Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1
value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3
values | title stringlengths 1 1k | labels stringlengths 4 1.38k | body stringlengths 1 262k | index stringclasses 16
values | text_combine stringlengths 96 262k | label stringclasses 2
values | text stringlengths 96 252k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
96,377 | 27,827,252,462 | IssuesEvent | 2023-03-19 22:20:43 | gitpod-io/gitpod | https://api.github.com/repos/gitpod-io/gitpod | closed | Project is considered inactive incorrectly | type: bug meta: stale feature: prebuilds | We found a case in which a project is considered inactive, which means prebuilds are not executed when push events are registered. Unfortunately, there were workspaces started for the very same context URL, which means the activity was not detected as expected. There is nothing in the UI what could help our users to identify the situation.
Here are the relevant entries from the database:
```
from d_b_prebuilt_workspace
|id |commit|creationTime |branch|error |projectId |
|1...d|f...a|2022-09-13 17:18:01.549572000|master|Project is inactive. Please start a new workspace for this project to re-enable prebuilds.|3...4|
|e...4|f...a|2022-09-13 17:18:01.544879000|master|Project is inactive. Please start a new workspace for this project to re-enable prebuilds.|3...4|
|1...8|4...4|2022-09-11 15:47:37.477726000|master| |3...4|
|7...d|4...4|2022-09-11 15:47:37.475648000|master| |3...4|
|6...7|8...7|2022-09-10 19:15:00.512667000|master| |3...4|
```
```
from d_b_project_usage
"projectId","lastWebhookReceived","lastWorkspaceStart","deleted","_lastModified"
"3..4","2022-09-13T23:59:36.148Z","2022-09-13T17:33:26.312Z",0,"2022-09-13 23:59:36.153359000"
```
Records from `d_b_workspace` show that there were workspaces created for that repo in recent days, thus prebuilds should have been started as expected.
See the correction from [comment](https://github.com/gitpod-io/gitpod/issues/12952#issuecomment-1247608325).
```
from d_b_workspace
"type","creationTime","id","contextURL"
regular,"2022-09-14T08:18:37.589Z",d...m,https://github.com/d...d/d..v
regular,"2022-09-14T06:52:32.427Z",d...g,https://github.com/d...d/d..v
regular,"2022-09-14T06:48:41.790Z",d...5,https://github.com/d...d/d..v
regular,"2022-09-13T17:33:26.294Z",d...i,https://github.com/d...d/d..v
regular,"2022-09-13T12:28:02.516Z",d...0,https://github.com/d...d/d..v
regular,"2022-09-07T02:34:47.617Z",d...2,https://github.com/d...d/d..v
regular,"2022-09-07T02:32:05.963Z",d...v,https://github.com/d...d/d..v
regular,"2022-09-07T02:12:12.526Z",d...l,https://github.com/d...d/d..v
```
This seems to be the underlying issue for https://github.com/gitpod-io/gitpod/issues/9564
<img src="https://front.com/assets/img/favicons/favicon-32x32.png" height="16" width="16" alt="Front logo" /> [Front conversations](https://app.frontapp.com/open/top_3rsju) | 1.0 | Project is considered inactive incorrectly - We found a case in which a project is considered inactive, which means prebuilds are not executed when push events are registered. Unfortunately, there were workspaces started for the very same context URL, which means the activity was not detected as expected. There is nothing in the UI what could help our users to identify the situation.
Here are the relevant entries from the database:
```
from d_b_prebuilt_workspace
|id |commit|creationTime |branch|error |projectId |
|1...d|f...a|2022-09-13 17:18:01.549572000|master|Project is inactive. Please start a new workspace for this project to re-enable prebuilds.|3...4|
|e...4|f...a|2022-09-13 17:18:01.544879000|master|Project is inactive. Please start a new workspace for this project to re-enable prebuilds.|3...4|
|1...8|4...4|2022-09-11 15:47:37.477726000|master| |3...4|
|7...d|4...4|2022-09-11 15:47:37.475648000|master| |3...4|
|6...7|8...7|2022-09-10 19:15:00.512667000|master| |3...4|
```
```
from d_b_project_usage
"projectId","lastWebhookReceived","lastWorkspaceStart","deleted","_lastModified"
"3..4","2022-09-13T23:59:36.148Z","2022-09-13T17:33:26.312Z",0,"2022-09-13 23:59:36.153359000"
```
Records from `d_b_workspace` show that there were workspaces created for that repo in recent days, thus prebuilds should have been started as expected.
See the correction from [comment](https://github.com/gitpod-io/gitpod/issues/12952#issuecomment-1247608325).
```
from d_b_workspace
"type","creationTime","id","contextURL"
regular,"2022-09-14T08:18:37.589Z",d...m,https://github.com/d...d/d..v
regular,"2022-09-14T06:52:32.427Z",d...g,https://github.com/d...d/d..v
regular,"2022-09-14T06:48:41.790Z",d...5,https://github.com/d...d/d..v
regular,"2022-09-13T17:33:26.294Z",d...i,https://github.com/d...d/d..v
regular,"2022-09-13T12:28:02.516Z",d...0,https://github.com/d...d/d..v
regular,"2022-09-07T02:34:47.617Z",d...2,https://github.com/d...d/d..v
regular,"2022-09-07T02:32:05.963Z",d...v,https://github.com/d...d/d..v
regular,"2022-09-07T02:12:12.526Z",d...l,https://github.com/d...d/d..v
```
This seems to be the underlying issue for https://github.com/gitpod-io/gitpod/issues/9564
<img src="https://front.com/assets/img/favicons/favicon-32x32.png" height="16" width="16" alt="Front logo" /> [Front conversations](https://app.frontapp.com/open/top_3rsju) | non_priority | project is considered inactive incorrectly we found a case in which a project is considered inactive which means prebuilds are not executed when push events are registered unfortunately there were workspaces started for the very same context url which means the activity was not detected as expected there is nothing in the ui what could help our users to identify the situation here are the relevant entries from the database from d b prebuilt workspace id commit creationtime branch error projectid d f a master project is inactive please start a new workspace for this project to re enable prebuilds e f a master project is inactive please start a new workspace for this project to re enable prebuilds master d master master from d b project usage projectid lastwebhookreceived lastworkspacestart deleted lastmodified records from d b workspace show that there were workspaces created for that repo in recent days thus prebuilds should have been started as expected see the correction from from d b workspace type creationtime id contexturl regular d m regular d g regular d regular d i regular d regular d regular d v regular d l this seems to be the underlying issue for | 0 |
49,097 | 13,441,199,242 | IssuesEvent | 2020-09-08 03:22:46 | jamland/samplescope | https://api.github.com/repos/jamland/samplescope | closed | WS-2019-0424 (Medium) detected in elliptic-6.5.1.tgz | security vulnerability | ## WS-2019-0424 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>elliptic-6.5.1.tgz</b></p></summary>
<p>EC cryptography</p>
<p>Library home page: <a href="https://registry.npmjs.org/elliptic/-/elliptic-6.5.1.tgz">https://registry.npmjs.org/elliptic/-/elliptic-6.5.1.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/samplescope/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/samplescope/node_modules/elliptic/package.json</p>
<p>
Dependency Hierarchy:
- plugin-webpack-6.0.0-beta.45.tgz (Root Library)
- webpack-4.43.0.tgz
- node-libs-browser-2.2.1.tgz
- crypto-browserify-3.12.0.tgz
- browserify-sign-4.0.4.tgz
- :x: **elliptic-6.5.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jamland/samplescope/commit/03d3c6f89da96960d9f3adeb74c452bac51908da">03d3c6f89da96960d9f3adeb74c452bac51908da</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
all versions of elliptic are vulnerable to Timing Attack through side-channels.
<p>Publish Date: 2019-11-13
<p>URL: <a href=https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a>WS-2019-0424</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Adjacent
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2019-0424 (Medium) detected in elliptic-6.5.1.tgz - ## WS-2019-0424 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>elliptic-6.5.1.tgz</b></p></summary>
<p>EC cryptography</p>
<p>Library home page: <a href="https://registry.npmjs.org/elliptic/-/elliptic-6.5.1.tgz">https://registry.npmjs.org/elliptic/-/elliptic-6.5.1.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/samplescope/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/samplescope/node_modules/elliptic/package.json</p>
<p>
Dependency Hierarchy:
- plugin-webpack-6.0.0-beta.45.tgz (Root Library)
- webpack-4.43.0.tgz
- node-libs-browser-2.2.1.tgz
- crypto-browserify-3.12.0.tgz
- browserify-sign-4.0.4.tgz
- :x: **elliptic-6.5.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jamland/samplescope/commit/03d3c6f89da96960d9f3adeb74c452bac51908da">03d3c6f89da96960d9f3adeb74c452bac51908da</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
all versions of elliptic are vulnerable to Timing Attack through side-channels.
<p>Publish Date: 2019-11-13
<p>URL: <a href=https://github.com/indutny/elliptic/commit/ec735edde187a43693197f6fa3667ceade751a3a>WS-2019-0424</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Adjacent
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws medium detected in elliptic tgz ws medium severity vulnerability vulnerable library elliptic tgz ec cryptography library home page a href path to dependency file tmp ws scm samplescope package json path to vulnerable library tmp ws scm samplescope node modules elliptic package json dependency hierarchy plugin webpack beta tgz root library webpack tgz node libs browser tgz crypto browserify tgz browserify sign tgz x elliptic tgz vulnerable library found in head commit a href vulnerability details all versions of elliptic are vulnerable to timing attack through side channels publish date url a href cvss score details base score metrics exploitability metrics attack vector adjacent attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact high availability impact none for more information on scores click a href step up your open source security game with whitesource | 0 |
165,566 | 12,865,492,069 | IssuesEvent | 2020-07-10 00:29:34 | commaai/openpilot | https://api.github.com/repos/commaai/openpilot | closed | Add boardd loopback test | new test | Add test that send messages to boardd using the `can` socket, and verifies that the same messages actually get send out and come back on `sendcan` with bus + 128.
Example bug this would catch, a conflate in boardd that causes it to drop messages. | 1.0 | Add boardd loopback test - Add test that send messages to boardd using the `can` socket, and verifies that the same messages actually get send out and come back on `sendcan` with bus + 128.
Example bug this would catch, a conflate in boardd that causes it to drop messages. | non_priority | add boardd loopback test add test that send messages to boardd using the can socket and verifies that the same messages actually get send out and come back on sendcan with bus example bug this would catch a conflate in boardd that causes it to drop messages | 0 |
614,842 | 19,190,723,744 | IssuesEvent | 2021-12-05 23:20:31 | ondryaso/kachna-online | https://api.github.com/repos/ondryaso/kachna-online | opened | Push notifications for events | enhancement backend frontend comp-events low-priority | Users could also make a subscription to get notifications about newly planned events. | 1.0 | Push notifications for events - Users could also make a subscription to get notifications about newly planned events. | priority | push notifications for events users could also make a subscription to get notifications about newly planned events | 1 |
543,562 | 15,883,599,534 | IssuesEvent | 2021-04-09 17:37:15 | AY2021S2-CS2103T-W10-2/tp | https://api.github.com/repos/AY2021S2-CS2103T-W10-2/tp | closed | [PE-D] Unsure of what my current "list" filter is | priority.Medium severity.Low type.Chore | By executing this command,


It is slightly difficult to find out what the current list filter is in place or was executed. Hence if I want to go up a level or recall what other filters I want to apply to list, I would have to do "list" and restart the process.
There was clear documentation of this feature however, it may be a good idea to indicate what filters have been applied for "list".
PS: Perhaps consider moving the note on "list", that other commands like "find" will only apply to that particular "list", into a more prominent section.
e.g:

<!--session: 1617429915572-7ea4bbe5-9f37-4e7b-97d5-95926028d84a-->
-------------
Labels: `severity.Medium` `type.FeatureFlaw`
original: justgnohUG/ped#3 | 1.0 | [PE-D] Unsure of what my current "list" filter is - By executing this command,


It is slightly difficult to find out what the current list filter is in place or was executed. Hence if I want to go up a level or recall what other filters I want to apply to list, I would have to do "list" and restart the process.
There was clear documentation of this feature however, it may be a good idea to indicate what filters have been applied for "list".
PS: Perhaps consider moving the note on "list", that other commands like "find" will only apply to that particular "list", into a more prominent section.
e.g:

<!--session: 1617429915572-7ea4bbe5-9f37-4e7b-97d5-95926028d84a-->
-------------
Labels: `severity.Medium` `type.FeatureFlaw`
original: justgnohUG/ped#3 | priority | unsure of what my current list filter is by executing this command it is slightly difficult to find out what the current list filter is in place or was executed hence if i want to go up a level or recall what other filters i want to apply to list i would have to do list and restart the process there was clear documentation of this feature however it may be a good idea to indicate what filters have been applied for list ps perhaps consider moving the note on list that other commands like find will only apply to that particular list into a more prominent section e g labels severity medium type featureflaw original justgnohug ped | 1 |
767,071 | 26,909,894,216 | IssuesEvent | 2023-02-06 22:28:22 | dexidp/dex | https://api.github.com/repos/dexidp/dex | closed | examples/k8s: use ingress to route traffic to dex | area/distribution priority/P2 | For real clusters, dex won't be exposed directly to the outside, it'll go through some sort of ingress controller. Make the example manifests do this. This also creates a cleaner point of customization, allowing users to re-purpose the examples by switching out the ingress for whatever their setup is.
Related to #682
Need to chat with @dghubble about possible setups. | 1.0 | examples/k8s: use ingress to route traffic to dex - For real clusters, dex won't be exposed directly to the outside, it'll go through some sort of ingress controller. Make the example manifests do this. This also creates a cleaner point of customization, allowing users to re-purpose the examples by switching out the ingress for whatever their setup is.
Related to #682
Need to chat with @dghubble about possible setups. | priority | examples use ingress to route traffic to dex for real clusters dex won t be exposed directly to the outside it ll go through some sort of ingress controller make the example manifests do this this also creates a cleaner point of customization allowing users to re purpose the examples by switching out the ingress for whatever their setup is related to need to chat with dghubble about possible setups | 1 |
607,416 | 18,782,153,747 | IssuesEvent | 2021-11-08 08:16:55 | magento/magento2 | https://api.github.com/repos/magento/magento2 | opened | [Issue] Add loading lazy for also for ko templates | Component: Catalog Priority: P2 Severity: S2 | This issue is automatically created based on existing pull request: magento/magento2#34558: Add loading lazy for also for ko templates
---------
<!---
Thank you for contributing to Magento.
To help us process this pull request we recommend that you add the following information:
- Summary of the pull request,
- Issue(s) related to the changes made,
- Manual testing scenarios
Fields marked with (*) are required. Please don't remove the template.
-->
<!--- Please provide a general summary of the Pull Request in the Title above -->
### Description (*)
<!---
Please provide a description of the changes proposed in the pull request.
Letting us know what has changed and why it needed changing will help us validate this pull request.
-->
### Related Pull Requests
<!-- related pull request placeholder -->
### Fixed Issues (if relevant)
<!---
If relevant, please provide a list of fixed issues in the format magento/magento2#<issue_number>.
There could be 1 or more issues linked here and it will help us find some more information about the reasoning behind this change.
-->
1. Fixes magento/magento2#<issue_number>
### Manual testing scenarios (*)
<!---
Please provide a set of unambiguous steps to test the proposed code change.
Giving us manual testing scenarios will help with the processing and validation process.
-->
1. ...
2. ...
### Questions or comments
<!---
If relevant, here you can ask questions or provide comments on your pull request for the reviewer
For example if you need assistance with writing tests or would like some feedback on one of your development ideas
-->
### Contribution checklist (*)
- [ ] Pull request has a meaningful description of its purpose
- [ ] All commits are accompanied by meaningful commit messages
- [ ] All new or changed code is covered with unit/integration tests (if applicable)
- [ ] README.md files for modified modules are updated and included in the pull request if any [README.md predefined sections](https://github.com/magento/devdocs/wiki/Magento-module-README.md) require an update
- [ ] All automated tests passed successfully (all builds are green)
| 1.0 | [Issue] Add loading lazy for also for ko templates - This issue is automatically created based on existing pull request: magento/magento2#34558: Add loading lazy for also for ko templates
---------
<!---
Thank you for contributing to Magento.
To help us process this pull request we recommend that you add the following information:
- Summary of the pull request,
- Issue(s) related to the changes made,
- Manual testing scenarios
Fields marked with (*) are required. Please don't remove the template.
-->
<!--- Please provide a general summary of the Pull Request in the Title above -->
### Description (*)
<!---
Please provide a description of the changes proposed in the pull request.
Letting us know what has changed and why it needed changing will help us validate this pull request.
-->
### Related Pull Requests
<!-- related pull request placeholder -->
### Fixed Issues (if relevant)
<!---
If relevant, please provide a list of fixed issues in the format magento/magento2#<issue_number>.
There could be 1 or more issues linked here and it will help us find some more information about the reasoning behind this change.
-->
1. Fixes magento/magento2#<issue_number>
### Manual testing scenarios (*)
<!---
Please provide a set of unambiguous steps to test the proposed code change.
Giving us manual testing scenarios will help with the processing and validation process.
-->
1. ...
2. ...
### Questions or comments
<!---
If relevant, here you can ask questions or provide comments on your pull request for the reviewer
For example if you need assistance with writing tests or would like some feedback on one of your development ideas
-->
### Contribution checklist (*)
- [ ] Pull request has a meaningful description of its purpose
- [ ] All commits are accompanied by meaningful commit messages
- [ ] All new or changed code is covered with unit/integration tests (if applicable)
- [ ] README.md files for modified modules are updated and included in the pull request if any [README.md predefined sections](https://github.com/magento/devdocs/wiki/Magento-module-README.md) require an update
- [ ] All automated tests passed successfully (all builds are green)
| priority | add loading lazy for also for ko templates this issue is automatically created based on existing pull request magento add loading lazy for also for ko templates thank you for contributing to magento to help us process this pull request we recommend that you add the following information summary of the pull request issue s related to the changes made manual testing scenarios fields marked with are required please don t remove the template description please provide a description of the changes proposed in the pull request letting us know what has changed and why it needed changing will help us validate this pull request related pull requests fixed issues if relevant if relevant please provide a list of fixed issues in the format magento there could be or more issues linked here and it will help us find some more information about the reasoning behind this change fixes magento manual testing scenarios please provide a set of unambiguous steps to test the proposed code change giving us manual testing scenarios will help with the processing and validation process questions or comments if relevant here you can ask questions or provide comments on your pull request for the reviewer for example if you need assistance with writing tests or would like some feedback on one of your development ideas contribution checklist pull request has a meaningful description of its purpose all commits are accompanied by meaningful commit messages all new or changed code is covered with unit integration tests if applicable readme md files for modified modules are updated and included in the pull request if any require an update all automated tests passed successfully all builds are green | 1 |
57,360 | 7,051,555,177 | IssuesEvent | 2018-01-03 12:21:01 | dhbw-timetable/rablabla | https://api.github.com/repos/dhbw-timetable/rablabla | closed | Multi week event cache | bug design enhancement frontend | Currently the cached events are displayed all the time, no matter which date you pick. Events should be cached in the future. If there is no data available for the selected week, there should be an error (empty calendar is misleading). | 1.0 | Multi week event cache - Currently the cached events are displayed all the time, no matter which date you pick. Events should be cached in the future. If there is no data available for the selected week, there should be an error (empty calendar is misleading). | non_priority | multi week event cache currently the cached events are displayed all the time no matter which date you pick events should be cached in the future if there is no data available for the selected week there should be an error empty calendar is misleading | 0 |
237,013 | 7,754,798,015 | IssuesEvent | 2018-05-31 08:06:54 | pootlepress/caxton | https://api.github.com/repos/pootlepress/caxton | closed | Could we improve the mobile settings? | Priority | It's a little hard choose the size without seeing the preview | 1.0 | Could we improve the mobile settings? - It's a little hard choose the size without seeing the preview | priority | could we improve the mobile settings it s a little hard choose the size without seeing the preview | 1 |
79,054 | 15,110,093,346 | IssuesEvent | 2021-02-08 18:44:20 | joomla/joomla-cms | https://api.github.com/repos/joomla/joomla-cms | closed | Template only in BS5 for Joomla 4 | No Code Attached Yet | Hello, I am looking to make a template for the Joomla community. Only in bootstrap 5 and in the format of the examples on the bootstrap site.
I'm looking for documentation to make this template with Joomla 4, but also so that there is an admin part that manages the colors and layout format in the three areas independently (header, content, bottom).

| 1.0 | Template only in BS5 for Joomla 4 - Hello, I am looking to make a template for the Joomla community. Only in bootstrap 5 and in the format of the examples on the bootstrap site.
I'm looking for documentation to make this template with Joomla 4, but also so that there is an admin part that manages the colors and layout format in the three areas independently (header, content, bottom).

| non_priority | template only in for joomla hello i am looking to make a template for the joomla community only in bootstrap and in the format of the examples on the bootstrap site i m looking for documentation to make this template with joomla but also so that there is an admin part that manages the colors and layout format in the three areas independently header content bottom | 0 |
671,397 | 22,760,080,896 | IssuesEvent | 2022-07-07 20:14:09 | HowSuen/GoalMe | https://api.github.com/repos/HowSuen/GoalMe | closed | Issue where "Completed Goals" graph in Progress Checker causes error and perpetual alert prompts. | bug priority.High | Completing a goal and navigating to the graph would cause alert message with the following error: "undefined is not an object (evaluating 'd.filter(function (o) ..." | 1.0 | Issue where "Completed Goals" graph in Progress Checker causes error and perpetual alert prompts. - Completing a goal and navigating to the graph would cause alert message with the following error: "undefined is not an object (evaluating 'd.filter(function (o) ..." | priority | issue where completed goals graph in progress checker causes error and perpetual alert prompts completing a goal and navigating to the graph would cause alert message with the following error undefined is not an object evaluating d filter function o | 1 |
15,659 | 3,970,375,213 | IssuesEvent | 2016-05-04 06:53:01 | spring-cloud/spring-cloud-netflix | https://api.github.com/repos/spring-cloud/spring-cloud-netflix | closed | Question : Feign Client Retry every 5 seconds | documentation question | I'm Using Brixton.RC1 and since I moved to there from M5 I have an issue with my feign client that always retry after 5 seconds. It was not there in Brixton.M5.
Is something changed?
I tried to put
ribbon.ReadTimeOut=60000
ribbon.ConnectTimeOut=60000
but I have the impression that all of that is ignored by my code.
Someone can tell me what is wrong?
Thanks in advance | 1.0 | Question : Feign Client Retry every 5 seconds - I'm Using Brixton.RC1 and since I moved to there from M5 I have an issue with my feign client that always retry after 5 seconds. It was not there in Brixton.M5.
Is something changed?
I tried to put
ribbon.ReadTimeOut=60000
ribbon.ConnectTimeOut=60000
but I have the impression that all of that is ignored by my code.
Someone can tell me what is wrong?
Thanks in advance | non_priority | question feign client retry every seconds i m using brixton and since i moved to there from i have an issue with my feign client that always retry after seconds it was not there in brixton is something changed i tried to put ribbon readtimeout ribbon connecttimeout but i have the impression that all of that is ignored by my code someone can tell me what is wrong thanks in advance | 0 |
293,493 | 22,060,294,292 | IssuesEvent | 2022-05-30 16:50:31 | Xpra-org/xpra-html5 | https://api.github.com/repos/Xpra-org/xpra-html5 | closed | Setup troubles | bug documentation invalid | I'm having trouble setting up my environment for xpra-html5 development.
1. I seemingly successfully installed xpra, which comes with an older/different version of xpra-html5.
2. I seemingly successfully updated xpra-html5 by running `sudo ./setup.py install`, even though I got a lot of errors/warnings (probably similar to the ones below). I noticed that the desktop background image in the xpra session changed to the cat, which I assumed indicated a version bump.
3. I changed the source code in the repo and re-ran `sudo ./setup.py install` (again with lots of errors/warnings), but I didn't see any change in the website (i.e. no error in the browser console when I added a `console.error` to the page's source).
4. I tried debugging my setup by uninstalling and reinstalling xpra a few times, and now I have an even more broken setup that won't connect to the server at all.
Help! 😆
Here is the latest path I took in my mostly-default Ubuntu 20.04 environment (consecutive commands, complete output, just split into multiple single-command snippets for readability):
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ sudo wget -O "/usr/share/keyrings/xpra-2022.gpg" https://xpra.org/xpra-2022.gpg
--2022-05-29 21:29:20-- https://xpra.org/xpra-2022.gpg
Resolving xpra.org (xpra.org)... 78.129.163.65
Connecting to xpra.org (xpra.org)|78.129.163.65|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 7533 (7.4K)
Saving to: â/usr/share/keyrings/xpra-2022.gpgâ
/usr/share/keyrings/xpra-2022 100%[==============================================>] 7.36K --.-KB/s in 0s
2022-05-29 21:29:20 (852 MB/s) - â/usr/share/keyrings/xpra-2022.gpgâ saved [7533/7533]
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$
```
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ (
> cd /etc/apt/sources.list.d
> sudo wget https://xpra.org/repos/focal/xpra.list
> )
--2022-05-29 21:29:56-- https://xpra.org/repos/focal/xpra.list
Resolving xpra.org (xpra.org)... 78.129.163.65
Connecting to xpra.org (xpra.org)|78.129.163.65|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 33
Saving to: âxpra.list.1â
xpra.list.1 100%[==============================================>] 33 --.-KB/s in 0s
2022-05-29 21:29:57 (5.28 MB/s) - âxpra.list.1â saved [33/33]
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$
```
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ sudo apt update
Hit:1 https://packages.cloud.google.com/apt cloud-sdk InRelease
Hit:2 https://deb.nodesource.com/node_16.x focal InRelease
Hit:3 https://dl.google.com/linux/chrome/deb stable InRelease
Hit:4 http://packages.microsoft.com/repos/code stable InRelease
Hit:5 http://archive.ubuntu.com/ubuntu focal InRelease
Get:6 http://security.ubuntu.com/ubuntu focal-security InRelease [114 kB]
Get:7 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB]
Get:8 https://xpra.org focal InRelease [5,925 B]
Get:9 http://archive.ubuntu.com/ubuntu focal-backports InRelease [108 kB]
Err:8 https://xpra.org focal InRelease
The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 18ADB31CF18AD6BB
Reading package lists... Done
N: Ignoring file 'xpra.list.1' in directory '/etc/apt/sources.list.d/' as it has an invalid filename extension
W: GPG error: https://xpra.org focal InRelease: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 18ADB31CF18AD6BB
E: The repository 'https://xpra.org focal InRelease' is not signed.
N: Updating from such a repository can't be done securely, and is therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user configuration details.
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$
```
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ sudo apt install -y xpra
Reading package lists... Done
Building dependency tree
Reading state information... Done
Suggested packages:
openssh-server python3-pyopencl python3-gst-1.0 python3-netifaces cups-pdf python3-opencv python3-pyinotify
v4l2loopback-dkms python3-yaml python3-uinput
The following NEW packages will be installed:
xpra
0 upgraded, 1 newly installed, 0 to remove and 3 not upgraded.
Need to get 2,531 kB of archives.
After this operation, 11.1 MB of additional disk space will be used.
Get:1 http://archive.ubuntu.com/ubuntu focal/universe amd64 xpra amd64 3.0.6+dfsg1-1build1 [2,531 kB]
Fetched 2,531 kB in 1s (2,232 kB/s)
debconf: unable to initialize frontend: Dialog
debconf: (No usable dialog-like program is installed, so the dialog based frontend cannot be used. at /usr/share/perl5/Debconf/FrontEnd/Dialog.pm line 76, <> line 1.)
debconf: falling back to frontend: Readline
N: Ignoring file 'xpra.list.1' in directory '/etc/apt/sources.list.d/' as it has an invalid filename extension
Selecting previously unselected package xpra.
(Reading database ... 142598 files and directories currently installed.)
Preparing to unpack .../xpra_3.0.6+dfsg1-1build1_amd64.deb ...
Unpacking xpra (3.0.6+dfsg1-1build1) ...
Setting up xpra (3.0.6+dfsg1-1build1) ...
Processing triggers for dbus (1.12.16-2ubuntu2.2) ...
Processing triggers for shared-mime-info (1.15-1) ...
Processing triggers for desktop-file-utils (0.24-1ubuntu3) ...
Processing triggers for mime-support (3.64ubuntu1) ...
Processing triggers for gnome-menus (3.36.0-1ubuntu1) ...
Processing triggers for systemd (245.4-4ubuntu3.17) ...
Processing triggers for man-db (2.9.1-1) ...
N: Ignoring file 'xpra.list.1' in directory '/etc/apt/sources.list.d/' as it has an invalid filename extension
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$
```
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ xpra start --start=xterm --bind-tcp=0.0.0.0:10001
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ 2022-05-29 21:30:45,301 Warning: failed to create script directory '/run/user/1000/xpra':
2022-05-29 21:30:45,301 [Errno 2] No such file or directory: '/run/user/1000/xpra'
2022-05-29 21:30:45,301 ($XDG_RUNTIME_DIR has not been created?)
