3f2a5408e27dd5424 removed information about entry age behaviour.
Create a new FAQ entry and document it (in a better way). | non_priority | document files cache entry age behaviour removed information about entry age behaviour create a new faq entry and document it in a better way | 0 |
377,289 | 26,244,833,346 | IssuesEvent | 2023-01-05 14:29:07 | ethereum/sourcify | https://api.github.com/repos/ethereum/sourcify | opened | Update metadata Solidity docs, add CBOR fields Add playground to Solidity docs and keys used by the compiler | documentation | - [ ] Fix the ordering of the fields in the example given in docs. This does not reflect the compiler's ordering of fields.
- [ ] Add the CBOR fields currently added by the compiler `ipfs`, `experimental` etc...
- [ ] Add a reference to playground.sourcify.dev in the CBOR encoding section | 1.0 | Update metadata Solidity docs, add CBOR fields Add playground to Solidity docs and keys used by the compiler - - [ ] Fix the ordering of the fields in the example given in docs. This does not reflect the compiler's ordering of fields.
- [ ] Add the CBOR fields currently added by the compiler `ipfs`, `experimental` etc...
- [ ] Add a reference to playground.sourcify.dev in the CBOR encoding section | non_priority | update metadata solidity docs add cbor fields add playground to solidity docs and keys used by the compiler fix the ordering of the fields in the example given in docs this does not reflect the compiler s ordering of fields add the cbor fields currently added by the compiler ipfs experimental etc add a reference to playground sourcify dev in the cbor encoding section | 0 |
213,902 | 24,022,532,586 | IssuesEvent | 2022-09-15 08:50:51 | sast-automation-dev/dvna-25 | https://api.github.com/repos/sast-automation-dev/dvna-25 | opened | node-serialize-0.0.4.tgz: 1 vulnerabilities (highest severity is: 9.8) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-serialize-0.0.4.tgz</b></p></summary>
<p>Serialize a object including it's function into a JSON.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz">https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/node-serialize/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/dvna-25/commit/7b2c46f684e2dab7219e5d6193b541bae4a53734">7b2c46f684e2dab7219e5d6193b541bae4a53734</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2017-5941](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-5941) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | node-serialize-0.0.4.tgz | Direct | N/A | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-5941</summary>
### Vulnerable Library - <b>node-serialize-0.0.4.tgz</b></p>
<p>Serialize a object including it's function into a JSON.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz">https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/node-serialize/package.json</p>
<p>
Dependency Hierarchy:
- :x: **node-serialize-0.0.4.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/dvna-25/commit/7b2c46f684e2dab7219e5d6193b541bae4a53734">7b2c46f684e2dab7219e5d6193b541bae4a53734</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
An issue was discovered in the node-serialize package 0.0.4 for Node.js. Untrusted data passed into the unserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE).
<p>Publish Date: 2017-02-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-5941>CVE-2017-5941</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
</details> | True | node-serialize-0.0.4.tgz: 1 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-serialize-0.0.4.tgz</b></p></summary>
<p>Serialize a object including it's function into a JSON.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz">https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/node-serialize/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/dvna-25/commit/7b2c46f684e2dab7219e5d6193b541bae4a53734">7b2c46f684e2dab7219e5d6193b541bae4a53734</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2017-5941](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-5941) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | node-serialize-0.0.4.tgz | Direct | N/A | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-5941</summary>
### Vulnerable Library - <b>node-serialize-0.0.4.tgz</b></p>
<p>Serialize a object including it's function into a JSON.</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz">https://registry.npmjs.org/node-serialize/-/node-serialize-0.0.4.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/node-serialize/package.json</p>
<p>
Dependency Hierarchy:
- :x: **node-serialize-0.0.4.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/dvna-25/commit/7b2c46f684e2dab7219e5d6193b541bae4a53734">7b2c46f684e2dab7219e5d6193b541bae4a53734</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
An issue was discovered in the node-serialize package 0.0.4 for Node.js. Untrusted data passed into the unserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE).
<p>Publish Date: 2017-02-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-5941>CVE-2017-5941</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
</details> | non_priority | node serialize tgz vulnerabilities highest severity is vulnerable library node serialize tgz serialize a object including it s function into a json library home page a href path to dependency file package json path to vulnerable library node modules node serialize package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high node serialize tgz direct n a details cve vulnerable library node serialize tgz serialize a object including it s function into a json library home page a href path to dependency file package json path to vulnerable library node modules node serialize package json dependency hierarchy x node serialize tgz vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in the node serialize package for node js untrusted data passed into the unserialize function can be exploited to achieve arbitrary code execution by passing a javascript object with an immediately invoked function expression iife publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href | 0 |
128,006 | 18,024,860,091 | IssuesEvent | 2021-09-17 02:12:37 | scottstientjes/snipe-it | https://api.github.com/repos/scottstientjes/snipe-it | opened | CVE-2021-3795 (Medium) detected in semver-regex-1.0.0.tgz | security vulnerability | ## CVE-2021-3795 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>semver-regex-1.0.0.tgz</b></p></summary>
<p>Regular expression for matching semver versions</p>
<p>Library home page: <a href="https://registry.npmjs.org/semver-regex/-/semver-regex-1.0.0.tgz">https://registry.npmjs.org/semver-regex/-/semver-regex-1.0.0.tgz</a></p>
<p>Path to dependency file: snipe-it/package.json</p>
<p>Path to vulnerable library: snipe-it/node_modules/semver-regex/package.json</p>
<p>
Dependency Hierarchy:
- laravel-mix-2.1.11.tgz (Root Library)
- img-loader-2.0.1.tgz
- imagemin-gifsicle-5.2.0.tgz
- gifsicle-3.0.4.tgz
- bin-wrapper-3.0.2.tgz
- bin-version-check-2.1.0.tgz
- bin-version-1.0.4.tgz
- find-versions-1.2.1.tgz
- :x: **semver-regex-1.0.0.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
semver-regex is vulnerable to Inefficient Regular Expression Complexity
<p>Publish Date: 2021-09-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3795>CVE-2021-3795</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: N/A
- Attack Complexity: N/A
- Privileges Required: N/A
- User Interaction: N/A
- Scope: N/A
- Impact Metrics:
- Confidentiality Impact: N/A
- Integrity Impact: N/A
- Availability Impact: N/A
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1">https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1</a></p>
<p>Release Date: 2021-09-15</p>
<p>Fix Resolution: semver-regex - 3.1.3,4.0.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-3795 (Medium) detected in semver-regex-1.0.0.tgz - ## CVE-2021-3795 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>semver-regex-1.0.0.tgz</b></p></summary>
<p>Regular expression for matching semver versions</p>
<p>Library home page: <a href="https://registry.npmjs.org/semver-regex/-/semver-regex-1.0.0.tgz">https://registry.npmjs.org/semver-regex/-/semver-regex-1.0.0.tgz</a></p>
<p>Path to dependency file: snipe-it/package.json</p>
<p>Path to vulnerable library: snipe-it/node_modules/semver-regex/package.json</p>
<p>
Dependency Hierarchy:
- laravel-mix-2.1.11.tgz (Root Library)
- img-loader-2.0.1.tgz
- imagemin-gifsicle-5.2.0.tgz
- gifsicle-3.0.4.tgz
- bin-wrapper-3.0.2.tgz
- bin-version-check-2.1.0.tgz
- bin-version-1.0.4.tgz
- find-versions-1.2.1.tgz
- :x: **semver-regex-1.0.0.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
semver-regex is vulnerable to Inefficient Regular Expression Complexity
<p>Publish Date: 2021-09-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3795>CVE-2021-3795</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: N/A
- Attack Complexity: N/A
- Privileges Required: N/A
- User Interaction: N/A
- Scope: N/A
- Impact Metrics:
- Confidentiality Impact: N/A
- Integrity Impact: N/A
- Availability Impact: N/A
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1">https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1</a></p>
<p>Release Date: 2021-09-15</p>
<p>Fix Resolution: semver-regex - 3.1.3,4.0.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in semver regex tgz cve medium severity vulnerability vulnerable library semver regex tgz regular expression for matching semver versions library home page a href path to dependency file snipe it package json path to vulnerable library snipe it node modules semver regex package json dependency hierarchy laravel mix tgz root library img loader tgz imagemin gifsicle tgz gifsicle tgz bin wrapper tgz bin version check tgz bin version tgz find versions tgz x semver regex tgz vulnerable library vulnerability details semver regex is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector n a attack complexity n a privileges required n a user interaction n a scope n a impact metrics confidentiality impact n a integrity impact n a availability impact n a for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution semver regex step up your open source security game with whitesource | 0 |
261,993 | 22,785,114,064 | IssuesEvent | 2022-07-09 05:41:22 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | opened | ccl/streamingccl/streamclient: TestSinklessReplicationClient failed | C-test-failure O-robot branch-release-21.2 | ccl/streamingccl/streamclient.TestSinklessReplicationClient [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=5695581&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=5695581&tab=artifacts#/) on release-21.2 @ [bce163fd3a462bc778405fb371470371d214e758](https://github.com/cockroachdb/cockroach/commits/bce163fd3a462bc778405fb371470371d214e758):
```
=== RUN TestSinklessReplicationClient
test_log_scope.go:79: test logs captured to: /go/src/github.com/cockroachdb/cockroach/artifacts/logTestSinklessReplicationClient078044924
test_log_scope.go:80: use -show-logs to present logs inline
=== CONT TestSinklessReplicationClient
cockroach_sinkless_replication_client_test.go:128: -- test log scope end --
test logs left over in: /go/src/github.com/cockroachdb/cockroach/artifacts/logTestSinklessReplicationClient078044924
--- FAIL: TestSinklessReplicationClient (2.35s)
=== RUN TestSinklessReplicationClient/stream-address-disconnects
replication_helpers.go:145: ran out of rows after processing 1 rows
--- FAIL: TestSinklessReplicationClient/stream-address-disconnects (0.05s)
```
<details><summary>Reproduce</summary>
<p>
To reproduce, try:
```bash
make stressrace TESTS=TestSinklessReplicationClient PKG=./pkg/ccl/streamingccl/streamclient TESTTIMEOUT=5m STRESSFLAGS='-timeout 5m' 2>&1
```
Parameters in this failure:
- GOFLAGS=-json
</p>
</details>
/cc @cockroachdb/cdc pbardea
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestSinklessReplicationClient.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
| 1.0 | ccl/streamingccl/streamclient: TestSinklessReplicationClient failed - ccl/streamingccl/streamclient.TestSinklessReplicationClient [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=5695581&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=5695581&tab=artifacts#/) on release-21.2 @ [bce163fd3a462bc778405fb371470371d214e758](https://github.com/cockroachdb/cockroach/commits/bce163fd3a462bc778405fb371470371d214e758):
```
=== RUN TestSinklessReplicationClient
test_log_scope.go:79: test logs captured to: /go/src/github.com/cockroachdb/cockroach/artifacts/logTestSinklessReplicationClient078044924
test_log_scope.go:80: use -show-logs to present logs inline
=== CONT TestSinklessReplicationClient
cockroach_sinkless_replication_client_test.go:128: -- test log scope end --
test logs left over in: /go/src/github.com/cockroachdb/cockroach/artifacts/logTestSinklessReplicationClient078044924
--- FAIL: TestSinklessReplicationClient (2.35s)
=== RUN TestSinklessReplicationClient/stream-address-disconnects
replication_helpers.go:145: ran out of rows after processing 1 rows
--- FAIL: TestSinklessReplicationClient/stream-address-disconnects (0.05s)
```
<details><summary>Reproduce</summary>
<p>
To reproduce, try:
```bash
make stressrace TESTS=TestSinklessReplicationClient PKG=./pkg/ccl/streamingccl/streamclient TESTTIMEOUT=5m STRESSFLAGS='-timeout 5m' 2>&1
```
Parameters in this failure:
- GOFLAGS=-json
</p>
</details>
/cc @cockroachdb/cdc pbardea
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestSinklessReplicationClient.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
| non_priority | ccl streamingccl streamclient testsinklessreplicationclient failed ccl streamingccl streamclient testsinklessreplicationclient with on release run testsinklessreplicationclient test log scope go test logs captured to go src github com cockroachdb cockroach artifacts test log scope go use show logs to present logs inline cont testsinklessreplicationclient cockroach sinkless replication client test go test log scope end test logs left over in go src github com cockroachdb cockroach artifacts fail testsinklessreplicationclient run testsinklessreplicationclient stream address disconnects replication helpers go ran out of rows after processing rows fail testsinklessreplicationclient stream address disconnects reproduce to reproduce try bash make stressrace tests testsinklessreplicationclient pkg pkg ccl streamingccl streamclient testtimeout stressflags timeout parameters in this failure goflags json cc cockroachdb cdc pbardea | 0 |
39,815 | 8,689,585,275 | IssuesEvent | 2018-12-03 19:06:59 | cosmos/cosmos-sdk | https://api.github.com/repos/cosmos/cosmos-sdk | opened | Store Refactor | code-hygiene core | The `store/` is quite large and the parts are deeply interconnected with each other, so refactoring will be split into three parts:
### 1. Move store types to separate folders #2309
Each store type, such as `rootmultistore.go`, `iavlstore.go`, will be moved into separated folders, for example, `rootmulti/store.go`, `iavl/store.go`. Actual types will be named `Store`, making them exposed and easily accessible from external code - the caller can use `iavl.Store` for example.