Entering daemon mode; any further errors will be reported to:
/tmp/S6423.log
```
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ sudo ./setup.py install
install_html5('', '/usr/share/xpra/www', '/etc/xpra/html5-client', ['default-settings.txt'], 'uglifyjs', True, True)
minifying html5 client to '/usr/share/xpra/www' using uglifyjs
brotli_cmd=None
copied favicon.png
copied favicon.ico
copied index.html
config file symlinked: /usr/share/xpra/www/default-settings.txt -> /etc/xpra/html5-client/default-settings.txt
copied mitm.html
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/sw.js.tmp', '-o', '/usr/share/xpra/www/sw.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'sw.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/sw.js.tmp', '-o', '/usr/share/xpra/www/sw.js', '--compress'] returned error -1
minified sw.js
copied connect.html
copied css/menu.css
copied css/spinner.css
copied css/menu-skin.css
copied css/simple-keyboard.css.map
copied css/slick.css
copied css/simple-keyboard.css
copied css/icon.css
copied css/client.css
copied css/bootstrap.css
copied css/signin.css
copied icons/xpra-logo.png
copied icons/maximize.png
copied icons/eye-slash.png
copied icons/unfullscreen.png
copied icons/close.png
copied icons/materialicons-regular.ttf
copied icons/materialicons-regular.woff2
copied icons/fullscreen.png
copied icons/speaker.png
copied icons/materialicons-regular.woff
copied icons/default_cursor.png
copied icons/speaker-off.png
copied icons/authentication.png
copied icons/eye.png
copied icons/minimize.png
copied icons/speaker-buffering.png
copied icons/noicon.png
copied icons/empty.png
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Constants.js.tmp', '-o', '/usr/share/xpra/www/js/Constants.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Constants.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Constants.js.tmp', '-o', '/usr/share/xpra/www/js/Constants.js', '--compress'] returned error -1
minified js/Constants.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Protocol.js.tmp', '-o', '/usr/share/xpra/www/js/Protocol.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Protocol.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Protocol.js.tmp', '-o', '/usr/share/xpra/www/js/Protocol.js', '--compress'] returned error -1
minified js/Protocol.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/VideoDecoder.js.tmp', '-o', '/usr/share/xpra/www/js/VideoDecoder.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'VideoDecoder.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/VideoDecoder.js.tmp', '-o', '/usr/share/xpra/www/js/VideoDecoder.js', '--compress'] returned error -1
minified js/VideoDecoder.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/OffscreenDecodeWorker.js.tmp', '-o', '/usr/share/xpra/www/js/OffscreenDecodeWorker.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'OffscreenDecodeWorker.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/OffscreenDecodeWorker.js.tmp', '-o', '/usr/share/xpra/www/js/OffscreenDecodeWorker.js', '--compress'] returned error -1
minified js/OffscreenDecodeWorker.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Utilities.js.tmp', '-o', '/usr/share/xpra/www/js/Utilities.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Utilities.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Utilities.js.tmp', '-o', '/usr/share/xpra/www/js/Utilities.js', '--compress'] returned error -1
minified js/Utilities.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Menu-custom.js.tmp', '-o', '/usr/share/xpra/www/js/Menu-custom.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Menu-custom.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Menu-custom.js.tmp', '-o', '/usr/share/xpra/www/js/Menu-custom.js', '--compress'] returned error -1
minified js/Menu-custom.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/RgbHelpers.js.tmp', '-o', '/usr/share/xpra/www/js/RgbHelpers.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'RgbHelpers.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/RgbHelpers.js.tmp', '-o', '/usr/share/xpra/www/js/RgbHelpers.js', '--compress'] returned error -1
minified js/RgbHelpers.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Notifications.js.tmp', '-o', '/usr/share/xpra/www/js/Notifications.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Notifications.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Notifications.js.tmp', '-o', '/usr/share/xpra/www/js/Notifications.js', '--compress'] returned error -1
minified js/Notifications.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Client.js.tmp', '-o', '/usr/share/xpra/www/js/Client.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Client.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Client.js.tmp', '-o', '/usr/share/xpra/www/js/Client.js', '--compress'] returned error -1
minified js/Client.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/MediaSourceUtil.js.tmp', '-o', '/usr/share/xpra/www/js/MediaSourceUtil.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'MediaSourceUtil.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/MediaSourceUtil.js.tmp', '-o', '/usr/share/xpra/www/js/MediaSourceUtil.js', '--compress'] returned error -1
minified js/MediaSourceUtil.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/OffscreenDecodeWorkerHelper.js.tmp', '-o', '/usr/share/xpra/www/js/OffscreenDecodeWorkerHelper.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'OffscreenDecodeWorkerHelper.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/OffscreenDecodeWorkerHelper.js.tmp', '-o', '/usr/share/xpra/www/js/OffscreenDecodeWorkerHelper.js', '--compress'] returned error -1
minified js/OffscreenDecodeWorkerHelper.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/DecodeWorker.js.tmp', '-o', '/usr/share/xpra/www/js/DecodeWorker.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'DecodeWorker.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/DecodeWorker.js.tmp', '-o', '/usr/share/xpra/www/js/DecodeWorker.js', '--compress'] returned error -1
minified js/DecodeWorker.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Menu.js.tmp', '-o', '/usr/share/xpra/www/js/Menu.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Menu.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Menu.js.tmp', '-o', '/usr/share/xpra/www/js/Menu.js', '--compress'] returned error -1
minified js/Menu.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/ImageDecoder.js.tmp', '-o', '/usr/share/xpra/www/js/ImageDecoder.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'ImageDecoder.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/ImageDecoder.js.tmp', '-o', '/usr/share/xpra/www/js/ImageDecoder.js', '--compress'] returned error -1
minified js/ImageDecoder.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Keycodes.js.tmp', '-o', '/usr/share/xpra/www/js/Keycodes.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Keycodes.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Keycodes.js.tmp', '-o', '/usr/share/xpra/www/js/Keycodes.js', '--compress'] returned error -1
minified js/Keycodes.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Window.js.tmp', '-o', '/usr/share/xpra/www/js/Window.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Window.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Window.js.tmp', '-o', '/usr/share/xpra/www/js/Window.js', '--compress'] returned error -1
minified js/Window.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/slick.js.tmp', '-o', '/usr/share/xpra/www/js/lib/slick.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'slick.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/slick.js.tmp', '-o', '/usr/share/xpra/www/js/lib/slick.js', '--compress'] returned error -1
minified js/lib/slick.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jquery-transform-draggable.js.tmp', '-o', '/usr/share/xpra/www/js/lib/jquery-transform-draggable.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'jquery-transform-draggable.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jquery-transform-draggable.js.tmp', '-o', '/usr/share/xpra/www/js/lib/jquery-transform-draggable.js', '--compress'] returned error -1
minified js/lib/jquery-transform-draggable.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jquery.ba-throttle-debounce.js.tmp', '-o', '/usr/share/xpra/www/js/lib/jquery.ba-throttle-debounce.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'jquery.ba-throttle-debounce.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jquery.ba-throttle-debounce.js.tmp', '-o', '/usr/share/xpra/www/js/lib/jquery.ba-throttle-debounce.js', '--compress'] returned error -1
minified js/lib/jquery.ba-throttle-debounce.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/bencode.js.tmp', '-o', '/usr/share/xpra/www/js/lib/bencode.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'bencode.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/bencode.js.tmp', '-o', '/usr/share/xpra/www/js/lib/bencode.js', '--compress'] returned error -1
minified js/lib/bencode.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/lz4.js.tmp', '-o', '/usr/share/xpra/www/js/lib/lz4.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'lz4.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/lz4.js.tmp', '-o', '/usr/share/xpra/www/js/lib/lz4.js', '--compress'] returned error -1
minified js/lib/lz4.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/zlib.js.tmp', '-o', '/usr/share/xpra/www/js/lib/zlib.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'zlib.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/zlib.js.tmp', '-o', '/usr/share/xpra/www/js/lib/zlib.js', '--compress'] returned error -1
minified js/lib/zlib.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/FileSaver.js.tmp', '-o', '/usr/share/xpra/www/js/lib/FileSaver.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'FileSaver.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/FileSaver.js.tmp', '-o', '/usr/share/xpra/www/js/lib/FileSaver.js', '--compress'] returned error -1
minified js/lib/FileSaver.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/wsworker_check.js', '-o', '/usr/share/xpra/www/js/lib/wsworker_check.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'wsworker_check.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/wsworker_check.js', '-o', '/usr/share/xpra/www/js/lib/wsworker_check.js', '--compress'] returned error -1
minified js/lib/wsworker_check.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/forge.js.tmp', '-o', '/usr/share/xpra/www/js/lib/forge.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'forge.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/forge.js.tmp', '-o', '/usr/share/xpra/www/js/lib/forge.js', '--compress'] returned error -1
minified js/lib/forge.js
symlinked /usr/share/xpra/www/js/lib/jquery.js from /usr/share/javascript/jquery/jquery.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/detect-zoom.js.tmp', '-o', '/usr/share/xpra/www/js/lib/detect-zoom.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'detect-zoom.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/detect-zoom.js.tmp', '-o', '/usr/share/xpra/www/js/lib/detect-zoom.js', '--compress'] returned error -1
minified js/lib/detect-zoom.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/rencode.js.tmp', '-o', '/usr/share/xpra/www/js/lib/rencode.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'rencode.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/rencode.js.tmp', '-o', '/usr/share/xpra/www/js/lib/rencode.js', '--compress'] returned error -1
minified js/lib/rencode.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jszip.js', '-o', '/usr/share/xpra/www/js/lib/jszip.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'jszip.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jszip.js', '-o', '/usr/share/xpra/www/js/lib/jszip.js', '--compress'] returned error -1
minified js/lib/jszip.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/brotli_decode.js.tmp', '-o', '/usr/share/xpra/www/js/lib/brotli_decode.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'brotli_decode.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/brotli_decode.js.tmp', '-o', '/usr/share/xpra/www/js/lib/brotli_decode.js', '--compress'] returned error -1
minified js/lib/brotli_decode.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/web-streams-ponyfill.es6.js.tmp', '-o', '/usr/share/xpra/www/js/lib/web-streams-ponyfill.es6.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'web-streams-ponyfill.es6.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/web-streams-ponyfill.es6.js.tmp', '-o', '/usr/share/xpra/www/js/lib/web-streams-ponyfill.es6.js', '--compress'] returned error -1
minified js/lib/web-streams-ponyfill.es6.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jsmpeg.js.tmp', '-o', '/usr/share/xpra/www/js/lib/jsmpeg.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'jsmpeg.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jsmpeg.js.tmp', '-o', '/usr/share/xpra/www/js/lib/jsmpeg.js', '--compress'] returned error -1
minified js/lib/jsmpeg.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jquery-ui.js', '-o', '/usr/share/xpra/www/js/lib/jquery-ui.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'jquery-ui.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jquery-ui.js', '-o', '/usr/share/xpra/www/js/lib/jquery-ui.js', '--compress'] returned error -1
minified js/lib/jquery-ui.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/StreamSaver.js.tmp', '-o', '/usr/share/xpra/www/js/lib/StreamSaver.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'StreamSaver.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/StreamSaver.js.tmp', '-o', '/usr/share/xpra/www/js/lib/StreamSaver.js', '--compress'] returned error -1
minified js/lib/StreamSaver.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/simple-keyboard.js', '-o', '/usr/share/xpra/www/js/lib/simple-keyboard.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'simple-keyboard.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/simple-keyboard.js', '-o', '/usr/share/xpra/www/js/lib/simple-keyboard.js', '--compress'] returned error -1
minified js/lib/simple-keyboard.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/broadway/Decoder.js.tmp', '-o', '/usr/share/xpra/www/js/lib/broadway/Decoder.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Decoder.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/broadway/Decoder.js.tmp', '-o', '/usr/share/xpra/www/js/lib/broadway/Decoder.js', '--compress'] returned error -1
minified js/lib/broadway/Decoder.js
copied js/lib/broadway/AUTHORS
copied js/lib/broadway/LICENSE
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/aurora-xpra.js', '-o', '/usr/share/xpra/www/js/lib/aurora/aurora-xpra.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'aurora-xpra.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/aurora-xpra.js', '-o', '/usr/share/xpra/www/js/lib/aurora/aurora-xpra.js', '--compress'] returned error -1
minified js/lib/aurora/aurora-xpra.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/mp3.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/mp3.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'mp3.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/mp3.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/mp3.js', '--compress'] returned error -1
minified js/lib/aurora/mp3.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/aac.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/aac.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'aac.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/aac.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/aac.js', '--compress'] returned error -1
minified js/lib/aurora/aac.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/flac.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/flac.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'flac.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/flac.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/flac.js', '--compress'] returned error -1
minified js/lib/aurora/flac.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/aurora.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/aurora.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'aurora.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/aurora.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/aurora.js', '--compress'] returned error -1
minified js/lib/aurora/aurora.js
symlinked /usr/share/xpra/www/background.png from /usr/share/backgrounds/ubuntu-default-greyscale-wallpaper.png
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$
```
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ xdg-open http://localhost:10001
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ [6626:6657:0529/213111.741620:ERROR:bus.cc(398)] Failed to connect to the bus: Could not parse server address: Unknown address type (examples of valid types are "tcp" and on UNIX "unix")
[6626:6657:0529/213111.742640:ERROR:bus.cc(398)] Failed to connect to the bus: Could not parse server address: Unknown address type (examples of valid types are "tcp" and on UNIX "unix")
[6626:6665:0529/213111.746507:ERROR:zygote_host_impl_linux.cc(263)] Failed to adjust OOM score of renderer with pid 6668: Permission denied (13)
[6626:6665:0529/213111.772444:ERROR:zygote_host_impl_linux.cc(263)] Failed to adjust OOM score of renderer with pid 6671: Permission denied (13)
[6626:6657:0529/213111.775432:ERROR:bus.cc(398)] Failed to connect to the bus: Could not parse server address: Unknown address type (examples of valid types are "tcp" and on UNIX "unix")
[6626:6657:0529/213111.775469:ERROR:bus.cc(398)] Failed to connect to the bus: Could not parse server address: Unknown address type (examples of valid types are "tcp" and on UNIX "unix")
[6626:6657:0529/213111.894940:ERROR:bus.cc(398)] Failed to connect to the bus: Could not parse server address: Unknown address type (examples of valid types are "tcp" and on UNIX "unix")
[6626:6657:0529/213111.895026:ERROR:bus.cc(398)] Failed to connect to the bus: Could not parse server address: Unknown address type (examples of valid types are "tcp" and on UNIX "unix")
libva error: vaGetDriverNameByIndex() failed with unknown libva error, driver_name = (null)
[6626:6665:0529/213112.003860:ERROR:zygote_host_impl_linux.cc(263)] Failed to adjust OOM score of renderer with pid 6707: Permission denied (13)
[6626:6665:0529/213112.006746:ERROR:zygote_host_impl_linux.cc(263)] Failed to adjust OOM score of renderer with pid 6708: Permission denied (13)
[6668:6668:0529/213112.013906:ERROR:viz_main_impl.cc(186)] Exiting GPU process due to errors during initialization
[6626:6665:0529/213112.119915:ERROR:zygote_host_impl_linux.cc(263)] Failed to adjust OOM score of renderer with pid 6743: Permission denied (13)
libva error: vaGetDriverNameByIndex() failed with unknown libva error, driver_name = (null)
[6743:6743:0529/213112.373612:ERROR:viz_main_impl.cc(186)] Exiting GPU process due to errors during initialization
[6626:6665:0529/213112.399411:ERROR:zygote_host_impl_linux.cc(263)] Failed to adjust OOM score of renderer with pid 6779: Permission denied (13)
libva error: vaGetDriverNameByIndex() failed with unknown libva error, driver_name = (null)
[6779:6779:0529/213112.513809:ERROR:gpu_memory_buffer_support_x11.cc(44)] dri3 extension not supported.^C
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$
```
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ xpra list
Found the following xpra sessions:
/run/xpra:
INACCESSIBLE session at :1
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$
``` | 1.0 | Setup troubles - I'm having trouble setting up my environment for xpra-html5 development.
1. I seemingly successfully installed xpra, which comes with an older/different version of xpra-html5.
2. I seemingly successfully updated xpra-html5 by running `sudo ./setup.py install`, even though I got a lot of errors/warnings (probably similar to the ones below). I noticed that the desktop background image in the xpra session changed to the cat, which I assumed indicated a version bump.
3. I changed the source code in the repo and re-ran `sudo ./setup.py install` (again with lots of errors/warnings), but I didn't see any change in the website (i.e. no error in the browser console when I added a `console.error` to the page's source).
4. I tried debugging my setup by uninstalling and reinstalling xpra a few times, and now I have an even more broken setup that won't connect to the server at all.
Help! 😆
Here is the latest path I took in my mostly-default Ubuntu 20.04 environment (consecutive commands, complete output, just split into multiple single-command snippets for readability):
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ sudo wget -O "/usr/share/keyrings/xpra-2022.gpg" https://xpra.org/xpra-2022.gpg
--2022-05-29 21:29:20-- https://xpra.org/xpra-2022.gpg
Resolving xpra.org (xpra.org)... 78.129.163.65
Connecting to xpra.org (xpra.org)|78.129.163.65|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 7533 (7.4K)
Saving to: â/usr/share/keyrings/xpra-2022.gpgâ
/usr/share/keyrings/xpra-2022 100%[==============================================>] 7.36K --.-KB/s in 0s
2022-05-29 21:29:20 (852 MB/s) - â/usr/share/keyrings/xpra-2022.gpgâ saved [7533/7533]
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$
```
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ (
> cd /etc/apt/sources.list.d
> sudo wget https://xpra.org/repos/focal/xpra.list
> )
--2022-05-29 21:29:56-- https://xpra.org/repos/focal/xpra.list
Resolving xpra.org (xpra.org)... 78.129.163.65
Connecting to xpra.org (xpra.org)|78.129.163.65|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 33
Saving to: âxpra.list.1â
xpra.list.1 100%[==============================================>] 33 --.-KB/s in 0s
2022-05-29 21:29:57 (5.28 MB/s) - âxpra.list.1â saved [33/33]
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$
```
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ sudo apt update
Hit:1 https://packages.cloud.google.com/apt cloud-sdk InRelease
Hit:2 https://deb.nodesource.com/node_16.x focal InRelease
Hit:3 https://dl.google.com/linux/chrome/deb stable InRelease
Hit:4 http://packages.microsoft.com/repos/code stable InRelease
Hit:5 http://archive.ubuntu.com/ubuntu focal InRelease
Get:6 http://security.ubuntu.com/ubuntu focal-security InRelease [114 kB]
Get:7 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB]
Get:8 https://xpra.org focal InRelease [5,925 B]
Get:9 http://archive.ubuntu.com/ubuntu focal-backports InRelease [108 kB]
Err:8 https://xpra.org focal InRelease
The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 18ADB31CF18AD6BB
Reading package lists... Done
N: Ignoring file 'xpra.list.1' in directory '/etc/apt/sources.list.d/' as it has an invalid filename extension
W: GPG error: https://xpra.org focal InRelease: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 18ADB31CF18AD6BB
E: The repository 'https://xpra.org focal InRelease' is not signed.
N: Updating from such a repository can't be done securely, and is therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user configuration details.
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$
```
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ sudo apt install -y xpra
Reading package lists... Done
Building dependency tree
Reading state information... Done
Suggested packages:
openssh-server python3-pyopencl python3-gst-1.0 python3-netifaces cups-pdf python3-opencv python3-pyinotify
v4l2loopback-dkms python3-yaml python3-uinput
The following NEW packages will be installed:
xpra
0 upgraded, 1 newly installed, 0 to remove and 3 not upgraded.
Need to get 2,531 kB of archives.
After this operation, 11.1 MB of additional disk space will be used.
Get:1 http://archive.ubuntu.com/ubuntu focal/universe amd64 xpra amd64 3.0.6+dfsg1-1build1 [2,531 kB]
Fetched 2,531 kB in 1s (2,232 kB/s)
debconf: unable to initialize frontend: Dialog
debconf: (No usable dialog-like program is installed, so the dialog based frontend cannot be used. at /usr/share/perl5/Debconf/FrontEnd/Dialog.pm line 76, <> line 1.)
debconf: falling back to frontend: Readline
N: Ignoring file 'xpra.list.1' in directory '/etc/apt/sources.list.d/' as it has an invalid filename extension
Selecting previously unselected package xpra.
(Reading database ... 142598 files and directories currently installed.)
Preparing to unpack .../xpra_3.0.6+dfsg1-1build1_amd64.deb ...
Unpacking xpra (3.0.6+dfsg1-1build1) ...
Setting up xpra (3.0.6+dfsg1-1build1) ...
Processing triggers for dbus (1.12.16-2ubuntu2.2) ...
Processing triggers for shared-mime-info (1.15-1) ...
Processing triggers for desktop-file-utils (0.24-1ubuntu3) ...
Processing triggers for mime-support (3.64ubuntu1) ...
Processing triggers for gnome-menus (3.36.0-1ubuntu1) ...
Processing triggers for systemd (245.4-4ubuntu3.17) ...
Processing triggers for man-db (2.9.1-1) ...
N: Ignoring file 'xpra.list.1' in directory '/etc/apt/sources.list.d/' as it has an invalid filename extension
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$
```
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ xpra start --start=xterm --bind-tcp=0.0.0.0:10001
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ 2022-05-29 21:30:45,301 Warning: failed to create script directory '/run/user/1000/xpra':
2022-05-29 21:30:45,301 [Errno 2] No such file or directory: '/run/user/1000/xpra'
2022-05-29 21:30:45,301 ($XDG_RUNTIME_DIR has not been created?)
Entering daemon mode; any further errors will be reported to:
/tmp/S6423.log
```
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ sudo ./setup.py install
install_html5('', '/usr/share/xpra/www', '/etc/xpra/html5-client', ['default-settings.txt'], 'uglifyjs', True, True)
minifying html5 client to '/usr/share/xpra/www' using uglifyjs
brotli_cmd=None
copied favicon.png
copied favicon.ico
copied index.html
config file symlinked: /usr/share/xpra/www/default-settings.txt -> /etc/xpra/html5-client/default-settings.txt
copied mitm.html
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/sw.js.tmp', '-o', '/usr/share/xpra/www/sw.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'sw.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/sw.js.tmp', '-o', '/usr/share/xpra/www/sw.js', '--compress'] returned error -1
minified sw.js
copied connect.html
copied css/menu.css
copied css/spinner.css
copied css/menu-skin.css
copied css/simple-keyboard.css.map
copied css/slick.css
copied css/simple-keyboard.css
copied css/icon.css
copied css/client.css
copied css/bootstrap.css
copied css/signin.css
copied icons/xpra-logo.png
copied icons/maximize.png
copied icons/eye-slash.png
copied icons/unfullscreen.png
copied icons/close.png
copied icons/materialicons-regular.ttf
copied icons/materialicons-regular.woff2
copied icons/fullscreen.png
copied icons/speaker.png
copied icons/materialicons-regular.woff
copied icons/default_cursor.png
copied icons/speaker-off.png
copied icons/authentication.png
copied icons/eye.png
copied icons/minimize.png
copied icons/speaker-buffering.png
copied icons/noicon.png
copied icons/empty.png
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Constants.js.tmp', '-o', '/usr/share/xpra/www/js/Constants.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Constants.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Constants.js.tmp', '-o', '/usr/share/xpra/www/js/Constants.js', '--compress'] returned error -1
minified js/Constants.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Protocol.js.tmp', '-o', '/usr/share/xpra/www/js/Protocol.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Protocol.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Protocol.js.tmp', '-o', '/usr/share/xpra/www/js/Protocol.js', '--compress'] returned error -1
minified js/Protocol.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/VideoDecoder.js.tmp', '-o', '/usr/share/xpra/www/js/VideoDecoder.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'VideoDecoder.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/VideoDecoder.js.tmp', '-o', '/usr/share/xpra/www/js/VideoDecoder.js', '--compress'] returned error -1
minified js/VideoDecoder.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/OffscreenDecodeWorker.js.tmp', '-o', '/usr/share/xpra/www/js/OffscreenDecodeWorker.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'OffscreenDecodeWorker.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/OffscreenDecodeWorker.js.tmp', '-o', '/usr/share/xpra/www/js/OffscreenDecodeWorker.js', '--compress'] returned error -1
minified js/OffscreenDecodeWorker.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Utilities.js.tmp', '-o', '/usr/share/xpra/www/js/Utilities.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Utilities.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Utilities.js.tmp', '-o', '/usr/share/xpra/www/js/Utilities.js', '--compress'] returned error -1
minified js/Utilities.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Menu-custom.js.tmp', '-o', '/usr/share/xpra/www/js/Menu-custom.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Menu-custom.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Menu-custom.js.tmp', '-o', '/usr/share/xpra/www/js/Menu-custom.js', '--compress'] returned error -1
minified js/Menu-custom.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/RgbHelpers.js.tmp', '-o', '/usr/share/xpra/www/js/RgbHelpers.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'RgbHelpers.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/RgbHelpers.js.tmp', '-o', '/usr/share/xpra/www/js/RgbHelpers.js', '--compress'] returned error -1
minified js/RgbHelpers.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Notifications.js.tmp', '-o', '/usr/share/xpra/www/js/Notifications.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Notifications.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Notifications.js.tmp', '-o', '/usr/share/xpra/www/js/Notifications.js', '--compress'] returned error -1
minified js/Notifications.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Client.js.tmp', '-o', '/usr/share/xpra/www/js/Client.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Client.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Client.js.tmp', '-o', '/usr/share/xpra/www/js/Client.js', '--compress'] returned error -1
minified js/Client.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/MediaSourceUtil.js.tmp', '-o', '/usr/share/xpra/www/js/MediaSourceUtil.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'MediaSourceUtil.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/MediaSourceUtil.js.tmp', '-o', '/usr/share/xpra/www/js/MediaSourceUtil.js', '--compress'] returned error -1
minified js/MediaSourceUtil.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/OffscreenDecodeWorkerHelper.js.tmp', '-o', '/usr/share/xpra/www/js/OffscreenDecodeWorkerHelper.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'OffscreenDecodeWorkerHelper.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/OffscreenDecodeWorkerHelper.js.tmp', '-o', '/usr/share/xpra/www/js/OffscreenDecodeWorkerHelper.js', '--compress'] returned error -1
minified js/OffscreenDecodeWorkerHelper.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/DecodeWorker.js.tmp', '-o', '/usr/share/xpra/www/js/DecodeWorker.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'DecodeWorker.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/DecodeWorker.js.tmp', '-o', '/usr/share/xpra/www/js/DecodeWorker.js', '--compress'] returned error -1
minified js/DecodeWorker.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Menu.js.tmp', '-o', '/usr/share/xpra/www/js/Menu.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Menu.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Menu.js.tmp', '-o', '/usr/share/xpra/www/js/Menu.js', '--compress'] returned error -1
minified js/Menu.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/ImageDecoder.js.tmp', '-o', '/usr/share/xpra/www/js/ImageDecoder.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'ImageDecoder.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/ImageDecoder.js.tmp', '-o', '/usr/share/xpra/www/js/ImageDecoder.js', '--compress'] returned error -1
minified js/ImageDecoder.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Keycodes.js.tmp', '-o', '/usr/share/xpra/www/js/Keycodes.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Keycodes.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Keycodes.js.tmp', '-o', '/usr/share/xpra/www/js/Keycodes.js', '--compress'] returned error -1
minified js/Keycodes.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Window.js.tmp', '-o', '/usr/share/xpra/www/js/Window.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Window.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/Window.js.tmp', '-o', '/usr/share/xpra/www/js/Window.js', '--compress'] returned error -1
minified js/Window.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/slick.js.tmp', '-o', '/usr/share/xpra/www/js/lib/slick.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'slick.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/slick.js.tmp', '-o', '/usr/share/xpra/www/js/lib/slick.js', '--compress'] returned error -1
minified js/lib/slick.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jquery-transform-draggable.js.tmp', '-o', '/usr/share/xpra/www/js/lib/jquery-transform-draggable.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'jquery-transform-draggable.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jquery-transform-draggable.js.tmp', '-o', '/usr/share/xpra/www/js/lib/jquery-transform-draggable.js', '--compress'] returned error -1
minified js/lib/jquery-transform-draggable.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jquery.ba-throttle-debounce.js.tmp', '-o', '/usr/share/xpra/www/js/lib/jquery.ba-throttle-debounce.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'jquery.ba-throttle-debounce.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jquery.ba-throttle-debounce.js.tmp', '-o', '/usr/share/xpra/www/js/lib/jquery.ba-throttle-debounce.js', '--compress'] returned error -1
minified js/lib/jquery.ba-throttle-debounce.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/bencode.js.tmp', '-o', '/usr/share/xpra/www/js/lib/bencode.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'bencode.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/bencode.js.tmp', '-o', '/usr/share/xpra/www/js/lib/bencode.js', '--compress'] returned error -1
minified js/lib/bencode.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/lz4.js.tmp', '-o', '/usr/share/xpra/www/js/lib/lz4.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'lz4.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/lz4.js.tmp', '-o', '/usr/share/xpra/www/js/lib/lz4.js', '--compress'] returned error -1
minified js/lib/lz4.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/zlib.js.tmp', '-o', '/usr/share/xpra/www/js/lib/zlib.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'zlib.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/zlib.js.tmp', '-o', '/usr/share/xpra/www/js/lib/zlib.js', '--compress'] returned error -1
minified js/lib/zlib.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/FileSaver.js.tmp', '-o', '/usr/share/xpra/www/js/lib/FileSaver.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'FileSaver.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/FileSaver.js.tmp', '-o', '/usr/share/xpra/www/js/lib/FileSaver.js', '--compress'] returned error -1
minified js/lib/FileSaver.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/wsworker_check.js', '-o', '/usr/share/xpra/www/js/lib/wsworker_check.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'wsworker_check.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/wsworker_check.js', '-o', '/usr/share/xpra/www/js/lib/wsworker_check.js', '--compress'] returned error -1
minified js/lib/wsworker_check.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/forge.js.tmp', '-o', '/usr/share/xpra/www/js/lib/forge.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'forge.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/forge.js.tmp', '-o', '/usr/share/xpra/www/js/lib/forge.js', '--compress'] returned error -1
minified js/lib/forge.js
symlinked /usr/share/xpra/www/js/lib/jquery.js from /usr/share/javascript/jquery/jquery.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/detect-zoom.js.tmp', '-o', '/usr/share/xpra/www/js/lib/detect-zoom.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'detect-zoom.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/detect-zoom.js.tmp', '-o', '/usr/share/xpra/www/js/lib/detect-zoom.js', '--compress'] returned error -1
minified js/lib/detect-zoom.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/rencode.js.tmp', '-o', '/usr/share/xpra/www/js/lib/rencode.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'rencode.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/rencode.js.tmp', '-o', '/usr/share/xpra/www/js/lib/rencode.js', '--compress'] returned error -1
minified js/lib/rencode.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jszip.js', '-o', '/usr/share/xpra/www/js/lib/jszip.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'jszip.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jszip.js', '-o', '/usr/share/xpra/www/js/lib/jszip.js', '--compress'] returned error -1
minified js/lib/jszip.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/brotli_decode.js.tmp', '-o', '/usr/share/xpra/www/js/lib/brotli_decode.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'brotli_decode.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/brotli_decode.js.tmp', '-o', '/usr/share/xpra/www/js/lib/brotli_decode.js', '--compress'] returned error -1
minified js/lib/brotli_decode.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/web-streams-ponyfill.es6.js.tmp', '-o', '/usr/share/xpra/www/js/lib/web-streams-ponyfill.es6.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'web-streams-ponyfill.es6.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/web-streams-ponyfill.es6.js.tmp', '-o', '/usr/share/xpra/www/js/lib/web-streams-ponyfill.es6.js', '--compress'] returned error -1
minified js/lib/web-streams-ponyfill.es6.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jsmpeg.js.tmp', '-o', '/usr/share/xpra/www/js/lib/jsmpeg.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'jsmpeg.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jsmpeg.js.tmp', '-o', '/usr/share/xpra/www/js/lib/jsmpeg.js', '--compress'] returned error -1
minified js/lib/jsmpeg.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jquery-ui.js', '-o', '/usr/share/xpra/www/js/lib/jquery-ui.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'jquery-ui.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/jquery-ui.js', '-o', '/usr/share/xpra/www/js/lib/jquery-ui.js', '--compress'] returned error -1
minified js/lib/jquery-ui.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/StreamSaver.js.tmp', '-o', '/usr/share/xpra/www/js/lib/StreamSaver.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'StreamSaver.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/StreamSaver.js.tmp', '-o', '/usr/share/xpra/www/js/lib/StreamSaver.js', '--compress'] returned error -1
minified js/lib/StreamSaver.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/simple-keyboard.js', '-o', '/usr/share/xpra/www/js/lib/simple-keyboard.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'simple-keyboard.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/simple-keyboard.js', '-o', '/usr/share/xpra/www/js/lib/simple-keyboard.js', '--compress'] returned error -1
minified js/lib/simple-keyboard.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/broadway/Decoder.js.tmp', '-o', '/usr/share/xpra/www/js/lib/broadway/Decoder.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'Decoder.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/broadway/Decoder.js.tmp', '-o', '/usr/share/xpra/www/js/lib/broadway/Decoder.js', '--compress'] returned error -1
minified js/lib/broadway/Decoder.js
copied js/lib/broadway/AUTHORS
copied js/lib/broadway/LICENSE
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/aurora-xpra.js', '-o', '/usr/share/xpra/www/js/lib/aurora/aurora-xpra.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'aurora-xpra.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/aurora-xpra.js', '-o', '/usr/share/xpra/www/js/lib/aurora/aurora-xpra.js', '--compress'] returned error -1
minified js/lib/aurora/aurora-xpra.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/mp3.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/mp3.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'mp3.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/mp3.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/mp3.js', '--compress'] returned error -1
minified js/lib/aurora/mp3.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/aac.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/aac.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'aac.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/aac.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/aac.js', '--compress'] returned error -1
minified js/lib/aurora/aac.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/flac.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/flac.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'flac.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/flac.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/flac.js', '--compress'] returned error -1