We cannot use `KVStore.Gas()` and `KVStore.Prefix()` now, since it causes import cycle between `store/prefix` and `store/gas`. For now we remove those methods and use `gas.NewStore` and `prefix.NewStore` directly.
The dependency of `store` on `types` will be inverted, meaning that `types/store.go`, `types/gas.go`, `types/queryable.go` and part of `types/errors.go` will be moved to `store/types/`, and `types/store.go` will reexport them. But in the first PR, only `types/store.go` and `types/gas.go` will be moved.
WIP on #2985
### 2. Simplify store interfaces
Currently the interfaces in `types/store.go` have multiple layers of embedding which is hard to analyze. The second PR will simplify it to two-layer structure.
```
KVStore CommitStore MultiStore ^
/ \ / \ / \ |
/ \ / \ / \ | embeds
CacheKVStore CommitKVStore CommitMultiStore CacheMultiStore *
```
It will also contain #2824. (Should it also be applied on `gas`?)
Also, instead of using `StoreType`, which is an enum type `rootmulti.Store` switches internally, we associate the `StoreKey` and `KVStore`/`MultiStore` implementation so the multistore can also mount third-party store type (needs discussion).
`StoreKey` will be split into `KVStoreKey` and `MultiStoreKey`, making it typesafe when accessing on substores and to prepare on future recursive multistore implementation.
### 3. Invert dependency
Because some of the error types are used by both `store/*` and the outside, we have to duplicate the error types from `types/` to `store/types/`. This PR will move `types/errors.go` and `types/queryable.go` to `store/types/`.
The primitive version can be found in #2344
| 1.0 | Store Refactor - The `store/` is quite large and the parts are deeply interconnected with each other, so refactoring will be split into three parts:
### 1. Move store types to separate folders #2309
Each store type, such as `rootmultistore.go`, `iavlstore.go`, will be moved into separated folders, for example, `rootmulti/store.go`, `iavl/store.go`. Actual types will be named `Store`, making them exposed and easily accessible from external code - the caller can use `iavl.Store` for example.
We cannot use `KVStore.Gas()` and `KVStore.Prefix()` now, since it causes import cycle between `store/prefix` and `store/gas`. For now we remove those methods and use `gas.NewStore` and `prefix.NewStore` directly.
The dependency of `store` on `types` will be inverted, meaning that `types/store.go`, `types/gas.go`, `types/queryable.go` and part of `types/errors.go` will be moved to `store/types/`, and `types/store.go` will reexport them. But in the first PR, only `types/store.go` and `types/gas.go` will be moved.
WIP on #2985
### 2. Simplify store interfaces
Currently the interfaces in `types/store.go` have multiple layers of embedding which is hard to analyze. The second PR will simplify it to two-layer structure.
```
KVStore CommitStore MultiStore ^
/ \ / \ / \ |
/ \ / \ / \ | embeds
CacheKVStore CommitKVStore CommitMultiStore CacheMultiStore *
```
It will also contain #2824. (Should it also be applied on `gas`?)
Also, instead of using `StoreType`, which is an enum type `rootmulti.Store` switches internally, we associate the `StoreKey` and `KVStore`/`MultiStore` implementation so the multistore can also mount third-party store type (needs discussion).
`StoreKey` will be split into `KVStoreKey` and `MultiStoreKey`, making it typesafe when accessing on substores and to prepare on future recursive multistore implementation.
### 3. Invert dependency
Because some of the error types are used by both `store/*` and the outside, we have to duplicate the error types from `types/` to `store/types/`. This PR will move `types/errors.go` and `types/queryable.go` to `store/types/`.
The primitive version can be found in #2344
| non_priority | store refactor the store is quite large and the parts are deeply interconnected with each other so refactoring will be split into three parts move store types to separate folders each store type such as rootmultistore go iavlstore go will be moved into separated folders for example rootmulti store go iavl store go actual types will be named store making them exposed and easily accessible from external code the caller can use iavl store for example we cannot use kvstore gas and kvstore prefix now since it causes import cycle between store prefix and store gas for now we remove those methods and use gas newstore and prefix newstore directly the dependency of store on types will be inverted meaning that types store go types gas go types queryable go and part of types errors go will be moved to store types and types store go will reexport them but in the first pr only types store go and types gas go will be moved wip on simplify store interfaces currently the interfaces in types store go have multiple layers of embedding which is hard to analyze the second pr will simplify it to two layer structure kvstore commitstore multistore embeds cachekvstore commitkvstore commitmultistore cachemultistore it will also contain should it also be applied on gas also instead of using storetype which is an enum type rootmulti store switches internally we associate the storekey and kvstore multistore implementation so the multistore can also mount third party store type needs discussion storekey will be split into kvstorekey and multistorekey making it typesafe when accessing on substores and to prepare on future recursive multistore implementation invert dependency because some of the error types are used by both store and the outside we have to duplicate the error types from types to store types this pr will move types errors go and types queryable go to store types the primitive version can be found in | 0 |
214,958 | 16,620,033,600 | IssuesEvent | 2021-06-02 22:39:28 | kubernetes/kubernetes | https://api.github.com/repos/kubernetes/kubernetes | closed | [Failing Test][sig-cluster-lifecycle] ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21 | kind/failing-test needs-triage sig/cluster-lifecycle | <!-- Please only use this template for submitting reports about continuously failing tests or jobs in Kubernetes CI -->
#### Which jobs are failing:
[kubeadm-kinder-latest-on-1-21](https://testgrid.k8s.io/sig-release-master-informing#kubeadm-kinder-latest-on-1-21&width=20)
#### Which test(s) are failing:
- ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21
- task-06-e2e-kubeadm
#### Since when has it been failing:
18.05.2021
Failing started with commit e338438b7 after some successful test iterations
#### Testgrid link:
- [Testgrid](https://testgrid.k8s.io/sig-release-master-informing#kubeadm-kinder-latest-on-1-21&width=20)
- [Spyglass on ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21 ](https://prow.k8s.io/view/gs/kubernetes-jenkins/logs/ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21/1397575241361788928)
- [Spyglass on task-06-e2e-kubeadm](https://prow.k8s.io/view/gs/kubernetes-jenkins/logs/ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21/1395245098811265024)
#### Reason for failure:
```
_output/local/go/src/k8s.io/kubernetes/test/e2e_kubeadm/kubeadm_config_test.go:59
Expected
<map[string]string | len:1>: {
"ClusterConfiguration": "apiServer:\n certSANs:\n - localhost\n - 172.17.0.3\n extraArgs:\n authorization-mode: Node,RBAC\n timeoutForControlPlane: 4m0s\napiVersion: kubeadm.k8s.io/v1beta3\ncertificatesDir: /etc/kubernetes/pki\nclusterName: kinder-xony\ncontrolPlaneEndpoint: 172.17.0.7:6443\ncontrollerManager:\n extraArgs:\n enable-hostpath-provisioner: \"true\"\ndns: {}\netcd:\n local:\n dataDir: /var/lib/etcd\nimageRepository: k8s.gcr.io\nkind: ClusterConfiguration\nkubernetesVersion: v1.21.2-rc.0.5+e338438b72e4af\nnetworking:\n dnsDomain: cluster.local\n podSubnet: 192.168.0.0/16\n serviceSubnet: 10.96.0.0/12\nscheduler: {}\n",
}
to have key
<string>: ClusterStatus
_output/local/go/src/k8s.io/kubernetes/test/e2e_kubeadm/kubeadm_config_test.go:63
```
#### Anything else we need to know:
| 1.0 | [Failing Test][sig-cluster-lifecycle] ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21 - <!-- Please only use this template for submitting reports about continuously failing tests or jobs in Kubernetes CI -->
#### Which jobs are failing:
[kubeadm-kinder-latest-on-1-21](https://testgrid.k8s.io/sig-release-master-informing#kubeadm-kinder-latest-on-1-21&width=20)
#### Which test(s) are failing:
- ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21
- task-06-e2e-kubeadm
#### Since when has it been failing:
18.05.2021
Failing started with commit e338438b7 after some successful test iterations
#### Testgrid link:
- [Testgrid](https://testgrid.k8s.io/sig-release-master-informing#kubeadm-kinder-latest-on-1-21&width=20)
- [Spyglass on ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21 ](https://prow.k8s.io/view/gs/kubernetes-jenkins/logs/ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21/1397575241361788928)
- [Spyglass on task-06-e2e-kubeadm](https://prow.k8s.io/view/gs/kubernetes-jenkins/logs/ci-kubernetes-e2e-kubeadm-kinder-latest-on-1-21/1395245098811265024)
#### Reason for failure:
```
_output/local/go/src/k8s.io/kubernetes/test/e2e_kubeadm/kubeadm_config_test.go:59
Expected
<map[string]string | len:1>: {
"ClusterConfiguration": "apiServer:\n certSANs:\n - localhost\n - 172.17.0.3\n extraArgs:\n authorization-mode: Node,RBAC\n timeoutForControlPlane: 4m0s\napiVersion: kubeadm.k8s.io/v1beta3\ncertificatesDir: /etc/kubernetes/pki\nclusterName: kinder-xony\ncontrolPlaneEndpoint: 172.17.0.7:6443\ncontrollerManager:\n extraArgs:\n enable-hostpath-provisioner: \"true\"\ndns: {}\netcd:\n local:\n dataDir: /var/lib/etcd\nimageRepository: k8s.gcr.io\nkind: ClusterConfiguration\nkubernetesVersion: v1.21.2-rc.0.5+e338438b72e4af\nnetworking:\n dnsDomain: cluster.local\n podSubnet: 192.168.0.0/16\n serviceSubnet: 10.96.0.0/12\nscheduler: {}\n",
}
to have key
<string>: ClusterStatus
_output/local/go/src/k8s.io/kubernetes/test/e2e_kubeadm/kubeadm_config_test.go:63
```
#### Anything else we need to know:
| non_priority | ci kubernetes kubeadm kinder latest on which jobs are failing which test s are failing ci kubernetes kubeadm kinder latest on task kubeadm since when has it been failing failing started with commit after some successful test iterations testgrid link reason for failure output local go src io kubernetes test kubeadm kubeadm config test go expected clusterconfiguration apiserver n certsans n localhost n n extraargs n authorization mode node rbac n timeoutforcontrolplane napiversion kubeadm io ncertificatesdir etc kubernetes pki nclustername kinder xony ncontrolplaneendpoint ncontrollermanager n extraargs n enable hostpath provisioner true ndns netcd n local n datadir var lib etcd nimagerepository gcr io nkind clusterconfiguration nkubernetesversion rc nnetworking n dnsdomain cluster local n podsubnet n servicesubnet nscheduler n to have key clusterstatus output local go src io kubernetes test kubeadm kubeadm config test go anything else we need to know | 0 |
346,101 | 24,886,549,622 | IssuesEvent | 2022-10-28 08:17:04 | jsincorporated/ped | https://api.github.com/repos/jsincorporated/ped | opened | Feature list in UG is disorganised | type.DocumentationBug severity.Low | Maybe it is possible to divide the features into categories (appointments, bills, patient features etc)
<!--session: 1666944149785-97cbf685-57d9-45ad-a313-8435d03f2880-->
<!--Version: Web v3.4.4--> | 1.0 | Feature list in UG is disorganised - Maybe it is possible to divide the features into categories (appointments, bills, patient features etc)
<!--session: 1666944149785-97cbf685-57d9-45ad-a313-8435d03f2880-->
<!--Version: Web v3.4.4--> | non_priority | feature list in ug is disorganised maybe it is possible to divide the features into categories appointments bills patient features etc | 0 |
433,283 | 30,321,450,391 | IssuesEvent | 2023-07-10 19:34:48 | ArkhamX2/StudendaUI | https://api.github.com/repos/ArkhamX2/StudendaUI | opened | QA Frontend | bug documentation enhancement | Реализация всех видов тестирования пользовательского интерфейса
Автоматизация тестирования
Составление тест-плана, тест-кейсов, отчёта о тестировании
Прохождение тест-кейсов | 1.0 | QA Frontend - Реализация всех видов тестирования пользовательского интерфейса
Автоматизация тестирования
Составление тест-плана, тест-кейсов, отчёта о тестировании
Прохождение тест-кейсов | non_priority | qa frontend реализация всех видов тестирования пользовательского интерфейса автоматизация тестирования составление тест плана тест кейсов отчёта о тестировании прохождение тест кейсов | 0 |
30,528 | 14,593,571,247 | IssuesEvent | 2020-12-19 23:39:11 | ppy/osu | https://api.github.com/repos/ppy/osu | closed | Changing the volume during gameplay/in the results screen causes lag | area:gameplay type:performance | **Describe the bug:**
Changing the volume with the scroll wheel while in the results screen lags/freezes the game. How much it lags appears to be directly related to the length of the beatmap.
On a 12 second beatmap, there is a spike on the update graph but no noticeable slowdown.
On a 1:27 beatmap, there are major slowdowns.
On a 4 minute beatmap it hangs for seconds after stopping the intense scrolling
**Screenshots or videos showing encountered issue:**
https://www.youtube.com/watch?v=gEq3Ngf18jY
12 second map lag is at 0:44
1 minute 27 second map lag is at 7:22
4 minute map lag is at 5:15
Game settings are at 7:45
**osu!lazer version:**
2019.913.0 | True | Changing the volume during gameplay/in the results screen causes lag - **Describe the bug:**
Changing the volume with the scroll wheel while in the results screen lags/freezes the game. How much it lags appears to be directly related to the length of the beatmap.