minified js/lib/aurora/flac.js
error running (['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/aurora.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/aurora.js', '--compress'],),{'stdout': -1, 'stderr': -1}: [Errno 2] No such file or directory: 'uglifyjs'
Error: failed to minify 'aurora.js', command ['uglifyjs', '/home/coder/project/xpra-html5/html5/js/lib/aurora/aurora.js.tmp', '-o', '/usr/share/xpra/www/js/lib/aurora/aurora.js', '--compress'] returned error -1
minified js/lib/aurora/aurora.js
symlinked /usr/share/xpra/www/background.png from /usr/share/backgrounds/ubuntu-default-greyscale-wallpaper.png
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$
```
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ xdg-open http://localhost:10001
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ [6626:6657:0529/213111.741620:ERROR:bus.cc(398)] Failed to connect to the bus: Could not parse server address: Unknown address type (examples of valid types are "tcp" and on UNIX "unix")
[6626:6657:0529/213111.742640:ERROR:bus.cc(398)] Failed to connect to the bus: Could not parse server address: Unknown address type (examples of valid types are "tcp" and on UNIX "unix")
[6626:6665:0529/213111.746507:ERROR:zygote_host_impl_linux.cc(263)] Failed to adjust OOM score of renderer with pid 6668: Permission denied (13)
[6626:6665:0529/213111.772444:ERROR:zygote_host_impl_linux.cc(263)] Failed to adjust OOM score of renderer with pid 6671: Permission denied (13)
[6626:6657:0529/213111.775432:ERROR:bus.cc(398)] Failed to connect to the bus: Could not parse server address: Unknown address type (examples of valid types are "tcp" and on UNIX "unix")
[6626:6657:0529/213111.775469:ERROR:bus.cc(398)] Failed to connect to the bus: Could not parse server address: Unknown address type (examples of valid types are "tcp" and on UNIX "unix")
[6626:6657:0529/213111.894940:ERROR:bus.cc(398)] Failed to connect to the bus: Could not parse server address: Unknown address type (examples of valid types are "tcp" and on UNIX "unix")
[6626:6657:0529/213111.895026:ERROR:bus.cc(398)] Failed to connect to the bus: Could not parse server address: Unknown address type (examples of valid types are "tcp" and on UNIX "unix")
libva error: vaGetDriverNameByIndex() failed with unknown libva error, driver_name = (null)
[6626:6665:0529/213112.003860:ERROR:zygote_host_impl_linux.cc(263)] Failed to adjust OOM score of renderer with pid 6707: Permission denied (13)
[6626:6665:0529/213112.006746:ERROR:zygote_host_impl_linux.cc(263)] Failed to adjust OOM score of renderer with pid 6708: Permission denied (13)
[6668:6668:0529/213112.013906:ERROR:viz_main_impl.cc(186)] Exiting GPU process due to errors during initialization
[6626:6665:0529/213112.119915:ERROR:zygote_host_impl_linux.cc(263)] Failed to adjust OOM score of renderer with pid 6743: Permission denied (13)
libva error: vaGetDriverNameByIndex() failed with unknown libva error, driver_name = (null)
[6743:6743:0529/213112.373612:ERROR:viz_main_impl.cc(186)] Exiting GPU process due to errors during initialization
[6626:6665:0529/213112.399411:ERROR:zygote_host_impl_linux.cc(263)] Failed to adjust OOM score of renderer with pid 6779: Permission denied (13)
libva error: vaGetDriverNameByIndex() failed with unknown libva error, driver_name = (null)
[6779:6779:0529/213112.513809:ERROR:gpu_memory_buffer_support_x11.cc(44)] dri3 extension not supported.^C
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$
```
```
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$ xpra list
Found the following xpra sessions:
/run/xpra:
INACCESSIBLE session at :1
coder@devrel-x-xpra-temporary-v1-9f8fb923f0-vdi-0:~/project/xpra-html5$
``` | non_priority | setup troubles i m having trouble setting up my environment for xpra development i seemingly successfully installed xpra which comes with an older different version of xpra i seemingly successfully updated xpra by running sudo setup py install even though i got a lot of errors warnings probably similar to the ones below i noticed that the desktop background image in the xpra session changed to the cat which i assumed indicated a version bump i changed the source code in the repo and re ran sudo setup py install again with lots of errors warnings but i didn t see any change in the website i e no error in the browser console when i added a console error to the page s source i tried debugging my setup by uninstalling and reinstalling xpra a few times and now i have an even more broken setup that won t connect to the server at all help 😆 here is the latest path i took in my mostly default ubuntu environment consecutive commands complete output just split into multiple single command snippets for readability coder devrel x xpra temporary vdi project xpra sudo wget o usr share keyrings xpra gpg resolving xpra org xpra org connecting to xpra org xpra org connected http request sent awaiting response ok length saving to â usr share keyrings xpra gpgâ usr share keyrings xpra kb s in mb s â usr share keyrings xpra gpgâ saved coder devrel x xpra temporary vdi project xpra coder devrel x xpra temporary vdi project xpra cd etc apt sources list d sudo wget resolving xpra org xpra org connecting to xpra org xpra org connected http request sent awaiting response ok length saving to âxpra list xpra list kb s in mb s âxpra list saved coder devrel x xpra temporary vdi project xpra coder devrel x xpra temporary vdi project xpra sudo apt update hit cloud sdk inrelease hit focal inrelease hit stable inrelease hit stable inrelease hit focal inrelease get focal security inrelease get focal updates inrelease get focal inrelease get focal backports inrelease err focal inrelease the following signatures couldn t be verified because the public key is not available no pubkey reading package lists done n ignoring file xpra list in directory etc apt sources list d as it has an invalid filename extension w gpg error focal inrelease the following signatures couldn t be verified because the public key is not available no pubkey e the repository focal inrelease is not signed n updating from such a repository can t be done securely and is therefore disabled by default n see apt secure manpage for repository creation and user configuration details coder devrel x xpra temporary vdi project xpra coder devrel x xpra temporary vdi project xpra sudo apt install y xpra reading package lists done building dependency tree reading state information done suggested packages openssh server pyopencl gst netifaces cups pdf opencv pyinotify dkms yaml uinput the following new packages will be installed xpra upgraded newly installed to remove and not upgraded need to get kb of archives after this operation mb of additional disk space will be used get focal universe xpra fetched kb in kb s debconf unable to initialize frontend dialog debconf no usable dialog like program is installed so the dialog based frontend cannot be used at usr share debconf frontend dialog pm line line debconf falling back to frontend readline n ignoring file xpra list in directory etc apt sources list d as it has an invalid filename extension selecting previously unselected package xpra reading database files and directories currently installed preparing to unpack xpra deb unpacking xpra setting up xpra processing triggers for dbus processing triggers for shared mime info processing triggers for desktop file utils processing triggers for mime support processing triggers for gnome menus processing triggers for systemd processing triggers for man db n ignoring file xpra list in directory etc apt sources list d as it has an invalid filename extension coder devrel x xpra temporary vdi project xpra coder devrel x xpra temporary vdi project xpra xpra start start xterm bind tcp coder devrel x xpra temporary vdi project xpra warning failed to create script directory run user xpra no such file or directory run user xpra xdg runtime dir has not been created entering daemon mode any further errors will be reported to tmp log coder devrel x xpra temporary vdi project xpra sudo setup py install install usr share xpra www etc xpra client uglifyjs true true minifying client to usr share xpra www using uglifyjs brotli cmd none copied favicon png copied favicon ico copied index html config file symlinked usr share xpra www default settings txt etc xpra client default settings txt copied mitm html error running stdout stderr no such file or directory uglifyjs error failed to minify sw js command returned error minified sw js copied connect html copied css menu css copied css spinner css copied css menu skin css copied css simple keyboard css map copied css slick css copied css simple keyboard css copied css icon css copied css client css copied css bootstrap css copied css signin css copied icons xpra logo png copied icons maximize png copied icons eye slash png copied icons unfullscreen png copied icons close png copied icons materialicons regular ttf copied icons materialicons regular copied icons fullscreen png copied icons speaker png copied icons materialicons regular woff copied icons default cursor png copied icons speaker off png copied icons authentication png copied icons eye png copied icons minimize png copied icons speaker buffering png copied icons noicon png copied icons empty png error running stdout stderr no such file or directory uglifyjs error failed to minify constants js command returned error minified js constants js error running stdout stderr no such file or directory uglifyjs error failed to minify protocol js command returned error minified js protocol js error running stdout stderr no such file or directory uglifyjs error failed to minify videodecoder js command returned error minified js videodecoder js error running stdout stderr no such file or directory uglifyjs error failed to minify offscreendecodeworker js command returned error minified js offscreendecodeworker js error running stdout stderr no such file or directory uglifyjs error failed to minify utilities js command returned error minified js utilities js error running stdout stderr no such file or directory uglifyjs error failed to minify menu custom js command returned error minified js menu custom js error running stdout stderr no such file or directory uglifyjs error failed to minify rgbhelpers js command returned error minified js rgbhelpers js error running stdout stderr no such file or directory uglifyjs error failed to minify notifications js command returned error minified js notifications js error running stdout stderr no such file or directory uglifyjs error failed to minify client js command returned error minified js client js error running stdout stderr no such file or directory uglifyjs error failed to minify mediasourceutil js command returned error minified js mediasourceutil js error running stdout stderr no such file or directory uglifyjs error failed to minify offscreendecodeworkerhelper js command returned error minified js offscreendecodeworkerhelper js error running stdout stderr no such file or directory uglifyjs error failed to minify decodeworker js command returned error minified js decodeworker js error running stdout stderr no such file or directory uglifyjs error failed to minify menu js command returned error minified js menu js error running stdout stderr no such file or directory uglifyjs error failed to minify imagedecoder js command returned error minified js imagedecoder js error running stdout stderr no such file or directory uglifyjs error failed to minify keycodes js command returned error minified js keycodes js error running stdout stderr no such file or directory uglifyjs error failed to minify window js command returned error minified js window js error running stdout stderr no such file or directory uglifyjs error failed to minify slick js command returned error minified js lib slick js error running stdout stderr no such file or directory uglifyjs error failed to minify jquery transform draggable js command returned error minified js lib jquery transform draggable js error running stdout stderr no such file or directory uglifyjs error failed to minify jquery ba throttle debounce js command returned error minified js lib jquery ba throttle debounce js error running stdout stderr no such file or directory uglifyjs error failed to minify bencode js command returned error minified js lib bencode js error running stdout stderr no such file or directory uglifyjs error failed to minify js command returned error minified js lib js error running stdout stderr no such file or directory uglifyjs error failed to minify zlib js command returned error minified js lib zlib js error running stdout stderr no such file or directory uglifyjs error failed to minify filesaver js command returned error minified js lib filesaver js error running stdout stderr no such file or directory uglifyjs error failed to minify wsworker check js command returned error minified js lib wsworker check js error running stdout stderr no such file or directory uglifyjs error failed to minify forge js command returned error minified js lib forge js symlinked usr share xpra www js lib jquery js from usr share javascript jquery jquery js error running stdout stderr no such file or directory uglifyjs error failed to minify detect zoom js command returned error minified js lib detect zoom js error running stdout stderr no such file or directory uglifyjs error failed to minify rencode js command returned error minified js lib rencode js error running stdout stderr no such file or directory uglifyjs error failed to minify jszip js command returned error minified js lib jszip js error running stdout stderr no such file or directory uglifyjs error failed to minify brotli decode js command returned error minified js lib brotli decode js error running stdout stderr no such file or directory uglifyjs error failed to minify web streams ponyfill js command returned error minified js lib web streams ponyfill js error running stdout stderr no such file or directory uglifyjs error failed to minify jsmpeg js command returned error minified js lib jsmpeg js error running stdout stderr no such file or directory uglifyjs error failed to minify jquery ui js command returned error minified js lib jquery ui js error running stdout stderr no such file or directory uglifyjs error failed to minify streamsaver js command returned error minified js lib streamsaver js error running stdout stderr no such file or directory uglifyjs error failed to minify simple keyboard js command returned error minified js lib simple keyboard js error running stdout stderr no such file or directory uglifyjs error failed to minify decoder js command returned error minified js lib broadway decoder js copied js lib broadway authors copied js lib broadway license error running stdout stderr no such file or directory uglifyjs error failed to minify aurora xpra js command returned error minified js lib aurora aurora xpra js error running stdout stderr no such file or directory uglifyjs error failed to minify js command returned error minified js lib aurora js error running stdout stderr no such file or directory uglifyjs error failed to minify aac js command returned error minified js lib aurora aac js error running stdout stderr no such file or directory uglifyjs error failed to minify flac js command returned error minified js lib aurora flac js error running stdout stderr no such file or directory uglifyjs error failed to minify aurora js command returned error minified js lib aurora aurora js symlinked usr share xpra www background png from usr share backgrounds ubuntu default greyscale wallpaper png coder devrel x xpra temporary vdi project xpra coder devrel x xpra temporary vdi project xpra xdg open coder devrel x xpra temporary vdi project xpra failed to connect to the bus could not parse server address unknown address type examples of valid types are tcp and on unix unix failed to connect to the bus could not parse server address unknown address type examples of valid types are tcp and on unix unix failed to adjust oom score of renderer with pid permission denied failed to adjust oom score of renderer with pid permission denied failed to connect to the bus could not parse server address unknown address type examples of valid types are tcp and on unix unix failed to connect to the bus could not parse server address unknown address type examples of valid types are tcp and on unix unix failed to connect to the bus could not parse server address unknown address type examples of valid types are tcp and on unix unix failed to connect to the bus could not parse server address unknown address type examples of valid types are tcp and on unix unix libva error vagetdrivernamebyindex failed with unknown libva error driver name null failed to adjust oom score of renderer with pid permission denied failed to adjust oom score of renderer with pid permission denied exiting gpu process due to errors during initialization failed to adjust oom score of renderer with pid permission denied libva error vagetdrivernamebyindex failed with unknown libva error driver name null exiting gpu process due to errors during initialization failed to adjust oom score of renderer with pid permission denied libva error vagetdrivernamebyindex failed with unknown libva error driver name null extension not supported c coder devrel x xpra temporary vdi project xpra coder devrel x xpra temporary vdi project xpra xpra list found the following xpra sessions run xpra inaccessible session at coder devrel x xpra temporary vdi project xpra | 0 |
166,335 | 20,718,433,120 | IssuesEvent | 2022-03-13 01:40:11 | kapseliboi/sttm-web | https://api.github.com/repos/kapseliboi/sttm-web | opened | CVE-2021-23343 (High) detected in path-parse-1.0.6.tgz | security vulnerability | ## CVE-2021-23343 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>path-parse-1.0.6.tgz</b></p></summary>
<p>Node.js path.parse() ponyfill</p>
<p>Library home page: <a href="https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz">https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/path-parse/package.json</p>
<p>
Dependency Hierarchy:
- core-7.10.2.tgz (Root Library)
- resolve-1.8.1.tgz
- :x: **path-parse-1.0.6.tgz** (Vulnerable Library)
<p>Found in base branch: <b>dev</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
<p>Publish Date: 2021-05-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23343>CVE-2021-23343</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/jbgutierrez/path-parse/issues/8">https://github.com/jbgutierrez/path-parse/issues/8</a></p>
<p>Release Date: 2021-05-04</p>
<p>Fix Resolution (path-parse): 1.0.7</p>
<p>Direct dependency fix Resolution (@babel/core): 7.10.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-23343 (High) detected in path-parse-1.0.6.tgz - ## CVE-2021-23343 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>path-parse-1.0.6.tgz</b></p></summary>
<p>Node.js path.parse() ponyfill</p>
<p>Library home page: <a href="https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz">https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/path-parse/package.json</p>
<p>
Dependency Hierarchy:
- core-7.10.2.tgz (Root Library)
- resolve-1.8.1.tgz
- :x: **path-parse-1.0.6.tgz** (Vulnerable Library)
<p>Found in base branch: <b>dev</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
<p>Publish Date: 2021-05-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23343>CVE-2021-23343</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/jbgutierrez/path-parse/issues/8">https://github.com/jbgutierrez/path-parse/issues/8</a></p>
<p>Release Date: 2021-05-04</p>
<p>Fix Resolution (path-parse): 1.0.7</p>
<p>Direct dependency fix Resolution (@babel/core): 7.10.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in path parse tgz cve high severity vulnerability vulnerable library path parse tgz node js path parse ponyfill library home page a href path to dependency file package json path to vulnerable library node modules path parse package json dependency hierarchy core tgz root library resolve tgz x path parse tgz vulnerable library found in base branch dev vulnerability details all versions of package path parse are vulnerable to regular expression denial of service redos via splitdevicere splittailre and splitpathre regular expressions redos exhibits polynomial worst case time complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution path parse direct dependency fix resolution babel core step up your open source security game with whitesource | 0 |
271,019 | 23,576,763,127 | IssuesEvent | 2022-08-23 02:07:52 | lowRISC/opentitan | https://api.github.com/repos/lowRISC/opentitan | opened | [rom-e2e] rom_e2e_boot_policy_valid | Priority:P2 Type:Task SW:ROM Milestone:V2 Component:RomE2eTest | ### Test point name
[rom_e2e_boot_policy_valid](https://cs.opensource.google/opentitan/opentitan/+/master:sw/device/silicon_creator/rom/data/rom_testplan.hjson?q=rom_e2e_boot_policy_valid)
### Host side component
Unknown
### OpenTitanTool infrastructure implemented
Unknown
### Contact person
@alphan
### Checklist
Please fill out this checklist as items are completed. Link to PRs and issues as appropriate.
- [ ] Check if existing test covers most or all of this testpoint (if so, either extend said test to cover all points, or skip the next 3 checkboxes)
- [ ] Device-side (C) component developed
- [ ] Bazel build rules developed
- [ ] Host-side component developed
- [ ] HJSON test plan updated with test name (so it shows up in the dashboard)
- [ ] Test added to dvsim nightly regression (and passing at time of checking)
### Verify that ROM chooses the slot with the valid signature.
- Apply bootstrap pin strapping and reset the chip.
- Write the ROM_EXT images to the chip -- same security_version.
- Verify that ROM chooses the slot with the valid signature, otherwise triggers a
shutdown.
- Repeat for all life cycle states: TEST, DEV, PROD, PROD_END, and RMA.
| Slot a | Slot b | Chosen |
|:------:|:------:|:------:|
| Bad | Bad | None |
| Bad | Good | b |
| Good | Bad | a |
| Good | Good | a |
| 1.0 | [rom-e2e] rom_e2e_boot_policy_valid - ### Test point name
[rom_e2e_boot_policy_valid](https://cs.opensource.google/opentitan/opentitan/+/master:sw/device/silicon_creator/rom/data/rom_testplan.hjson?q=rom_e2e_boot_policy_valid)
### Host side component
Unknown
### OpenTitanTool infrastructure implemented
Unknown
### Contact person
@alphan
### Checklist
Please fill out this checklist as items are completed. Link to PRs and issues as appropriate.
- [ ] Check if existing test covers most or all of this testpoint (if so, either extend said test to cover all points, or skip the next 3 checkboxes)
- [ ] Device-side (C) component developed
- [ ] Bazel build rules developed
- [ ] Host-side component developed
- [ ] HJSON test plan updated with test name (so it shows up in the dashboard)
- [ ] Test added to dvsim nightly regression (and passing at time of checking)
### Verify that ROM chooses the slot with the valid signature.
- Apply bootstrap pin strapping and reset the chip.
- Write the ROM_EXT images to the chip -- same security_version.
- Verify that ROM chooses the slot with the valid signature, otherwise triggers a
shutdown.
- Repeat for all life cycle states: TEST, DEV, PROD, PROD_END, and RMA.
| Slot a | Slot b | Chosen |
|:------:|:------:|:------:|
| Bad | Bad | None |
| Bad | Good | b |
| Good | Bad | a |
| Good | Good | a |
| non_priority | rom boot policy valid test point name host side component unknown opentitantool infrastructure implemented unknown contact person alphan checklist please fill out this checklist as items are completed link to prs and issues as appropriate check if existing test covers most or all of this testpoint if so either extend said test to cover all points or skip the next checkboxes device side c component developed bazel build rules developed host side component developed hjson test plan updated with test name so it shows up in the dashboard test added to dvsim nightly regression and passing at time of checking verify that rom chooses the slot with the valid signature apply bootstrap pin strapping and reset the chip write the rom ext images to the chip same security version verify that rom chooses the slot with the valid signature otherwise triggers a shutdown repeat for all life cycle states test dev prod prod end and rma slot a slot b chosen bad bad none bad good b good bad a good good a | 0 |
12,477 | 4,468,252,413 | IssuesEvent | 2016-08-25 08:47:07 | joomla/joomla-cms | https://api.github.com/repos/joomla/joomla-cms | closed | 'Enter' in field navigates back to article manager | No Code Attached Yet | ### Steps to reproduce the issue
1. Create new article in article manager
2. Enter a title
3. Click in to any field excluding the article editor (Eg. Image and Links -> Link A)
4. Hit Enter (even after adding data)
### Expected result
Nothing
### Actual result
Navigates back to article manager, losing article
### System information
Joomla 3.6.2
### Additional comments
Maybe there is a good reason for this however I am failing to see one. Out of habit it is very easy for a user to hit enter after adding data to a field. Do this after composing an article and your article will be lost. Just seems like bad UI/UX?
| 1.0 | 'Enter' in field navigates back to article manager - ### Steps to reproduce the issue
1. Create new article in article manager
2. Enter a title
3. Click in to any field excluding the article editor (Eg. Image and Links -> Link A)
4. Hit Enter (even after adding data)
### Expected result
Nothing
### Actual result
Navigates back to article manager, losing article
### System information
Joomla 3.6.2
### Additional comments
Maybe there is a good reason for this however I am failing to see one. Out of habit it is very easy for a user to hit enter after adding data to a field. Do this after composing an article and your article will be lost. Just seems like bad UI/UX?
| non_priority | enter in field navigates back to article manager steps to reproduce the issue create new article in article manager enter a title click in to any field excluding the article editor eg image and links link a hit enter even after adding data expected result nothing actual result navigates back to article manager losing article system information joomla additional comments maybe there is a good reason for this however i am failing to see one out of habit it is very easy for a user to hit enter after adding data to a field do this after composing an article and your article will be lost just seems like bad ui ux | 0 |
781,729 | 27,447,117,036 | IssuesEvent | 2023-03-02 14:59:11 | K1llByte/kazan | https://api.github.com/repos/K1llByte/kazan | closed | App interface for simpler app creation | feature priority:low | An abstract class that can be inherited to provide a boilerplate free app creation
```c++
class TestApp: public Application {
void on_create();
void on_update();
void on_draw();
};
``` | 1.0 | App interface for simpler app creation - An abstract class that can be inherited to provide a boilerplate free app creation
```c++
class TestApp: public Application {
void on_create();
void on_update();
void on_draw();
};
``` | priority | app interface for simpler app creation an abstract class that can be inherited to provide a boilerplate free app creation c class testapp public application void on create void on update void on draw | 1 |
341,643 | 24,706,755,561 | IssuesEvent | 2022-10-19 19:47:05 | microsoftgraph/microsoft-graph-docs | https://api.github.com/repos/microsoftgraph/microsoft-graph-docs | closed | PATCH request to update the minimum OS Minimum version is not documented correctly | request: documentation area: intune area: corporate management |
[Enter feedback here]
PATCH request to deviceMangement https://graph.microsoft.com/v1.0//deviceManagement/deviceEnrollmentConfigurations/aa38aa92-1763-4083-9e41-5b8b3f6b5b9c_DefaultPlatformRestrictions
with request body shown in the doucmentation gives 400 badrequest.
{
"iosRestriction": {
"platformBlocked": false,
"personalDeviceEnrollmentBlocked": false,
"osMinimumVersion": "15.6",
"osMaximumVersion": "15.7"
}
}
Error:
{
"error": {
"code": "ModelValidationFailure",
"message": "Exception has been thrown by the target of an invocation.",
"innerError": {
"message": "Exception has been thrown by the target of an invocation.",
"date": "2022-08-31T04:06:37",
"request-id": "4f260ef3-5e8a-4fef-a5b1-c0bf5086f2d4",
"client-request-id": "b7d0afb7-a601-17e8-1e1a-d3766596632b"
}
}
}
Please update the documentation if these properties are read only, if not then how to update these properties and not to get 400 badrequest
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: f09295a6-8642-257b-0fba-de8e06cf67b2
* Version Independent ID: 3623d15d-63d6-1857-8495-7f1822b64572
* Content: [deviceEnrollmentPlatformRestriction resource type - Microsoft Graph v1.0](https://docs.microsoft.com/en-us/graph/api/resources/intune-onboarding-deviceenrollmentplatformrestriction?view=graph-rest-1.0)
* Content Source: [api-reference/v1.0/resources/intune-onboarding-deviceenrollmentplatformrestriction.md](https://github.com/microsoftgraph/microsoft-graph-docs/blob/main/api-reference/v1.0/resources/intune-onboarding-deviceenrollmentplatformrestriction.md)
* Product: **intune**
* Technology: **microsoft-graph**
* GitHub Login: @dougeby
* Microsoft Alias: **MSGraphDocsVteam** | 1.0 | PATCH request to update the minimum OS Minimum version is not documented correctly -
[Enter feedback here]
PATCH request to deviceMangement https://graph.microsoft.com/v1.0//deviceManagement/deviceEnrollmentConfigurations/aa38aa92-1763-4083-9e41-5b8b3f6b5b9c_DefaultPlatformRestrictions
with request body shown in the doucmentation gives 400 badrequest.
{
"iosRestriction": {
"platformBlocked": false,
"personalDeviceEnrollmentBlocked": false,
"osMinimumVersion": "15.6",
"osMaximumVersion": "15.7"
}
}
Error:
{
"error": {
"code": "ModelValidationFailure",
"message": "Exception has been thrown by the target of an invocation.",
"innerError": {
"message": "Exception has been thrown by the target of an invocation.",
"date": "2022-08-31T04:06:37",
"request-id": "4f260ef3-5e8a-4fef-a5b1-c0bf5086f2d4",
"client-request-id": "b7d0afb7-a601-17e8-1e1a-d3766596632b"
}
}
}
Please update the documentation if these properties are read only, if not then how to update these properties and not to get 400 badrequest
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: f09295a6-8642-257b-0fba-de8e06cf67b2
* Version Independent ID: 3623d15d-63d6-1857-8495-7f1822b64572
* Content: [deviceEnrollmentPlatformRestriction resource type - Microsoft Graph v1.0](https://docs.microsoft.com/en-us/graph/api/resources/intune-onboarding-deviceenrollmentplatformrestriction?view=graph-rest-1.0)
* Content Source: [api-reference/v1.0/resources/intune-onboarding-deviceenrollmentplatformrestriction.md](https://github.com/microsoftgraph/microsoft-graph-docs/blob/main/api-reference/v1.0/resources/intune-onboarding-deviceenrollmentplatformrestriction.md)
* Product: **intune**
* Technology: **microsoft-graph**
* GitHub Login: @dougeby
* Microsoft Alias: **MSGraphDocsVteam** | non_priority | patch request to update the minimum os minimum version is not documented correctly patch request to devicemangement with request body shown in the doucmentation gives badrequest iosrestriction platformblocked false personaldeviceenrollmentblocked false osminimumversion osmaximumversion error error code modelvalidationfailure message exception has been thrown by the target of an invocation innererror message exception has been thrown by the target of an invocation date request id client request id please update the documentation if these properties are read only if not then how to update these properties and not to get badrequest document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source product intune technology microsoft graph github login dougeby microsoft alias msgraphdocsvteam | 0 |
166,408 | 14,049,986,442 | IssuesEvent | 2020-11-02 11:03:32 | scoutapp/scout-apm-laravel | https://api.github.com/repos/scoutapp/scout-apm-laravel | closed | Add docs on log level configuration to this readme | documentation enhancement | Whilst we have information about configuring log level in both the official docs, and the `scout-apm-php` README, we still get queries on the verbose log level (#60, #23).
Add a section to the README for THIS repo also to hopefully help folks understand how to quieten the log level down in the standard way. | 1.0 | Add docs on log level configuration to this readme - Whilst we have information about configuring log level in both the official docs, and the `scout-apm-php` README, we still get queries on the verbose log level (#60, #23).
Add a section to the README for THIS repo also to hopefully help folks understand how to quieten the log level down in the standard way. | non_priority | add docs on log level configuration to this readme whilst we have information about configuring log level in both the official docs and the scout apm php readme we still get queries on the verbose log level add a section to the readme for this repo also to hopefully help folks understand how to quieten the log level down in the standard way | 0 |
734,760 | 25,362,349,919 | IssuesEvent | 2022-11-21 01:10:18 | wso2/api-manager | https://api.github.com/repos/wso2/api-manager | closed | Starting Gateway profile in JDK 17 shows an error log | Type/Bug Priority/Highest Component/APIM 4.2.0-alpha | ### Description
The following error log is being printed when starting the Gateway profile in JDK 17. This works fine in JDK 11.
```
[2022-11-12 10:08:12,878] ERROR - [bridgeservlet] Servlet.service() for servlet [bridgeservlet] in context with path [/] threw exception
java.lang.NullPointerException: Cannot invoke "org.osgi.util.tracker.ServiceTracker.getServices()" because "org.wso2.carbon.ui.tracker.AuthenticatorRegistry.authTracker" is null
at org.wso2.carbon.ui.tracker.AuthenticatorRegistry.getCarbonAuthenticator(AuthenticatorRegistry.java:67) ~[org.wso2.carbon.ui_4.8.0.m1.jar:?]
at org.wso2.carbon.ui.CarbonUILoginUtil.getAuthenticator(CarbonUILoginUtil.java:74) ~[org.wso2.carbon.ui_4.8.0.m1.jar:?]
at org.wso2.carbon.ui.CarbonSecuredHttpContext.handleSecurity(CarbonSecuredHttpContext.java:76) ~[org.wso2.carbon.ui_4.8.0.m1.jar:?]
at org.eclipse.equinox.http.servlet.internal.ServletRegistration.service(ServletRegistration.java:60) ~[?:?]
at org.eclipse.equinox.http.servlet.internal.ProxyServlet.processAlias(ProxyServlet.java:128) ~[?:?]
at org.eclipse.equinox.http.servlet.internal.ProxyServlet.service(ProxyServlet.java:76) ~[?:?]
at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) ~[tomcat-servlet-api_9.0.58.wso2v1.jar:?]
at org.wso2.carbon.tomcat.ext.servlet.DelegationServlet.service(DelegationServlet.java:68) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.owasp.csrfguard.CsrfGuardFilter.doFilter(CsrfGuardFilter.java:72) ~[csrfguard_3.1.0.wso2v4.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.wso2.carbon.tomcat.ext.filter.CharacterSetFilter.doFilter(CharacterSetFilter.java:65) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.filters.HttpHeaderSecurityFilter.doFilter(HttpHeaderSecurityFilter.java:126) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.wso2.carbon.identity.context.rewrite.valve.TenantContextRewriteValve.invoke(TenantContextRewriteValve.java:119) ~[org.wso2.carbon.identity.context.rewrite.valve_1.7.1.jar:?]
at org.wso2.carbon.identity.context.rewrite.valve.OrganizationContextRewriteValve.invoke(OrganizationContextRewriteValve.java:116) ~[org.wso2.carbon.identity.context.rewrite.valve_1.7.1.jar:?]
at org.wso2.carbon.tomcat.ext.valves.SameSiteCookieValve.invoke(SameSiteCookieValve.java:38) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.wso2.carbon.identity.authz.valve.AuthorizationValve.invoke(AuthorizationValve.java:165) ~[org.wso2.carbon.identity.authz.valve_1.7.1.jar:?]
at org.wso2.carbon.identity.auth.valve.AuthenticationValve.invoke(AuthenticationValve.java:111) ~[org.wso2.carbon.identity.auth.valve_1.7.1.jar:?]
at org.wso2.carbon.tomcat.ext.valves.CompositeValve.continueInvocation(CompositeValve.java:106) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.wso2.carbon.tomcat.ext.valves.TomcatValveContainer.invokeValves(TomcatValveContainer.java:49) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.wso2.carbon.tomcat.ext.valves.CompositeValve.invoke(CompositeValve.java:67) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.wso2.carbon.tomcat.ext.valves.CarbonStuckThreadDetectionValve.invoke(CarbonStuckThreadDetectionValve.java:152) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.apache.catalina.valves.AbstractAccessLogValve.invoke(AbstractAccessLogValve.java:687) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.wso2.carbon.tomcat.ext.valves.CarbonContextCreatorValve.invoke(CarbonContextCreatorValve.java:63) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.wso2.carbon.tomcat.ext.valves.RequestCorrelationIdValve.invoke(RequestCorrelationIdValve.java:137) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:359) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:399) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:889) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1735) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) ~[tomcat_9.0.58.wso2v1.jar:?]
at java.lang.Thread.run(Thread.java:833) [?:?]
```
### Steps to Reproduce
Profile optimize and start the Gateway-worker profile.
### Affected Component
APIM
### Version
APIM 4.2.0 M1 testing pack
### Environment Details (with versions)
_No response_
### Relevant Log Output
_No response_
### Related Issues
_No response_
### Suggested Labels
_No response_ | 1.0 | Starting Gateway profile in JDK 17 shows an error log - ### Description
The following error log is being printed when starting the Gateway profile in JDK 17. This works fine in JDK 11.
```
[2022-11-12 10:08:12,878] ERROR - [bridgeservlet] Servlet.service() for servlet [bridgeservlet] in context with path [/] threw exception
java.lang.NullPointerException: Cannot invoke "org.osgi.util.tracker.ServiceTracker.getServices()" because "org.wso2.carbon.ui.tracker.AuthenticatorRegistry.authTracker" is null
at org.wso2.carbon.ui.tracker.AuthenticatorRegistry.getCarbonAuthenticator(AuthenticatorRegistry.java:67) ~[org.wso2.carbon.ui_4.8.0.m1.jar:?]
at org.wso2.carbon.ui.CarbonUILoginUtil.getAuthenticator(CarbonUILoginUtil.java:74) ~[org.wso2.carbon.ui_4.8.0.m1.jar:?]
at org.wso2.carbon.ui.CarbonSecuredHttpContext.handleSecurity(CarbonSecuredHttpContext.java:76) ~[org.wso2.carbon.ui_4.8.0.m1.jar:?]
at org.eclipse.equinox.http.servlet.internal.ServletRegistration.service(ServletRegistration.java:60) ~[?:?]
at org.eclipse.equinox.http.servlet.internal.ProxyServlet.processAlias(ProxyServlet.java:128) ~[?:?]
at org.eclipse.equinox.http.servlet.internal.ProxyServlet.service(ProxyServlet.java:76) ~[?:?]
at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) ~[tomcat-servlet-api_9.0.58.wso2v1.jar:?]
at org.wso2.carbon.tomcat.ext.servlet.DelegationServlet.service(DelegationServlet.java:68) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.owasp.csrfguard.CsrfGuardFilter.doFilter(CsrfGuardFilter.java:72) ~[csrfguard_3.1.0.wso2v4.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.wso2.carbon.tomcat.ext.filter.CharacterSetFilter.doFilter(CharacterSetFilter.java:65) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.filters.HttpHeaderSecurityFilter.doFilter(HttpHeaderSecurityFilter.java:126) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.wso2.carbon.identity.context.rewrite.valve.TenantContextRewriteValve.invoke(TenantContextRewriteValve.java:119) ~[org.wso2.carbon.identity.context.rewrite.valve_1.7.1.jar:?]
at org.wso2.carbon.identity.context.rewrite.valve.OrganizationContextRewriteValve.invoke(OrganizationContextRewriteValve.java:116) ~[org.wso2.carbon.identity.context.rewrite.valve_1.7.1.jar:?]
at org.wso2.carbon.tomcat.ext.valves.SameSiteCookieValve.invoke(SameSiteCookieValve.java:38) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.wso2.carbon.identity.authz.valve.AuthorizationValve.invoke(AuthorizationValve.java:165) ~[org.wso2.carbon.identity.authz.valve_1.7.1.jar:?]
at org.wso2.carbon.identity.auth.valve.AuthenticationValve.invoke(AuthenticationValve.java:111) ~[org.wso2.carbon.identity.auth.valve_1.7.1.jar:?]
at org.wso2.carbon.tomcat.ext.valves.CompositeValve.continueInvocation(CompositeValve.java:106) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.wso2.carbon.tomcat.ext.valves.TomcatValveContainer.invokeValves(TomcatValveContainer.java:49) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.wso2.carbon.tomcat.ext.valves.CompositeValve.invoke(CompositeValve.java:67) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.wso2.carbon.tomcat.ext.valves.CarbonStuckThreadDetectionValve.invoke(CarbonStuckThreadDetectionValve.java:152) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.apache.catalina.valves.AbstractAccessLogValve.invoke(AbstractAccessLogValve.java:687) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.wso2.carbon.tomcat.ext.valves.CarbonContextCreatorValve.invoke(CarbonContextCreatorValve.java:63) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.wso2.carbon.tomcat.ext.valves.RequestCorrelationIdValve.invoke(RequestCorrelationIdValve.java:137) ~[org.wso2.carbon.tomcat.ext_4.8.0.m1.jar:?]