On a 12 second beatmap, there is a spike on the update graph but no noticeable slowdown.
On a 1:27 beatmap, there are major slowdowns.
On a 4 minute beatmap it hangs for seconds after stopping the intense scrolling
**Screenshots or videos showing encountered issue:**
https://www.youtube.com/watch?v=gEq3Ngf18jY
12 second map lag is at 0:44
1 minute 27 second map lag is at 7:22
4 minute map lag is at 5:15
Game settings are at 7:45
**osu!lazer version:**
2019.913.0 | non_priority | changing the volume during gameplay in the results screen causes lag describe the bug changing the volume with the scroll wheel while in the results screen lags freezes the game how much it lags appears to be directly related to the length of the beatmap on a second beatmap there is a spike on the update graph but no noticeable slowdown on a beatmap there are major slowdowns on a minute beatmap it hangs for seconds after stopping the intense scrolling screenshots or videos showing encountered issue second map lag is at minute second map lag is at minute map lag is at game settings are at osu lazer version | 0 |
79,157 | 15,159,088,613 | IssuesEvent | 2021-02-12 03:08:19 | heclak/community-a4e-c | https://api.github.com/repos/heclak/community-a4e-c | closed | Compatibility with the new Supercarrier Module? | Code/EFM DCS/Limitation Feature Request | **Is your feature request related to a problem? Please describe.**
No, other than currently it is only compatible with the Stennis, and only under certain circumstances. (according to the guide, anyway, if this is not the case, the guide may need to be updated).
**Describe the solution you'd like**
Can the Skyhawk be made compatible with the new Supercarrier module?
**Describe alternatives you've considered**
Nil
**Additional context**
Currently have issues gettig the plane to sit still on a moving carrier (or should I say, moving with the carrier instead of moving backwards under the carrier, regardless of the orientation on the carrier), and the inability for the system to recognise that the aircraft is able to hook into the catapult despite being in the correct location and direction (unless a runway start is specified).
| 1.0 | Compatibility with the new Supercarrier Module? - **Is your feature request related to a problem? Please describe.**
No, other than currently it is only compatible with the Stennis, and only under certain circumstances. (according to the guide, anyway, if this is not the case, the guide may need to be updated).
**Describe the solution you'd like**
Can the Skyhawk be made compatible with the new Supercarrier module?
**Describe alternatives you've considered**
Nil
**Additional context**
Currently have issues gettig the plane to sit still on a moving carrier (or should I say, moving with the carrier instead of moving backwards under the carrier, regardless of the orientation on the carrier), and the inability for the system to recognise that the aircraft is able to hook into the catapult despite being in the correct location and direction (unless a runway start is specified).
| non_priority | compatibility with the new supercarrier module is your feature request related to a problem please describe no other than currently it is only compatible with the stennis and only under certain circumstances according to the guide anyway if this is not the case the guide may need to be updated describe the solution you d like can the skyhawk be made compatible with the new supercarrier module describe alternatives you ve considered nil additional context currently have issues gettig the plane to sit still on a moving carrier or should i say moving with the carrier instead of moving backwards under the carrier regardless of the orientation on the carrier and the inability for the system to recognise that the aircraft is able to hook into the catapult despite being in the correct location and direction unless a runway start is specified | 0 |
104,545 | 8,974,928,463 | IssuesEvent | 2019-01-30 02:36:57 | nodejs/node | https://api.github.com/repos/nodejs/node | closed | Consistent failure of test-http-client-timeout-option-with-agent | CI / flaky test http test | Every time I run the suite I see this failure:
```
=== release test-http-client-timeout-option-with-agent ===
Path: parallel/test-http-client-timeout-option-with-agent
assert.js:351
throw err;
^
AssertionError [ERR_ASSERTION]: duration 2992ms less than timeout 3000ms
at ClientRequest.req.on.common.mustCall (node/test/parallel/test-http-client-timeout-option-with-agent.js:46:12)
at ClientRequest.<anonymous> (node/test/common/index.js:368:15)
at ClientRequest.emit (events.js:197:13)
at Socket.emitRequestTimeout (_http_client.js:666:40)
at Object.onceWrapper (events.js:285:13)
at Socket.emit (events.js:197:13)
at Socket._onTimeout (net.js:422:8)
at listOnTimeout (timers.js:324:15)
at processTimers (timers.js:268:5)
Command: out/Release/node node/test/parallel/test-http-client-timeout-option-with-agent.js
```
cc @Trott who messed with the timers in this test last | 2.0 | Consistent failure of test-http-client-timeout-option-with-agent - Every time I run the suite I see this failure:
```
=== release test-http-client-timeout-option-with-agent ===
Path: parallel/test-http-client-timeout-option-with-agent
assert.js:351
throw err;
^
AssertionError [ERR_ASSERTION]: duration 2992ms less than timeout 3000ms
at ClientRequest.req.on.common.mustCall (node/test/parallel/test-http-client-timeout-option-with-agent.js:46:12)
at ClientRequest.<anonymous> (node/test/common/index.js:368:15)
at ClientRequest.emit (events.js:197:13)
at Socket.emitRequestTimeout (_http_client.js:666:40)
at Object.onceWrapper (events.js:285:13)
at Socket.emit (events.js:197:13)
at Socket._onTimeout (net.js:422:8)
at listOnTimeout (timers.js:324:15)
at processTimers (timers.js:268:5)
Command: out/Release/node node/test/parallel/test-http-client-timeout-option-with-agent.js
```
cc @Trott who messed with the timers in this test last | non_priority | consistent failure of test http client timeout option with agent every time i run the suite i see this failure release test http client timeout option with agent path parallel test http client timeout option with agent assert js throw err assertionerror duration less than timeout at clientrequest req on common mustcall node test parallel test http client timeout option with agent js at clientrequest node test common index js at clientrequest emit events js at socket emitrequesttimeout http client js at object oncewrapper events js at socket emit events js at socket ontimeout net js at listontimeout timers js at processtimers timers js command out release node node test parallel test http client timeout option with agent js cc trott who messed with the timers in this test last | 0 |
40,775 | 10,577,841,355 | IssuesEvent | 2019-10-07 21:01:51 | google/blockly | https://api.github.com/repos/google/blockly | closed | Build FieldDate as auxiliary .js file | component: build process component: demos component: fields | <!--
- Thanks for opening an issue for us! Before you open an issue,
- please check if a similar issue exists or has been closed before.
-
- If you're asking a question about how to use Blockly in your application,
- please ask questions on the mailing list, instead of filing issues:
- https://groups.google.com/forum/#!forum/blockly
-->
### Problem statement
FieldDate requires significant parts of the closure libraries that are not used by other parts of Blockly. As such, it bloats the library. The solution to date has been to comment out the field in default builds. This has lead to a situation where we are expecting users to modify the code to take advantage of the feature (complicating the process for users to update their version of Blockly).
This current solution has meant we rarely test with FieldDate.
With the new Field registration methods, we can separate FieldDate and its dependencies as a auxiliary library.
### Proposed Solution
* [ ] Update build.py to build field_date.js as it's own `_compressed.js` library.
* [ ] Import this library into the playground and possibly other demos for testing. | 1.0 | Build FieldDate as auxiliary .js file - <!--
- Thanks for opening an issue for us! Before you open an issue,
- please check if a similar issue exists or has been closed before.
-
- If you're asking a question about how to use Blockly in your application,
- please ask questions on the mailing list, instead of filing issues:
- https://groups.google.com/forum/#!forum/blockly
-->
### Problem statement
FieldDate requires significant parts of the closure libraries that are not used by other parts of Blockly. As such, it bloats the library. The solution to date has been to comment out the field in default builds. This has lead to a situation where we are expecting users to modify the code to take advantage of the feature (complicating the process for users to update their version of Blockly).
This current solution has meant we rarely test with FieldDate.
With the new Field registration methods, we can separate FieldDate and its dependencies as a auxiliary library.
### Proposed Solution
* [ ] Update build.py to build field_date.js as it's own `_compressed.js` library.
* [ ] Import this library into the playground and possibly other demos for testing. | non_priority | build fielddate as auxiliary js file thanks for opening an issue for us before you open an issue please check if a similar issue exists or has been closed before if you re asking a question about how to use blockly in your application please ask questions on the mailing list instead of filing issues problem statement fielddate requires significant parts of the closure libraries that are not used by other parts of blockly as such it bloats the library the solution to date has been to comment out the field in default builds this has lead to a situation where we are expecting users to modify the code to take advantage of the feature complicating the process for users to update their version of blockly this current solution has meant we rarely test with fielddate with the new field registration methods we can separate fielddate and its dependencies as a auxiliary library proposed solution update build py to build field date js as it s own compressed js library import this library into the playground and possibly other demos for testing | 0 |
12,520 | 2,702,704,432 | IssuesEvent | 2015-04-06 11:25:20 | hazelcast/hazelcast | https://api.github.com/repos/hazelcast/hazelcast | closed | [TEST-FAILURE] jsr107.tck.CachingTest failures | Team: Core Type: Defect | ```
javax.cache.CacheException: Error opening URI [hazelcast]
at com.hazelcast.cache.impl.AbstractHazelcastCachingProvider.getCacheManager(AbstractHazelcastCachingProvider.java:89)
at com.hazelcast.cache.impl.AbstractHazelcastCachingProvider.getCacheManager(AbstractHazelcastCachingProvider.java:113)
at com.hazelcast.cache.HazelcastCachingProvider.getCacheManager(HazelcastCachingProvider.java:153)
```
https://hazelcast-l337.ci.cloudbees.com/job/JCache-TCK-Client-maintenance/300/
org.jsr107.tck.CachingTest.getCacheManager_URI
org.jsr107.tck.CachingTest.getCacheManager_nullUriParameter
org.jsr107.tck.CachingTest.cachingProviderGetNonExistentCache
org.jsr107.tck.CachingTest.getCacheManager_defaultURI
org.jsr107.tck.CachingTest.getCacheManager_nonNullProperties
org.jsr107.tck.CachingTest.getCacheManager_nullClassLoader
org.jsr107.tck.CachingTest.getCacheManager_singleton
org.jsr107.tck.CachingTest.getCacheNullValueClass
org.jsr107.tck.CachingTest.cachingProviderGetCache
| 1.0 | [TEST-FAILURE] jsr107.tck.CachingTest failures - ```
javax.cache.CacheException: Error opening URI [hazelcast]
at com.hazelcast.cache.impl.AbstractHazelcastCachingProvider.getCacheManager(AbstractHazelcastCachingProvider.java:89)
at com.hazelcast.cache.impl.AbstractHazelcastCachingProvider.getCacheManager(AbstractHazelcastCachingProvider.java:113)
at com.hazelcast.cache.HazelcastCachingProvider.getCacheManager(HazelcastCachingProvider.java:153)
```
https://hazelcast-l337.ci.cloudbees.com/job/JCache-TCK-Client-maintenance/300/
org.jsr107.tck.CachingTest.getCacheManager_URI
org.jsr107.tck.CachingTest.getCacheManager_nullUriParameter
org.jsr107.tck.CachingTest.cachingProviderGetNonExistentCache
org.jsr107.tck.CachingTest.getCacheManager_defaultURI
org.jsr107.tck.CachingTest.getCacheManager_nonNullProperties
org.jsr107.tck.CachingTest.getCacheManager_nullClassLoader
org.jsr107.tck.CachingTest.getCacheManager_singleton
org.jsr107.tck.CachingTest.getCacheNullValueClass
org.jsr107.tck.CachingTest.cachingProviderGetCache
| non_priority | tck cachingtest failures javax cache cacheexception error opening uri at com hazelcast cache impl abstracthazelcastcachingprovider getcachemanager abstracthazelcastcachingprovider java at com hazelcast cache impl abstracthazelcastcachingprovider getcachemanager abstracthazelcastcachingprovider java at com hazelcast cache hazelcastcachingprovider getcachemanager hazelcastcachingprovider java org tck cachingtest getcachemanager uri org tck cachingtest getcachemanager nulluriparameter org tck cachingtest cachingprovidergetnonexistentcache org tck cachingtest getcachemanager defaulturi org tck cachingtest getcachemanager nonnullproperties org tck cachingtest getcachemanager nullclassloader org tck cachingtest getcachemanager singleton org tck cachingtest getcachenullvalueclass org tck cachingtest cachingprovidergetcache | 0 |
109,839 | 23,826,630,567 | IssuesEvent | 2022-09-05 15:23:59 | WordPress/Documentation-Issue-Tracker | https://api.github.com/repos/WordPress/Documentation-Issue-Tracker | closed | Code Reference: More Info for WP_Rewrite links | code reference | ## Issue Description
The More Information section for WP_Rewrite has two links to itself. It looks very similar to the Rewrite API page, but actually has more details (but missing the info about `init` hook), yet it links to the API page in the Codex.
There is also a link to a support article for Pretty Permalinks, but it doesn't link to that section of the article.
## URL of the Page with the Issue
https://developer.wordpress.org/reference/classes/wp_rewrite/
## Section of Page with the issue
More Information
## Why is this a problem?
The developer has to jump around to various pages that look alike but have slightly different information, in order to get everything needed to use the class. None of these pages indicates which parts apply only to the `post` post type.