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:359) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:399) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:889) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1735) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) ~[tomcat_9.0.58.wso2v1.jar:?]
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) ~[tomcat_9.0.58.wso2v1.jar:?]
at java.lang.Thread.run(Thread.java:833) [?:?]
```
### Steps to Reproduce
Profile optimize and start the Gateway-worker profile.
### Affected Component
APIM
### Version
APIM 4.2.0 M1 testing pack
### Environment Details (with versions)
_No response_
### Relevant Log Output
_No response_
### Related Issues
_No response_
### Suggested Labels
_No response_ | priority | starting gateway profile in jdk shows an error log description the following error log is being printed when starting the gateway profile in jdk this works fine in jdk error servlet service for servlet in context with path threw exception java lang nullpointerexception cannot invoke org osgi util tracker servicetracker getservices because org carbon ui tracker authenticatorregistry authtracker is null at org carbon ui tracker authenticatorregistry getcarbonauthenticator authenticatorregistry java at org carbon ui carbonuiloginutil getauthenticator carbonuiloginutil java at org carbon ui carbonsecuredhttpcontext handlesecurity carbonsecuredhttpcontext java at org eclipse equinox http servlet internal servletregistration service servletregistration java at org eclipse equinox http servlet internal proxyservlet processalias proxyservlet java at org eclipse equinox http servlet internal proxyservlet service proxyservlet java at javax servlet http httpservlet service httpservlet java at org carbon tomcat ext servlet delegationservlet service delegationservlet java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org apache tomcat websocket server wsfilter dofilter wsfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org owasp csrfguard csrfguardfilter dofilter csrfguardfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org carbon tomcat ext filter charactersetfilter dofilter charactersetfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org apache catalina filters httpheadersecurityfilter dofilter httpheadersecurityfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org apache catalina core standardwrappervalve invoke standardwrappervalve java at org apache catalina core standardcontextvalve invoke standardcontextvalve java at org apache catalina authenticator authenticatorbase invoke authenticatorbase java at org apache catalina core standardhostvalve invoke standardhostvalve java at org apache catalina valves errorreportvalve invoke errorreportvalve java at org carbon identity context rewrite valve tenantcontextrewritevalve invoke tenantcontextrewritevalve java at org carbon identity context rewrite valve organizationcontextrewritevalve invoke organizationcontextrewritevalve java at org carbon tomcat ext valves samesitecookievalve invoke samesitecookievalve java at org carbon identity authz valve authorizationvalve invoke authorizationvalve java at org carbon identity auth valve authenticationvalve invoke authenticationvalve java at org carbon tomcat ext valves compositevalve continueinvocation compositevalve java at org carbon tomcat ext valves tomcatvalvecontainer invokevalves tomcatvalvecontainer java at org carbon tomcat ext valves compositevalve invoke compositevalve java at org carbon tomcat ext valves carbonstuckthreaddetectionvalve invoke carbonstuckthreaddetectionvalve java at org apache catalina valves abstractaccesslogvalve invoke abstractaccesslogvalve java at org carbon tomcat ext valves carboncontextcreatorvalve invoke carboncontextcreatorvalve java at org carbon tomcat ext valves requestcorrelationidvalve invoke requestcorrelationidvalve java at org apache catalina core standardenginevalve invoke standardenginevalve java at org apache catalina connector coyoteadapter service coyoteadapter java at org apache coyote service java at org apache coyote abstractprocessorlight process abstractprocessorlight java at org apache coyote abstractprotocol connectionhandler process abstractprotocol java at org apache tomcat util net nioendpoint socketprocessor dorun nioendpoint java at org apache tomcat util net socketprocessorbase run socketprocessorbase java at org apache tomcat util threads threadpoolexecutor runworker threadpoolexecutor java at org apache tomcat util threads threadpoolexecutor worker run threadpoolexecutor java at org apache tomcat util threads taskthread wrappingrunnable run taskthread java at java lang thread run thread java steps to reproduce profile optimize and start the gateway worker profile affected component apim version apim testing pack environment details with versions no response relevant log output no response related issues no response suggested labels no response | 1 |
317,684 | 23,683,874,269 | IssuesEvent | 2022-08-29 03:07:21 | rojedav/git_web_practice_branch | https://api.github.com/repos/rojedav/git_web_practice_branch | opened | Un commit que no sigue la convención de código o arreglo a realizar | documentation | La convención del mensaje del último commit no es la esperada:
` FIX1: Update pagina 5.`
Recuerde que debe tener el siguiente formato: `<Identificador de la corrección>: <Comentario>`
Para realizar la corrección del mensaje de commit ejecute los comandos `git commit --amend` y `git push -f`
Este issue es solo un recordatorio de la convención de comentarios en los commits y puede ser cerrado. | 1.0 | Un commit que no sigue la convención de código o arreglo a realizar - La convención del mensaje del último commit no es la esperada:
` FIX1: Update pagina 5.`
Recuerde que debe tener el siguiente formato: `<Identificador de la corrección>: <Comentario>`
Para realizar la corrección del mensaje de commit ejecute los comandos `git commit --amend` y `git push -f`
Este issue es solo un recordatorio de la convención de comentarios en los commits y puede ser cerrado. | non_priority | un commit que no sigue la convención de código o arreglo a realizar la convención del mensaje del último commit no es la esperada update pagina recuerde que debe tener el siguiente formato para realizar la corrección del mensaje de commit ejecute los comandos git commit amend y git push f este issue es solo un recordatorio de la convención de comentarios en los commits y puede ser cerrado | 0 |
399,731 | 27,253,147,472 | IssuesEvent | 2023-02-22 09:37:23 | argilla-io/argilla | https://api.github.com/repos/argilla-io/argilla | closed | Docs: `docker-compose.yaml` URL in User Management documentation points to Rubrix | bug documentation | **Describe the bug**
The first URL in [this link](https://docs.argilla.io/en/latest/getting_started/installation/configurations/user_management.html#using-docker-compose) points to https://raw.githubusercontent.com/recognai/rubrix/master/docker-compose.yaml?, which shows various outdated mentions of `rubrix`. Presumably this is an outdated script, and it should be replaced.
**To Reproduce**
Steps to reproduce the behavior:
1. Go to https://docs.argilla.io/en/latest/getting_started/installation/configurations/user_management.html#using-docker-compose
2. Click on the URL to go to https://raw.githubusercontent.com/recognai/rubrix/master/docker-compose.yaml
3. Observe some ~8 mentions of Rubrix
**Expected behavior**
I expect for this docker yaml to be usable with the most recent Argilla version, but I presume that it isn't.
**Screenshots**
N\A
**Environment (please complete the following information):**
N\A
**Additional context**
N\A
| 1.0 | Docs: `docker-compose.yaml` URL in User Management documentation points to Rubrix - **Describe the bug**
The first URL in [this link](https://docs.argilla.io/en/latest/getting_started/installation/configurations/user_management.html#using-docker-compose) points to https://raw.githubusercontent.com/recognai/rubrix/master/docker-compose.yaml?, which shows various outdated mentions of `rubrix`. Presumably this is an outdated script, and it should be replaced.
**To Reproduce**
Steps to reproduce the behavior:
1. Go to https://docs.argilla.io/en/latest/getting_started/installation/configurations/user_management.html#using-docker-compose
2. Click on the URL to go to https://raw.githubusercontent.com/recognai/rubrix/master/docker-compose.yaml
3. Observe some ~8 mentions of Rubrix
**Expected behavior**
I expect for this docker yaml to be usable with the most recent Argilla version, but I presume that it isn't.
**Screenshots**
N\A
**Environment (please complete the following information):**
N\A
**Additional context**
N\A
| non_priority | docs docker compose yaml url in user management documentation points to rubrix describe the bug the first url in points to which shows various outdated mentions of rubrix presumably this is an outdated script and it should be replaced to reproduce steps to reproduce the behavior go to click on the url to go to observe some mentions of rubrix expected behavior i expect for this docker yaml to be usable with the most recent argilla version but i presume that it isn t screenshots n a environment please complete the following information n a additional context n a | 0 |
586,214 | 17,572,828,712 | IssuesEvent | 2021-08-15 03:11:07 | temporalio/sdk-java | https://api.github.com/repos/temporalio/sdk-java | opened | Flaky testShouldReturnQueryResultAfterWorkflowTimeout | low priority | ## Actual Behavior
java-sdk builds in buildkite started to fail often on flaky `TerminatedWorkflowQueryTest#testShouldReturnQueryResultAfterWorkflowTimeout` | 1.0 | Flaky testShouldReturnQueryResultAfterWorkflowTimeout - ## Actual Behavior
java-sdk builds in buildkite started to fail often on flaky `TerminatedWorkflowQueryTest#testShouldReturnQueryResultAfterWorkflowTimeout` | priority | flaky testshouldreturnqueryresultafterworkflowtimeout actual behavior java sdk builds in buildkite started to fail often on flaky terminatedworkflowquerytest testshouldreturnqueryresultafterworkflowtimeout | 1 |
762,243 | 26,712,391,312 | IssuesEvent | 2023-01-28 03:23:41 | Reyder95/Project-Capybara | https://api.github.com/repos/Reyder95/Project-Capybara | opened | Implement level switcher | ready for development technological easy high priority | There needs to be switching between scenes (levels). This needs to be implemented. | 1.0 | Implement level switcher - There needs to be switching between scenes (levels). This needs to be implemented. | priority | implement level switcher there needs to be switching between scenes levels this needs to be implemented | 1 |
185,949 | 21,890,714,432 | IssuesEvent | 2022-05-20 01:04:02 | mkevenaar/OctoPrint-Slack | https://api.github.com/repos/mkevenaar/OctoPrint-Slack | opened | CVE-2022-1432 (High) detected in OctoPrint-1.7.2-py2.py3-none-any.whl | security vulnerability | ## CVE-2022-1432 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>OctoPrint-1.7.2-py2.py3-none-any.whl</b></p></summary>
<p>The snappy web interface for your 3D printer</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/85/f9/643f8de22bc50d11afee9560e0557859f0af7993c79cd4794c79bcd4d8c4/OctoPrint-1.7.2-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/85/f9/643f8de22bc50d11afee9560e0557859f0af7993c79cd4794c79bcd4d8c4/OctoPrint-1.7.2-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: /requirements.txt</p>
<p>Path to vulnerable library: /requirements.txt,/tmp/ws-scm/OctoPrint-Slack</p>
<p>
Dependency Hierarchy:
- :x: **OctoPrint-1.7.2-py2.py3-none-any.whl** (Vulnerable Library)
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0.
<p>Publish Date: 2022-05-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-1432>CVE-2022-1432</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1432">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1432</a></p>
<p>Release Date: 2022-05-18</p>
<p>Fix Resolution: OctoPrint - 1.8.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-1432 (High) detected in OctoPrint-1.7.2-py2.py3-none-any.whl - ## CVE-2022-1432 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>OctoPrint-1.7.2-py2.py3-none-any.whl</b></p></summary>
<p>The snappy web interface for your 3D printer</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/85/f9/643f8de22bc50d11afee9560e0557859f0af7993c79cd4794c79bcd4d8c4/OctoPrint-1.7.2-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/85/f9/643f8de22bc50d11afee9560e0557859f0af7993c79cd4794c79bcd4d8c4/OctoPrint-1.7.2-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: /requirements.txt</p>
<p>Path to vulnerable library: /requirements.txt,/tmp/ws-scm/OctoPrint-Slack</p>
<p>
Dependency Hierarchy:
- :x: **OctoPrint-1.7.2-py2.py3-none-any.whl** (Vulnerable Library)
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0.
<p>Publish Date: 2022-05-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-1432>CVE-2022-1432</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1432">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1432</a></p>
<p>Release Date: 2022-05-18</p>
<p>Fix Resolution: OctoPrint - 1.8.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in octoprint none any whl cve high severity vulnerability vulnerable library octoprint none any whl the snappy web interface for your printer library home page a href path to dependency file requirements txt path to vulnerable library requirements txt tmp ws scm octoprint slack dependency hierarchy x octoprint none any whl vulnerable library found in base branch develop vulnerability details cross site scripting xss generic in github repository octoprint octoprint prior to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution octoprint step up your open source security game with whitesource | 0 |
117,975 | 9,966,966,637 | IssuesEvent | 2019-07-08 12:34:27 | ckeditor/ckeditor-dev | https://api.github.com/repos/ckeditor/ckeditor-dev | closed | Test tests/plugins/pastefromword/generated/vertical_margin failing | browser:firefox plugin:pastefromword status:confirmed type:failingtest | ## Type of report
Failing test http://tests.ckeditor.test:1030/tests/plugins/pastefromword/generated/vertical_margin
## Provide detailed reproduction steps (if any)
Fixtures for IE 11 are failing.
## Other details
* Browser: Firefox
* Installed CKEditor plugins: pastefromword
CI is not showing this issue as it's on Linux and all tests on Linux are ignored due to filesystem case sensitivity. Test requires `Word*` files and we have `word*` ones in repo (notice difference in case of "w")…
| 1.0 | Test tests/plugins/pastefromword/generated/vertical_margin failing - ## Type of report
Failing test http://tests.ckeditor.test:1030/tests/plugins/pastefromword/generated/vertical_margin
## Provide detailed reproduction steps (if any)
Fixtures for IE 11 are failing.
## Other details
* Browser: Firefox
* Installed CKEditor plugins: pastefromword
CI is not showing this issue as it's on Linux and all tests on Linux are ignored due to filesystem case sensitivity. Test requires `Word*` files and we have `word*` ones in repo (notice difference in case of "w")…
| non_priority | test tests plugins pastefromword generated vertical margin failing type of report failing test provide detailed reproduction steps if any fixtures for ie are failing other details browser firefox installed ckeditor plugins pastefromword ci is not showing this issue as it s on linux and all tests on linux are ignored due to filesystem case sensitivity test requires word files and we have word ones in repo notice difference in case of w … | 0 |
4,500 | 2,552,678,989 | IssuesEvent | 2015-02-02 18:43:00 | Sistema-Integrado-Gestao-Academica/SiGA | https://api.github.com/repos/Sistema-Integrado-Gestao-Academica/SiGA | opened | Currículo de Curso | enhancement [Medium Priority] | Como **secretária acadêmica** [de determinado Curso] desejo alocar disciplinas (issue #31) no **Currículo** de determinado **Curso de Pós-Graduação** (issue #5 ) para que possa organizar corretamente a lista de oferta do meu curso a partir dos cursos existentes no sistema.
------------------------
| 1.0 | Currículo de Curso - Como **secretária acadêmica** [de determinado Curso] desejo alocar disciplinas (issue #31) no **Currículo** de determinado **Curso de Pós-Graduação** (issue #5 ) para que possa organizar corretamente a lista de oferta do meu curso a partir dos cursos existentes no sistema.
------------------------
| priority | currículo de curso como secretária acadêmica desejo alocar disciplinas issue no currículo de determinado curso de pós graduação issue para que possa organizar corretamente a lista de oferta do meu curso a partir dos cursos existentes no sistema | 1 |
88,051 | 3,771,005,281 | IssuesEvent | 2016-03-16 16:15:49 | cmacma7/bn | https://api.github.com/repos/cmacma7/bn | opened | 網路不穩定時,不可以讓客戶新增商品widget(以進階團購為例) | First Priority | 網路不穩定時,不允許讓客戶新增商品widget(以進階團購為例)
故障現象:
客戶新增一個"進階團購"widget,在網路不穩定時,會帶出前一個widget的最終狀態(而不是一個全新的widget) 且依然可以編輯,文字照片都可以換掉。 但一旦按下鍵立,所有個圖片、文字都會失效,而是建立出"前一個widget的最終狀態"
客戶會完全錯亂! 不曉得為什麼新增widget會失效。
所以不可以再讓客戶 進入這樣的狀態了,必須完全清除前一個狀態! | 1.0 | 網路不穩定時,不可以讓客戶新增商品widget(以進階團購為例) - 網路不穩定時,不允許讓客戶新增商品widget(以進階團購為例)
故障現象:
客戶新增一個"進階團購"widget,在網路不穩定時,會帶出前一個widget的最終狀態(而不是一個全新的widget) 且依然可以編輯,文字照片都可以換掉。 但一旦按下鍵立,所有個圖片、文字都會失效,而是建立出"前一個widget的最終狀態"
客戶會完全錯亂! 不曉得為什麼新增widget會失效。
所以不可以再讓客戶 進入這樣的狀態了,必須完全清除前一個狀態! | priority | 網路不穩定時,不可以讓客戶新增商品widget 以進階團購為例 網路不穩定時,不允許讓客戶新增商品widget 以進階團購為例 故障現象 客戶新增一個 進階團購 widget,在網路不穩定時,會帶出前一個widget的最終狀態 而不是一個全新的widget 且依然可以編輯,文字照片都可以換掉。 但一旦按下鍵立,所有個圖片、文字都會失效,而是建立出 前一個widget的最終狀態 客戶會完全錯亂 不曉得為什麼新增widget會失效。 所以不可以再讓客戶 進入這樣的狀態了,必須完全清除前一個狀態 | 1 |
355,050 | 10,576,036,948 | IssuesEvent | 2019-10-07 16:58:11 | compodoc/compodoc | https://api.github.com/repos/compodoc/compodoc | closed | [BUG] Same Description used for all Overload Functions | Priority: Medium Time: ~1 hour Type: Bug wontfix | <!--
> Please follow the issue template below for bug reports and queries.
> For issue, start the label of the title with [BUG]
> For feature requests, start the label of the title with [FEATURE] and explain your use case and ideas clearly below, you can remove sections which are not relevant.
-->
##### **Overview of the issue**
When adding a description to each overload function Compodoc adds the description together for all overloads and uses it for all of the functions.

##### **Operating System, Node.js, npm, compodoc version(s)**
Compodoc 1.0.9
##### **Angular configuration, a `package.json` file in the root folder**
##### **Compodoc installed globally or locally ?**
Locally
##### **Motivation for or Use Case**
Each override function should have it's own description.
##### **Reproduce the error**
<!-- an unambiguous set of steps to reproduce the error. -->
##### **Related issues**
##### **Suggest a Fix**
| 1.0 | [BUG] Same Description used for all Overload Functions - <!--
> Please follow the issue template below for bug reports and queries.
> For issue, start the label of the title with [BUG]
> For feature requests, start the label of the title with [FEATURE] and explain your use case and ideas clearly below, you can remove sections which are not relevant.
-->
##### **Overview of the issue**
When adding a description to each overload function Compodoc adds the description together for all overloads and uses it for all of the functions.

##### **Operating System, Node.js, npm, compodoc version(s)**
Compodoc 1.0.9
##### **Angular configuration, a `package.json` file in the root folder**
##### **Compodoc installed globally or locally ?**
Locally
##### **Motivation for or Use Case**
Each override function should have it's own description.
##### **Reproduce the error**
<!-- an unambiguous set of steps to reproduce the error. -->
##### **Related issues**
##### **Suggest a Fix**
| priority | same description used for all overload functions please follow the issue template below for bug reports and queries for issue start the label of the title with for feature requests start the label of the title with and explain your use case and ideas clearly below you can remove sections which are not relevant overview of the issue when adding a description to each overload function compodoc adds the description together for all overloads and uses it for all of the functions operating system node js npm compodoc version s compodoc angular configuration a package json file in the root folder compodoc installed globally or locally locally motivation for or use case each override function should have it s own description reproduce the error related issues suggest a fix | 1 |
144,881 | 13,129,244,542 | IssuesEvent | 2020-08-06 13:37:08 | mathematicalmichael/cafelytics | https://api.github.com/repos/mathematicalmichael/cafelytics | opened | update binder links | documentation good first issue | these are really outdated. now that we don't depend on octave, we can use the default binder settings to just build the dependency set from `requirements.txt` | 1.0 | update binder links - these are really outdated. now that we don't depend on octave, we can use the default binder settings to just build the dependency set from `requirements.txt` | non_priority | update binder links these are really outdated now that we don t depend on octave we can use the default binder settings to just build the dependency set from requirements txt | 0 |
531,263 | 15,443,567,253 | IssuesEvent | 2021-03-08 09:18:01 | zephyrproject-rtos/zephyr | https://api.github.com/repos/zephyrproject-rtos/zephyr | closed | [Coverity CID :219611] Dereference after null check in subsys/net/ip/tcp2.c | Coverity bug priority: low |
Static code scan issues found in file:
https://github.com/zephyrproject-rtos/zephyr/tree/bd97359a5338b2542d19011b6d6aa1d8d1b9cc3f/subsys/net/ip/tcp2.c
Category: Null pointer dereferences
Function: `tcp_in`
Component: Networking
CID: [219611](https://scan9.coverity.com/reports.htm#v29726/p12996/mergedDefectId=219611)
Details:
https://github.com/zephyrproject-rtos/zephyr/blob/bd97359a5338b2542d19011b6d6aa1d8d1b9cc3f/subsys/net/ip/tcp2.c#L1535
Please fix or provide comments in coverity using the link:
https://scan9.coverity.com/reports.htm#v32951/p12996.
Note: This issue was created automatically. Priority was set based on classification
of the file affected and the impact field in coverity. Assignees were set using the CODEOWNERS file.
| 1.0 | [Coverity CID :219611] Dereference after null check in subsys/net/ip/tcp2.c -
Static code scan issues found in file:
https://github.com/zephyrproject-rtos/zephyr/tree/bd97359a5338b2542d19011b6d6aa1d8d1b9cc3f/subsys/net/ip/tcp2.c
Category: Null pointer dereferences
Function: `tcp_in`
Component: Networking
CID: [219611](https://scan9.coverity.com/reports.htm#v29726/p12996/mergedDefectId=219611)
Details:
https://github.com/zephyrproject-rtos/zephyr/blob/bd97359a5338b2542d19011b6d6aa1d8d1b9cc3f/subsys/net/ip/tcp2.c#L1535
Please fix or provide comments in coverity using the link:
https://scan9.coverity.com/reports.htm#v32951/p12996.
Note: This issue was created automatically. Priority was set based on classification
of the file affected and the impact field in coverity. Assignees were set using the CODEOWNERS file.
| priority | dereference after null check in subsys net ip c static code scan issues found in file category null pointer dereferences function tcp in component networking cid details please fix or provide comments in coverity using the link note this issue was created automatically priority was set based on classification of the file affected and the impact field in coverity assignees were set using the codeowners file | 1 |
18,421 | 2,615,170,778 | IssuesEvent | 2015-03-01 06:52:38 | chrsmith/html5rocks | https://api.github.com/repos/chrsmith/html5rocks | closed | HTML Details | auto-migrated Priority-P2 Type-Bug | ```
hi, why don't add the HTML 5 Details build in Chrome 15?
Like this site:
http://acidmartin.wordpress.com/2011/10/28/html-5-details-element-enabler/
In the slide:
http://slides.html5rocks.com/#landing-slide
It's cool. Thanks
```
Original issue reported on code.google.com by `luizcarl...@gmail.com` on 31 Oct 2011 at 1:29 | 1.0 | HTML Details - ```
hi, why don't add the HTML 5 Details build in Chrome 15?
Like this site:
http://acidmartin.wordpress.com/2011/10/28/html-5-details-element-enabler/
In the slide:
http://slides.html5rocks.com/#landing-slide
It's cool. Thanks
```
Original issue reported on code.google.com by `luizcarl...@gmail.com` on 31 Oct 2011 at 1:29 | priority | html details hi why don t add the html details build in chrome like this site in the slide it s cool thanks original issue reported on code google com by luizcarl gmail com on oct at | 1 |
256,302 | 27,561,636,522 | IssuesEvent | 2023-03-07 22:37:04 | samqws-marketing/amzn-ion-hive-serde | https://api.github.com/repos/samqws-marketing/amzn-ion-hive-serde | opened | hadoop-common-2.7.1.jar: 45 vulnerabilities (highest severity is: 9.8) | Mend: dependency security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p></summary>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (hadoop-common version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2019-10202](https://www.mend.io/vulnerability-database/CVE-2019-10202) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | jackson-mapper-asl-1.9.13.jar | Transitive | N/A* | ❌ |
| [CVE-2016-3086](https://www.mend.io/vulnerability-database/CVE-2016-3086) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | hadoop-common-2.7.1.jar | Direct | 2.7.3 | ✅ |
| [CVE-2022-26612](https://www.mend.io/vulnerability-database/CVE-2022-26612) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | hadoop-common-2.7.1.jar | Direct | org.apache.hadoop:hadoop-common:3.2.3 | ✅ |
| [CVE-2022-25168](https://www.mend.io/vulnerability-database/CVE-2022-25168) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | hadoop-common-2.7.1.jar | Direct | 2.10.2 | ✅ |
| [CVE-2020-9493](https://www.mend.io/vulnerability-database/CVE-2020-9493) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2022-23305](https://www.mend.io/vulnerability-database/CVE-2022-23305) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2019-17571](https://www.mend.io/vulnerability-database/CVE-2019-17571) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2018-8029](https://www.mend.io/vulnerability-database/CVE-2018-8029) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | hadoop-common-2.7.1.jar | Direct | 2.8.5 | ✅ |
| [CVE-2018-8009](https://www.mend.io/vulnerability-database/CVE-2018-8009) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | hadoop-common-2.7.1.jar | Direct | 2.7.4 | ✅ |
| [CVE-2016-5393](https://www.mend.io/vulnerability-database/CVE-2016-5393) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | hadoop-common-2.7.1.jar | Direct | 2.7.3 | ✅ |
| [CVE-2022-23307](https://www.mend.io/vulnerability-database/CVE-2022-23307) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2022-23302](https://www.mend.io/vulnerability-database/CVE-2022-23302) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [WS-2021-0419](https://github.com/google/gson/pull/1991) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.7 | gson-2.2.4.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-3509](https://www.mend.io/vulnerability-database/CVE-2022-3509) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | protobuf-java-2.5.0.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2014-3643](https://www.mend.io/vulnerability-database/CVE-2014-3643) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | 2.7.2 | ✅ |
| [CVE-2022-45693](https://www.mend.io/vulnerability-database/CVE-2022-45693) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-36090](https://www.mend.io/vulnerability-database/CVE-2021-36090) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2019-10172](https://www.mend.io/vulnerability-database/CVE-2019-10172) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-mapper-asl-1.9.13.jar | Transitive | N/A* | ❌ |
| [CVE-2022-25647](https://www.mend.io/vulnerability-database/CVE-2022-25647) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | gson-2.2.4.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-40149](https://www.mend.io/vulnerability-database/CVE-2022-40149) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2017-5637](https://www.mend.io/vulnerability-database/CVE-2017-5637) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | zookeeper-3.4.6.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-35517](https://www.mend.io/vulnerability-database/CVE-2021-35517) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-35516](https://www.mend.io/vulnerability-database/CVE-2021-35516) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-35515](https://www.mend.io/vulnerability-database/CVE-2021-35515) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-4104](https://www.mend.io/vulnerability-database/CVE-2021-4104) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2018-8012](https://www.mend.io/vulnerability-database/CVE-2018-8012) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | zookeeper-3.4.6.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-3171](https://www.mend.io/vulnerability-database/CVE-2022-3171) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | protobuf-java-2.5.0.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-40150](https://www.mend.io/vulnerability-database/CVE-2022-40150) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-45685](https://www.mend.io/vulnerability-database/CVE-2022-45685) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2019-10086](https://www.mend.io/vulnerability-database/CVE-2019-10086) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | detected in multiple dependencies | Transitive | 2.7.2 | ✅ |
| [CVE-2014-0114](https://www.mend.io/vulnerability-database/CVE-2014-0114) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | detected in multiple dependencies | Transitive | 2.7.2 | ✅ |
| [CVE-2021-37533](https://www.mend.io/vulnerability-database/CVE-2021-37533) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | commons-net-3.1.jar | Transitive | 2.7.2 | ✅ |
| [WS-2019-0379](https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | commons-codec-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2017-15713](https://www.mend.io/vulnerability-database/CVE-2017-15713) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | hadoop-common-2.7.1.jar | Direct | 2.8.3 | ✅ |
| [CVE-2016-5725](https://www.mend.io/vulnerability-database/CVE-2016-5725) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jsch-0.1.42.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2019-0201](https://www.mend.io/vulnerability-database/CVE-2019-0201) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | zookeeper-3.4.6.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2018-10237](https://www.mend.io/vulnerability-database/CVE-2018-10237) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | guava-16.0.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2018-11771](https://www.mend.io/vulnerability-database/CVE-2018-11771) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-22569](https://www.mend.io/vulnerability-database/CVE-2021-22569) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | protobuf-java-2.5.0.jar | Transitive | 2.7.2 | ✅ |
| [WS-2017-3734](https://github.com/apache/httpcomponents-client/commit/0554271750599756d4946c0d7ba43d04b1a7b220) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | httpclient-4.4.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2020-13956](https://www.mend.io/vulnerability-database/CVE-2020-13956) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | httpclient-4.4.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2012-5783](https://www.mend.io/vulnerability-database/CVE-2012-5783) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-httpclient-3.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-29425](https://www.mend.io/vulnerability-database/CVE-2021-29425) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-io-2.4.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2020-9488](https://www.mend.io/vulnerability-database/CVE-2020-9488) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.7 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2020-8908](https://www.mend.io/vulnerability-database/CVE-2020-8908) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.3 | guava-16.0.1.jar | Transitive | 2.7.2 | ✅ |
<p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p>
## Details
> Partial details (21 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br>
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2019-10202</summary>
### Vulnerable Library - <b>jackson-mapper-asl-1.9.13.jar</b></p>
<p>Data Mapper package is a high-performance data binding package
built on Jackson JSON processor</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jackson-mapper-asl-1.9.13.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike.
<p>Publish Date: 2019-10-01
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10202>CVE-2019-10202</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4">https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4</a></p>
<p>Release Date: 2019-10-01</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.0.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2016-3086</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The YARN NodeManager in Apache Hadoop 2.6.x before 2.6.5 and 2.7.x before 2.7.3 can leak the password for credential store provider used by the NodeManager to YARN Applications.
<p>Publish Date: 2017-09-05
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-3086>CVE-2016-3086</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://mail-archives.apache.org/mod_mbox/hadoop-general/201701.mbox/%3C0ed32746-5a53-9051-5877-2b1abd88beb6%40apache.org%3E">http://mail-archives.apache.org/mod_mbox/hadoop-general/201701.mbox/%3C0ed32746-5a53-9051-5877-2b1abd88beb6%40apache.org%3E</a></p>
<p>Release Date: 2017-01-10</p>
<p>Fix Resolution: 2.7.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-26612</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the external directory using the symlink name. This however would be caught by the same targetDirPath check on Unix because of the getCanonicalPath call. However on Windows, getCanonicalPath doesn't resolve symbolic links, which bypasses the check. unpackEntries during TAR extraction follows symbolic links which allows writing outside expected base directory on Windows. This was addressed in Apache Hadoop 3.2.3
<p>Publish Date: 2022-04-07
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-26612>CVE-2022-26612</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26612">https://nvd.nist.gov/vuln/detail/CVE-2022-26612</a></p>
<p>Release Date: 2022-04-07</p>
<p>Fix Resolution: org.apache.hadoop:hadoop-common:3.2.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-25168</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Hadoop's FileUtil.unTar(File, File) API does not escape the input file name before being passed to the shell. An attacker can inject arbitrary commands. This is only used in Hadoop 3.3 InMemoryAliasMap.completeBootstrapTransfer, which is only ever run by a local user. It has been used in Hadoop 2.x for yarn localization, which does enable remote code execution. It is used in Apache Spark, from the SQL command ADD ARCHIVE. As the ADD ARCHIVE command adds new binaries to the classpath, being able to execute shell scripts does not confer new permissions to the caller. SPARK-38305. "Check existence of file before untarring/zipping", which is included in 3.3.0, 3.1.4, 3.2.2, prevents shell commands being executed, regardless of which version of the hadoop libraries are in use. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.3 or upper (including HADOOP-18136).
<p>Publish Date: 2022-08-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25168>CVE-2022-25168</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread/mxqnb39jfrwgs3j6phwvlrfq4mlox130">https://lists.apache.org/thread/mxqnb39jfrwgs3j6phwvlrfq4mlox130</a></p>
<p>Release Date: 2022-08-04</p>
<p>Fix Resolution: 2.10.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2020-9493</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
<p>Publish Date: 2021-06-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9493>CVE-2020-9493</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.openwall.com/lists/oss-security/2021/06/16/1">https://www.openwall.com/lists/oss-security/2021/06/16/1</a></p>
<p>Release Date: 2021-06-16</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-23305</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23305>CVE-2022-23305</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2019-17571</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
<p>Publish Date: 2019-12-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17571>CVE-2019-17571</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E">https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E</a></p>
<p>Release Date: 2019-12-20</p>
<p>Fix Resolution: log4j-manual - 1.2.17-16;log4j-javadoc - 1.2.17-16;log4j - 1.2.17-16,1.2.17-16</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-8029</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Hadoop versions 3.0.0-alpha1 to 3.1.0, 2.9.0 to 2.9.1, and 2.2.0 to 2.8.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user.