## Suggested Fix
Unlink the two places where `WP_Rewrite` links to this page.
Change the Rewrite API link from Codex to https://developer.wordpress.org/apis/handbook/rewrite/
Consider mentioning the `init` hook and whether any of the Properties only apply to Posts.
Add the fragment id for the Pretty Permalinks link.
| 1.0 | Code Reference: More Info for WP_Rewrite links - ## Issue Description
The More Information section for WP_Rewrite has two links to itself. It looks very similar to the Rewrite API page, but actually has more details (but missing the info about `init` hook), yet it links to the API page in the Codex.
There is also a link to a support article for Pretty Permalinks, but it doesn't link to that section of the article.
## URL of the Page with the Issue
https://developer.wordpress.org/reference/classes/wp_rewrite/
## Section of Page with the issue
More Information
## Why is this a problem?
The developer has to jump around to various pages that look alike but have slightly different information, in order to get everything needed to use the class. None of these pages indicates which parts apply only to the `post` post type.
## Suggested Fix
Unlink the two places where `WP_Rewrite` links to this page.
Change the Rewrite API link from Codex to https://developer.wordpress.org/apis/handbook/rewrite/
Consider mentioning the `init` hook and whether any of the Properties only apply to Posts.
Add the fragment id for the Pretty Permalinks link.
| non_priority | code reference more info for wp rewrite links issue description the more information section for wp rewrite has two links to itself it looks very similar to the rewrite api page but actually has more details but missing the info about init hook yet it links to the api page in the codex there is also a link to a support article for pretty permalinks but it doesn t link to that section of the article url of the page with the issue section of page with the issue more information why is this a problem the developer has to jump around to various pages that look alike but have slightly different information in order to get everything needed to use the class none of these pages indicates which parts apply only to the post post type suggested fix unlink the two places where wp rewrite links to this page change the rewrite api link from codex to consider mentioning the init hook and whether any of the properties only apply to posts add the fragment id for the pretty permalinks link | 0 |
5,157 | 26,269,262,630 | IssuesEvent | 2023-01-06 15:27:18 | centerofci/mathesar | https://api.github.com/repos/centerofci/mathesar | closed | Support descriptions for tables on the frontend | type: enhancement work: frontend status: ready restricted: maintainers | * This issue is to track the implementation of descriptions for tables on the frontend. | True | Support descriptions for tables on the frontend - * This issue is to track the implementation of descriptions for tables on the frontend. | non_priority | support descriptions for tables on the frontend this issue is to track the implementation of descriptions for tables on the frontend | 0 |
145,752 | 22,773,820,728 | IssuesEvent | 2022-07-08 12:41:00 | EscolaDeSaudePublica/DesignLab | https://api.github.com/repos/EscolaDeSaudePublica/DesignLab | opened | Disponibilizar no ambiente virtual os clusters de todos os problemas | Oficina Design Sem Projeto Definido Prioridade Design: Alta | ## **Objetivo**
**Como** designer
**Quero** Disponibilizar no ambiente virtual os clusters de todos os problemas
**Para** possibilitar a consulta pelos colaboradores da ESP
## **Contexto**
Com o fim do momento presencial da oficina, a etapa de pós-oficina possui entre suas entregas a disponibilização dos achados validados na oficina no ambiente virtual.
## **Escopo**
- [ ] criar na seção de achados da oficina um espaço para apresentar todos os 13 cluster encontrados e validados na oficina | 2.0 | Disponibilizar no ambiente virtual os clusters de todos os problemas - ## **Objetivo**
**Como** designer
**Quero** Disponibilizar no ambiente virtual os clusters de todos os problemas
**Para** possibilitar a consulta pelos colaboradores da ESP
## **Contexto**
Com o fim do momento presencial da oficina, a etapa de pós-oficina possui entre suas entregas a disponibilização dos achados validados na oficina no ambiente virtual.
## **Escopo**
- [ ] criar na seção de achados da oficina um espaço para apresentar todos os 13 cluster encontrados e validados na oficina | non_priority | disponibilizar no ambiente virtual os clusters de todos os problemas objetivo como designer quero disponibilizar no ambiente virtual os clusters de todos os problemas para possibilitar a consulta pelos colaboradores da esp contexto com o fim do momento presencial da oficina a etapa de pós oficina possui entre suas entregas a disponibilização dos achados validados na oficina no ambiente virtual escopo criar na seção de achados da oficina um espaço para apresentar todos os cluster encontrados e validados na oficina | 0 |
70,908 | 15,158,435,669 | IssuesEvent | 2021-02-12 01:09:19 | GooseWSS/node-express-realworld-example-app | https://api.github.com/repos/GooseWSS/node-express-realworld-example-app | opened | CVE-2021-26540 (Medium) detected in sanitize-html-1.18.2.tgz | security vulnerability | ## CVE-2021-26540 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sanitize-html-1.18.2.tgz</b></p></summary>
<p>Clean up user-submitted HTML, preserving whitelisted elements and whitelisted attributes on a per-element basis</p>
<p>Library home page: <a href="https://registry.npmjs.org/sanitize-html/-/sanitize-html-1.18.2.tgz">https://registry.npmjs.org/sanitize-html/-/sanitize-html-1.18.2.tgz</a></p>
<p>Path to dependency file: node-express-realworld-example-app/package.json</p>
<p>Path to vulnerable library: node-express-realworld-example-app/node_modules/sanitize-html/package.json</p>
<p>
Dependency Hierarchy:
- newman-3.10.0.tgz (Root Library)
- postman-collection-3.1.1.tgz
- :x: **sanitize-html-1.18.2.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\\example.com".
<p>Publish Date: 2021-02-08
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-26540>CVE-2021-26540</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26540</a></p>
<p>Release Date: 2021-02-08</p>
<p>Fix Resolution: 2.3.2</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"sanitize-html","packageVersion":"1.18.2","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"newman:3.10.0;postman-collection:3.1.1;sanitize-html:1.18.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.3.2"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-26540","vulnerabilityDetails":"Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the \"allowedIframeHostnames\" option when the \"allowIframeRelativeUrls\" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with \"/\\\\example.com\".","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-26540","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-26540 (Medium) detected in sanitize-html-1.18.2.tgz - ## CVE-2021-26540 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sanitize-html-1.18.2.tgz</b></p></summary>
<p>Clean up user-submitted HTML, preserving whitelisted elements and whitelisted attributes on a per-element basis</p>
<p>Library home page: <a href="https://registry.npmjs.org/sanitize-html/-/sanitize-html-1.18.2.tgz">https://registry.npmjs.org/sanitize-html/-/sanitize-html-1.18.2.tgz</a></p>
<p>Path to dependency file: node-express-realworld-example-app/package.json</p>
<p>Path to vulnerable library: node-express-realworld-example-app/node_modules/sanitize-html/package.json</p>
<p>
Dependency Hierarchy:
- newman-3.10.0.tgz (Root Library)
- postman-collection-3.1.1.tgz
- :x: **sanitize-html-1.18.2.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\\example.com".
<p>Publish Date: 2021-02-08
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-26540>CVE-2021-26540</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26540</a></p>
<p>Release Date: 2021-02-08</p>
<p>Fix Resolution: 2.3.2</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"sanitize-html","packageVersion":"1.18.2","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"newman:3.10.0;postman-collection:3.1.1;sanitize-html:1.18.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.3.2"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-26540","vulnerabilityDetails":"Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the \"allowedIframeHostnames\" option when the \"allowIframeRelativeUrls\" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with \"/\\\\example.com\".","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-26540","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in sanitize html tgz cve medium severity vulnerability vulnerable library sanitize html tgz clean up user submitted html preserving whitelisted elements and whitelisted attributes on a per element basis library home page a href path to dependency file node express realworld example app package json path to vulnerable library node express realworld example app node modules sanitize html package json dependency hierarchy newman tgz root library postman collection tgz x sanitize html tgz vulnerable library found in base branch master vulnerability details apostrophe technologies sanitize html before does not properly validate the hostnames set by the allowediframehostnames option when the allowiframerelativeurls is set to true which allows attackers to bypass hostname whitelist for iframe element related using an src value that starts with example com publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree newman postman collection sanitize html isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails apostrophe technologies sanitize html before does not properly validate the hostnames set by the allowediframehostnames option when the allowiframerelativeurls is set to true which allows attackers to bypass hostname whitelist for iframe element related using an src value that starts with example com vulnerabilityurl | 0 |
162,686 | 12,686,241,948 | IssuesEvent | 2020-06-20 09:42:32 | Oldes/Rebol-issues | https://api.github.com/repos/Oldes/Rebol-issues | closed | Wish: add `enbase/part` and `debase/part` | Oldes.resolved Test.written Type.wish | So one can use these on large input stream without need to additionally `copy/part`.
This:
```rebol
enbase/part "hello" 16 2
```
should be same like:
```rebol
enbase copy/part "hello" 2 16
``` | 1.0 | Wish: add `enbase/part` and `debase/part` - So one can use these on large input stream without need to additionally `copy/part`.
This:
```rebol
enbase/part "hello" 16 2
```
should be same like:
```rebol
enbase copy/part "hello" 2 16
``` | non_priority | wish add enbase part and debase part so one can use these on large input stream without need to additionally copy part this rebol enbase part hello should be same like rebol enbase copy part hello | 0 |
10,794 | 6,922,274,472 | IssuesEvent | 2017-11-30 02:13:05 | spyder-ide/spyder | https://api.github.com/repos/spyder-ide/spyder | closed | Include PyQt5 as pip dependency | tag:Ux-usability type:Enhancement | Dear developers,
I installed Spyder via pip and I noticed that PyQt5 and Matplotlib don't get installed automatically with the ```pip install spyder``` command.
You probably don't want to include to much pip-dependencies into the spyder package but could you include at least one of the PyQts (either 4 or 5)? That would be helpful as Spyder needs one of those to work.
Also I think that matplotlib seems as a pretty useful tool for spyder users, so could you include this as a dependency as well?
Regards,
Jakob
## Version and main components
* Spyder Version: 3.2.4
* Python Version: 3.6.2
* Qt Versions: 5.9.1, PyQt5 5.9 on Linux
## Dependencies
```
pyflakes >=0.6.0 : 1.6.0 (OK)
pycodestyle >=2.3: 2.3.1 (OK)
pygments >=2.0 : 2.2.0 (OK)
pandas >=0.13.1 : None (NOK)
numpy >=1.7 : 1.13.3 (OK)
sphinx >=0.6.6 : 1.6.5 (OK)
rope >=0.9.4 : 0.10.7 (OK)
jedi >=0.9.0 : 0.11.0 (OK)
psutil >=0.3 : 5.4.1 (OK)
nbconvert >=4.0 : 5.3.1 (OK)
sympy >=0.7.3 : None (NOK)
cython >=0.21 : None (NOK)
qtconsole >=4.2.0: 4.3.1 (OK)
IPython >=4.0 : 6.2.1 (OK)
pylint >=0.25 : 1.7.4 (OK)
```
| True | Include PyQt5 as pip dependency - Dear developers,
I installed Spyder via pip and I noticed that PyQt5 and Matplotlib don't get installed automatically with the ```pip install spyder``` command.
You probably don't want to include to much pip-dependencies into the spyder package but could you include at least one of the PyQts (either 4 or 5)? That would be helpful as Spyder needs one of those to work.
Also I think that matplotlib seems as a pretty useful tool for spyder users, so could you include this as a dependency as well?
Regards,
Jakob
## Version and main components
* Spyder Version: 3.2.4
* Python Version: 3.6.2
* Qt Versions: 5.9.1, PyQt5 5.9 on Linux
## Dependencies
```
pyflakes >=0.6.0 : 1.6.0 (OK)
pycodestyle >=2.3: 2.3.1 (OK)
pygments >=2.0 : 2.2.0 (OK)
pandas >=0.13.1 : None (NOK)
numpy >=1.7 : 1.13.3 (OK)
sphinx >=0.6.6 : 1.6.5 (OK)
rope >=0.9.4 : 0.10.7 (OK)
jedi >=0.9.0 : 0.11.0 (OK)
psutil >=0.3 : 5.4.1 (OK)
nbconvert >=4.0 : 5.3.1 (OK)
sympy >=0.7.3 : None (NOK)
cython >=0.21 : None (NOK)
qtconsole >=4.2.0: 4.3.1 (OK)
IPython >=4.0 : 6.2.1 (OK)
pylint >=0.25 : 1.7.4 (OK)
```
| non_priority | include as pip dependency dear developers i installed spyder via pip and i noticed that and matplotlib don t get installed automatically with the pip install spyder command you probably don t want to include to much pip dependencies into the spyder package but could you include at least one of the pyqts either or that would be helpful as spyder needs one of those to work also i think that matplotlib seems as a pretty useful tool for spyder users so could you include this as a dependency as well regards jakob version and main components spyder version python version qt versions on linux dependencies pyflakes ok pycodestyle ok pygments ok pandas none nok numpy ok sphinx ok rope ok jedi ok psutil ok nbconvert ok sympy none nok cython none nok qtconsole ok ipython ok pylint ok | 0 |
178,159 | 14,661,810,741 | IssuesEvent | 2020-12-29 05:12:46 | JackCSheehan/text-game-engine | https://api.github.com/repos/JackCSheehan/text-game-engine | opened | Update pointer comments | documentation | Update comments that reference pointers where pointers are no longer used | 1.0 | Update pointer comments - Update comments that reference pointers where pointers are no longer used | non_priority | update pointer comments update comments that reference pointers where pointers are no longer used | 0 |
304,460 | 26,277,898,139 | IssuesEvent | 2023-01-07 01:26:44 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | opened | sql: TestLogic_testserver_test_22_1_22_2 flaked due to empty conn string (master, x86 build) | C-test-failure T-sql-sessions | See flake[ here](https://teamcity.cockroachdb.com/viewLog.html?buildId=8222053&buildTypeId=Cockroach_BazelEssentialCi).
Stack trace:
```
No pass/skip/fail event found for test
=== RUN TestLogic_testserver_test_22_1_22_2
test_log_scope.go:161: test logs captured to: /artifacts/tmp/_tmp/a0cd2ed7268f1ad03abb8f1d57f5fcc9/logTestLogic_testserver_test_22_1_22_22661895086
test_log_scope.go:79: use -show-logs to present logs inline
panic: empty connection string
goroutine 94 [running]:
github.com/cockroachdb/cockroach-go/v2/testserver.(*testServerImpl).pollListeningURLFile(0xc0002fc900, 0x0)
github.com/cockroachdb/cockroach-go/v2/testserver/external/com_github_cockroachdb_cockroach_go_v2/testserver/testserver.go:722 +0x765
github.com/cockroachdb/cockroach-go/v2/testserver.(*testServerImpl).StartNode.func1()
github.com/cockroachdb/cockroach-go/v2/testserver/external/com_github_cockroachdb_cockroach_go_v2/testserver/testservernode.go:108 +0x2f
created by github.com/cockroachdb/cockroach-go/v2/testserver.(*testServerImpl).StartNode
github.com/cockroachdb/cockroach-go/v2/testserver/external/com_github_cockroachdb_cockroach_go_v2/testserver/testservernode.go:107 +0xcbb
```
| 1.0 | sql: TestLogic_testserver_test_22_1_22_2 flaked due to empty conn string (master, x86 build) - See flake[ here](https://teamcity.cockroachdb.com/viewLog.html?buildId=8222053&buildTypeId=Cockroach_BazelEssentialCi).
Stack trace:
```
No pass/skip/fail event found for test
=== RUN TestLogic_testserver_test_22_1_22_2
test_log_scope.go:161: test logs captured to: /artifacts/tmp/_tmp/a0cd2ed7268f1ad03abb8f1d57f5fcc9/logTestLogic_testserver_test_22_1_22_22661895086
test_log_scope.go:79: use -show-logs to present logs inline
panic: empty connection string
goroutine 94 [running]:
github.com/cockroachdb/cockroach-go/v2/testserver.(*testServerImpl).pollListeningURLFile(0xc0002fc900, 0x0)
github.com/cockroachdb/cockroach-go/v2/testserver/external/com_github_cockroachdb_cockroach_go_v2/testserver/testserver.go:722 +0x765
github.com/cockroachdb/cockroach-go/v2/testserver.(*testServerImpl).StartNode.func1()
github.com/cockroachdb/cockroach-go/v2/testserver/external/com_github_cockroachdb_cockroach_go_v2/testserver/testservernode.go:108 +0x2f
created by github.com/cockroachdb/cockroach-go/v2/testserver.(*testServerImpl).StartNode
github.com/cockroachdb/cockroach-go/v2/testserver/external/com_github_cockroachdb_cockroach_go_v2/testserver/testservernode.go:107 +0xcbb
```
| non_priority | sql testlogic testserver test flaked due to empty conn string master build see flake stack trace no pass skip fail event found for test run testlogic testserver test test log scope go test logs captured to artifacts tmp tmp logtestlogic testserver test test log scope go use show logs to present logs inline panic empty connection string goroutine github com cockroachdb cockroach go testserver testserverimpl polllisteningurlfile github com cockroachdb cockroach go testserver external com github cockroachdb cockroach go testserver testserver go github com cockroachdb cockroach go testserver testserverimpl startnode github com cockroachdb cockroach go testserver external com github cockroachdb cockroach go testserver testservernode go created by github com cockroachdb cockroach go testserver testserverimpl startnode github com cockroachdb cockroach go testserver external com github cockroachdb cockroach go testserver testservernode go | 0 |
279,347 | 30,702,513,478 | IssuesEvent | 2023-07-27 01:36:40 | nidhi7598/linux-3.0.35_CVE-2018-13405 | https://api.github.com/repos/nidhi7598/linux-3.0.35_CVE-2018-13405 | closed | CVE-2023-1838 (High) detected in linux-stable-rtv3.8.6 - autoclosed | Mend: dependency security vulnerability | ## CVE-2023-1838 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/nidhi7598/linux-3.0.35_CVE-2018-13405/commit/662fbf6e1ed61fd353add2f52e2dd27e990364c7">662fbf6e1ed61fd353add2f52e2dd27e990364c7</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.
<p>Publish Date: 2023-04-05
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-1838>CVE-2023-1838</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2023-1838">https://www.linuxkernelcves.com/cves/CVE-2023-1838</a></p>
<p>Release Date: 2023-04-05</p>
<p>Fix Resolution: v4.19.245,v5.4.196,v5.10.118,v5.15.42,v5.17.10,v5.18,v5.18</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2023-1838 (High) detected in linux-stable-rtv3.8.6 - autoclosed - ## CVE-2023-1838 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/nidhi7598/linux-3.0.35_CVE-2018-13405/commit/662fbf6e1ed61fd353add2f52e2dd27e990364c7">662fbf6e1ed61fd353add2f52e2dd27e990364c7</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.
<p>Publish Date: 2023-04-05
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-1838>CVE-2023-1838</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2023-1838">https://www.linuxkernelcves.com/cves/CVE-2023-1838</a></p>
<p>Release Date: 2023-04-05</p>
<p>Fix Resolution: v4.19.245,v5.4.196,v5.10.118,v5.15.42,v5.17.10,v5.18,v5.18</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in linux stable autoclosed cve high severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details a use after free flaw was found in vhost net set backend in drivers vhost net c in virtio network subcomponent in the linux kernel due to a double fget this flaw could allow a local attacker to crash the system and could even lead to a kernel information leak problem publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
278,508 | 24,159,832,473 | IssuesEvent | 2022-09-22 10:41:02 | Kuadrant/testsuite | https://api.github.com/repos/Kuadrant/testsuite | closed | Add Redirect tests | good first issue test-case Kuadrant | https://github.com/Kuadrant/authorino/blob/main/docs/user-guides/deny-with-redirect-to-login.md
Authority can deny unauthorized requests and then redirect them to a different page | 1.0 | Add Redirect tests - https://github.com/Kuadrant/authorino/blob/main/docs/user-guides/deny-with-redirect-to-login.md
Authority can deny unauthorized requests and then redirect them to a different page | non_priority | add redirect tests authority can deny unauthorized requests and then redirect them to a different page | 0 |
37,335 | 18,280,165,639 | IssuesEvent | 2021-10-05 01:30:21 | spack/spack | https://api.github.com/repos/spack/spack | closed | Make Spack's compiler wrapper compatible with dash | performance shell-support | Currently, Spack's compiler wrapper is hardcoded to use `/bin/bash`. However, if we changed this to `/bin/sh` and made things POSIX compliant, systems like Ubuntu that default to `dash` could see ~~vast~~ slight improvements to build times for large, complex packages. If we changed it to `/usr/bin/env sh`, Spack users could install `dash` on other systems and add it to their `PATH`, although I don't know how much `env` will slow down runtimes.
If no one else gets to this, I'll probably experiment with it eventually. I just wanted to make a dedicated issue before I forget.
Related to #4048. Probably depends on #7604. See https://unix.stackexchange.com/questions/148035 for performance comparisons between common shells. | True | Make Spack's compiler wrapper compatible with dash - Currently, Spack's compiler wrapper is hardcoded to use `/bin/bash`. However, if we changed this to `/bin/sh` and made things POSIX compliant, systems like Ubuntu that default to `dash` could see ~~vast~~ slight improvements to build times for large, complex packages. If we changed it to `/usr/bin/env sh`, Spack users could install `dash` on other systems and add it to their `PATH`, although I don't know how much `env` will slow down runtimes.
If no one else gets to this, I'll probably experiment with it eventually. I just wanted to make a dedicated issue before I forget.
Related to #4048. Probably depends on #7604. See https://unix.stackexchange.com/questions/148035 for performance comparisons between common shells. | non_priority | make spack s compiler wrapper compatible with dash currently spack s compiler wrapper is hardcoded to use bin bash however if we changed this to bin sh and made things posix compliant systems like ubuntu that default to dash could see vast slight improvements to build times for large complex packages if we changed it to usr bin env sh spack users could install dash on other systems and add it to their path although i don t know how much env will slow down runtimes if no one else gets to this i ll probably experiment with it eventually i just wanted to make a dedicated issue before i forget related to probably depends on see for performance comparisons between common shells | 0 |
116,937 | 15,027,709,976 | IssuesEvent | 2021-02-02 01:24:04 | grommet/hpe-design-system | https://api.github.com/repos/grommet/hpe-design-system | closed | Tabs in Figma aren't adjusting correctly | bug design |
<img width="727" alt="Screen Shot 2021-01-20 at 1 31 57 PM" src="https://user-images.githubusercontent.com/62117454/105251147-d03a3c00-5b2f-11eb-91c0-e4751954df5e.png">
Diane from CCS team pointed out that when changing the text in tabs, the base underline doesn't stretch proportionally to adjust to the width of the tabs.
Convo: https://hpe.slack.com/archives/C04LMJWQT/p1611178744007600 | 1.0 | Tabs in Figma aren't adjusting correctly -
<img width="727" alt="Screen Shot 2021-01-20 at 1 31 57 PM" src="https://user-images.githubusercontent.com/62117454/105251147-d03a3c00-5b2f-11eb-91c0-e4751954df5e.png">
Diane from CCS team pointed out that when changing the text in tabs, the base underline doesn't stretch proportionally to adjust to the width of the tabs.
Convo: https://hpe.slack.com/archives/C04LMJWQT/p1611178744007600 | non_priority | tabs in figma aren t adjusting correctly img width alt screen shot at pm src diane from ccs team pointed out that when changing the text in tabs the base underline doesn t stretch proportionally to adjust to the width of the tabs convo | 0 |
24,603 | 6,556,340,561 | IssuesEvent | 2017-09-06 13:51:08 | numbbo/coco | https://api.github.com/repos/numbbo/coco | closed | Figures LaTeX templates messed up (matplotlib version 2.0) | Code-Postprocessing | While working on #1171, I realized that the recent changes in matplotlib with its new version 2.0 messed up almost all our figures within the LaTeX templates due to trimming and clipping (the HTML output seems okay). We should definitely check and adjust all templates and the postprocessing accordingly before the next BBOB workshop. | 1.0 | Figures LaTeX templates messed up (matplotlib version 2.0) - While working on #1171, I realized that the recent changes in matplotlib with its new version 2.0 messed up almost all our figures within the LaTeX templates due to trimming and clipping (the HTML output seems okay). We should definitely check and adjust all templates and the postprocessing accordingly before the next BBOB workshop. | non_priority | figures latex templates messed up matplotlib version while working on i realized that the recent changes in matplotlib with its new version messed up almost all our figures within the latex templates due to trimming and clipping the html output seems okay we should definitely check and adjust all templates and the postprocessing accordingly before the next bbob workshop | 0 |
13,613 | 9,008,087,544 | IssuesEvent | 2019-02-05 01:57:10 | apache/cloudstack | https://api.github.com/repos/apache/cloudstack | closed | CloudStack management java.security.ciphers has no effect on JVM process | security | The `/etc/cloudstack/management/java.security.ciphers` has no effect on the list of disabled TLS algorithms in the management server JVM process. For example, on port 8250 TLS1.0, 1.1 are still allowed/supported protocols. (Tested using `openssl s_client -connect localhost:8250 -tls1`)
However, workaround exists to configure `jdk.tls.disabledAlgorithms` in the global security file: `$JRE_HOME/lib/security/java.security`.
##### ISSUE TYPE
<!-- Pick one below and delete the rest -->
* Bug Report
##### COMPONENT NAME
<!--
Categorize the issue, e.g. API, VR, VPN, UI, etc.
-->
~~~
Management Server
~~~
##### CLOUDSTACK VERSION
<!--
New line separated list of affected versions, commit ID for issues on master branch.
-->
~~~
4.11
~~~
##### CONFIGURATION
<!--
Information about the configuration if relevant, e.g. basic network, advanced networking, etc. N/A otherwise
--> | True | CloudStack management java.security.ciphers has no effect on JVM process - The `/etc/cloudstack/management/java.security.ciphers` has no effect on the list of disabled TLS algorithms in the management server JVM process. For example, on port 8250 TLS1.0, 1.1 are still allowed/supported protocols. (Tested using `openssl s_client -connect localhost:8250 -tls1`)
However, workaround exists to configure `jdk.tls.disabledAlgorithms` in the global security file: `$JRE_HOME/lib/security/java.security`.
##### ISSUE TYPE
<!-- Pick one below and delete the rest -->
* Bug Report
##### COMPONENT NAME
<!--
Categorize the issue, e.g. API, VR, VPN, UI, etc.