<p>Publish Date: 2019-05-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-8029>CVE-2018-8029</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8029</a></p>
<p>Release Date: 2019-05-30</p>
<p>Fix Resolution: 2.8.5</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-8009</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.
<p>Publish Date: 2018-11-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-8009>CVE-2018-8009</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1593018">https://bugzilla.redhat.com/show_bug.cgi?id=1593018</a></p>
<p>Release Date: 2018-11-13</p>
<p>Fix Resolution: 2.7.4</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-5393</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Hadoop 2.6.x before 2.6.5 and 2.7.x before 2.7.3, a remote user who can authenticate with the HDFS NameNode can possibly run arbitrary commands with the same privileges as the HDFS service.
<p>Publish Date: 2016-11-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-5393>CVE-2016-5393</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5393">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5393</a></p>
<p>Release Date: 2016-11-29</p>
<p>Fix Resolution: 2.7.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-23307</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23307>CVE-2022-23307</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-23302</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23302>CVE-2022-23302</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2021-0419</summary>
### Vulnerable Library - <b>gson-2.2.4.jar</b></p>
<p>Google Gson library</p>
<p>Library home page: <a href="http://code.google.com/p/google-gson/">http://code.google.com/p/google-gson/</a></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **gson-2.2.4.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Denial of Service vulnerability was discovered in gson before 2.8.9 via the writeReplace() method.
<p>Publish Date: 2021-10-11
<p>URL: <a href=https://github.com/google/gson/pull/1991>WS-2021-0419</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.7</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-10-11</p>
<p>Fix Resolution (com.google.code.gson:gson): 2.8.9</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-3509</summary>
### Vulnerable Library - <b>protobuf-java-2.5.0.jar</b></p>
<p>Protocol Buffers are a way of encoding structured data in an efficient yet
extensible format.</p>
<p>Library home page: <a href="http://code.google.com/p/protobuf">http://code.google.com/p/protobuf</a></p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/2.5.0/a10732c76bfacdbd633a7eb0f7968b1059a65dfa/protobuf-java-2.5.0.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/2.5.0/a10732c76bfacdbd633a7eb0f7968b1059a65dfa/protobuf-java-2.5.0.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **protobuf-java-2.5.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
<p>Publish Date: 2022-12-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-3509>CVE-2022-3509</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3509">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3509</a></p>
<p>Release Date: 2022-12-12</p>
<p>Fix Resolution (com.google.protobuf:protobuf-java): 3.16.3</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-3643</summary>
### Vulnerable Libraries - <b>jersey-core-1.9.jar</b>, <b>jersey-server-1.9.jar</b></p>
<p>
### <b>jersey-core-1.9.jar</b></p>
<p>Jersey is the open source (under dual CDDL+GPL license) JAX-RS (JSR 311)
production quality Reference Implementation for building
RESTful Web services.</p>
<p>Library home page: <a href="https://jersey.java.net/">https://jersey.java.net/</a></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-core/1.9/8341846f18187013bb9e27e46b7ee00a6395daf4/jersey-core-1.9.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-core/1.9/8341846f18187013bb9e27e46b7ee00a6395daf4/jersey-core-1.9.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jersey-core-1.9.jar** (Vulnerable Library)
### <b>jersey-server-1.9.jar</b></p>
<p>Jersey is the open source (under dual CDDL+GPL license) JAX-RS (JSR 311)
production quality Reference Implementation for building
RESTful Web services.</p>
<p>Library home page: <a href="https://jersey.java.net/">https://jersey.java.net/</a></p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-server/1.9/3a6ea7cc5e15c824953f9f3ece2201b634d90d18/jersey-server-1.9.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-server/1.9/3a6ea7cc5e15c824953f9f3ece2201b634d90d18/jersey-server-1.9.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jersey-server-1.9.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jersey: XXE via parameter entities not disabled by the jersey SAX parser
<p>Publish Date: 2019-12-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-3643>CVE-2014-3643</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3643">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3643</a></p>
<p>Release Date: 2019-12-15</p>
<p>Fix Resolution (com.sun.jersey:jersey-core): 1.12-b01</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p><p>Fix Resolution (com.sun.jersey:jersey-server): 1.13-b01</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-45693</summary>
### Vulnerable Library - <b>jettison-1.1.jar</b></p>
<p>A StAX implementation for JSON.</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- jersey-json-1.9.jar
- :x: **jettison-1.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
<p>Publish Date: 2022-12-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-45693>CVE-2022-45693</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-12-13</p>
<p>Fix Resolution (org.codehaus.jettison:jettison): 1.5.2</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-36090</summary>
### Vulnerable Library - <b>commons-compress-1.9.jar</b></p>
<p>Apache Commons Compress software defines an API for working with
compression and archive formats.
These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional
Unix Compress, DEFLATE and ar, cpio, jar, tar, zip, dump, 7z, arj.</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.9/cc18955ff1e36d5abd39a14bfe82b19154330a34/commons-compress-1.9.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.9/cc18955ff1e36d5abd39a14bfe82b19154330a34/commons-compress-1.9.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **commons-compress-1.9.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.
<p>Publish Date: 2021-07-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-36090>CVE-2021-36090</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://commons.apache.org/proper/commons-compress/security-reports.html">https://commons.apache.org/proper/commons-compress/security-reports.html</a></p>
<p>Release Date: 2021-07-13</p>
<p>Fix Resolution (org.apache.commons:commons-compress): 1.21</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-10172</summary>
### Vulnerable Library - <b>jackson-mapper-asl-1.9.13.jar</b></p>
<p>Data Mapper package is a high-performance data binding package
built on Jackson JSON processor</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jackson-mapper-asl-1.9.13.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.
<p>Publish Date: 2019-11-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10172>CVE-2019-10172</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10172">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10172</a></p>
<p>Release Date: 2019-11-18</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.0.0-RC1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-25647</summary>
### Vulnerable Library - <b>gson-2.2.4.jar</b></p>
<p>Google Gson library</p>
<p>Library home page: <a href="http://code.google.com/p/google-gson/">http://code.google.com/p/google-gson/</a></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **gson-2.2.4.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.
<p>Publish Date: 2022-05-01
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25647>CVE-2022-25647</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25647`">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25647`</a></p>
<p>Release Date: 2022-05-01</p>
<p>Fix Resolution (com.google.code.gson:gson): 2.8.9</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-40149</summary>
### Vulnerable Library - <b>jettison-1.1.jar</b></p>
<p>A StAX implementation for JSON.</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- jersey-json-1.9.jar
- :x: **jettison-1.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
<p>Publish Date: 2022-09-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-40149>CVE-2022-40149</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-09-16</p>
<p>Fix Resolution (org.codehaus.jettison:jettison): 1.5.1</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-5637</summary>
### Vulnerable Library - <b>zookeeper-3.4.6.jar</b></p>
<p></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.zookeeper/zookeeper/3.4.6/1b2502e29da1ebaade2357cd1de35a855fa3755/zookeeper-3.4.6.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.zookeeper/zookeeper/3.4.6/1b2502e29da1ebaade2357cd1de35a855fa3755/zookeeper-3.4.6.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **zookeeper-3.4.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.
<p>Publish Date: 2017-10-10
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-5637>CVE-2017-5637</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637</a></p>
<p>Release Date: 2017-10-09</p>
<p>Fix Resolution (org.apache.zookeeper:zookeeper): 3.4.10</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | True | hadoop-common-2.7.1.jar: 45 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p></summary>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (hadoop-common version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2019-10202](https://www.mend.io/vulnerability-database/CVE-2019-10202) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | jackson-mapper-asl-1.9.13.jar | Transitive | N/A* | ❌ |
| [CVE-2016-3086](https://www.mend.io/vulnerability-database/CVE-2016-3086) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | hadoop-common-2.7.1.jar | Direct | 2.7.3 | ✅ |
| [CVE-2022-26612](https://www.mend.io/vulnerability-database/CVE-2022-26612) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | hadoop-common-2.7.1.jar | Direct | org.apache.hadoop:hadoop-common:3.2.3 | ✅ |
| [CVE-2022-25168](https://www.mend.io/vulnerability-database/CVE-2022-25168) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | hadoop-common-2.7.1.jar | Direct | 2.10.2 | ✅ |
| [CVE-2020-9493](https://www.mend.io/vulnerability-database/CVE-2020-9493) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2022-23305](https://www.mend.io/vulnerability-database/CVE-2022-23305) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2019-17571](https://www.mend.io/vulnerability-database/CVE-2019-17571) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2018-8029](https://www.mend.io/vulnerability-database/CVE-2018-8029) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | hadoop-common-2.7.1.jar | Direct | 2.8.5 | ✅ |
| [CVE-2018-8009](https://www.mend.io/vulnerability-database/CVE-2018-8009) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | hadoop-common-2.7.1.jar | Direct | 2.7.4 | ✅ |
| [CVE-2016-5393](https://www.mend.io/vulnerability-database/CVE-2016-5393) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | hadoop-common-2.7.1.jar | Direct | 2.7.3 | ✅ |
| [CVE-2022-23307](https://www.mend.io/vulnerability-database/CVE-2022-23307) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2022-23302](https://www.mend.io/vulnerability-database/CVE-2022-23302) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [WS-2021-0419](https://github.com/google/gson/pull/1991) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.7 | gson-2.2.4.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-3509](https://www.mend.io/vulnerability-database/CVE-2022-3509) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | protobuf-java-2.5.0.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2014-3643](https://www.mend.io/vulnerability-database/CVE-2014-3643) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | 2.7.2 | ✅ |
| [CVE-2022-45693](https://www.mend.io/vulnerability-database/CVE-2022-45693) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-36090](https://www.mend.io/vulnerability-database/CVE-2021-36090) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2019-10172](https://www.mend.io/vulnerability-database/CVE-2019-10172) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-mapper-asl-1.9.13.jar | Transitive | N/A* | ❌ |
| [CVE-2022-25647](https://www.mend.io/vulnerability-database/CVE-2022-25647) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | gson-2.2.4.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-40149](https://www.mend.io/vulnerability-database/CVE-2022-40149) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2017-5637](https://www.mend.io/vulnerability-database/CVE-2017-5637) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | zookeeper-3.4.6.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-35517](https://www.mend.io/vulnerability-database/CVE-2021-35517) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-35516](https://www.mend.io/vulnerability-database/CVE-2021-35516) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-35515](https://www.mend.io/vulnerability-database/CVE-2021-35515) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-4104](https://www.mend.io/vulnerability-database/CVE-2021-4104) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2018-8012](https://www.mend.io/vulnerability-database/CVE-2018-8012) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | zookeeper-3.4.6.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-3171](https://www.mend.io/vulnerability-database/CVE-2022-3171) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | protobuf-java-2.5.0.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-40150](https://www.mend.io/vulnerability-database/CVE-2022-40150) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2022-45685](https://www.mend.io/vulnerability-database/CVE-2022-45685) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jettison-1.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2019-10086](https://www.mend.io/vulnerability-database/CVE-2019-10086) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | detected in multiple dependencies | Transitive | 2.7.2 | ✅ |
| [CVE-2014-0114](https://www.mend.io/vulnerability-database/CVE-2014-0114) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | detected in multiple dependencies | Transitive | 2.7.2 | ✅ |
| [CVE-2021-37533](https://www.mend.io/vulnerability-database/CVE-2021-37533) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | commons-net-3.1.jar | Transitive | 2.7.2 | ✅ |
| [WS-2019-0379](https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | commons-codec-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2017-15713](https://www.mend.io/vulnerability-database/CVE-2017-15713) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | hadoop-common-2.7.1.jar | Direct | 2.8.3 | ✅ |
| [CVE-2016-5725](https://www.mend.io/vulnerability-database/CVE-2016-5725) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | jsch-0.1.42.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2019-0201](https://www.mend.io/vulnerability-database/CVE-2019-0201) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | zookeeper-3.4.6.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2018-10237](https://www.mend.io/vulnerability-database/CVE-2018-10237) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | guava-16.0.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2018-11771](https://www.mend.io/vulnerability-database/CVE-2018-11771) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | commons-compress-1.9.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-22569](https://www.mend.io/vulnerability-database/CVE-2021-22569) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | protobuf-java-2.5.0.jar | Transitive | 2.7.2 | ✅ |
| [WS-2017-3734](https://github.com/apache/httpcomponents-client/commit/0554271750599756d4946c0d7ba43d04b1a7b220) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | httpclient-4.4.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2020-13956](https://www.mend.io/vulnerability-database/CVE-2020-13956) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | httpclient-4.4.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2012-5783](https://www.mend.io/vulnerability-database/CVE-2012-5783) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-httpclient-3.1.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2021-29425](https://www.mend.io/vulnerability-database/CVE-2021-29425) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-io-2.4.jar | Transitive | 2.7.2 | ✅ |
| [CVE-2020-9488](https://www.mend.io/vulnerability-database/CVE-2020-9488) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.7 | log4j-1.2.17.jar | Transitive | N/A* | ❌ |
| [CVE-2020-8908](https://www.mend.io/vulnerability-database/CVE-2020-8908) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.3 | guava-16.0.1.jar | Transitive | 2.7.2 | ✅ |
<p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p>
## Details
> Partial details (21 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br>
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2019-10202</summary>
### Vulnerable Library - <b>jackson-mapper-asl-1.9.13.jar</b></p>
<p>Data Mapper package is a high-performance data binding package
built on Jackson JSON processor</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jackson-mapper-asl-1.9.13.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike.
<p>Publish Date: 2019-10-01
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10202>CVE-2019-10202</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4">https://lists.apache.org/thread/08302h5kp2l9ry2zq8vydomlhn0fg4j4</a></p>
<p>Release Date: 2019-10-01</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.0.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2016-3086</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The YARN NodeManager in Apache Hadoop 2.6.x before 2.6.5 and 2.7.x before 2.7.3 can leak the password for credential store provider used by the NodeManager to YARN Applications.
<p>Publish Date: 2017-09-05
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-3086>CVE-2016-3086</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://mail-archives.apache.org/mod_mbox/hadoop-general/201701.mbox/%3C0ed32746-5a53-9051-5877-2b1abd88beb6%40apache.org%3E">http://mail-archives.apache.org/mod_mbox/hadoop-general/201701.mbox/%3C0ed32746-5a53-9051-5877-2b1abd88beb6%40apache.org%3E</a></p>
<p>Release Date: 2017-01-10</p>
<p>Fix Resolution: 2.7.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-26612</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the external directory using the symlink name. This however would be caught by the same targetDirPath check on Unix because of the getCanonicalPath call. However on Windows, getCanonicalPath doesn't resolve symbolic links, which bypasses the check. unpackEntries during TAR extraction follows symbolic links which allows writing outside expected base directory on Windows. This was addressed in Apache Hadoop 3.2.3
<p>Publish Date: 2022-04-07
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-26612>CVE-2022-26612</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26612">https://nvd.nist.gov/vuln/detail/CVE-2022-26612</a></p>
<p>Release Date: 2022-04-07</p>
<p>Fix Resolution: org.apache.hadoop:hadoop-common:3.2.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-25168</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Hadoop's FileUtil.unTar(File, File) API does not escape the input file name before being passed to the shell. An attacker can inject arbitrary commands. This is only used in Hadoop 3.3 InMemoryAliasMap.completeBootstrapTransfer, which is only ever run by a local user. It has been used in Hadoop 2.x for yarn localization, which does enable remote code execution. It is used in Apache Spark, from the SQL command ADD ARCHIVE. As the ADD ARCHIVE command adds new binaries to the classpath, being able to execute shell scripts does not confer new permissions to the caller. SPARK-38305. "Check existence of file before untarring/zipping", which is included in 3.3.0, 3.1.4, 3.2.2, prevents shell commands being executed, regardless of which version of the hadoop libraries are in use. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.3 or upper (including HADOOP-18136).
<p>Publish Date: 2022-08-04
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25168>CVE-2022-25168</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread/mxqnb39jfrwgs3j6phwvlrfq4mlox130">https://lists.apache.org/thread/mxqnb39jfrwgs3j6phwvlrfq4mlox130</a></p>
<p>Release Date: 2022-08-04</p>
<p>Fix Resolution: 2.10.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2020-9493</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
<p>Publish Date: 2021-06-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9493>CVE-2020-9493</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.openwall.com/lists/oss-security/2021/06/16/1">https://www.openwall.com/lists/oss-security/2021/06/16/1</a></p>
<p>Release Date: 2021-06-16</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2022-23305</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23305>CVE-2022-23305</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.2</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2019-17571</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
<p>Publish Date: 2019-12-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17571>CVE-2019-17571</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E">https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E</a></p>
<p>Release Date: 2019-12-20</p>
<p>Fix Resolution: log4j-manual - 1.2.17-16;log4j-javadoc - 1.2.17-16;log4j - 1.2.17-16,1.2.17-16</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-8029</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Hadoop versions 3.0.0-alpha1 to 3.1.0, 2.9.0 to 2.9.1, and 2.2.0 to 2.8.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user.
<p>Publish Date: 2019-05-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-8029>CVE-2018-8029</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8029</a></p>
<p>Release Date: 2019-05-30</p>
<p>Fix Resolution: 2.8.5</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-8009</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.
<p>Publish Date: 2018-11-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-8009>CVE-2018-8009</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1593018">https://bugzilla.redhat.com/show_bug.cgi?id=1593018</a></p>
<p>Release Date: 2018-11-13</p>
<p>Fix Resolution: 2.7.4</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-5393</summary>
### Vulnerable Library - <b>hadoop-common-2.7.1.jar</b></p>
<p>Apache Hadoop Common</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/2.7.1/50580f5ebab60b1b318ad157f668d8e40a1cc0da/hadoop-common-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **hadoop-common-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Hadoop 2.6.x before 2.6.5 and 2.7.x before 2.7.3, a remote user who can authenticate with the HDFS NameNode can possibly run arbitrary commands with the same privileges as the HDFS service.
<p>Publish Date: 2016-11-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-5393>CVE-2016-5393</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5393">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5393</a></p>
<p>Release Date: 2016-11-29</p>
<p>Fix Resolution: 2.7.3</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-23307</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23307>CVE-2022-23307</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-23302</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/log4j/log4j/1.2.17/5af35056b4d257e4b64b9e8069c0746e8b08629f/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23302>CVE-2022-23302</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2021-0419</summary>
### Vulnerable Library - <b>gson-2.2.4.jar</b></p>
<p>Google Gson library</p>
<p>Library home page: <a href="http://code.google.com/p/google-gson/">http://code.google.com/p/google-gson/</a></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **gson-2.2.4.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Denial of Service vulnerability was discovered in gson before 2.8.9 via the writeReplace() method.
<p>Publish Date: 2021-10-11
<p>URL: <a href=https://github.com/google/gson/pull/1991>WS-2021-0419</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.7</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-10-11</p>
<p>Fix Resolution (com.google.code.gson:gson): 2.8.9</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-3509</summary>
### Vulnerable Library - <b>protobuf-java-2.5.0.jar</b></p>
<p>Protocol Buffers are a way of encoding structured data in an efficient yet
extensible format.</p>
<p>Library home page: <a href="http://code.google.com/p/protobuf">http://code.google.com/p/protobuf</a></p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/2.5.0/a10732c76bfacdbd633a7eb0f7968b1059a65dfa/protobuf-java-2.5.0.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/2.5.0/a10732c76bfacdbd633a7eb0f7968b1059a65dfa/protobuf-java-2.5.0.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **protobuf-java-2.5.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
<p>Publish Date: 2022-12-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-3509>CVE-2022-3509</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3509">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3509</a></p>
<p>Release Date: 2022-12-12</p>
<p>Fix Resolution (com.google.protobuf:protobuf-java): 3.16.3</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-3643</summary>
### Vulnerable Libraries - <b>jersey-core-1.9.jar</b>, <b>jersey-server-1.9.jar</b></p>
<p>
### <b>jersey-core-1.9.jar</b></p>
<p>Jersey is the open source (under dual CDDL+GPL license) JAX-RS (JSR 311)
production quality Reference Implementation for building
RESTful Web services.</p>
<p>Library home page: <a href="https://jersey.java.net/">https://jersey.java.net/</a></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-core/1.9/8341846f18187013bb9e27e46b7ee00a6395daf4/jersey-core-1.9.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-core/1.9/8341846f18187013bb9e27e46b7ee00a6395daf4/jersey-core-1.9.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jersey-core-1.9.jar** (Vulnerable Library)
### <b>jersey-server-1.9.jar</b></p>
<p>Jersey is the open source (under dual CDDL+GPL license) JAX-RS (JSR 311)
production quality Reference Implementation for building
RESTful Web services.</p>
<p>Library home page: <a href="https://jersey.java.net/">https://jersey.java.net/</a></p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-server/1.9/3a6ea7cc5e15c824953f9f3ece2201b634d90d18/jersey-server-1.9.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.sun.jersey/jersey-server/1.9/3a6ea7cc5e15c824953f9f3ece2201b634d90d18/jersey-server-1.9.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jersey-server-1.9.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jersey: XXE via parameter entities not disabled by the jersey SAX parser
<p>Publish Date: 2019-12-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2014-3643>CVE-2014-3643</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3643">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3643</a></p>
<p>Release Date: 2019-12-15</p>
<p>Fix Resolution (com.sun.jersey:jersey-core): 1.12-b01</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p><p>Fix Resolution (com.sun.jersey:jersey-server): 1.13-b01</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-45693</summary>
### Vulnerable Library - <b>jettison-1.1.jar</b></p>
<p>A StAX implementation for JSON.</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- jersey-json-1.9.jar
- :x: **jettison-1.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
<p>Publish Date: 2022-12-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-45693>CVE-2022-45693</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-12-13</p>
<p>Fix Resolution (org.codehaus.jettison:jettison): 1.5.2</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-36090</summary>
### Vulnerable Library - <b>commons-compress-1.9.jar</b></p>
<p>Apache Commons Compress software defines an API for working with
compression and archive formats.
These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional
Unix Compress, DEFLATE and ar, cpio, jar, tar, zip, dump, 7z, arj.</p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.9/cc18955ff1e36d5abd39a14bfe82b19154330a34/commons-compress-1.9.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.9/cc18955ff1e36d5abd39a14bfe82b19154330a34/commons-compress-1.9.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **commons-compress-1.9.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.
<p>Publish Date: 2021-07-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-36090>CVE-2021-36090</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://commons.apache.org/proper/commons-compress/security-reports.html">https://commons.apache.org/proper/commons-compress/security-reports.html</a></p>
<p>Release Date: 2021-07-13</p>
<p>Fix Resolution (org.apache.commons:commons-compress): 1.21</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-10172</summary>
### Vulnerable Library - <b>jackson-mapper-asl-1.9.13.jar</b></p>
<p>Data Mapper package is a high-performance data binding package
built on Jackson JSON processor</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jackson/jackson-mapper-asl/1.9.13/1ee2f2bed0e5dd29d1cb155a166e6f8d50bbddb7/jackson-mapper-asl-1.9.13.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **jackson-mapper-asl-1.9.13.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.
<p>Publish Date: 2019-11-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10172>CVE-2019-10172</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10172">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10172</a></p>
<p>Release Date: 2019-11-18</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.0.0-RC1</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-25647</summary>
### Vulnerable Library - <b>gson-2.2.4.jar</b></p>
<p>Google Gson library</p>
<p>Library home page: <a href="http://code.google.com/p/google-gson/">http://code.google.com/p/google-gson/</a></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.2.4/a60a5e993c98c864010053cb901b7eab25306568/gson-2.2.4.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **gson-2.2.4.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.
<p>Publish Date: 2022-05-01
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25647>CVE-2022-25647</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25647`">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25647`</a></p>
<p>Release Date: 2022-05-01</p>
<p>Fix Resolution (com.google.code.gson:gson): 2.8.9</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-40149</summary>
### Vulnerable Library - <b>jettison-1.1.jar</b></p>
<p>A StAX implementation for JSON.</p>
<p>Path to dependency file: /serde/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.jettison/jettison/1.1/1a01a2a1218fcf9faa2cc2a6ced025bdea687262/jettison-1.1.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- jersey-json-1.9.jar
- :x: **jettison-1.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
<p>Publish Date: 2022-09-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-40149>CVE-2022-40149</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-09-16</p>
<p>Fix Resolution (org.codehaus.jettison:jettison): 1.5.1</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-5637</summary>
### Vulnerable Library - <b>zookeeper-3.4.6.jar</b></p>
<p></p>
<p>Path to dependency file: /integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.zookeeper/zookeeper/3.4.6/1b2502e29da1ebaade2357cd1de35a855fa3755/zookeeper-3.4.6.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.zookeeper/zookeeper/3.4.6/1b2502e29da1ebaade2357cd1de35a855fa3755/zookeeper-3.4.6.jar</p>
<p>
Dependency Hierarchy:
- hadoop-common-2.7.1.jar (Root Library)
- :x: **zookeeper-3.4.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/amzn-ion-hive-serde/commit/7450c4b582f0eca34db650c74209d5fea06b8af8">7450c4b582f0eca34db650c74209d5fea06b8af8</a></p>
<p>Found in base branch: <b>0.3.0</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.
<p>Publish Date: 2017-10-10
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-5637>CVE-2017-5637</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637</a></p>
<p>Release Date: 2017-10-09</p>
<p>Fix Resolution (org.apache.zookeeper:zookeeper): 3.4.10</p>
<p>Direct dependency fix Resolution (org.apache.hadoop:hadoop-common): 2.7.2</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | non_priority | hadoop common jar vulnerabilities highest severity is vulnerable library hadoop common jar apache hadoop common path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache hadoop hadoop common hadoop common jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in hadoop common version remediation available critical jackson mapper asl jar transitive n a critical hadoop common jar direct critical hadoop common jar direct org apache hadoop hadoop common critical hadoop common jar direct critical jar transitive n a critical jar transitive n a critical jar transitive n a high hadoop common jar direct high hadoop common jar direct high hadoop common jar direct high jar transitive n a high jar transitive n a high gson jar transitive high protobuf java jar transitive high detected in multiple dependencies transitive high jettison jar transitive high commons compress jar transitive high jackson mapper asl jar transitive n a high gson jar transitive high jettison jar transitive high zookeeper jar transitive high commons compress jar transitive high commons compress jar transitive high commons compress jar transitive high jar transitive n a high zookeeper jar transitive high protobuf java jar transitive high jettison jar transitive high jettison jar transitive high detected in multiple dependencies transitive high detected in multiple dependencies transitive medium commons net jar transitive medium commons codec jar transitive medium hadoop common jar direct medium jsch jar transitive medium zookeeper jar transitive medium guava jar transitive medium commons compress jar transitive medium protobuf java jar transitive medium httpclient jar transitive medium httpclient jar transitive medium commons httpclient jar transitive medium commons io jar transitive low jar transitive n a low guava jar transitive for some transitive vulnerabilities there is no version of direct dependency with a fix check the section details below to see if there is a version of transitive dependency where vulnerability is fixed details partial details vulnerabilities are displayed below due to a content size limitation in github to view information on the remaining vulnerabilities navigate to the mend application cve vulnerable library jackson mapper asl jar data mapper package is a high performance data binding package built on jackson json processor path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files org codehaus jackson jackson mapper asl jackson mapper asl jar home wss scanner gradle caches modules files org codehaus jackson jackson mapper asl jackson mapper asl jar dependency hierarchy hadoop common jar root library x jackson mapper asl jar vulnerable library found in head commit a href found in base branch vulnerability details a series of deserialization vulnerabilities have been discovered in codehaus x implemented in eap this cve fixes cve cve cve cve cve cve cve reported for fasterxml jackson databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind cve vulnerable library hadoop common jar apache hadoop common path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache hadoop hadoop common hadoop common jar dependency hierarchy x hadoop common jar vulnerable library found in head commit a href found in base branch vulnerability details the yarn nodemanager in apache hadoop x before and x before can leak the password for credential store provider used by the nodemanager to yarn applications publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library hadoop common jar apache hadoop common path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache hadoop hadoop common hadoop common jar dependency hierarchy x hadoop common jar vulnerable library found in head commit a href found in base branch vulnerability details in apache hadoop the untar function uses untarusingjava function on windows and the built in tar utility on unix and other oses as a result a tar entry may create a symlink under the expected extraction directory which points to an external directory a subsequent tar entry may extract an arbitrary file into the external directory using the symlink name this however would be caught by the same targetdirpath check on unix because of the getcanonicalpath call however on windows getcanonicalpath doesn t resolve symbolic links which bypasses the check unpackentries during tar extraction follows symbolic links which allows writing outside expected base directory on windows this was addressed in apache hadoop publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable library hadoop common jar apache hadoop common path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache hadoop hadoop common hadoop common jar dependency hierarchy x hadoop common jar vulnerable library found in head commit a href found in base branch vulnerability details apache hadoop s fileutil untar file file api does not escape the input file name before being passed to the shell an attacker can inject arbitrary commands this is only used in hadoop inmemoryaliasmap completebootstraptransfer which is only ever run by a local user it has been used in hadoop x for yarn localization which does enable remote code execution it is used in apache spark from the sql command add archive as the add archive command adds new binaries to the classpath being able to execute shell scripts does not confer new permissions to the caller spark check existence of file before untarring zipping which is included in prevents shell commands being executed regardless of which version of the hadoop libraries are in use users should upgrade to apache hadoop or upper including hadoop publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jar apache path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files jar home wss scanner gradle caches modules files jar dependency hierarchy hadoop common jar root library x jar vulnerable library found in head commit a href found in base branch vulnerability details a deserialization flaw was found in apache chainsaw versions prior to which could lead to malicious code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos cve vulnerable library jar apache path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files jar home wss scanner gradle caches modules files jar dependency hierarchy hadoop common jar root library x jar vulnerable library found in head commit a href found in base branch vulnerability details by design the jdbcappender in x accepts an sql statement as a configuration parameter where the values to be inserted are converters from patternlayout the message converter m is likely to always be included this allows attackers to manipulate the sql by entering crafted strings into input fields or headers of an application that are logged allowing unintended sql queries to be executed note this issue only affects x when specifically configured to use the jdbcappender which is not the default beginning in version the jdbcappender was re introduced with proper support for parameterized sql queries and further customization over the columns written to in logs apache reached end of life in august users should upgrade to as it addresses numerous other issues from the previous versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos cve vulnerable library jar apache path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files jar home wss scanner gradle caches modules files jar dependency hierarchy hadoop common jar root library x jar vulnerable library found in head commit a href found in base branch vulnerability details included in is a socketserver class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data this affects versions up to up to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution manual javadoc cve vulnerable library hadoop common jar apache hadoop common path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache hadoop hadoop common hadoop common jar dependency hierarchy x hadoop common jar vulnerable library found in head commit a href found in base branch vulnerability details in apache hadoop versions to to and to a user who can escalate to yarn user can possibly run arbitrary commands as root user publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library hadoop common jar apache hadoop common path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache hadoop hadoop common hadoop common jar dependency hierarchy x hadoop common jar vulnerable library found in head commit a href found in base branch vulnerability details apache hadoop alpha to to to alpha to to is exploitable via the zip slip vulnerability in places that accept a zip file publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library hadoop common jar apache hadoop common path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache hadoop hadoop common hadoop common jar dependency hierarchy x hadoop common jar vulnerable library found in head commit a href found in base branch vulnerability details in apache hadoop x before and x before a remote user who can authenticate with the hdfs namenode can possibly run arbitrary commands with the same privileges as the hdfs service publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library jar apache path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files jar home wss scanner gradle caches modules files jar dependency hierarchy hadoop common jar root library x jar vulnerable library found in head commit a href found in base branch vulnerability details cve identified a deserialization issue that was present in apache chainsaw prior to chainsaw chainsaw was a component of apache x where the same issue exists publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution ch qos cve vulnerable library jar apache path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files jar home wss scanner gradle caches modules files jar dependency hierarchy hadoop common jar root library x jar vulnerable library found in head commit a href found in base branch vulnerability details jmssink in all versions of x is vulnerable to deserialization of untrusted data when the attacker has write access to the configuration or if the configuration references an ldap service the attacker has access to the attacker can provide a topicconnectionfactorybindingname configuration causing jmssink to perform jndi requests that result in remote code execution in a similar fashion to cve note this issue only affects x when specifically configured to use jmssink which is not the default apache reached end of life in august users should upgrade to as it addresses numerous other issues from the previous versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos ws vulnerable library gson jar google gson library library home page a href path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files com google code gson gson gson jar home wss scanner gradle caches modules files com google code gson gson gson jar dependency hierarchy hadoop common jar root library x gson jar vulnerable library found in head commit a href found in base branch vulnerability details denial of service vulnerability was discovered in gson before via the writereplace method publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com google code gson gson direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable library protobuf java jar protocol buffers are a way of encoding structured data in an efficient yet extensible format library home page a href path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files com google protobuf protobuf java protobuf java jar home wss scanner gradle caches modules files com google protobuf protobuf java protobuf java jar dependency hierarchy hadoop common jar root library x protobuf java jar vulnerable library found in head commit a href found in base branch vulnerability details a parsing issue similar to cve but with textformat in protobuf java core and lite versions prior to and can lead to a denial of service attack inputs containing multiple instances of non repeated embedded messages with repeated or unknown fields causes objects to be converted back n forth between mutable and immutable forms resulting in potentially long garbage collection pauses we recommend updating to the versions mentioned above publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com google protobuf protobuf java direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable libraries jersey core jar jersey server jar jersey core jar jersey is the open source under dual cddl gpl license jax rs jsr production quality reference implementation for building restful web services library home page a href path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files com sun jersey jersey core jersey core jar home wss scanner gradle caches modules files com sun jersey jersey core jersey core jar dependency hierarchy hadoop common jar root library x jersey core jar vulnerable library jersey server jar jersey is the open source under dual cddl gpl license jax rs jsr production quality reference implementation for building restful web services library home page a href path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files com sun jersey jersey server jersey server jar home wss scanner gradle caches modules files com sun jersey jersey server jersey server jar dependency hierarchy hadoop common jar root library x jersey server jar vulnerable library found in head commit a href found in base branch vulnerability details jersey xxe via parameter entities not disabled by the jersey sax parser publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com sun jersey jersey core direct dependency fix resolution org apache hadoop hadoop common fix resolution com sun jersey jersey server direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable library jettison jar a stax implementation for json path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files org codehaus jettison jettison jettison jar home wss scanner gradle caches modules files org codehaus jettison jettison jettison jar dependency hierarchy hadoop common jar root library jersey json jar x jettison jar vulnerable library found in head commit a href found in base branch vulnerability details jettison before was discovered to contain a stack overflow via the map parameter this vulnerability allows attackers to cause a denial of service dos via a crafted string publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution org codehaus jettison jettison direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable library commons compress jar apache commons compress software defines an api for working with compression and archive formats these include gzip lzma xz snappy traditional unix compress deflate and ar cpio jar tar zip dump arj path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar dependency hierarchy hadoop common jar root library x commons compress jar vulnerable library found in head commit a href found in base branch vulnerability details when reading a specially crafted zip archive compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs this could be used to mount a denial of service attack against services that use compress zip package publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache commons commons compress direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable library jackson mapper asl jar data mapper package is a high performance data binding package built on jackson json processor path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files org codehaus jackson jackson mapper asl jackson mapper asl jar home wss scanner gradle caches modules files org codehaus jackson jackson mapper asl jackson mapper asl jar dependency hierarchy hadoop common jar root library x jackson mapper asl jar vulnerable library found in head commit a href found in base branch vulnerability details a flaw was found in org codehaus jackson jackson mapper asl x libraries xml external entity vulnerabilities similar cve also affects codehaus jackson mapper asl libraries but in different classes publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind cve vulnerable library gson jar google gson library library home page a href path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files com google code gson gson gson jar home wss scanner gradle caches modules files com google code gson gson gson jar dependency hierarchy hadoop common jar root library x gson jar vulnerable library found in head commit a href found in base branch vulnerability details the package com google code gson gson before are vulnerable to deserialization of untrusted data via the writereplace method in internal classes which may lead to dos attacks publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com google code gson gson direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable library jettison jar a stax implementation for json path to dependency file serde build gradle path to vulnerable library home wss scanner gradle caches modules files org codehaus jettison jettison jettison jar home wss scanner gradle caches modules files org codehaus jettison jettison jettison jar dependency hierarchy hadoop common jar root library jersey json jar x jettison jar vulnerable library found in head commit a href found in base branch vulnerability details those using jettison to parse untrusted xml or json data may be vulnerable to denial of service attacks dos if the parser is running on user supplied input an attacker may supply content that causes the parser to crash by stackoverflow this effect may support a denial of service attack publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution org codehaus jettison jettison direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue cve vulnerable library zookeeper jar path to dependency file integration test build gradle path to vulnerable library home wss scanner gradle caches modules files org apache zookeeper zookeeper zookeeper jar home wss scanner gradle caches modules files org apache zookeeper zookeeper zookeeper jar dependency hierarchy hadoop common jar root library x zookeeper jar vulnerable library found in head commit a href found in base branch vulnerability details two four letter word commands wchp wchc are cpu intensive and could cause spike of cpu utilization on apache zookeeper server if abused which leads to the server unable to serve legitimate client requests apache zookeeper thru version and suffer from this issue fixed in and later publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache zookeeper zookeeper direct dependency fix resolution org apache hadoop hadoop common rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue | 0 |
820,885 | 30,794,237,612 | IssuesEvent | 2023-07-31 18:32:06 | thePlebDev/Clicker | https://api.github.com/repos/thePlebDev/Clicker | closed | Read about the Text processing | priority 1 priority 2 | # Proposed change
- Need to read about Text processing
# Why is this important
- For every text, we are given a long string of text with a whole lot of meta data containing their view badge, their text color and so on.