-->
~~~
Management Server
~~~
##### CLOUDSTACK VERSION
<!--
New line separated list of affected versions, commit ID for issues on master branch.
-->
~~~
4.11
~~~
##### CONFIGURATION
<!--
Information about the configuration if relevant, e.g. basic network, advanced networking, etc. N/A otherwise
--> | non_priority | cloudstack management java security ciphers has no effect on jvm process the etc cloudstack management java security ciphers has no effect on the list of disabled tls algorithms in the management server jvm process for example on port are still allowed supported protocols tested using openssl s client connect localhost however workaround exists to configure jdk tls disabledalgorithms in the global security file jre home lib security java security issue type bug report component name categorize the issue e g api vr vpn ui etc management server cloudstack version new line separated list of affected versions commit id for issues on master branch configuration information about the configuration if relevant e g basic network advanced networking etc n a otherwise | 0 |
716 | 2,570,210,602 | IssuesEvent | 2015-02-10 07:11:26 | retailcoder/Rubberduck | https://api.github.com/repos/retailcoder/Rubberduck | closed | CodePaneExtensions.GetSelection can return an extraneous line | bug code-parsing | This is the real bug behind issue #173 *Extract Method selection is off by one*. It affects much more than just *Extract Method selection*. | 1.0 | CodePaneExtensions.GetSelection can return an extraneous line - This is the real bug behind issue #173 *Extract Method selection is off by one*. It affects much more than just *Extract Method selection*. | non_priority | codepaneextensions getselection can return an extraneous line this is the real bug behind issue extract method selection is off by one it affects much more than just extract method selection | 0 |
31,446 | 11,940,660,330 | IssuesEvent | 2020-04-02 17:05:02 | MicrosoftDocs/microsoft-365-docs | https://api.github.com/repos/MicrosoftDocs/microsoft-365-docs | closed | Missing documentation for MS Roadmap Featured ID: 60407 which is rolling out in production. | security | Missing documentation for MS Roadmap Featured ID: 60407 which is rolling out in production.
Specifically we need the settings here:
Navigate to "Security & Compliance\Threat Management\Policy\User Submissions\"
Setting = "Set up a reporting mailbox"
Setting = "Customize confirmation message"
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: cccec9e6-5bc6-bad8-a174-0f08716f365d
* Version Independent ID: 8f10d2a4-4f84-1d19-8b45-b4fd858a4752
* Content: [What's new in Office 365 Advanced Threat Protection - Office 365](https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/whats-new-in-office-365-atp?view=o365-worldwide&source=docs)
* Content Source: [microsoft-365/security/office-365-security/whats-new-in-office-365-atp.md](https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/security/office-365-security/whats-new-in-office-365-atp.md)
* Service: **o365-seccomp**
* GitHub Login: @denisebmsft
* Microsoft Alias: **deniseb** | True | Missing documentation for MS Roadmap Featured ID: 60407 which is rolling out in production. - Missing documentation for MS Roadmap Featured ID: 60407 which is rolling out in production.
Specifically we need the settings here:
Navigate to "Security & Compliance\Threat Management\Policy\User Submissions\"
Setting = "Set up a reporting mailbox"
Setting = "Customize confirmation message"
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: cccec9e6-5bc6-bad8-a174-0f08716f365d
* Version Independent ID: 8f10d2a4-4f84-1d19-8b45-b4fd858a4752
* Content: [What's new in Office 365 Advanced Threat Protection - Office 365](https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/whats-new-in-office-365-atp?view=o365-worldwide&source=docs)
* Content Source: [microsoft-365/security/office-365-security/whats-new-in-office-365-atp.md](https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/security/office-365-security/whats-new-in-office-365-atp.md)
* Service: **o365-seccomp**
* GitHub Login: @denisebmsft
* Microsoft Alias: **deniseb** | non_priority | missing documentation for ms roadmap featured id which is rolling out in production missing documentation for ms roadmap featured id which is rolling out in production specifically we need the settings here navigate to security compliance threat management policy user submissions setting set up a reporting mailbox setting customize confirmation message document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service seccomp github login denisebmsft microsoft alias deniseb | 0 |
55,999 | 14,889,997,698 | IssuesEvent | 2021-01-20 22:17:26 | STEllAR-GROUP/hpx | https://api.github.com/repos/STEllAR-GROUP/hpx | opened | Lock held while suspending | category: LCOs type: defect | @stevenrbrandt reported a 'lock being held' error in Phylanx here: https://github.com/STEllAR-GROUP/phylanx/issues/1307. | 1.0 | Lock held while suspending - @stevenrbrandt reported a 'lock being held' error in Phylanx here: https://github.com/STEllAR-GROUP/phylanx/issues/1307. | non_priority | lock held while suspending stevenrbrandt reported a lock being held error in phylanx here | 0 |
4,696 | 3,069,273,322 | IssuesEvent | 2015-08-18 19:40:19 | pyro-dragon/Riverwood | https://api.github.com/repos/pyro-dragon/Riverwood | opened | Read game save data- test | Code | A test to see how easy/hard it may be to read saved game data and restore to a saved state. | 1.0 | Read game save data- test - A test to see how easy/hard it may be to read saved game data and restore to a saved state. | non_priority | read game save data test a test to see how easy hard it may be to read saved game data and restore to a saved state | 0 |
123,304 | 12,196,549,039 | IssuesEvent | 2020-04-29 19:16:29 | TE-Temp/docusaurus | https://api.github.com/repos/TE-Temp/docusaurus | opened | Token Engineering 101 | documentation | This is like https://github.com/TE-Temp/docusaurus/issues/5, but with content specifically for the beginning token engineer. It should take about a week of full time study to get through the material, so if they spend 5-10 hours a week on it they can get through it in the course of a semester. If there is more content than that, the least relevant information should be moved to #5!
| 1.0 | Token Engineering 101 - This is like https://github.com/TE-Temp/docusaurus/issues/5, but with content specifically for the beginning token engineer. It should take about a week of full time study to get through the material, so if they spend 5-10 hours a week on it they can get through it in the course of a semester. If there is more content than that, the least relevant information should be moved to #5!
| non_priority | token engineering this is like but with content specifically for the beginning token engineer it should take about a week of full time study to get through the material so if they spend hours a week on it they can get through it in the course of a semester if there is more content than that the least relevant information should be moved to | 0 |
27,176 | 12,520,774,731 | IssuesEvent | 2020-06-03 16:23:26 | cityofaustin/atd-data-tech | https://api.github.com/repos/cityofaustin/atd-data-tech | closed | Size Level of Effort for Citywide HR requests | Product: COVID-19 Time Tracking App Service: Apps Workgroup: HR | Can we scope the feasibility and level of effort to make the following updates to the COVID-19 Time Tracking app?
- To put in a field to require supervisor email, that would then generate and email to the supervisor to notify them that there is a file for review?
- If we were to make it optional for use Citywide and did not use the prefill feature how long would it take to roll out?
- I am including an excel document (waiting for an updated csv with formatting) with fields that would need to be added in yellow and fields to be removed highlighted in blue, are these changes possible? | 1.0 | Size Level of Effort for Citywide HR requests - Can we scope the feasibility and level of effort to make the following updates to the COVID-19 Time Tracking app?
- To put in a field to require supervisor email, that would then generate and email to the supervisor to notify them that there is a file for review?
- If we were to make it optional for use Citywide and did not use the prefill feature how long would it take to roll out?
- I am including an excel document (waiting for an updated csv with formatting) with fields that would need to be added in yellow and fields to be removed highlighted in blue, are these changes possible? | non_priority | size level of effort for citywide hr requests can we scope the feasibility and level of effort to make the following updates to the covid time tracking app to put in a field to require supervisor email that would then generate and email to the supervisor to notify them that there is a file for review if we were to make it optional for use citywide and did not use the prefill feature how long would it take to roll out i am including an excel document waiting for an updated csv with formatting with fields that would need to be added in yellow and fields to be removed highlighted in blue are these changes possible | 0 |
247,133 | 26,688,631,425 | IssuesEvent | 2023-01-27 01:11:32 | Nivaskumark/_beforeCVE-2020-0114-frameworks_base | https://api.github.com/repos/Nivaskumark/_beforeCVE-2020-0114-frameworks_base | opened | CVE-2023-20908 (Medium) detected in baseandroid-10.0.0_r14 | security vulnerability | ## CVE-2023-20908 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>baseandroid-10.0.0_r14</b></p></summary>
<p>
<p>Android framework classes and services</p>
<p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/base>https://android.googlesource.com/platform/frameworks/base</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base/commit/39d22daf6461c11b79a0f843499e30dd2b12ceef">39d22daf6461c11b79a0f843499e30dd2b12ceef</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/SettingsProvider/src/com/android/providers/settings/SettingsState.java</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In several functions of SettingsState.java, there is a possible system crash loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239415861
<p>Publish Date: 2022-11-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-20908>CVE-2023-20908</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://android.googlesource.com/platform/frameworks/base/+/e144b7802e04841a22afcb5100ac46be5e595d82">https://android.googlesource.com/platform/frameworks/base/+/e144b7802e04841a22afcb5100ac46be5e595d82</a></p>
<p>Release Date: 2022-11-04</p>
<p>Fix Resolution: android-13.0.0_r19</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2023-20908 (Medium) detected in baseandroid-10.0.0_r14 - ## CVE-2023-20908 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>baseandroid-10.0.0_r14</b></p></summary>
<p>
<p>Android framework classes and services</p>
<p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/base>https://android.googlesource.com/platform/frameworks/base</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base/commit/39d22daf6461c11b79a0f843499e30dd2b12ceef">39d22daf6461c11b79a0f843499e30dd2b12ceef</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/SettingsProvider/src/com/android/providers/settings/SettingsState.java</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In several functions of SettingsState.java, there is a possible system crash loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239415861
<p>Publish Date: 2022-11-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-20908>CVE-2023-20908</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://android.googlesource.com/platform/frameworks/base/+/e144b7802e04841a22afcb5100ac46be5e595d82">https://android.googlesource.com/platform/frameworks/base/+/e144b7802e04841a22afcb5100ac46be5e595d82</a></p>
<p>Release Date: 2022-11-04</p>
<p>Fix Resolution: android-13.0.0_r19</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in baseandroid cve medium severity vulnerability vulnerable library baseandroid android framework classes and services library home page a href found in head commit a href found in base branch master vulnerable source files settingsprovider src com android providers settings settingsstate java vulnerability details in several functions of settingsstate java there is a possible system crash loop due to resource exhaustion this could lead to local denial of service with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with mend | 0 |
164,339 | 12,798,519,777 | IssuesEvent | 2020-07-02 14:03:05 | elastic/elasticsearch | https://api.github.com/repos/elastic/elasticsearch | closed | Reproducible Failure in IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion | :Distributed/Recovery >test-failure Team:Distributed | Reproduces 100% of the time for me locally on master:
```
REPRODUCE WITH: ./gradlew ':server:test' --tests "org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion" -Dtests.seed=8F7E1836ED070021 -Dtests.security.manager=true -Dtests.locale=nl-BE -Dtests.timezone=Brazil/West -Druntime.java=14
org.elasticsearch.index.shard.IndexShardTests > testRestoreLocalHistoryFromTranslogOnPromotion FAILED
java.lang.AssertionError:
Expected: <12L>
but: was <10L>
at __randomizedtesting.SeedInfo.seed([8F7E1836ED070021:3FB466971CC634D8]:0)
at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18)
at org.junit.Assert.assertThat(Assert.java:956)
at org.junit.Assert.assertThat(Assert.java:923)
at org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion(IndexShardTests.java:1206)
Suite: Test class org.elasticsearch.index.shard.IndexShardTests
1> [2020-06-16T06:07:53,046][INFO ][o.e.i.s.IndexShardTests ] [testRestoreLocalHistoryFromTranslogOnPromotion] before test
1> [2020-06-16T06:07:53,906][INFO ][o.e.i.s.IndexShard ] [org.elasticsearch.index.shard.IndexShardTests] [index][0] detected new primary with primary term [7], global checkpoint [12], max_seq_no [12]
1> [2020-06-16T06:07:53,911][INFO ][o.e.i.s.IndexShardTests ] [testRestoreLocalHistoryFromTranslogOnPromotion] after test
2> REPRODUCE WITH: ./gradlew ':server:test' --tests "org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion" -Dtests.seed=8F7E1836ED070021 -Dtests.security.manager=true -Dtests.locale=nl-BE -Dtests.timezone=Brazil/West -Druntime.java=14
2> java.lang.AssertionError:
Expected: <12L>
but: was <10L>
at __randomizedtesting.SeedInfo.seed([8F7E1836ED070021:3FB466971CC634D8]:0)
at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18)
at org.junit.Assert.assertThat(Assert.java:956)
at org.junit.Assert.assertThat(Assert.java:923)
at org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion(IndexShardTests.java:1206)
2> NOTE: leaving temporary files on disk at: /home/brownbear/src/elasticsearch/server/build/testrun/test/temp/org.elasticsearch.index.shard.IndexShardTests_8F7E1836ED070021-003
2> NOTE: test params are: codec=Asserting(Lucene86): {}, docValues:{}, maxPointsInLeafNode=1049, maxMBSortInHeap=5.637758798428584, sim=Asserting(org.apache.lucene.search.similarities.AssertingSimilarity@251926d5), locale=nl-BE, timezone=Brazil/West
2> NOTE: Linux 5.4.0-37-generic amd64/AdoptOpenJDK 14.0.1 (64-bit)/cpus=16,threads=1,free=491558296,total=536870912
2> NOTE: All tests run in this JVM: [IndexShardTests]
1 test completed, 1 failed
``` | 1.0 | Reproducible Failure in IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion - Reproduces 100% of the time for me locally on master:
```
REPRODUCE WITH: ./gradlew ':server:test' --tests "org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion" -Dtests.seed=8F7E1836ED070021 -Dtests.security.manager=true -Dtests.locale=nl-BE -Dtests.timezone=Brazil/West -Druntime.java=14
org.elasticsearch.index.shard.IndexShardTests > testRestoreLocalHistoryFromTranslogOnPromotion FAILED
java.lang.AssertionError:
Expected: <12L>
but: was <10L>
at __randomizedtesting.SeedInfo.seed([8F7E1836ED070021:3FB466971CC634D8]:0)
at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18)
at org.junit.Assert.assertThat(Assert.java:956)
at org.junit.Assert.assertThat(Assert.java:923)
at org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion(IndexShardTests.java:1206)
Suite: Test class org.elasticsearch.index.shard.IndexShardTests
1> [2020-06-16T06:07:53,046][INFO ][o.e.i.s.IndexShardTests ] [testRestoreLocalHistoryFromTranslogOnPromotion] before test
1> [2020-06-16T06:07:53,906][INFO ][o.e.i.s.IndexShard ] [org.elasticsearch.index.shard.IndexShardTests] [index][0] detected new primary with primary term [7], global checkpoint [12], max_seq_no [12]
1> [2020-06-16T06:07:53,911][INFO ][o.e.i.s.IndexShardTests ] [testRestoreLocalHistoryFromTranslogOnPromotion] after test
2> REPRODUCE WITH: ./gradlew ':server:test' --tests "org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion" -Dtests.seed=8F7E1836ED070021 -Dtests.security.manager=true -Dtests.locale=nl-BE -Dtests.timezone=Brazil/West -Druntime.java=14
2> java.lang.AssertionError:
Expected: <12L>
but: was <10L>
at __randomizedtesting.SeedInfo.seed([8F7E1836ED070021:3FB466971CC634D8]:0)
at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18)
at org.junit.Assert.assertThat(Assert.java:956)
at org.junit.Assert.assertThat(Assert.java:923)
at org.elasticsearch.index.shard.IndexShardTests.testRestoreLocalHistoryFromTranslogOnPromotion(IndexShardTests.java:1206)
2> NOTE: leaving temporary files on disk at: /home/brownbear/src/elasticsearch/server/build/testrun/test/temp/org.elasticsearch.index.shard.IndexShardTests_8F7E1836ED070021-003
2> NOTE: test params are: codec=Asserting(Lucene86): {}, docValues:{}, maxPointsInLeafNode=1049, maxMBSortInHeap=5.637758798428584, sim=Asserting(org.apache.lucene.search.similarities.AssertingSimilarity@251926d5), locale=nl-BE, timezone=Brazil/West
2> NOTE: Linux 5.4.0-37-generic amd64/AdoptOpenJDK 14.0.1 (64-bit)/cpus=16,threads=1,free=491558296,total=536870912
2> NOTE: All tests run in this JVM: [IndexShardTests]
1 test completed, 1 failed
``` | non_priority | reproducible failure in indexshardtests testrestorelocalhistoryfromtranslogonpromotion reproduces of the time for me locally on master reproduce with gradlew server test tests org elasticsearch index shard indexshardtests testrestorelocalhistoryfromtranslogonpromotion dtests seed dtests security manager true dtests locale nl be dtests timezone brazil west druntime java org elasticsearch index shard indexshardtests testrestorelocalhistoryfromtranslogonpromotion failed java lang assertionerror expected but was at randomizedtesting seedinfo seed at org hamcrest matcherassert assertthat matcherassert java at org junit assert assertthat assert java at org junit assert assertthat assert java at org elasticsearch index shard indexshardtests testrestorelocalhistoryfromtranslogonpromotion indexshardtests java suite test class org elasticsearch index shard indexshardtests before test detected new primary with primary term global checkpoint max seq no after test reproduce with gradlew server test tests org elasticsearch index shard indexshardtests testrestorelocalhistoryfromtranslogonpromotion dtests seed dtests security manager true dtests locale nl be dtests timezone brazil west druntime java java lang assertionerror expected but was at randomizedtesting seedinfo seed at org hamcrest matcherassert assertthat matcherassert java at org junit assert assertthat assert java at org junit assert assertthat assert java at org elasticsearch index shard indexshardtests testrestorelocalhistoryfromtranslogonpromotion indexshardtests java note leaving temporary files on disk at home brownbear src elasticsearch server build testrun test temp org elasticsearch index shard indexshardtests note test params are codec asserting docvalues maxpointsinleafnode maxmbsortinheap sim asserting org apache lucene search similarities assertingsimilarity locale nl be timezone brazil west note linux generic adoptopenjdk bit cpus threads free total note all tests run in this jvm test completed failed | 0 |
93,270 | 8,406,858,269 | IssuesEvent | 2018-10-11 19:09:57 | dotnet/roslyn | https://api.github.com/repos/dotnet/roslyn | closed | Handle null descriptor in DiagnosticAnalyzer.SupportedDiagnostics | 4 - In Review Area-Analyzers Bug Integration-Test Tenet-Reliability | Likely cause of intermittent FailFast in integration tests: https://ci.dot.net/job/dotnet_roslyn/job/dev16.0.x/job/windows_debug_vs-integration_prtest/189/artifact/Binaries/Debug/UnitTests/Microsoft.VisualStudio.LanguageServices.IntegrationTests/xUnitResults/Screenshots/Unknown-RemotingException-16.23.36.DotNet.log
```
Description: The application requested process termination through System.Environment.FailFast(string message).
Message: System.NullReferenceException: Object reference not set to an instance of an object.
at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.AnalyzerExecutionContext.ComputeDescriptors(DiagnosticAnalyzer analyzer, AnalyzerExecutor analyzerExecutor)
at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.AnalyzerExecutionContext.GetOrComputeDescriptors(DiagnosticAnalyzer analyzer, AnalyzerExecutor analyzerExecutor)
at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.GetSupportedDiagnosticDescriptors(DiagnosticAnalyzer analyzer, AnalyzerExecutor analyzerExecutor)
at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.IsDiagnosticAnalyzerSuppressed(DiagnosticAnalyzer analyzer, CompilationOptions options, Func`2 isCompilerAnalyzer, AnalyzerExecutor analyzerExecutor)
at Microsoft.CodeAnalysis.Diagnostics.AnalyzerDriver.IsDiagnosticAnalyzerSuppressed(DiagnosticAnalyzer analyzer, CompilationOptions options, AnalyzerManager analyzerManager, AnalyzerExecutor analyzerExecutor)
at Microsoft.CodeAnalysis.Diagnostics.AnalyzerDriver.<GetAnalyzerActionsAsync>d__105.MoveNext()
``` | 1.0 | Handle null descriptor in DiagnosticAnalyzer.SupportedDiagnostics - Likely cause of intermittent FailFast in integration tests: https://ci.dot.net/job/dotnet_roslyn/job/dev16.0.x/job/windows_debug_vs-integration_prtest/189/artifact/Binaries/Debug/UnitTests/Microsoft.VisualStudio.LanguageServices.IntegrationTests/xUnitResults/Screenshots/Unknown-RemotingException-16.23.36.DotNet.log
```
Description: The application requested process termination through System.Environment.FailFast(string message).
Message: System.NullReferenceException: Object reference not set to an instance of an object.
at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.AnalyzerExecutionContext.ComputeDescriptors(DiagnosticAnalyzer analyzer, AnalyzerExecutor analyzerExecutor)
at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.AnalyzerExecutionContext.GetOrComputeDescriptors(DiagnosticAnalyzer analyzer, AnalyzerExecutor analyzerExecutor)
at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.GetSupportedDiagnosticDescriptors(DiagnosticAnalyzer analyzer, AnalyzerExecutor analyzerExecutor)
at Microsoft.CodeAnalysis.Diagnostics.AnalyzerManager.IsDiagnosticAnalyzerSuppressed(DiagnosticAnalyzer analyzer, CompilationOptions options, Func`2 isCompilerAnalyzer, AnalyzerExecutor analyzerExecutor)
at Microsoft.CodeAnalysis.Diagnostics.AnalyzerDriver.IsDiagnosticAnalyzerSuppressed(DiagnosticAnalyzer analyzer, CompilationOptions options, AnalyzerManager analyzerManager, AnalyzerExecutor analyzerExecutor)
at Microsoft.CodeAnalysis.Diagnostics.AnalyzerDriver.<GetAnalyzerActionsAsync>d__105.MoveNext()
``` | non_priority | handle null descriptor in diagnosticanalyzer supporteddiagnostics likely cause of intermittent failfast in integration tests description the application requested process termination through system environment failfast string message message system nullreferenceexception object reference not set to an instance of an object at microsoft codeanalysis diagnostics analyzermanager analyzerexecutioncontext computedescriptors diagnosticanalyzer analyzer analyzerexecutor analyzerexecutor at microsoft codeanalysis diagnostics analyzermanager analyzerexecutioncontext getorcomputedescriptors diagnosticanalyzer analyzer analyzerexecutor analyzerexecutor at microsoft codeanalysis diagnostics analyzermanager getsupporteddiagnosticdescriptors diagnosticanalyzer analyzer analyzerexecutor analyzerexecutor at microsoft codeanalysis diagnostics analyzermanager isdiagnosticanalyzersuppressed diagnosticanalyzer analyzer compilationoptions options func iscompileranalyzer analyzerexecutor analyzerexecutor at microsoft codeanalysis diagnostics analyzerdriver isdiagnosticanalyzersuppressed diagnosticanalyzer analyzer compilationoptions options analyzermanager analyzermanager analyzerexecutor analyzerexecutor at microsoft codeanalysis diagnostics analyzerdriver d movenext | 0 |
205,673 | 16,004,566,122 | IssuesEvent | 2021-04-20 00:17:54 | Azure/azure-sdk-for-rust | https://api.github.com/repos/Azure/azure-sdk-for-rust | closed | crates.io links are outdated | documentation question | "Homepage" and "Repository" link to the old archived repository.
"Documentation" is 404. | 1.0 | crates.io links are outdated - "Homepage" and "Repository" link to the old archived repository.
"Documentation" is 404. | non_priority | crates io links are outdated homepage and repository link to the old archived repository documentation is | 0 |
314,877 | 23,539,305,235 | IssuesEvent | 2022-08-20 05:51:54 | gbowne1/spmssite | https://api.github.com/repos/gbowne1/spmssite | closed | Colors for FontAwesome Social Icons | bug documentation enhancement help wanted good first issue question | ### Prerequisites
- [X] I have read the [Contributing Guidelines](https://github.com/gbowne1/spmssite/blob/main/.github/CONTRIBUTING.md).
- [X] I agree to follow the [Code of Conduct](https://github.com/gbowne1/spmssite/code-of-conduct).
- [X] I have searched for [existing issues](https://github.com/gbowne1/spmssite/issues) that already report this problem, without success.
### Current Behavior
There is no current styling for the social media icons in the footer.
Add the colors from below.
### Expected Behavior
```css
.fa-facebook {
color: #1877f2;
}
.fa-github {
color: #171515;
}
.fa-youtube {
color: #ff0000;
}
.fa-discord {
color: #5865f2;
}
.fa-reddit {
color: #ff4500;
}
.ft-social-list li a :hover {
color: #fff;
}
```
### Steps to Reproduce
Try it :+1: :-) | 1.0 | Colors for FontAwesome Social Icons - ### Prerequisites
- [X] I have read the [Contributing Guidelines](https://github.com/gbowne1/spmssite/blob/main/.github/CONTRIBUTING.md).
- [X] I agree to follow the [Code of Conduct](https://github.com/gbowne1/spmssite/code-of-conduct).
- [X] I have searched for [existing issues](https://github.com/gbowne1/spmssite/issues) that already report this problem, without success.
### Current Behavior
There is no current styling for the social media icons in the footer.
Add the colors from below.
### Expected Behavior
```css
.fa-facebook {
color: #1877f2;
}
.fa-github {
color: #171515;
}
.fa-youtube {
color: #ff0000;
}
.fa-discord {
color: #5865f2;
}
.fa-reddit {
color: #ff4500;
}
.ft-social-list li a :hover {
color: #fff;
}
```
### Steps to Reproduce
Try it :+1: :-) | non_priority | colors for fontawesome social icons prerequisites i have read the i agree to follow the i have searched for that already report this problem without success current behavior there is no current styling for the social media icons in the footer add the colors from below expected behavior css fa facebook color fa github color fa youtube color fa discord color fa reddit color ft social list li a hover color fff steps to reproduce try it | 0 |
242,499 | 18,666,925,210 | IssuesEvent | 2021-10-30 01:29:22 | ThienHi/Python-app-demo | https://api.github.com/repos/ThienHi/Python-app-demo | closed | Automated issue for commit: dc4fd6b07e5ec3ad55d0787f2c291c76d7b42d95 | documentation | This issue was automatically created by the GitHub Action workflow **Django CI**.