- Twitch will give a string like this: `@badge-info=subscriber/77;badges=subscriber/36,sub-gifter/50;client-nonce=d7a543c7dc514886b439d55826eeeb5b;color=;display-name=marc_malabanan;emotes=;first-msg=0;flags=;id=fd594314-969b-4f5e-a83f-5e2f74261e6c;mod=0;returning-chatter=0;room-id=19070311;subscriber=1;tmi-sent-ts=1690747946900;turbo=0;user-id=144252234;user-type= :marc_malabanan!marc_malabanan@marc_malabanan.tmi.twitch.tv PRIVMSG #a_seagull :sumSmash`
- I need to be able to process this text and pull out what I need
# Additional context
- I need to read about this text process and how to deal with this
| 2.0 | Read about the Text processing - # Proposed change
- Need to read about Text processing
# Why is this important
- For every text, we are given a long string of text with a whole lot of meta data containing their view badge, their text color and so on.
- Twitch will give a string like this: `@badge-info=subscriber/77;badges=subscriber/36,sub-gifter/50;client-nonce=d7a543c7dc514886b439d55826eeeb5b;color=;display-name=marc_malabanan;emotes=;first-msg=0;flags=;id=fd594314-969b-4f5e-a83f-5e2f74261e6c;mod=0;returning-chatter=0;room-id=19070311;subscriber=1;tmi-sent-ts=1690747946900;turbo=0;user-id=144252234;user-type= :marc_malabanan!marc_malabanan@marc_malabanan.tmi.twitch.tv PRIVMSG #a_seagull :sumSmash`
- I need to be able to process this text and pull out what I need
# Additional context
- I need to read about this text process and how to deal with this
| priority | read about the text processing proposed change need to read about text processing why is this important for every text we are given a long string of text with a whole lot of meta data containing their view badge their text color and so on twitch will give a string like this badge info subscriber badges subscriber sub gifter client nonce color display name marc malabanan emotes first msg flags id mod returning chatter room id subscriber tmi sent ts turbo user id user type marc malabanan marc malabanan marc malabanan tmi twitch tv privmsg a seagull sumsmash i need to be able to process this text and pull out what i need additional context i need to read about this text process and how to deal with this | 1 |
634,823 | 20,373,958,143 | IssuesEvent | 2022-02-21 13:56:58 | hotosm/insights | https://api.github.com/repos/hotosm/insights | closed | Identifying all unique OSM hashtags | priority:high status:work in progess | In order to validate the existence of hashtags in the data source, it will be easier to have all the unique OSM hashtags in a separate table. From what has @omranlm shared so far I believe we can extract this information from the changeset metadata and at present we have all OSM changesets from the beginning of time captured within Insights.
Population all existings hashtags will be a one time efforts and later to keep this up to date, processing script has to be updated to capture new hashtags within the table.
Leave it to @itskshitiz321 and @omranlm to decide on the best approach here.
We can prioritise this for the upcoming sprint | 1.0 | Identifying all unique OSM hashtags - In order to validate the existence of hashtags in the data source, it will be easier to have all the unique OSM hashtags in a separate table. From what has @omranlm shared so far I believe we can extract this information from the changeset metadata and at present we have all OSM changesets from the beginning of time captured within Insights.
Population all existings hashtags will be a one time efforts and later to keep this up to date, processing script has to be updated to capture new hashtags within the table.
Leave it to @itskshitiz321 and @omranlm to decide on the best approach here.
We can prioritise this for the upcoming sprint | priority | identifying all unique osm hashtags in order to validate the existence of hashtags in the data source it will be easier to have all the unique osm hashtags in a separate table from what has omranlm shared so far i believe we can extract this information from the changeset metadata and at present we have all osm changesets from the beginning of time captured within insights population all existings hashtags will be a one time efforts and later to keep this up to date processing script has to be updated to capture new hashtags within the table leave it to and omranlm to decide on the best approach here we can prioritise this for the upcoming sprint | 1 |
2,745 | 2,533,020,162 | IssuesEvent | 2015-01-23 20:06:56 | google/error-prone | https://api.github.com/repos/google/error-prone | closed | Support Apple-provided JDK | migrated Priority-Low Status-Accepted Type-Enhancement | _[Original issue](https://code.google.com/p/error-prone/issues/detail?id=16) created by **alexeagle@google.com** on 2012-05-21 at 03:22 AM_
---
Currently, the way we hook into javac has only been tested with OpenJDK 6 and 7. Not sure how many developers expect to compile with Apple's JDK, since it is probably going to be sunset and Oracle will start maintaining the Mac version. | 1.0 | Support Apple-provided JDK - _[Original issue](https://code.google.com/p/error-prone/issues/detail?id=16) created by **alexeagle@google.com** on 2012-05-21 at 03:22 AM_
---
Currently, the way we hook into javac has only been tested with OpenJDK 6 and 7. Not sure how many developers expect to compile with Apple's JDK, since it is probably going to be sunset and Oracle will start maintaining the Mac version. | priority | support apple provided jdk created by alexeagle google com on at am currently the way we hook into javac has only been tested with openjdk and not sure how many developers expect to compile with apple s jdk since it is probably going to be sunset and oracle will start maintaining the mac version | 1 |
36,048 | 12,396,309,773 | IssuesEvent | 2020-05-20 20:17:40 | jjcv2304/CheatCodes | https://api.github.com/repos/jjcv2304/CheatCodes | closed | CVE-2012-6708 (Medium) detected in jquery-1.7.1.min.js, jquery-1.4.4.min.js | security vulnerability | ## CVE-2012-6708 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-1.7.1.min.js</b>, <b>jquery-1.4.4.min.js</b></p></summary>
<p>
<details><summary><b>jquery-1.7.1.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js</a></p>
<p>Path to dependency file: /tmp/ws-scm/CheatCodes/Reports.All.UI/node_modules/sockjs/examples/express-3.x/index.html</p>
<p>Path to vulnerable library: /CheatCodes/Reports.All.UI/node_modules/sockjs/examples/express-3.x/index.html,/CheatCodes/Reports.All.UI/node_modules/sockjs/examples/hapi/html/index.html,/CheatCodes/Reports.All.UI/node_modules/sockjs/examples/echo/index.html,/CheatCodes/CheatCodes.UI/node_modules/sockjs/examples/echo/index.html,/CheatCodes/CheatCodes.UI/node_modules/sockjs/examples/express-3.x/index.html,/CheatCodes/CheatCodes.UI/node_modules/sockjs/examples/hapi/html/index.html,/CheatCodes/Reports.All.UI/node_modules/sockjs/examples/express/index.html,/CheatCodes/CheatCodes.UI/node_modules/sockjs/examples/express/index.html,/CheatCodes/Reports.All.UI/node_modules/sockjs/examples/multiplex/index.html,/CheatCodes/CheatCodes.UI/node_modules/sockjs/examples/multiplex/index.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.7.1.min.js** (Vulnerable Library)
</details>
<details><summary><b>jquery-1.4.4.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.4.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.4.4/jquery.min.js</a></p>
<p>Path to dependency file: /tmp/ws-scm/CheatCodes/CheatCodes.UI/node_modules/selenium-webdriver/lib/test/data/selectableItems.html</p>
<p>Path to vulnerable library: /CheatCodes/CheatCodes.UI/node_modules/selenium-webdriver/lib/test/data/js/jquery-1.4.4.min.js,/CheatCodes/Reports.All.UI/node_modules/selenium-webdriver/lib/test/data/js/jquery-1.4.4.min.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.4.4.min.js** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/jjcv2304/CheatCodes/commit/f8a78ff76053ee4abe1f6cdc400a632e5ba871e8">f8a78ff76053ee4abe1f6cdc400a632e5ba871e8</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
<p>Publish Date: 2018-01-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-6708>CVE-2012-6708</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-6708">https://nvd.nist.gov/vuln/detail/CVE-2012-6708</a></p>
<p>Release Date: 2018-01-18</p>
<p>Fix Resolution: jQuery - v1.9.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2012-6708 (Medium) detected in jquery-1.7.1.min.js, jquery-1.4.4.min.js - ## CVE-2012-6708 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jquery-1.7.1.min.js</b>, <b>jquery-1.4.4.min.js</b></p></summary>
<p>
<details><summary><b>jquery-1.7.1.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js</a></p>
<p>Path to dependency file: /tmp/ws-scm/CheatCodes/Reports.All.UI/node_modules/sockjs/examples/express-3.x/index.html</p>
<p>Path to vulnerable library: /CheatCodes/Reports.All.UI/node_modules/sockjs/examples/express-3.x/index.html,/CheatCodes/Reports.All.UI/node_modules/sockjs/examples/hapi/html/index.html,/CheatCodes/Reports.All.UI/node_modules/sockjs/examples/echo/index.html,/CheatCodes/CheatCodes.UI/node_modules/sockjs/examples/echo/index.html,/CheatCodes/CheatCodes.UI/node_modules/sockjs/examples/express-3.x/index.html,/CheatCodes/CheatCodes.UI/node_modules/sockjs/examples/hapi/html/index.html,/CheatCodes/Reports.All.UI/node_modules/sockjs/examples/express/index.html,/CheatCodes/CheatCodes.UI/node_modules/sockjs/examples/express/index.html,/CheatCodes/Reports.All.UI/node_modules/sockjs/examples/multiplex/index.html,/CheatCodes/CheatCodes.UI/node_modules/sockjs/examples/multiplex/index.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.7.1.min.js** (Vulnerable Library)
</details>
<details><summary><b>jquery-1.4.4.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.4.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.4.4/jquery.min.js</a></p>
<p>Path to dependency file: /tmp/ws-scm/CheatCodes/CheatCodes.UI/node_modules/selenium-webdriver/lib/test/data/selectableItems.html</p>
<p>Path to vulnerable library: /CheatCodes/CheatCodes.UI/node_modules/selenium-webdriver/lib/test/data/js/jquery-1.4.4.min.js,/CheatCodes/Reports.All.UI/node_modules/selenium-webdriver/lib/test/data/js/jquery-1.4.4.min.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-1.4.4.min.js** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/jjcv2304/CheatCodes/commit/f8a78ff76053ee4abe1f6cdc400a632e5ba871e8">f8a78ff76053ee4abe1f6cdc400a632e5ba871e8</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
<p>Publish Date: 2018-01-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-6708>CVE-2012-6708</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-6708">https://nvd.nist.gov/vuln/detail/CVE-2012-6708</a></p>
<p>Release Date: 2018-01-18</p>
<p>Fix Resolution: jQuery - v1.9.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in jquery min js jquery min js cve medium severity vulnerability vulnerable libraries jquery min js jquery min js jquery min js javascript library for dom operations library home page a href path to dependency file tmp ws scm cheatcodes reports all ui node modules sockjs examples express x index html path to vulnerable library cheatcodes reports all ui node modules sockjs examples express x index html cheatcodes reports all ui node modules sockjs examples hapi html index html cheatcodes reports all ui node modules sockjs examples echo index html cheatcodes cheatcodes ui node modules sockjs examples echo index html cheatcodes cheatcodes ui node modules sockjs examples express x index html cheatcodes cheatcodes ui node modules sockjs examples hapi html index html cheatcodes reports all ui node modules sockjs examples express index html cheatcodes cheatcodes ui node modules sockjs examples express index html cheatcodes reports all ui node modules sockjs examples multiplex index html cheatcodes cheatcodes ui node modules sockjs examples multiplex index html dependency hierarchy x jquery min js vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file tmp ws scm cheatcodes cheatcodes ui node modules selenium webdriver lib test data selectableitems html path to vulnerable library cheatcodes cheatcodes ui node modules selenium webdriver lib test data js jquery min js cheatcodes reports all ui node modules selenium webdriver lib test data js jquery min js dependency hierarchy x jquery min js vulnerable library found in head commit a href vulnerability details jquery before is vulnerable to cross site scripting xss attacks the jquery strinput function does not differentiate selectors from html in a reliable fashion in vulnerable versions jquery determined whether the input was html by looking for the character anywhere in the string giving attackers more flexibility when attempting to construct a malicious payload in fixed versions jquery only deems the input to be html if it explicitly starts with the character limiting exploitability only to attackers who can control the beginning of a string which is far less common publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource | 0 |
565,613 | 16,765,675,347 | IssuesEvent | 2021-06-14 08:31:19 | ballerina-platform/ballerina-standard-library | https://api.github.com/repos/ballerina-platform/ballerina-standard-library | closed | Fields are Missing if There are Duplicate Fields | Priority/Low Team/PCP Type/Bug module/graphql | **Description:**
When a document has duplicated fields with different sub fields, the data is lost for the first fields.
**Steps to reproduce:**
Consider the following service:
```ballerina
import ballerina/graphql;
type Address record {
string number;
string street;
string city;
};
type Person record {
string name;
int age;
Address address;
};
Address a = {
number: "308",
street: "Negra Arroyo Lane",
city: "Albuquerque"
};
Person p = {
name: "Walter White",
age: 50,
address: a
};
service /graphql on new graphql:Listener(9090) {
resource function get profile() returns Person {
return p;
}
}
```
Now if we query this with the following document:
```
query getPerson {
profile {
address {
city
}
address {
city
} address {
street
}
}
}
```
This retuns the following JSON:
```json
{
"data": {
"profile": {
"address": {
"street": "Negra Arroyo Lane"
}
}
}
}
```
But the result should be:
```json
{
"data": {
"profile": {
"address": {
"city": "Albuquerque",
"street": "Negra Arroyo Lane"
}
}
}
}
```
| 1.0 | Fields are Missing if There are Duplicate Fields - **Description:**
When a document has duplicated fields with different sub fields, the data is lost for the first fields.
**Steps to reproduce:**
Consider the following service:
```ballerina
import ballerina/graphql;
type Address record {
string number;
string street;
string city;
};
type Person record {
string name;
int age;
Address address;
};
Address a = {
number: "308",
street: "Negra Arroyo Lane",
city: "Albuquerque"
};
Person p = {
name: "Walter White",
age: 50,
address: a
};
service /graphql on new graphql:Listener(9090) {
resource function get profile() returns Person {
return p;
}
}
```
Now if we query this with the following document:
```
query getPerson {
profile {
address {
city
}
address {
city
} address {
street
}
}
}
```
This retuns the following JSON:
```json
{
"data": {
"profile": {
"address": {
"street": "Negra Arroyo Lane"
}
}
}
}
```
But the result should be:
```json
{
"data": {
"profile": {
"address": {
"city": "Albuquerque",
"street": "Negra Arroyo Lane"
}
}
}
}
```
| priority | fields are missing if there are duplicate fields description when a document has duplicated fields with different sub fields the data is lost for the first fields steps to reproduce consider the following service ballerina import ballerina graphql type address record string number string street string city type person record string name int age address address address a number street negra arroyo lane city albuquerque person p name walter white age address a service graphql on new graphql listener resource function get profile returns person return p now if we query this with the following document query getperson profile address city address city address street this retuns the following json json data profile address street negra arroyo lane but the result should be json data profile address city albuquerque street negra arroyo lane | 1 |
169,037 | 6,393,747,694 | IssuesEvent | 2017-08-04 08:25:49 | arquillian/smart-testing | https://api.github.com/repos/arquillian/smart-testing | closed | NullPointerException is thrown when having custom surefire configuration | Component: Maven Priority: High Status: In Progress Type: Bug | ##### Issue Overview
NullPointerException is thrown when having custom surefire configuration. For example:
```xml
<plugin>
<groupId>org.apache.maven.plugins</groupId>
<artifactId>maven-surefire-plugin</artifactId>
<version>2.19.1</version>
<configuration>
<forkCount>1</forkCount>
<reuseForks>false</reuseForks>
</configuration>
</plugin>
```
##### Expected Behaviour
Work normally
##### Current Behaviour
Null pointer exception is thrown.
##### Steps To Reproduce
1. Clone https://github.com/perwendel/spark
2. Install ST extension
3. `mvn -Dsmart.testing=changed -Dsmart.testing.mode=selecting clean test`
##### Additional Information
Using Maven 3.5.0 and Surefire version 2.19.1 | 1.0 | NullPointerException is thrown when having custom surefire configuration - ##### Issue Overview
NullPointerException is thrown when having custom surefire configuration. For example:
```xml
<plugin>
<groupId>org.apache.maven.plugins</groupId>
<artifactId>maven-surefire-plugin</artifactId>
<version>2.19.1</version>
<configuration>
<forkCount>1</forkCount>
<reuseForks>false</reuseForks>
</configuration>
</plugin>
```
##### Expected Behaviour
Work normally
##### Current Behaviour
Null pointer exception is thrown.
##### Steps To Reproduce
1. Clone https://github.com/perwendel/spark
2. Install ST extension
3. `mvn -Dsmart.testing=changed -Dsmart.testing.mode=selecting clean test`
##### Additional Information
Using Maven 3.5.0 and Surefire version 2.19.1 | priority | nullpointerexception is thrown when having custom surefire configuration issue overview nullpointerexception is thrown when having custom surefire configuration for example xml org apache maven plugins maven surefire plugin false expected behaviour work normally current behaviour null pointer exception is thrown steps to reproduce clone install st extension mvn dsmart testing changed dsmart testing mode selecting clean test additional information using maven and surefire version | 1 |
73,566 | 7,344,355,349 | IssuesEvent | 2018-03-07 14:27:35 | mozilla-mobile/focus-android | https://api.github.com/repos/mozilla-mobile/focus-android | closed | DeleteWebViewDataTest fails intermittently, not finding the files it expect | bug testing | In some cases, deleteWebViewDataTest fails with:
java.lang.AssertionError: Expected file 'files' to be in the app's data dir whitelist
at org.junit.Assert.fail(Assert.java:88)
at org.junit.Assert.assertTrue(Assert.java:41)
at org.mozilla.focus.privacy.WebViewDataTest.DeleteWebViewDataTest(WebViewDataTest.java:239)
at java.lang.reflect.Method.invoke(Native Method)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at android.support.test.internal.runner.junit4.statement.RunAfters.evaluate(RunAfters.java:61)
at android.support.test.rule.ActivityTestRule$ActivityStatement.evaluate(ActivityTestRule.java:433)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
at org.junit.runners.Suite.runChild(Suite.java:128)
On second look, it doesn't look like firebase is randomizing the test order, but it usually fails when other tests are failing. see here for more detail: https://console.firebase.google.com/project/moz-fx-mobile-firebase-testlab/testlab/histories/bh.2b4ca2c7fdb2f0f0/matrices/6780175006496742457/executions/bs.b9b39f93c75551a9/test-cases | 1.0 | DeleteWebViewDataTest fails intermittently, not finding the files it expect - In some cases, deleteWebViewDataTest fails with:
java.lang.AssertionError: Expected file 'files' to be in the app's data dir whitelist
at org.junit.Assert.fail(Assert.java:88)
at org.junit.Assert.assertTrue(Assert.java:41)
at org.mozilla.focus.privacy.WebViewDataTest.DeleteWebViewDataTest(WebViewDataTest.java:239)
at java.lang.reflect.Method.invoke(Native Method)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at android.support.test.internal.runner.junit4.statement.RunAfters.evaluate(RunAfters.java:61)
at android.support.test.rule.ActivityTestRule$ActivityStatement.evaluate(ActivityTestRule.java:433)
at org.junit.rules.RunRules.evaluate(RunRules.java:20)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
at org.junit.runners.Suite.runChild(Suite.java:128)
On second look, it doesn't look like firebase is randomizing the test order, but it usually fails when other tests are failing. see here for more detail: https://console.firebase.google.com/project/moz-fx-mobile-firebase-testlab/testlab/histories/bh.2b4ca2c7fdb2f0f0/matrices/6780175006496742457/executions/bs.b9b39f93c75551a9/test-cases | non_priority | deletewebviewdatatest fails intermittently not finding the files it expect in some cases deletewebviewdatatest fails with java lang assertionerror expected file files to be in the app s data dir whitelist at org junit assert fail assert java at org junit assert asserttrue assert java at org mozilla focus privacy webviewdatatest deletewebviewdatatest webviewdatatest java at java lang reflect method invoke native method at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at android support test internal runner statement runafters evaluate runafters java at android support test rule activitytestrule activitystatement evaluate activitytestrule java at org junit rules runrules evaluate runrules java at org junit runners parentrunner runleaf parentrunner java at org junit runners runchild java at org junit runners runchild java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org junit runners suite runchild suite java on second look it doesn t look like firebase is randomizing the test order but it usually fails when other tests are failing see here for more detail | 0 |
269,630 | 8,441,333,486 | IssuesEvent | 2018-10-18 09:55:09 | fac-14/sleuth-coop | https://api.github.com/repos/fac-14/sleuth-coop | closed | Create a contact page | T1h priority-2 | **User Story:** “I can select button(s) to go to a contact page that will provide information on getting in contact with Sleuth”
| 1.0 | Create a contact page - **User Story:** “I can select button(s) to go to a contact page that will provide information on getting in contact with Sleuth”
| priority | create a contact page user story “i can select button s to go to a contact page that will provide information on getting in contact with sleuth” | 1 |
791,455 | 27,864,074,205 | IssuesEvent | 2023-03-21 09:01:56 | googleapis/google-cloud-ruby | https://api.github.com/repos/googleapis/google-cloud-ruby | opened | [Nightly CI Failures] Failures detected for google-cloud-os_config-v1 | type: bug priority: p1 nightly failure | At 2023-03-21 09:01:55 UTC, detected failures in google-cloud-os_config-v1 for: bundle
report_key_e6d5cf604be1b5a47f8d335a48ca4f8f | 1.0 | [Nightly CI Failures] Failures detected for google-cloud-os_config-v1 - At 2023-03-21 09:01:55 UTC, detected failures in google-cloud-os_config-v1 for: bundle
report_key_e6d5cf604be1b5a47f8d335a48ca4f8f | priority | failures detected for google cloud os config at utc detected failures in google cloud os config for bundle report key | 1 |
320,498 | 9,781,706,847 | IssuesEvent | 2019-06-07 20:37:09 | forseti-security/forseti-security | https://api.github.com/repos/forseti-security/forseti-security | closed | Better home for run_forseti.sh | issue-review: future-milestone module: installer priority: p2 triaged: yes | This is not doing any setup, but is currently installed under the `setup` folder on the server VM. So, it would be awesome to move it to a better location.
```
/home/ubuntu/forseti-security/setup/gcp/scripts/run_forseti.sh
``` | 1.0 | Better home for run_forseti.sh - This is not doing any setup, but is currently installed under the `setup` folder on the server VM. So, it would be awesome to move it to a better location.
```
/home/ubuntu/forseti-security/setup/gcp/scripts/run_forseti.sh
``` | priority | better home for run forseti sh this is not doing any setup but is currently installed under the setup folder on the server vm so it would be awesome to move it to a better location home ubuntu forseti security setup gcp scripts run forseti sh | 1 |
263,654 | 28,047,916,165 | IssuesEvent | 2023-03-29 01:35:46 | zettatips/ex10-website | https://api.github.com/repos/zettatips/ex10-website | closed | CVE-2021-23440 (High) detected in set-value-2.0.1.tgz - autoclosed | Mend: dependency security vulnerability | ## CVE-2021-23440 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>set-value-2.0.1.tgz</b></p></summary>
<p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p>
<p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-2.0.1.tgz">https://registry.npmjs.org/set-value/-/set-value-2.0.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/set-value/package.json</p>
<p>
Dependency Hierarchy:
- next-10.0.3.tgz (Root Library)
- webpack-4.44.1.tgz
- micromatch-3.1.10.tgz
- snapdragon-0.8.2.tgz
- base-0.11.2.tgz
- cache-base-1.0.1.tgz
- :x: **set-value-2.0.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/zettatips/ex10-website/commit/ccd1fa96ac3b5406cb8231dc95b0496a05a23586">ccd1fa96ac3b5406cb8231dc95b0496a05a23586</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package set-value before <2.0.1, >=3.0.0 <4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
Mend Note: After conducting further research, Mend has determined that all versions of set-value up to version 4.0.0 are vulnerable to CVE-2021-23440.
<p>Publish Date: 2021-09-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23440>CVE-2021-23440</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-09-12</p>
<p>Fix Resolution (set-value): 4.0.1</p>
<p>Direct dependency fix Resolution (next): 10.0.6-canary.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-23440 (High) detected in set-value-2.0.1.tgz - autoclosed - ## CVE-2021-23440 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>set-value-2.0.1.tgz</b></p></summary>
<p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p>
<p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-2.0.1.tgz">https://registry.npmjs.org/set-value/-/set-value-2.0.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/set-value/package.json</p>
<p>
Dependency Hierarchy:
- next-10.0.3.tgz (Root Library)
- webpack-4.44.1.tgz
- micromatch-3.1.10.tgz
- snapdragon-0.8.2.tgz
- base-0.11.2.tgz
- cache-base-1.0.1.tgz
- :x: **set-value-2.0.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/zettatips/ex10-website/commit/ccd1fa96ac3b5406cb8231dc95b0496a05a23586">ccd1fa96ac3b5406cb8231dc95b0496a05a23586</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package set-value before <2.0.1, >=3.0.0 <4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
Mend Note: After conducting further research, Mend has determined that all versions of set-value up to version 4.0.0 are vulnerable to CVE-2021-23440.
<p>Publish Date: 2021-09-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23440>CVE-2021-23440</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-09-12</p>
<p>Fix Resolution (set-value): 4.0.1</p>
<p>Direct dependency fix Resolution (next): 10.0.6-canary.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in set value tgz autoclosed cve high severity vulnerability vulnerable library set value tgz create nested values and any intermediaries using dot notation a b c paths library home page a href path to dependency file package json path to vulnerable library node modules set value package json dependency hierarchy next tgz root library webpack tgz micromatch tgz snapdragon tgz base tgz cache base tgz x set value tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package set value before a type confusion vulnerability can lead to a bypass of cve when the user provided keys used in the path parameter are arrays mend note after conducting further research mend has determined that all versions of set value up to version are vulnerable to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution set value direct dependency fix resolution next canary step up your open source security game with mend | 0 |
337,020 | 30,234,112,937 | IssuesEvent | 2023-07-06 09:02:45 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | opened | roachtest: restore/tpce/400GB/aws/nodes=4/cpus=8 failed | C-test-failure O-robot O-roachtest release-blocker T-disaster-recovery branch-release-23.1 | roachtest.restore/tpce/400GB/aws/nodes=4/cpus=8 [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyAwsBazel/10797190?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyAwsBazel/10797190?buildTab=artifacts#/restore/tpce/400GB/aws/nodes=4/cpus=8) on release-23.1 @ [fa2d7f7c9894d701ac4a393f058aa84552957087](https://github.com/cockroachdb/cockroach/commits/fa2d7f7c9894d701ac4a393f058aa84552957087):
```
(test_runner.go:1073).runTest: test timed out (1h0m0s)
(monitor.go:137).Wait: monitor failure: monitor task failed: output in run_080048.232311134_n1_cockroach-sql-insecu: ./cockroach sql --insecure -e "RESTORE FROM LATEST IN 's3://cockroach-fixtures-us-east-2/backups/tpc-e/customers=25000/v22.2.0/inc-count=48?AUTH=implicit' AS OF SYSTEM TIME '2022-12-21T02:00:00Z' " returned: COMMAND_PROBLEM: exit status 137
test artifacts and logs in: /artifacts/restore/tpce/400GB/aws/nodes=4/cpus=8/run_1
```
<p>Parameters: <code>ROACHTEST_arch=amd64</code>
, <code>ROACHTEST_cloud=aws</code>
, <code>ROACHTEST_cpu=8</code>
, <code>ROACHTEST_encrypted=false</code>
, <code>ROACHTEST_fs=ext4</code>
, <code>ROACHTEST_localSSD=false</code>
, <code>ROACHTEST_ssd=0</code>
</p>
<details><summary>Help</summary>
<p>
See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md)
See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7)
</p>
</details>
/cc @cockroachdb/disaster-recovery
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*restore/tpce/400GB/aws/nodes=4/cpus=8.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
| 2.0 | roachtest: restore/tpce/400GB/aws/nodes=4/cpus=8 failed - roachtest.restore/tpce/400GB/aws/nodes=4/cpus=8 [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyAwsBazel/10797190?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyAwsBazel/10797190?buildTab=artifacts#/restore/tpce/400GB/aws/nodes=4/cpus=8) on release-23.1 @ [fa2d7f7c9894d701ac4a393f058aa84552957087](https://github.com/cockroachdb/cockroach/commits/fa2d7f7c9894d701ac4a393f058aa84552957087):
```
(test_runner.go:1073).runTest: test timed out (1h0m0s)
(monitor.go:137).Wait: monitor failure: monitor task failed: output in run_080048.232311134_n1_cockroach-sql-insecu: ./cockroach sql --insecure -e "RESTORE FROM LATEST IN 's3://cockroach-fixtures-us-east-2/backups/tpc-e/customers=25000/v22.2.0/inc-count=48?AUTH=implicit' AS OF SYSTEM TIME '2022-12-21T02:00:00Z' " returned: COMMAND_PROBLEM: exit status 137
test artifacts and logs in: /artifacts/restore/tpce/400GB/aws/nodes=4/cpus=8/run_1
```
<p>Parameters: <code>ROACHTEST_arch=amd64</code>
, <code>ROACHTEST_cloud=aws</code>
, <code>ROACHTEST_cpu=8</code>
, <code>ROACHTEST_encrypted=false</code>
, <code>ROACHTEST_fs=ext4</code>
, <code>ROACHTEST_localSSD=false</code>
, <code>ROACHTEST_ssd=0</code>
</p>
<details><summary>Help</summary>
<p>
See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md)
See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7)
</p>
</details>
/cc @cockroachdb/disaster-recovery
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*restore/tpce/400GB/aws/nodes=4/cpus=8.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
| non_priority | roachtest restore tpce aws nodes cpus failed roachtest restore tpce aws nodes cpus with on release test runner go runtest test timed out monitor go wait monitor failure monitor task failed output in run cockroach sql insecu cockroach sql insecure e restore from latest in cockroach fixtures us east backups tpc e customers inc count auth implicit as of system time returned command problem exit status test artifacts and logs in artifacts restore tpce aws nodes cpus run parameters roachtest arch roachtest cloud aws roachtest cpu roachtest encrypted false roachtest fs roachtest localssd false roachtest ssd help see see cc cockroachdb disaster recovery | 0 |
411,193 | 12,015,528,672 | IssuesEvent | 2020-04-10 14:11:25 | inverse-inc/packetfence | https://api.github.com/repos/inverse-inc/packetfence | opened | Bandwith Accounting per hour for device is empty | Priority: Medium Type: Bug | **Describe the bug**
Bandwith Accounting per hour for device is empty
**To Reproduce**
Inline l2 setup, downloaded 1gb file, the hour repport is empty:
1. Go to https://mgmt_ip:1443/admin/alt#/reports/standard/chart/nodebandwidth/hour

2. Go to https://mgmt_ip:1443/admin/alt#/reports/standard/chart/nodebandwidth/day

**Expected behavior**
We should be able to see what happen in the last hour.
**Additional context**
```
MariaDB [pf]> select * from bandwidth_accounting_history;
+-----------------+---------------------+------------+-----------+-------------+-------------------+-----------+
| node_id | time_bucket | in_bytes | out_bytes | total_bytes | mac | tenant_id |
+-----------------+---------------------+------------+-----------+-------------+-------------------+-----------+
| 414483715395997 | 2020-04-10 09:00:00 | 1083687638 | 20356317 | 1104043955 | 78:f8:82:9f:11:9d | 1 |
| 414483715395997 | 2020-04-10 10:00:00 | 135 | 5439 | 5574 | 78:f8:82:9f:11:9d | 1 |
+-----------------+---------------------+------------+-----------+-------------+-------------------+-----------+
``` | 1.0 | Bandwith Accounting per hour for device is empty - **Describe the bug**
Bandwith Accounting per hour for device is empty
**To Reproduce**
Inline l2 setup, downloaded 1gb file, the hour repport is empty:
1. Go to https://mgmt_ip:1443/admin/alt#/reports/standard/chart/nodebandwidth/hour

2. Go to https://mgmt_ip:1443/admin/alt#/reports/standard/chart/nodebandwidth/day

**Expected behavior**
We should be able to see what happen in the last hour.
**Additional context**
```
MariaDB [pf]> select * from bandwidth_accounting_history;
+-----------------+---------------------+------------+-----------+-------------+-------------------+-----------+
| node_id | time_bucket | in_bytes | out_bytes | total_bytes | mac | tenant_id |
+-----------------+---------------------+------------+-----------+-------------+-------------------+-----------+
| 414483715395997 | 2020-04-10 09:00:00 | 1083687638 | 20356317 | 1104043955 | 78:f8:82:9f:11:9d | 1 |
| 414483715395997 | 2020-04-10 10:00:00 | 135 | 5439 | 5574 | 78:f8:82:9f:11:9d | 1 |
+-----------------+---------------------+------------+-----------+-------------+-------------------+-----------+
``` | priority | bandwith accounting per hour for device is empty describe the bug bandwith accounting per hour for device is empty to reproduce inline setup downloaded file the hour repport is empty go to go to expected behavior we should be able to see what happen in the last hour additional context mariadb select from bandwidth accounting history node id time bucket in bytes out bytes total bytes mac tenant id | 1 |
299,402 | 9,205,457,547 | IssuesEvent | 2019-03-08 10:37:39 | qissue-bot/QGIS | https://api.github.com/repos/qissue-bot/QGIS | closed | Typos error in internationalized string | Category: GUI Component: Affected QGIS version Component: Crashes QGIS or corrupts data Component: Easy fix? Component: Operating System Component: Pull Request or Patch supplied Component: Regression? Component: Resolution Priority: Low Project: QGIS Application Status: Closed Tracker: Bug report | ---
Author Name: **cdavila -** (cdavila -)
Original Redmine Issue: 792, https://issues.qgis.org/issues/792
Original Assignee: nobody -
---
There's an error in the following string: "Shows the map coordinates at the current cursor *postion.* The display is continuously updated as the mouse is moved."
It should be "position".
| 1.0 | Typos error in internationalized string - ---
Author Name: **cdavila -** (cdavila -)
Original Redmine Issue: 792, https://issues.qgis.org/issues/792
Original Assignee: nobody -
---
There's an error in the following string: "Shows the map coordinates at the current cursor *postion.* The display is continuously updated as the mouse is moved."
It should be "position".
| priority | typos error in internationalized string author name cdavila cdavila original redmine issue original assignee nobody there s an error in the following string shows the map coordinates at the current cursor postion the display is continuously updated as the mouse is moved it should be position | 1 |
330,307 | 10,038,306,541 | IssuesEvent | 2019-07-18 14:54:13 | Citykleta/web-app | https://api.github.com/repos/Citykleta/web-app | closed | Route exploration | component:Itinerary enhancement priority:medium | At the moment, a user can quickly find a route going from A to B going through various intermediate points.
It would be however important to improve this part of the application.
- [ ] change the style of the displayed route to convey the sens of the route as the moment it just displays the path but no direction is shown
- [ ] propose alternatives
- [ ] give a way to the user to preview the instructions | 1.0 | Route exploration - At the moment, a user can quickly find a route going from A to B going through various intermediate points.
It would be however important to improve this part of the application.
- [ ] change the style of the displayed route to convey the sens of the route as the moment it just displays the path but no direction is shown
- [ ] propose alternatives
- [ ] give a way to the user to preview the instructions | priority | route exploration at the moment a user can quickly find a route going from a to b going through various intermediate points it would be however important to improve this part of the application change the style of the displayed route to convey the sens of the route as the moment it just displays the path but no direction is shown propose alternatives give a way to the user to preview the instructions | 1 |
150,650 | 5,783,128,574 | IssuesEvent | 2017-04-30 05:28:14 | zmaster587/AdvancedRocketry | https://api.github.com/repos/zmaster587/AdvancedRocketry | closed | Little bug while showing the manually added recipe in NEI with chemical reactor | bug Low Priority | 
I've used a fluid input, but it shows as a bucket
Things works normally, it's just a graphical bug imo
Not like the default one with rocket fuel

| 1.0 | Little bug while showing the manually added recipe in NEI with chemical reactor - 
I've used a fluid input, but it shows as a bucket
Things works normally, it's just a graphical bug imo
Not like the default one with rocket fuel

| priority | little bug while showing the manually added recipe in nei with chemical reactor i ve used a fluid input but it shows as a bucket things works normally it s just a graphical bug imo not like the default one with rocket fuel | 1 |
15,882 | 11,741,395,780 | IssuesEvent | 2020-03-11 21:39:00 | microsoft/TypeScript | https://api.github.com/repos/microsoft/TypeScript | closed | User test PRs are hard to parse and work through for individual PRs | Infrastructure Needs Proposal Suggestion | Was chatting with @ahejlsberg today and we were commiserating about how difficult it is to understand user test PRs generated from @typescript-bot. (e.g. `user test this`).
To me, the issue is that the workflow just feels bad.
1. I'm told that the user tests _failed_ (always with the italics!)
1. I open up the user tests PR, which is slow because GitHub is slow
1. I open up the files view, which is slow because GitHub is slow
1. The differences are often just the deltas between today and yesterday's baselines.
Some ideas:
1. We only update user tests on a weekly basis. This avoids the noise and means someone doesn't have to update the differences every day.
1. Maybe diffs can be posted on the PR itself, within a `<details>` tag, e.g.
`````markdown
<details>
<summary>
The user tests <em>failed!</em>.
Click here to view the diff of the user tests.
</summary>
```diff
derp
- blop
+ bloop
```
</details>
````` | 1.0 | User test PRs are hard to parse and work through for individual PRs - Was chatting with @ahejlsberg today and we were commiserating about how difficult it is to understand user test PRs generated from @typescript-bot. (e.g. `user test this`).
To me, the issue is that the workflow just feels bad.
1. I'm told that the user tests _failed_ (always with the italics!)
1. I open up the user tests PR, which is slow because GitHub is slow
1. I open up the files view, which is slow because GitHub is slow
1. The differences are often just the deltas between today and yesterday's baselines.
Some ideas:
1. We only update user tests on a weekly basis. This avoids the noise and means someone doesn't have to update the differences every day.
1. Maybe diffs can be posted on the PR itself, within a `<details>` tag, e.g.
`````markdown
<details>
<summary>
The user tests <em>failed!</em>.
Click here to view the diff of the user tests.
</summary>
```diff
derp
- blop
+ bloop
```
</details>
````` | non_priority | user test prs are hard to parse and work through for individual prs was chatting with ahejlsberg today and we were commiserating about how difficult it is to understand user test prs generated from typescript bot e g user test this to me the issue is that the workflow just feels bad i m told that the user tests failed always with the italics i open up the user tests pr which is slow because github is slow i open up the files view which is slow because github is slow the differences are often just the deltas between today and yesterday s baselines some ideas we only update user tests on a weekly basis this avoids the noise and means someone doesn t have to update the differences every day maybe diffs can be posted on the pr itself within a tag e g markdown the user tests failed click here to view the diff of the user tests diff derp blop bloop | 0 |
190,234 | 22,047,334,456 | IssuesEvent | 2022-05-30 04:18:32 | pazhanivel07/linux-4.19.72 | https://api.github.com/repos/pazhanivel07/linux-4.19.72 | closed | CVE-2021-45480 (Medium) detected in linux-yoctov5.4.51 - autoclosed | security vulnerability | ## CVE-2021-45480 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yoctov5.4.51</b></p></summary>
<p>
<p>Yocto Linux Embedded kernel</p>
<p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto>https://git.yoctoproject.org/git/linux-yocto</a></p>
<p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/linux-4.19.72/commit/ce28e4f7a922d93d9b737061ae46827305c8c30a">ce28e4f7a922d93d9b737061ae46827305c8c30a</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in the Linux kernel before 5.15.11. There is a memory leak in the __rds_conn_create() function in net/rds/connection.c in a certain combination of circumstances.
<p>Publish Date: 2021-12-24
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-45480>CVE-2021-45480</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480</a></p>
<p>Release Date: 2021-12-24</p>
<p>Fix Resolution: v5.15.11</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-45480 (Medium) detected in linux-yoctov5.4.51 - autoclosed - ## CVE-2021-45480 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yoctov5.4.51</b></p></summary>
<p>
<p>Yocto Linux Embedded kernel</p>
<p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto>https://git.yoctoproject.org/git/linux-yocto</a></p>
<p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/linux-4.19.72/commit/ce28e4f7a922d93d9b737061ae46827305c8c30a">ce28e4f7a922d93d9b737061ae46827305c8c30a</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in the Linux kernel before 5.15.11. There is a memory leak in the __rds_conn_create() function in net/rds/connection.c in a certain combination of circumstances.
<p>Publish Date: 2021-12-24
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-45480>CVE-2021-45480</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480</a></p>
<p>Release Date: 2021-12-24</p>
<p>Fix Resolution: v5.15.11</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in linux autoclosed cve medium severity vulnerability vulnerable library linux yocto linux embedded kernel library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details an issue was discovered in the linux kernel before there is a memory leak in the rds conn create function in net rds connection c in a certain combination of circumstances publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
724,305 | 24,926,259,193 | IssuesEvent | 2022-10-31 07:41:30 | AY2223S1-CS2113-T18-1b/tp | https://api.github.com/repos/AY2223S1-CS2113-T18-1b/tp | closed | [PE-D][Tester B] Program crashes on higher than max_int and min_int value given for index during delete. | type.Bug priority.High | When using delete command, if the entry given is higher than MAX_INT or lower than MIN_INT, program crashes.
Payload 1: delete movie 2147483648
Payload 2: delete movie -2147483649

<!--session: 1666946579190-89d44391-99f3-4d88-82ec-674d7d112db9-->
<!--Version: Web v3.4.4-->
-------------
Labels: `severity.High` `type.FunctionalityBug`
original: wcwy/ped#6 | 1.0 | [PE-D][Tester B] Program crashes on higher than max_int and min_int value given for index during delete. - When using delete command, if the entry given is higher than MAX_INT or lower than MIN_INT, program crashes.
Payload 1: delete movie 2147483648
Payload 2: delete movie -2147483649

<!--session: 1666946579190-89d44391-99f3-4d88-82ec-674d7d112db9-->
<!--Version: Web v3.4.4-->
-------------
Labels: `severity.High` `type.FunctionalityBug`
original: wcwy/ped#6 | priority | program crashes on higher than max int and min int value given for index during delete when using delete command if the entry given is higher than max int or lower than min int program crashes payload delete movie payload delete movie labels severity high type functionalitybug original wcwy ped | 1 |
230,728 | 17,643,644,113 | IssuesEvent | 2021-08-20 00:32:11 | hashicorp/terraform-provider-azuread | https://api.github.com/repos/hashicorp/terraform-provider-azuread | closed | azuread_application_oauth2_permission_scope optional properties are required | documentation feature/application | *user_consent_display_name* and *user_consent_description* are optional in documentation but required during deployment.
<!---
Please note the following potential times when an issue might be in Terraform core:
* [Configuration Language](https://www.terraform.io/docs/configuration/index.html) or resource ordering issues
* [State](https://www.terraform.io/docs/state/index.html) and [State Backend](https://www.terraform.io/docs/backends/index.html) issues
* [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues
* [Registry](https://registry.terraform.io/) issues
* Spans resources across multiple providers
If you are running into one of these scenarios, we recommend opening an issue in the [Terraform core repository](https://github.com/hashicorp/terraform/) instead.
--->
<!--- Please keep this note for the community --->
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritise this request
* Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritise the request
* If you are interested in working on this issue or have submitted a pull request, please leave a comment
<!--- Thank you for keeping this note for the community --->
### Terraform (and AzureAD Provider) Version
Terraform v0.15.0
azuread v1.6.0
<!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). --->
### Affected Resource(s)
<!--- Please list the affected resources and data sources. --->
* azuread_application_oauth2_permission_scope
### Terraform Configuration Files
<!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code --->
```hcl
# Copy-paste your Terraform configurations here - for large Terraform configs,
# please use a service like Dropbox and share a link to the ZIP file. For
# security, you can also encrypt the files using our GPG public key: https://keybase.io/hashicorp
```
### Debug Output
<!---
Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist.
To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html).
--->
### Panic Output
<!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. --->
### Expected Behavior
<!--- What should have happened? --->
Should have created resource without error
### Actual Behavior
<!--- What actually happened? --->
Error on missing properties
### Steps to Reproduce
<!--- Please list the steps required to reproduce the issue. --->
1. `terraform apply`
### Important Factoids
<!--- Are there anything atypical about your accounts that we should know? For example: Running in a Azure China/Germany/Government? --->
### References
<!---
Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests
Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Such as vendor documentation?
--->
* #0000
| 1.0 | azuread_application_oauth2_permission_scope optional properties are required - *user_consent_display_name* and *user_consent_description* are optional in documentation but required during deployment.
<!---
Please note the following potential times when an issue might be in Terraform core:
* [Configuration Language](https://www.terraform.io/docs/configuration/index.html) or resource ordering issues
* [State](https://www.terraform.io/docs/state/index.html) and [State Backend](https://www.terraform.io/docs/backends/index.html) issues
* [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues
* [Registry](https://registry.terraform.io/) issues
* Spans resources across multiple providers
If you are running into one of these scenarios, we recommend opening an issue in the [Terraform core repository](https://github.com/hashicorp/terraform/) instead.
--->
<!--- Please keep this note for the community --->
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritise this request
* Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritise the request
* If you are interested in working on this issue or have submitted a pull request, please leave a comment
<!--- Thank you for keeping this note for the community --->
### Terraform (and AzureAD Provider) Version
Terraform v0.15.0
azuread v1.6.0
<!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). --->
### Affected Resource(s)
<!--- Please list the affected resources and data sources. --->
* azuread_application_oauth2_permission_scope
### Terraform Configuration Files
<!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code --->
```hcl
# Copy-paste your Terraform configurations here - for large Terraform configs,
# please use a service like Dropbox and share a link to the ZIP file. For
# security, you can also encrypt the files using our GPG public key: https://keybase.io/hashicorp
```
### Debug Output
<!---
Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist.
To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html).
--->
### Panic Output
<!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. --->
### Expected Behavior
<!--- What should have happened? --->
Should have created resource without error
### Actual Behavior
<!--- What actually happened? --->
Error on missing properties
### Steps to Reproduce
<!--- Please list the steps required to reproduce the issue. --->
1. `terraform apply`
### Important Factoids
<!--- Are there anything atypical about your accounts that we should know? For example: Running in a Azure China/Germany/Government? --->
### References
<!---
Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests
Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Such as vendor documentation?
--->
* #0000
| non_priority | azuread application permission scope optional properties are required user consent display name and user consent description are optional in documentation but required during deployment please note the following potential times when an issue might be in terraform core or resource ordering issues and issues issues issues spans resources across multiple providers if you are running into one of these scenarios we recommend opening an issue in the instead community note please vote on this issue by adding a 👍 to the original issue to help the community and maintainers prioritise this request please do not leave or me too comments they generate extra noise for issue followers and do not help prioritise the request if you are interested in working on this issue or have submitted a pull request please leave a comment terraform and azuread provider version terraform azuread affected resource s azuread application permission scope terraform configuration files hcl copy paste your terraform configurations here for large terraform configs please use a service like dropbox and share a link to the zip file for security you can also encrypt the files using our gpg public key debug output please provide a link to a github gist containing the complete debug output please do not paste the debug output in the issue just paste a link to the gist to obtain the debug output see the panic output expected behavior should have created resource without error actual behavior error on missing properties steps to reproduce terraform apply important factoids references information about referencing github issues are there any other github issues open or closed or pull requests that should be linked here such as vendor documentation | 0 |
484,899 | 13,958,816,435 | IssuesEvent | 2020-10-24 13:45:52 | magento/magento2 | https://api.github.com/repos/magento/magento2 | closed | [Issue] checkout_index_index.xml file code improvement. | Component: Checkout Fixed in 2.4.x Priority: P4 Progress: PR Created Severity: S4 | This issue is automatically created based on existing pull request: magento/magento2#30538: checkout_index_index.xml file code improvement.
---------
<!---
Thank you for contributing to Magento.
To help us process this pull request we recommend that you add the following information:
- Summary of the pull request,
- Issue(s) related to the changes made,
- Manual testing scenarios
Fields marked with (*) are required. Please don't remove the template.
-->
<!--- Please provide a general summary of the Pull Request in the Title above -->
### Description (*)
<!---
Please provide a description of the changes proposed in the pull request.
Letting us know what has changed and why it needed changing will help us validate this pull request.
-->
Removed **sortOrder** from **messages, authentication, progressBar, estimation, and sidebar checkout components** as they are already been rendered without those sortOrders and individual getRegions at `app/code/Magento/Checkout/view/frontend/web/template/onepage.html`
### Related Pull Requests
<!-- related pull request placeholder -->
### Fixed Issues (if relevant)
<!---
If relevant, please provide a list of fixed issues in the format magento/magento2#<issue_number>.
There could be 1 or more issues linked here and it will help us find some more information about the reasoning behind this change.
-->
1. This is code improvement.
### Manual testing scenarios (*)
<!---
Please provide a set of unambiguous steps to test the proposed code change.
Giving us manual testing scenarios will help with the processing and validation process.
-->
N/A
### Contribution checklist (*)
- [ ] Pull request has a meaningful description of its purpose
- [ ] All commits are accompanied by meaningful commit messages
- [ ] All new or changed code is covered with unit/integration tests (if applicable)
- [ ] All automated tests passed successfully (all builds are green)
| 1.0 | [Issue] checkout_index_index.xml file code improvement. - This issue is automatically created based on existing pull request: magento/magento2#30538: checkout_index_index.xml file code improvement.
---------
<!---
Thank you for contributing to Magento.
To help us process this pull request we recommend that you add the following information:
- Summary of the pull request,
- Issue(s) related to the changes made,
- Manual testing scenarios
Fields marked with (*) are required. Please don't remove the template.
-->
<!--- Please provide a general summary of the Pull Request in the Title above -->
### Description (*)
<!---
Please provide a description of the changes proposed in the pull request.
Letting us know what has changed and why it needed changing will help us validate this pull request.
-->
Removed **sortOrder** from **messages, authentication, progressBar, estimation, and sidebar checkout components** as they are already been rendered without those sortOrders and individual getRegions at `app/code/Magento/Checkout/view/frontend/web/template/onepage.html`
### Related Pull Requests
<!-- related pull request placeholder -->
### Fixed Issues (if relevant)
<!---
If relevant, please provide a list of fixed issues in the format magento/magento2#<issue_number>.
There could be 1 or more issues linked here and it will help us find some more information about the reasoning behind this change.
-->
1. This is code improvement.
### Manual testing scenarios (*)
<!---
Please provide a set of unambiguous steps to test the proposed code change.
Giving us manual testing scenarios will help with the processing and validation process.
-->
N/A
### Contribution checklist (*)
- [ ] Pull request has a meaningful description of its purpose
- [ ] All commits are accompanied by meaningful commit messages
- [ ] All new or changed code is covered with unit/integration tests (if applicable)
- [ ] All automated tests passed successfully (all builds are green)
| priority | checkout index index xml file code improvement this issue is automatically created based on existing pull request magento checkout index index xml file code improvement thank you for contributing to magento to help us process this pull request we recommend that you add the following information summary of the pull request issue s related to the changes made manual testing scenarios fields marked with are required please don t remove the template description please provide a description of the changes proposed in the pull request letting us know what has changed and why it needed changing will help us validate this pull request removed sortorder from messages authentication progressbar estimation and sidebar checkout components as they are already been rendered without those sortorders and individual getregions at app code magento checkout view frontend web template onepage html related pull requests fixed issues if relevant if relevant please provide a list of fixed issues in the format magento there could be or more issues linked here and it will help us find some more information about the reasoning behind this change this is code improvement manual testing scenarios please provide a set of unambiguous steps to test the proposed code change giving us manual testing scenarios will help with the processing and validation process n a contribution checklist pull request has a meaningful description of its purpose all commits are accompanied by meaningful commit messages all new or changed code is covered with unit integration tests if applicable all automated tests passed successfully all builds are green | 1 |
181,126 | 21,645,574,295 | IssuesEvent | 2022-05-06 01:08:55 | AlexRogalskiy/java-patterns | https://api.github.com/repos/AlexRogalskiy/java-patterns | closed | CVE-2021-3795 (High) detected in semver-regex-1.0.0.tgz - autoclosed | security vulnerability needs/triage | ## CVE-2021-3795 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>semver-regex-1.0.0.tgz</b></p></summary>
<p>Regular expression for matching semver versions</p>
<p>Library home page: <a href="https://registry.npmjs.org/semver-regex/-/semver-regex-1.0.0.tgz">https://registry.npmjs.org/semver-regex/-/semver-regex-1.0.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/semver-regex/package.json</p>
<p>
Dependency Hierarchy:
- validate-commit-msg-2.14.0.tgz (Root Library)
- :x: **semver-regex-1.0.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/java-patterns/commit/fe3fc69c6aa9128d2a4b77ebfd8d8e355574dd05">fe3fc69c6aa9128d2a4b77ebfd8d8e355574dd05</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
semver-regex is vulnerable to Inefficient Regular Expression Complexity
<p>Publish Date: 2021-09-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3795>CVE-2021-3795</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1">https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1</a></p>
<p>Release Date: 2021-09-15</p>
<p>Fix Resolution: semver-regex - 3.1.3,4.0.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-3795 (High) detected in semver-regex-1.0.0.tgz - autoclosed - ## CVE-2021-3795 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>semver-regex-1.0.0.tgz</b></p></summary>
<p>Regular expression for matching semver versions</p>
<p>Library home page: <a href="https://registry.npmjs.org/semver-regex/-/semver-regex-1.0.0.tgz">https://registry.npmjs.org/semver-regex/-/semver-regex-1.0.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/semver-regex/package.json</p>
<p>
Dependency Hierarchy:
- validate-commit-msg-2.14.0.tgz (Root Library)
- :x: **semver-regex-1.0.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/java-patterns/commit/fe3fc69c6aa9128d2a4b77ebfd8d8e355574dd05">fe3fc69c6aa9128d2a4b77ebfd8d8e355574dd05</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
semver-regex is vulnerable to Inefficient Regular Expression Complexity
<p>Publish Date: 2021-09-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3795>CVE-2021-3795</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1">https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1</a></p>
<p>Release Date: 2021-09-15</p>
<p>Fix Resolution: semver-regex - 3.1.3,4.0.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in semver regex tgz autoclosed cve high severity vulnerability vulnerable library semver regex tgz regular expression for matching semver versions library home page a href path to dependency file package json path to vulnerable library node modules semver regex package json dependency hierarchy validate commit msg tgz root library x semver regex tgz vulnerable library found in head commit a href found in base branch master vulnerability details semver regex is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution semver regex step up your open source security game with whitesource | 0 |
15,769 | 19,914,611,738 | IssuesEvent | 2022-01-25 21:00:54 | plazi/community | https://api.github.com/repos/plazi/community | opened | to be processed 10.1093/isd/ixab026 | process request | to be processed
the file is too big to upload, here is the link https://academic.oup.com/isd/article-pdf/6/1/5/42268871/ixab026.pdf or https://doi.org/10.1093/isd/ixab026
genus level, so no material citation. Should show up in GBIF | 1.0 | to be processed 10.1093/isd/ixab026 - to be processed
the file is too big to upload, here is the link https://academic.oup.com/isd/article-pdf/6/1/5/42268871/ixab026.pdf or https://doi.org/10.1093/isd/ixab026
genus level, so no material citation. Should show up in GBIF | non_priority | to be processed isd to be processed the file is too big to upload here is the link or genus level so no material citation should show up in gbif | 0 |
154,762 | 19,758,356,095 | IssuesEvent | 2022-01-16 01:20:32 | attesch/opencart | https://api.github.com/repos/attesch/opencart | opened | CVE-2018-20677 (Medium) detected in multiple libraries | security vulnerability | ## CVE-2018-20677 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>bootstrap-3.0.1.min.js</b>, <b>bootstrap-3.3.5.min.js</b>, <b>bootstrap-3.0.1.js</b></p></summary>
<p>
<details><summary><b>bootstrap-3.0.1.min.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.1/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.1/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /opencart/upload/install/view/javascript/bootstrap/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.0.1.min.js** (Vulnerable Library)
</details>
<details><summary><b>bootstrap-3.3.5.min.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.5/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.5/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /opencart/upload/admin/view/javascript/jquery/datetimepicker/bootstrap.min.js,/opencart/upload/catalog/view/javascript/jquery/datetimepicker/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.5.min.js** (Vulnerable Library)
</details>
<details><summary><b>bootstrap-3.0.1.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.1/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.1/js/bootstrap.js</a></p>
<p>Path to vulnerable library: /opencart/upload/install/view/javascript/bootstrap/js/bootstrap.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.0.1.js** (Vulnerable Library)
</details>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
<p>Publish Date: 2019-01-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20677>CVE-2018-20677</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677</a></p>
<p>Release Date: 2019-01-09</p>
<p>Fix Resolution: Bootstrap - v3.4.0;NorDroN.AngularTemplate - 0.1.6;Dynamic.NET.Express.ProjectTemplates - 0.8.0;dotnetng.template - 1.0.0.4;ZNxtApp.Core.Module.Theme - 1.0.9-Beta;JMeter - 5.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-20677 (Medium) detected in multiple libraries - ## CVE-2018-20677 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>bootstrap-3.0.1.min.js</b>, <b>bootstrap-3.3.5.min.js</b>, <b>bootstrap-3.0.1.js</b></p></summary>
<p>
<details><summary><b>bootstrap-3.0.1.min.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.1/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.1/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /opencart/upload/install/view/javascript/bootstrap/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.0.1.min.js** (Vulnerable Library)
</details>
<details><summary><b>bootstrap-3.3.5.min.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.5/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.5/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /opencart/upload/admin/view/javascript/jquery/datetimepicker/bootstrap.min.js,/opencart/upload/catalog/view/javascript/jquery/datetimepicker/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.3.5.min.js** (Vulnerable Library)
</details>
<details><summary><b>bootstrap-3.0.1.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.1/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.1/js/bootstrap.js</a></p>
<p>Path to vulnerable library: /opencart/upload/install/view/javascript/bootstrap/js/bootstrap.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.0.1.js** (Vulnerable Library)
</details>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
<p>Publish Date: 2019-01-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20677>CVE-2018-20677</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677</a></p>
<p>Release Date: 2019-01-09</p>
<p>Fix Resolution: Bootstrap - v3.4.0;NorDroN.AngularTemplate - 0.1.6;Dynamic.NET.Express.ProjectTemplates - 0.8.0;dotnetng.template - 1.0.0.4;ZNxtApp.Core.Module.Theme - 1.0.9-Beta;JMeter - 5.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries bootstrap min js bootstrap min js bootstrap js bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library opencart upload install view javascript bootstrap js bootstrap min js dependency hierarchy x bootstrap min js vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library opencart upload admin view javascript jquery datetimepicker bootstrap min js opencart upload catalog view javascript jquery datetimepicker bootstrap min js dependency hierarchy x bootstrap min js vulnerable library bootstrap js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library opencart upload install view javascript bootstrap js bootstrap js dependency hierarchy x bootstrap js vulnerable library vulnerability details in bootstrap before xss is possible in the affix configuration target property publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bootstrap nordron angulartemplate dynamic net express projecttemplates dotnetng template znxtapp core module theme beta jmeter step up your open source security game with whitesource | 0 |
386,553 | 26,689,310,607 | IssuesEvent | 2023-01-27 02:10:22 | UBC-MDS/colourpycker | https://api.github.com/repos/UBC-MDS/colourpycker | closed | Documentation | documentation | Ensure the following fundamental changes are complete:
- [x] Deploy documentation rendered using the napoleon Sphinx extension at ReadTheDocs
- [x] Provide an example of how to use each function
Reference: https://pages.github.ubc.ca/mds-2022-23/DSCI_524_collab-sw-dev_students/materials/assignments/milestone3.html#documentation
| 1.0 | Documentation - Ensure the following fundamental changes are complete:
- [x] Deploy documentation rendered using the napoleon Sphinx extension at ReadTheDocs
- [x] Provide an example of how to use each function
Reference: https://pages.github.ubc.ca/mds-2022-23/DSCI_524_collab-sw-dev_students/materials/assignments/milestone3.html#documentation
| non_priority | documentation ensure the following fundamental changes are complete deploy documentation rendered using the napoleon sphinx extension at readthedocs provide an example of how to use each function reference | 0 |
103,700 | 8,933,171,176 | IssuesEvent | 2019-01-23 00:48:12 | Microsoft/AzureStorageExplorer | https://api.github.com/repos/Microsoft/AzureStorageExplorer | closed | The enabled and visible bindings for actions are not evaluated until context menu or actions panel are opened | :gear: adls gen2 testing | **Storage Explorer Version:** 1.6.2
**Platform/OS Version:** Windows 10/MacOS High Sierra/ Linux Ubuntu 16.04
**Architecture:** ia32/x64
**Build Number:** 20190104.2
**Commit:** 6ad194d8
**Regression From:** Not a regression
#### Steps to Reproduce: ####
1. Expand an ADLS Gen2 account -> Blob Containers -> Create a blob container.
2. Select the blob container and press "F2".
#### Expected Experience: ####
Nothing happens after pressing "F2".
#### Actual Experience: ####
The "Rename" dialog pops up.
**More Info:**
Pops up an error dialog after renaming.

| 1.0 | The enabled and visible bindings for actions are not evaluated until context menu or actions panel are opened - **Storage Explorer Version:** 1.6.2
**Platform/OS Version:** Windows 10/MacOS High Sierra/ Linux Ubuntu 16.04
**Architecture:** ia32/x64
**Build Number:** 20190104.2
**Commit:** 6ad194d8
**Regression From:** Not a regression
#### Steps to Reproduce: ####
1. Expand an ADLS Gen2 account -> Blob Containers -> Create a blob container.
2. Select the blob container and press "F2".
#### Expected Experience: ####
Nothing happens after pressing "F2".
#### Actual Experience: ####
The "Rename" dialog pops up.
**More Info:**
Pops up an error dialog after renaming.