The commit hash was: _dc4fd6b07e5ec3ad55d0787f2c291c76d7b42d95_. | 1.0 | Automated issue for commit: dc4fd6b07e5ec3ad55d0787f2c291c76d7b42d95 - This issue was automatically created by the GitHub Action workflow **Django CI**.
The commit hash was: _dc4fd6b07e5ec3ad55d0787f2c291c76d7b42d95_. | non_priority | automated issue for commit this issue was automatically created by the github action workflow django ci the commit hash was | 0 |
275,342 | 20,918,336,991 | IssuesEvent | 2022-03-24 15:12:19 | nexB/aboutcode | https://api.github.com/repos/nexB/aboutcode | opened | Improve how we references issues in commit message and code | documentation | ### Description
Today we use `#12` as a reference to an issue.
When the code is move to another repo, 12 will point to another issue.
We should consider switching to something using full URLs in code comments
and this `Reference: https://github.com/nexB/dejacode/issues/1198` just above the signoff in commits
| 1.0 | Improve how we references issues in commit message and code - ### Description
Today we use `#12` as a reference to an issue.
When the code is move to another repo, 12 will point to another issue.
We should consider switching to something using full URLs in code comments
and this `Reference: https://github.com/nexB/dejacode/issues/1198` just above the signoff in commits
| non_priority | improve how we references issues in commit message and code description today we use as a reference to an issue when the code is move to another repo will point to another issue we should consider switching to something using full urls in code comments and this reference just above the signoff in commits | 0 |
55,084 | 13,962,948,445 | IssuesEvent | 2020-10-25 12:01:32 | gavarasana/spring-petclinic | https://api.github.com/repos/gavarasana/spring-petclinic | opened | CVE-2018-14040 (Medium) detected in bootstrap-3.3.6.jar | security vulnerability | ## CVE-2018-14040 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.3.6.jar</b></p></summary>
<p>WebJar for Bootstrap</p>
<p>Library home page: <a href="http://webjars.org">http://webjars.org</a></p>
<p>Path to dependency file: spring-petclinic/pom.xml</p>
<p>Path to vulnerable library: canner/.m2/repository/org/webjars/bootstrap/3.3.6/bootstrap-3.3.6.jar</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/gavarasana/spring-petclinic/commit/3535fb0922496f23d4915bd9ad24c8d3c8658c09">3535fb0922496f23d4915bd9ad24c8d3c8658c09</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
<p>Publish Date: 2018-07-13
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14040>CVE-2018-14040</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/twbs/bootstrap/pull/26630">https://github.com/twbs/bootstrap/pull/26630</a></p>
<p>Release Date: 2018-07-13</p>
<p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-14040 (Medium) detected in bootstrap-3.3.6.jar - ## CVE-2018-14040 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.3.6.jar</b></p></summary>
<p>WebJar for Bootstrap</p>
<p>Library home page: <a href="http://webjars.org">http://webjars.org</a></p>
<p>Path to dependency file: spring-petclinic/pom.xml</p>
<p>Path to vulnerable library: canner/.m2/repository/org/webjars/bootstrap/3.3.6/bootstrap-3.3.6.jar</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/gavarasana/spring-petclinic/commit/3535fb0922496f23d4915bd9ad24c8d3c8658c09">3535fb0922496f23d4915bd9ad24c8d3c8658c09</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
<p>Publish Date: 2018-07-13
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14040>CVE-2018-14040</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/twbs/bootstrap/pull/26630">https://github.com/twbs/bootstrap/pull/26630</a></p>
<p>Release Date: 2018-07-13</p>
<p>Fix Resolution: org.webjars.npm:bootstrap:4.1.2,org.webjars:bootstrap:3.4.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in bootstrap jar cve medium severity vulnerability vulnerable library bootstrap jar webjar for bootstrap library home page a href path to dependency file spring petclinic pom xml path to vulnerable library canner repository org webjars bootstrap bootstrap jar dependency hierarchy x bootstrap jar vulnerable library found in head commit a href found in base branch main vulnerability details in bootstrap before xss is possible in the collapse data parent attribute publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org webjars npm bootstrap org webjars bootstrap step up your open source security game with whitesource | 0 |
163,262 | 20,327,179,765 | IssuesEvent | 2022-02-18 07:08:45 | dotnet/runtime | https://api.github.com/repos/dotnet/runtime | opened | mark SslProtocols.Tls and SslProtocols.Tls11 as obsolete | area-System.Net.Security breaking-change | We marked `Ssl2`and `Ssl3` as obsolete while ago. With recent push for more secure defaults and behavior and with recent Azure and `CipherSuitePolicy` changes I feel it is time to mark 1.0 and 1.1 as obsolete since industry no long consider them as safe.
cc: @blowdart | True | mark SslProtocols.Tls and SslProtocols.Tls11 as obsolete - We marked `Ssl2`and `Ssl3` as obsolete while ago. With recent push for more secure defaults and behavior and with recent Azure and `CipherSuitePolicy` changes I feel it is time to mark 1.0 and 1.1 as obsolete since industry no long consider them as safe.
cc: @blowdart | non_priority | mark sslprotocols tls and sslprotocols as obsolete we marked and as obsolete while ago with recent push for more secure defaults and behavior and with recent azure and ciphersuitepolicy changes i feel it is time to mark and as obsolete since industry no long consider them as safe cc blowdart | 0 |
859 | 8,434,965,035 | IssuesEvent | 2018-10-17 11:50:16 | DoESLiverpool/somebody-should | https://api.github.com/repos/DoESLiverpool/somebody-should | opened | Doorbots should generate an MQTT message for each one | System: Automation System: Doorbots | The message doesn't need to give names or serial numbers (unless the keyholder wants to). But an MQTT message would allow for some occupancy messages to be made and timing dashboards.
Additionally we'd add in the fresh coffee and fresh water MQTT messages, which could be worked out on the node-red dashboard.
(oh, and we need an tap-out doorbot) | 1.0 | Doorbots should generate an MQTT message for each one - The message doesn't need to give names or serial numbers (unless the keyholder wants to). But an MQTT message would allow for some occupancy messages to be made and timing dashboards.
Additionally we'd add in the fresh coffee and fresh water MQTT messages, which could be worked out on the node-red dashboard.
(oh, and we need an tap-out doorbot) | non_priority | doorbots should generate an mqtt message for each one the message doesn t need to give names or serial numbers unless the keyholder wants to but an mqtt message would allow for some occupancy messages to be made and timing dashboards additionally we d add in the fresh coffee and fresh water mqtt messages which could be worked out on the node red dashboard oh and we need an tap out doorbot | 0 |
153,250 | 19,703,259,382 | IssuesEvent | 2022-01-12 18:51:49 | rorymcentee-p/bitcoin-s | https://api.github.com/repos/rorymcentee-p/bitcoin-s | opened | CVE-2021-22569 (Medium) detected in protobuf-java-3.15.8.jar | security vulnerability | ## CVE-2021-22569 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>protobuf-java-3.15.8.jar</b></p></summary>
<p>Core Protocol Buffers library. Protocol Buffers are a way of encoding structured data in an
efficient yet extensible format.</p>
<p>Library home page: <a href="https://developers.google.com/protocol-buffers/">https://developers.google.com/protocol-buffers/</a></p>
<p>
Dependency Hierarchy:
- bitcoin-s-testkit_2.13-1.7.0-179-1cbe5034-SNAPSHOT (Root Library)
- bitcoin-s-lnd-rpc_2.13-1.7.0-179-1cbe5034-SNAPSHOT
- scalapb-runtime_2.13-0.11.5.jar
- :x: **protobuf-java-3.15.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/rorymcentee-p/bitcoin-s/commit/1cbe5034130b27cd3d6b9769c224667e0871208c">1cbe5034130b27cd3d6b9769c224667e0871208c</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
<p>Publish Date: 2022-01-10
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22569>CVE-2021-22569</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: N/A
- Attack Complexity: N/A
- Privileges Required: N/A
- User Interaction: N/A
- Scope: N/A
- Impact Metrics:
- Confidentiality Impact: N/A
- Integrity Impact: N/A
- Availability Impact: N/A
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-wrvw-hg22-4m67">https://github.com/advisories/GHSA-wrvw-hg22-4m67</a></p>
<p>Release Date: 2022-01-10</p>
<p>Fix Resolution: com.google.protobuf:protobuf-java:3.16.1,3.18.2,3.19.2; com.google.protobuf:protobuf-kotlin:3.18.2,3.19.2; google-protobuf - 3.19.2</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.google.protobuf","packageName":"protobuf-java","packageVersion":"3.15.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"org.bitcoin-s:bitcoin-s-testkit_2.13:1.7.0-179-1cbe5034-SNAPSHOT;org.bitcoin-s:bitcoin-s-lnd-rpc_2.13:1.7.0-179-1cbe5034-SNAPSHOT;com.thesamet.scalapb:scalapb-runtime_2.13:0.11.5;com.google.protobuf:protobuf-java:3.15.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.google.protobuf:protobuf-java:3.16.1,3.18.2,3.19.2; com.google.protobuf:protobuf-kotlin:3.18.2,3.19.2; google-protobuf - 3.19.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-22569","vulnerabilityDetails":"An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22569","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"N/A","AC":"N/A","PR":"N/A","S":"N/A","C":"N/A","UI":"N/A","AV":"N/A","I":"N/A"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-22569 (Medium) detected in protobuf-java-3.15.8.jar - ## CVE-2021-22569 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>protobuf-java-3.15.8.jar</b></p></summary>
<p>Core Protocol Buffers library. Protocol Buffers are a way of encoding structured data in an
efficient yet extensible format.</p>
<p>Library home page: <a href="https://developers.google.com/protocol-buffers/">https://developers.google.com/protocol-buffers/</a></p>
<p>
Dependency Hierarchy:
- bitcoin-s-testkit_2.13-1.7.0-179-1cbe5034-SNAPSHOT (Root Library)
- bitcoin-s-lnd-rpc_2.13-1.7.0-179-1cbe5034-SNAPSHOT
- scalapb-runtime_2.13-0.11.5.jar
- :x: **protobuf-java-3.15.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/rorymcentee-p/bitcoin-s/commit/1cbe5034130b27cd3d6b9769c224667e0871208c">1cbe5034130b27cd3d6b9769c224667e0871208c</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
<p>Publish Date: 2022-01-10
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22569>CVE-2021-22569</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: N/A
- Attack Complexity: N/A
- Privileges Required: N/A
- User Interaction: N/A
- Scope: N/A
- Impact Metrics:
- Confidentiality Impact: N/A
- Integrity Impact: N/A
- Availability Impact: N/A
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-wrvw-hg22-4m67">https://github.com/advisories/GHSA-wrvw-hg22-4m67</a></p>
<p>Release Date: 2022-01-10</p>
<p>Fix Resolution: com.google.protobuf:protobuf-java:3.16.1,3.18.2,3.19.2; com.google.protobuf:protobuf-kotlin:3.18.2,3.19.2; google-protobuf - 3.19.2</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.google.protobuf","packageName":"protobuf-java","packageVersion":"3.15.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"org.bitcoin-s:bitcoin-s-testkit_2.13:1.7.0-179-1cbe5034-SNAPSHOT;org.bitcoin-s:bitcoin-s-lnd-rpc_2.13:1.7.0-179-1cbe5034-SNAPSHOT;com.thesamet.scalapb:scalapb-runtime_2.13:0.11.5;com.google.protobuf:protobuf-java:3.15.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.google.protobuf:protobuf-java:3.16.1,3.18.2,3.19.2; com.google.protobuf:protobuf-kotlin:3.18.2,3.19.2; google-protobuf - 3.19.2","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-22569","vulnerabilityDetails":"An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22569","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"N/A","AC":"N/A","PR":"N/A","S":"N/A","C":"N/A","UI":"N/A","AV":"N/A","I":"N/A"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in protobuf java jar cve medium severity vulnerability vulnerable library protobuf java jar core protocol buffers library protocol buffers are a way of encoding structured data in an efficient yet extensible format library home page a href dependency hierarchy bitcoin s testkit snapshot root library bitcoin s lnd rpc snapshot scalapb runtime jar x protobuf java jar vulnerable library found in head commit a href found in base branch master vulnerability details an issue in protobuf java allowed the interleaving of com google protobuf unknownfieldset fields in such a way that would be processed out of order a small malicious payload can occupy the parser for several minutes by creating large numbers of short lived objects that cause frequent repeated pauses we recommend upgrading libraries beyond the vulnerable versions publish date url a href cvss score details base score metrics exploitability metrics attack vector n a attack complexity n a privileges required n a user interaction n a scope n a impact metrics confidentiality impact n a integrity impact n a availability impact n a for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com google protobuf protobuf java com google protobuf protobuf kotlin google protobuf isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org bitcoin s bitcoin s testkit snapshot org bitcoin s bitcoin s lnd rpc snapshot com thesamet scalapb scalapb runtime com google protobuf protobuf java isminimumfixversionavailable true minimumfixversion com google protobuf protobuf java com google protobuf protobuf kotlin google protobuf isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails an issue in protobuf java allowed the interleaving of com google protobuf unknownfieldset fields in such a way that would be processed out of order a small malicious payload can occupy the parser for several minutes by creating large numbers of short lived objects that cause frequent repeated pauses we recommend upgrading libraries beyond the vulnerable versions vulnerabilityurl | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.