| non_priority | the enabled and visible bindings for actions are not evaluated until context menu or actions panel are opened storage explorer version platform os version windows macos high sierra linux ubuntu architecture build number commit regression from not a regression steps to reproduce expand an adls account blob containers create a blob container select the blob container and press expected experience nothing happens after pressing actual experience the rename dialog pops up more info pops up an error dialog after renaming | 0 |
281,796 | 24,420,254,887 | IssuesEvent | 2022-10-05 19:37:47 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | closed | unknown: (unknown) failed | C-test-failure O-robot branch-release-22.2.0 | unknown.(unknown) [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RandomSyntaxTestsBazel/6784095?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RandomSyntaxTestsBazel/6784095?buildTab=artifacts#/) on release-22.2.0 @ [9bb8a7faf624dcd23ce60e2a8a805ef863b10f72](https://github.com/cockroachdb/cockroach/commits/9bb8a7faf624dcd23ce60e2a8a805ef863b10f72):
```
Slow failing tests:
TestRandomSyntaxGeneration - 301.35s
TestRandomSyntaxFunctions - 293.09s
Slow passing tests:
TestRandomSyntaxSelect - 300.56s
```
<details><summary>Help</summary>
<p>
See also: [How To Investigate a Go Test Failure \(internal\)](https://cockroachlabs.atlassian.net/l/c/HgfXfJgM)
</p>
</details>
<details><summary>Same failure on other branches</summary>
<p>
- #88087 unknown: (unknown) failed [sqlstats/persistedsqlstats: stuck when flushing during shutdown] [C-test-failure GA-blocker O-robot T-sql-observability branch-release-22.2]
- #87673 unknown: (unknown) failed [sqlstats/persistedsqlstats: stuck when flushing during shutdown] [C-test-failure GA-blocker O-robot T-sql-observability branch-master]
</p>
</details>
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*\(unknown\).*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
Jira issue: CRDB-20239 | 1.0 | unknown: (unknown) failed - unknown.(unknown) [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RandomSyntaxTestsBazel/6784095?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RandomSyntaxTestsBazel/6784095?buildTab=artifacts#/) on release-22.2.0 @ [9bb8a7faf624dcd23ce60e2a8a805ef863b10f72](https://github.com/cockroachdb/cockroach/commits/9bb8a7faf624dcd23ce60e2a8a805ef863b10f72):
```
Slow failing tests:
TestRandomSyntaxGeneration - 301.35s
TestRandomSyntaxFunctions - 293.09s
Slow passing tests:
TestRandomSyntaxSelect - 300.56s
```
<details><summary>Help</summary>
<p>
See also: [How To Investigate a Go Test Failure \(internal\)](https://cockroachlabs.atlassian.net/l/c/HgfXfJgM)
</p>
</details>
<details><summary>Same failure on other branches</summary>
<p>
- #88087 unknown: (unknown) failed [sqlstats/persistedsqlstats: stuck when flushing during shutdown] [C-test-failure GA-blocker O-robot T-sql-observability branch-release-22.2]
- #87673 unknown: (unknown) failed [sqlstats/persistedsqlstats: stuck when flushing during shutdown] [C-test-failure GA-blocker O-robot T-sql-observability branch-master]
</p>
</details>
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*\(unknown\).*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
Jira issue: CRDB-20239 | non_priority | unknown unknown failed unknown unknown with on release slow failing tests testrandomsyntaxgeneration testrandomsyntaxfunctions slow passing tests testrandomsyntaxselect help see also same failure on other branches unknown unknown failed unknown unknown failed jira issue crdb | 0 |
141,717 | 5,440,240,737 | IssuesEvent | 2017-03-06 15:23:30 | kubernetes/kubernetes | https://api.github.com/repos/kubernetes/kubernetes | closed | container "runtime" exceeding expected RSS memory | area/docker area/os/gci kind/flake priority/backlog sig/node | We seemed to have curbed the kubelet memory issues in #27456, but the runtime issues remain.
``` console
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubelet_perf.go:277
Jun 26 21:41:36.956: Memory usage exceeding limits:
node jenkins-e2e-minion-group-lkou:
container "runtime": expected RSS memory (MB) < 157286400; got 192192512
node jenkins-e2e-minion-group-vdvc:
container "runtime": expected RSS memory (MB) < 157286400; got 169332736
node jenkins-e2e-minion-group-zlrc:
container "runtime": expected RSS memory (MB) < 157286400; got 169558016
```
https://k8s-gubernator.appspot.com/build/kubernetes-jenkins/logs/kubernetes-soak-continuous-e2e-gce/5807 has a lot of these.
This can likely be de-duped to an auto-filed issue when the soak tests are added to the munger.
| 1.0 | container "runtime" exceeding expected RSS memory - We seemed to have curbed the kubelet memory issues in #27456, but the runtime issues remain.
``` console
/go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/kubelet_perf.go:277
Jun 26 21:41:36.956: Memory usage exceeding limits:
node jenkins-e2e-minion-group-lkou:
container "runtime": expected RSS memory (MB) < 157286400; got 192192512
node jenkins-e2e-minion-group-vdvc:
container "runtime": expected RSS memory (MB) < 157286400; got 169332736
node jenkins-e2e-minion-group-zlrc:
container "runtime": expected RSS memory (MB) < 157286400; got 169558016
```
https://k8s-gubernator.appspot.com/build/kubernetes-jenkins/logs/kubernetes-soak-continuous-e2e-gce/5807 has a lot of these.
This can likely be de-duped to an auto-filed issue when the soak tests are added to the munger.
| priority | container runtime exceeding expected rss memory we seemed to have curbed the kubelet memory issues in but the runtime issues remain console go src io kubernetes output dockerized go src io kubernetes test kubelet perf go jun memory usage exceeding limits node jenkins minion group lkou container runtime expected rss memory mb got node jenkins minion group vdvc container runtime expected rss memory mb got node jenkins minion group zlrc container runtime expected rss memory mb got has a lot of these this can likely be de duped to an auto filed issue when the soak tests are added to the munger | 1 |
374,655 | 11,093,745,068 | IssuesEvent | 2019-12-16 03:13:58 | dhenry-KCI/FredCo-Post-Go-Live- | https://api.github.com/repos/dhenry-KCI/FredCo-Post-Go-Live- | opened | Building - Elec. Perm | High Priority | Non-Res Service coming up as 39.00. Non Res-Service fee sohudl be $40.00
See permit 258144
Logged by Ashlye B. | 1.0 | Building - Elec. Perm - Non-Res Service coming up as 39.00. Non Res-Service fee sohudl be $40.00
See permit 258144
Logged by Ashlye B. | priority | building elec perm non res service coming up as non res service fee sohudl be see permit logged by ashlye b | 1 |
330,232 | 28,360,848,949 | IssuesEvent | 2023-04-12 10:36:44 | hazelcast/hazelcast | https://api.github.com/repos/hazelcast/hazelcast | closed | com.hazelcast.jet.config.ResourceConfigTest.when_addResourcesWithNonExistingPackage | Type: Test-Failure Source: Internal Module: Jet Team: Platform | _master_ (commit 83371a644146617653c1e5a83c72a04264b4175c)
Failed on openjdk-20: https://jenkins.hazelcast.com/job/Hazelcast-master-OpenJDK-ea/25/testReport/junit/com.hazelcast.jet.config/ResourceConfigTest/when_addResourcesWithNonExistingPackage/
<details><summary>Stacktrace:</summary>
```
java.lang.RuntimeException: Cannot use reflection after ScanResult has been closed
at nonapi.io.github.classgraph.reflection.ReflectionUtils.invokeMethod(ReflectionUtils.java:241)
at io.github.classgraph.ModuleRef.<init>(ModuleRef.java:91)
at nonapi.io.github.classgraph.classpath.ModuleFinder.findModuleRefs(ModuleFinder.java:189)
at nonapi.io.github.classgraph.classpath.ModuleFinder.findModuleRefsFromCallstack(ModuleFinder.java:258)
at nonapi.io.github.classgraph.classpath.ModuleFinder.<init>(ModuleFinder.java:284)
at nonapi.io.github.classgraph.classpath.ClasspathFinder.<init>(ClasspathFinder.java:168)
at io.github.classgraph.Scanner.<init>(Scanner.java:166)
at io.github.classgraph.ClassGraph.scanAsync(ClassGraph.java:1531)
at io.github.classgraph.ClassGraph.scanAsync(ClassGraph.java:1559)
at io.github.classgraph.ClassGraph.scan(ClassGraph.java:1584)
at io.github.classgraph.ClassGraph.scan(ClassGraph.java:1623)
at io.github.classgraph.ClassGraph.scan(ClassGraph.java:1636)
at com.hazelcast.jet.impl.util.ReflectionUtils.resourcesOf(ReflectionUtils.java:258)
at com.hazelcast.jet.config.JobConfig.addPackage(JobConfig.java:337)
at com.hazelcast.jet.config.ResourceConfigTest.when_addResourcesWithNonExistingPackage(ResourceConfigTest.java:98)
at java.base/jdk.internal.reflect.DirectMethodHandleAccessor.invoke(DirectMethodHandleAccessor.java:104)
at java.base/java.lang.reflect.Method.invoke(Method.java:578)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:115)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:107)
at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:317)
at java.base/java.lang.Thread.run(Thread.java:1591)
```
</details>
<details><summary>Standard output:</summary>
```
No metrics recorded during the test
Finished Running Test: when_attachNonexistentDirectoryWithUrl_then_throwsException in 0.223 seconds.
Started Running Test: when_addZipOfJarWithFile
Started Running Test: when_addResourceWithFileAndId
```
</details>
Standard output can be found here - https://s3.console.aws.amazon.com/s3/buckets/j-artifacts/Hazelcast-master-OpenJDK-ea/25/
Similar issues:
https://github.com/hazelcast/hazelcast/issues/23838
https://github.com/hazelcast/hazelcast-enterprise/issues/5786 | 1.0 | com.hazelcast.jet.config.ResourceConfigTest.when_addResourcesWithNonExistingPackage - _master_ (commit 83371a644146617653c1e5a83c72a04264b4175c)
Failed on openjdk-20: https://jenkins.hazelcast.com/job/Hazelcast-master-OpenJDK-ea/25/testReport/junit/com.hazelcast.jet.config/ResourceConfigTest/when_addResourcesWithNonExistingPackage/
<details><summary>Stacktrace:</summary>
```
java.lang.RuntimeException: Cannot use reflection after ScanResult has been closed
at nonapi.io.github.classgraph.reflection.ReflectionUtils.invokeMethod(ReflectionUtils.java:241)
at io.github.classgraph.ModuleRef.<init>(ModuleRef.java:91)
at nonapi.io.github.classgraph.classpath.ModuleFinder.findModuleRefs(ModuleFinder.java:189)
at nonapi.io.github.classgraph.classpath.ModuleFinder.findModuleRefsFromCallstack(ModuleFinder.java:258)
at nonapi.io.github.classgraph.classpath.ModuleFinder.<init>(ModuleFinder.java:284)
at nonapi.io.github.classgraph.classpath.ClasspathFinder.<init>(ClasspathFinder.java:168)
at io.github.classgraph.Scanner.<init>(Scanner.java:166)
at io.github.classgraph.ClassGraph.scanAsync(ClassGraph.java:1531)
at io.github.classgraph.ClassGraph.scanAsync(ClassGraph.java:1559)
at io.github.classgraph.ClassGraph.scan(ClassGraph.java:1584)
at io.github.classgraph.ClassGraph.scan(ClassGraph.java:1623)
at io.github.classgraph.ClassGraph.scan(ClassGraph.java:1636)
at com.hazelcast.jet.impl.util.ReflectionUtils.resourcesOf(ReflectionUtils.java:258)
at com.hazelcast.jet.config.JobConfig.addPackage(JobConfig.java:337)
at com.hazelcast.jet.config.ResourceConfigTest.when_addResourcesWithNonExistingPackage(ResourceConfigTest.java:98)
at java.base/jdk.internal.reflect.DirectMethodHandleAccessor.invoke(DirectMethodHandleAccessor.java:104)
at java.base/java.lang.reflect.Method.invoke(Method.java:578)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:115)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:107)
at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:317)
at java.base/java.lang.Thread.run(Thread.java:1591)
```
</details>
<details><summary>Standard output:</summary>
```
No metrics recorded during the test
Finished Running Test: when_attachNonexistentDirectoryWithUrl_then_throwsException in 0.223 seconds.
Started Running Test: when_addZipOfJarWithFile
Started Running Test: when_addResourceWithFileAndId
```
</details>
Standard output can be found here - https://s3.console.aws.amazon.com/s3/buckets/j-artifacts/Hazelcast-master-OpenJDK-ea/25/
Similar issues:
https://github.com/hazelcast/hazelcast/issues/23838
https://github.com/hazelcast/hazelcast-enterprise/issues/5786 | non_priority | com hazelcast jet config resourceconfigtest when addresourceswithnonexistingpackage master commit failed on openjdk stacktrace java lang runtimeexception cannot use reflection after scanresult has been closed at nonapi io github classgraph reflection reflectionutils invokemethod reflectionutils java at io github classgraph moduleref moduleref java at nonapi io github classgraph classpath modulefinder findmodulerefs modulefinder java at nonapi io github classgraph classpath modulefinder findmodulerefsfromcallstack modulefinder java at nonapi io github classgraph classpath modulefinder modulefinder java at nonapi io github classgraph classpath classpathfinder classpathfinder java at io github classgraph scanner scanner java at io github classgraph classgraph scanasync classgraph java at io github classgraph classgraph scanasync classgraph java at io github classgraph classgraph scan classgraph java at io github classgraph classgraph scan classgraph java at io github classgraph classgraph scan classgraph java at com hazelcast jet impl util reflectionutils resourcesof reflectionutils java at com hazelcast jet config jobconfig addpackage jobconfig java at com hazelcast jet config resourceconfigtest when addresourceswithnonexistingpackage resourceconfigtest java at java base jdk internal reflect directmethodhandleaccessor invoke directmethodhandleaccessor java at java base java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at com hazelcast test failontimeoutstatement callablestatement call failontimeoutstatement java at com hazelcast test failontimeoutstatement callablestatement call failontimeoutstatement java at java base java util concurrent futuretask run futuretask java at java base java lang thread run thread java standard output no metrics recorded during the test finished running test when attachnonexistentdirectorywithurl then throwsexception in seconds started running test when addzipofjarwithfile started running test when addresourcewithfileandid standard output can be found here similar issues | 0 |
43,721 | 11,298,048,585 | IssuesEvent | 2020-01-17 08:00:21 | iamseth/oracledb_exporter | https://api.github.com/repos/iamseth/oracledb_exporter | closed | Binaries are missing for release 0.2.4 | build | Hi,
Binaries are missing for release 0.2.4 in https://github.com/iamseth/oracledb_exporter/releases. Could you fix that or give a pointer to instructions for compiling the source code.
Regards,
Michiel | 1.0 | Binaries are missing for release 0.2.4 - Hi,
Binaries are missing for release 0.2.4 in https://github.com/iamseth/oracledb_exporter/releases. Could you fix that or give a pointer to instructions for compiling the source code.
Regards,
Michiel | non_priority | binaries are missing for release hi binaries are missing for release in could you fix that or give a pointer to instructions for compiling the source code regards michiel | 0 |
388,588 | 11,489,671,748 | IssuesEvent | 2020-02-11 15:52:06 | kubernetes-sigs/cluster-api-provider-aws | https://api.github.com/repos/kubernetes-sigs/cluster-api-provider-aws | closed | Ability to configure node disks | kind/feature lifecycle/active priority/important-soon | /kind feature
**User Story**
When creating nodes in a cluster, it would be useful to be able to request disk characteristics to control performance, space, and cost. Specifically, it would be good to be able to configure:
* Root disk size (I think this is already possible)
* Disk type (gp2, etc)
* IOPS
| 1.0 | Ability to configure node disks - /kind feature
**User Story**
When creating nodes in a cluster, it would be useful to be able to request disk characteristics to control performance, space, and cost. Specifically, it would be good to be able to configure:
* Root disk size (I think this is already possible)
* Disk type (gp2, etc)
* IOPS
| priority | ability to configure node disks kind feature user story when creating nodes in a cluster it would be useful to be able to request disk characteristics to control performance space and cost specifically it would be good to be able to configure root disk size i think this is already possible disk type etc iops | 1 |
306,867 | 23,175,074,871 | IssuesEvent | 2022-07-31 09:46:21 | ironSource/license-report | https://api.github.com/repos/ironSource/license-report | closed | Use default config file | documentation | it will be great to use default config file.
example:

And then anyone can change it, e.g.:
```json
{
"fields": [
"name",
"licenseType",
"author",
"link",
"installedVersion",
],
"output": "html",
"only": "prod,dev",
"registry": "http://example.com"
}
```
currently I need to specify config file manually:
```json
"build:license-report": "license-report --config=.license-report-config > ./src/dependencies.html"
``` | 1.0 | Use default config file - it will be great to use default config file.
example:

And then anyone can change it, e.g.:
```json
{
"fields": [
"name",
"licenseType",
"author",
"link",
"installedVersion",
],
"output": "html",
"only": "prod,dev",
"registry": "http://example.com"
}
```
currently I need to specify config file manually:
```json
"build:license-report": "license-report --config=.license-report-config > ./src/dependencies.html"
``` | non_priority | use default config file it will be great to use default config file example and then anyone can change it e g json fields name licensetype author link installedversion output html only prod dev registry currently i need to specify config file manually json build license report license report config license report config src dependencies html | 0 |
776,844 | 27,264,706,636 | IssuesEvent | 2023-02-22 17:09:00 | ascheid/itsg33-pbmm-issue-gen | https://api.github.com/repos/ascheid/itsg33-pbmm-issue-gen | opened | RA-5(2): Vulnerability Scanning | Update By Frequency / Prior To New Scan / When Identified | Priority: P2 ITSG-33 Suggested Assignment: IT Operations Group Class: Management Control: RA-5 | # Control Definition
VULNERABILITY SCANNING | UPDATE BY FREQUENCY / PRIOR TO NEW SCAN / WHEN IDENTIFIED
The organization updates the information system vulnerabilities scanned [Selection (one or more): [Assignment: organization-defined frequency]; prior to a new scan; when new vulnerabilities are identified and reported].
# Class
Management
# Supplemental Guidance
Related controls: SI-3, SI-5.
# Suggested Placeholder Values
(2) frequency [immediately prior to each vulnerability scan]
# Suggested Assignment
IT Operations Group
# Support Teams
IT Projects
| 1.0 | RA-5(2): Vulnerability Scanning | Update By Frequency / Prior To New Scan / When Identified - # Control Definition
VULNERABILITY SCANNING | UPDATE BY FREQUENCY / PRIOR TO NEW SCAN / WHEN IDENTIFIED
The organization updates the information system vulnerabilities scanned [Selection (one or more): [Assignment: organization-defined frequency]; prior to a new scan; when new vulnerabilities are identified and reported].
# Class
Management
# Supplemental Guidance
Related controls: SI-3, SI-5.
# Suggested Placeholder Values
(2) frequency [immediately prior to each vulnerability scan]
# Suggested Assignment
IT Operations Group
# Support Teams
IT Projects
| priority | ra vulnerability scanning update by frequency prior to new scan when identified control definition vulnerability scanning update by frequency prior to new scan when identified the organization updates the information system vulnerabilities scanned prior to a new scan when new vulnerabilities are identified and reported class management supplemental guidance related controls si si suggested placeholder values frequency suggested assignment it operations group support teams it projects | 1 |
336,718 | 10,195,911,876 | IssuesEvent | 2019-08-12 19:21:23 | jbadlato/Markov-Rankings | https://api.github.com/repos/jbadlato/Markov-Rankings | opened | Display teams' ranks in game score component | Priority: Low Type: Feature | Could be current rank, or rank at the time of the game | 1.0 | Display teams' ranks in game score component - Could be current rank, or rank at the time of the game | priority | display teams ranks in game score component could be current rank or rank at the time of the game | 1 |
32,917 | 15,712,374,884 | IssuesEvent | 2021-03-27 11:50:23 | hajimehoshi/ebiten | https://api.github.com/repos/hajimehoshi/ebiten | closed | glfw (opengl) SwapBuffers skips frames when shareable.Image.makeShared has just run | performance | I'm observing a progressively worsening stuttering once every second in my new ebiten-based app. I'm using the v2 branch on Linux, with glfw UI using opengl.
The app is a music visualization app - based on music notes sent to it, it generates scrolling tracks visualizing the music being played. As such, I create a bunch of images (in a tiled manner) all the time to scroll them across the screen. However, it seems like the `SwapBuffers` call will get progressively more and more slower, in steps, as I generate more of these scrolling images over time - and `Dispose` does not seem to help.
I've added some instrumentation to the `UserInterface.loop` function [here](https://github.com/hajimehoshi/ebiten/blob/master/internal/uidriver/glfw/ui.go#L803):
```go
func logIfLonger(msg string, t time.Duration) func() {
start := time.Now()
return func() {
d := time.Now().Sub(start)
if d > t {
log.Printf("%s: %dms exceeded: %dms\n", msg, t.Milliseconds(), d.Milliseconds())
}
}
}
```
```go
f := logIfLonger("swap", 50*time.Millisecond)
_ = u.t.Call(func() error {
u.swapBuffers()
return nil
})
f()
```
These calls start off taking a few hundred microseconds, then after a few seconds they start to take 80ms ~once every second, then ~minute later still ~180ms:
```
2021/01/16 22:59:00 New track
2021/01/16 22:59:08 swap: 50ms exceeded: 88ms
2021/01/16 22:59:09 swap: 50ms exceeded: 85ms
2021/01/16 22:59:10 swap: 50ms exceeded: 84ms
2021/01/16 22:59:11 swap: 50ms exceeded: 83ms
...
2021/01/16 23:00:31 swap: 50ms exceeded: 87ms
2021/01/16 23:00:31 swap: 50ms exceeded: 88ms
2021/01/16 23:00:32 swap: 50ms exceeded: 84ms
2021/01/16 23:00:34 swap: 50ms exceeded: 197ms
2021/01/16 23:00:34 swap: 50ms exceeded: 191ms
2021/01/16 23:00:35 swap: 50ms exceeded: 192ms
...
```
There is some type of a slow memory leak happening with images too, so I wonder if they are building up somewhere where they get in the way of swapping buffers? I've sort of been careful to not leak anything but I guess I could have missed something too. A heap profile seems to think most of the memory is allocated in `internal.shareable.image` though:
```
(pprof) top
Showing nodes accounting for 180.98MB, 100% of 180.98MB total
Showing top 10 nodes out of 18
flat flat% sum% cum cum%
178.23MB 98.48% 98.48% 178.23MB 98.48% github.com/hajimehoshi/ebiten/v2/internal/shareable.(*Image).replacePixels
1.38MB 0.76% 99.24% 1.38MB 0.76% github.com/hajimehoshi/ebiten/v2/internal/graphicsdriver/opengl.(*context).framebufferPixels.func2
1.37MB 0.76% 100% 179.60MB 99.24% github.com/hajimehoshi/ebiten/v2/internal/shareable.(*Image).makeShared
0 0% 100% 179.60MB 99.24% github.com/hajimehoshi/ebiten/v2.(*uiContext).Update
0 0% 100% 179.60MB 99.24% github.com/hajimehoshi/ebiten/v2.(*uiContext).update
```
It's getting late here, I'll poke more tomorrow. But I thought I'd post it here just in case there is an obvious answer to this. | True | glfw (opengl) SwapBuffers skips frames when shareable.Image.makeShared has just run - I'm observing a progressively worsening stuttering once every second in my new ebiten-based app. I'm using the v2 branch on Linux, with glfw UI using opengl.
The app is a music visualization app - based on music notes sent to it, it generates scrolling tracks visualizing the music being played. As such, I create a bunch of images (in a tiled manner) all the time to scroll them across the screen. However, it seems like the `SwapBuffers` call will get progressively more and more slower, in steps, as I generate more of these scrolling images over time - and `Dispose` does not seem to help.
I've added some instrumentation to the `UserInterface.loop` function [here](https://github.com/hajimehoshi/ebiten/blob/master/internal/uidriver/glfw/ui.go#L803):
```go
func logIfLonger(msg string, t time.Duration) func() {
start := time.Now()
return func() {
d := time.Now().Sub(start)
if d > t {
log.Printf("%s: %dms exceeded: %dms\n", msg, t.Milliseconds(), d.Milliseconds())
}
}
}
```
```go
f := logIfLonger("swap", 50*time.Millisecond)
_ = u.t.Call(func() error {
u.swapBuffers()
return nil
})
f()
```
These calls start off taking a few hundred microseconds, then after a few seconds they start to take 80ms ~once every second, then ~minute later still ~180ms:
```
2021/01/16 22:59:00 New track
2021/01/16 22:59:08 swap: 50ms exceeded: 88ms
2021/01/16 22:59:09 swap: 50ms exceeded: 85ms
2021/01/16 22:59:10 swap: 50ms exceeded: 84ms
2021/01/16 22:59:11 swap: 50ms exceeded: 83ms
...
2021/01/16 23:00:31 swap: 50ms exceeded: 87ms
2021/01/16 23:00:31 swap: 50ms exceeded: 88ms
2021/01/16 23:00:32 swap: 50ms exceeded: 84ms
2021/01/16 23:00:34 swap: 50ms exceeded: 197ms
2021/01/16 23:00:34 swap: 50ms exceeded: 191ms
2021/01/16 23:00:35 swap: 50ms exceeded: 192ms
...
```
There is some type of a slow memory leak happening with images too, so I wonder if they are building up somewhere where they get in the way of swapping buffers? I've sort of been careful to not leak anything but I guess I could have missed something too. A heap profile seems to think most of the memory is allocated in `internal.shareable.image` though:
```
(pprof) top
Showing nodes accounting for 180.98MB, 100% of 180.98MB total
Showing top 10 nodes out of 18
flat flat% sum% cum cum%
178.23MB 98.48% 98.48% 178.23MB 98.48% github.com/hajimehoshi/ebiten/v2/internal/shareable.(*Image).replacePixels
1.38MB 0.76% 99.24% 1.38MB 0.76% github.com/hajimehoshi/ebiten/v2/internal/graphicsdriver/opengl.(*context).framebufferPixels.func2
1.37MB 0.76% 100% 179.60MB 99.24% github.com/hajimehoshi/ebiten/v2/internal/shareable.(*Image).makeShared
0 0% 100% 179.60MB 99.24% github.com/hajimehoshi/ebiten/v2.(*uiContext).Update
0 0% 100% 179.60MB 99.24% github.com/hajimehoshi/ebiten/v2.(*uiContext).update
```
It's getting late here, I'll poke more tomorrow. But I thought I'd post it here just in case there is an obvious answer to this. | non_priority | glfw opengl swapbuffers skips frames when shareable image makeshared has just run i m observing a progressively worsening stuttering once every second in my new ebiten based app i m using the branch on linux with glfw ui using opengl the app is a music visualization app based on music notes sent to it it generates scrolling tracks visualizing the music being played as such i create a bunch of images in a tiled manner all the time to scroll them across the screen however it seems like the swapbuffers call will get progressively more and more slower in steps as i generate more of these scrolling images over time and dispose does not seem to help i ve added some instrumentation to the userinterface loop function go func logiflonger msg string t time duration func start time now return func d time now sub start if d t log printf s dms exceeded dms n msg t milliseconds d milliseconds go f logiflonger swap time millisecond u t call func error u swapbuffers return nil f these calls start off taking a few hundred microseconds then after a few seconds they start to take once every second then minute later still new track swap exceeded swap exceeded swap exceeded swap exceeded swap exceeded swap exceeded swap exceeded swap exceeded swap exceeded swap exceeded there is some type of a slow memory leak happening with images too so i wonder if they are building up somewhere where they get in the way of swapping buffers i ve sort of been careful to not leak anything but i guess i could have missed something too a heap profile seems to think most of the memory is allocated in internal shareable image though pprof top showing nodes accounting for of total showing top nodes out of flat flat sum cum cum github com hajimehoshi ebiten internal shareable image replacepixels github com hajimehoshi ebiten internal graphicsdriver opengl context framebufferpixels github com hajimehoshi ebiten internal shareable image makeshared github com hajimehoshi ebiten uicontext update github com hajimehoshi ebiten uicontext update it s getting late here i ll poke more tomorrow but i thought i d post it here just in case there is an obvious answer to this | 0 |
16,561 | 2,918,052,174 | IssuesEvent | 2015-06-24 04:22:43 | cakephp/cakephp | https://api.github.com/repos/cakephp/cakephp | closed | Changelog list is broken | Defect website | On http://cakephp.org/changelogs/ the menu on the right side containing the list of changelogs is broken.
Also when you go directly to a changelog, eg. http://cakephp.org/changelogs/3.0.5, the site returns "Invalid tag for changelog" | 1.0 | Changelog list is broken - On http://cakephp.org/changelogs/ the menu on the right side containing the list of changelogs is broken.
Also when you go directly to a changelog, eg. http://cakephp.org/changelogs/3.0.5, the site returns "Invalid tag for changelog" | non_priority | changelog list is broken on the menu on the right side containing the list of changelogs is broken also when you go directly to a changelog eg the site returns invalid tag for changelog | 0 |
270,347 | 28,960,508,903 | IssuesEvent | 2023-05-10 01:48:02 | hshivhare67/kernel_v4.1.15 | https://api.github.com/repos/hshivhare67/kernel_v4.1.15 | reopened | CVE-2022-41858 (High) detected in linux-stable-rtv4.1.33 | Mend: dependency security vulnerability | ## CVE-2022-41858 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/hshivhare67/kernel_v4.1.15/commit/ad22f8de1f1d069a1e8715eb4af9718f2d87a974">ad22f8de1f1d069a1e8715eb4af9718f2d87a974</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/net/slip/slip.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/net/slip/slip.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.
<p>Publish Date: 2023-01-17
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41858>CVE-2022-41858</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2022-41858">https://www.linuxkernelcves.com/cves/CVE-2022-41858</a></p>
<p>Release Date: 2022-09-30</p>
<p>Fix Resolution: v4.9.311,v4.14.276,v4.19.239,v5.4.190,v5.10.112,v5.15.35,v5.17.4,v5.18-rc2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-41858 (High) detected in linux-stable-rtv4.1.33 - ## CVE-2022-41858 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/hshivhare67/kernel_v4.1.15/commit/ad22f8de1f1d069a1e8715eb4af9718f2d87a974">ad22f8de1f1d069a1e8715eb4af9718f2d87a974</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/net/slip/slip.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/net/slip/slip.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.
<p>Publish Date: 2023-01-17
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41858>CVE-2022-41858</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2022-41858">https://www.linuxkernelcves.com/cves/CVE-2022-41858</a></p>
<p>Release Date: 2022-09-30</p>
<p>Fix Resolution: v4.9.311,v4.14.276,v4.19.239,v5.4.190,v5.10.112,v5.15.35,v5.17.4,v5.18-rc2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in linux stable cve high severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files drivers net slip slip c drivers net slip slip c vulnerability details a flaw was found in the linux kernel a null pointer dereference may occur while a slip driver is in progress to detach in sl tx timeout in drivers net slip slip c this issue could allow an attacker to crash the system or leak internal kernel information publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
503,210 | 14,581,093,942 | IssuesEvent | 2020-12-18 10:11:27 | microsoft/terminal | https://api.github.com/repos/microsoft/terminal | closed | MRU mode: when you close a tab, it goes to the nearest adjacent instead of the last used | Area-User Interface Help Wanted In-PR Issue-Bug Priority-3 Product-Terminal | As in the title: tab closing logic doesn't take the MRU order into account.
Might be a feature, rather than a bug, if we consider MRU as a property of TabSwitcher only
| 1.0 | MRU mode: when you close a tab, it goes to the nearest adjacent instead of the last used - As in the title: tab closing logic doesn't take the MRU order into account.
Might be a feature, rather than a bug, if we consider MRU as a property of TabSwitcher only
| priority | mru mode when you close a tab it goes to the nearest adjacent instead of the last used as in the title tab closing logic doesn t take the mru order into account might be a feature rather than a bug if we consider mru as a property of tabswitcher only | 1 |
675,451 | 23,094,991,632 | IssuesEvent | 2022-07-26 18:36:27 | hemaraghu666/testreposotory | https://api.github.com/repos/hemaraghu666/testreposotory | reopened | cp for na build deploy failing | bug operations Priority 1 Severity 1 | ### description :
build of maviner xnf delpoy failed with error "task Wait for CUCP and CUUP deployment to be up failed"
### steps to reproduce :
step1 : log in to cp for na
step2 : manage entity and fill the data
step3 : click on build
### expected results
1. build should be successful
2. 'oc get pods -n cu02' should return all the pods in 'Running' status
3. cellmapping entry should be added
4. function mapping should be added
5. gnb mapping should be added
### actual result
1. build has failed
2. pods are all running
```
[ibm@redhat-bastion ~]$ oc get pods -n cu02
NAME READY STATUS RESTARTS AGE
bccsvc-0 2/2 Running 0 3m29s
dalsvc-fd977b546-plhqw 2/2 Running 0 3m29s
dprmsvc-7b65c79bdc-pfhxw 2/2 Running 0 3m29s
gnbmgr-7cf7d666dd-lsrjx 2/2 Running 0 3m39s
gwsvc-748c97b8bc-7zxs8 2/2 Running 0 3m29s
intfmgrsvc-86978846d9-5z7ms 2/2 Running 0 3m29s
iwfsvc-0 2/2 Running 0 3m29s
ngclientiwf-7b9bc64d97-pkdlr 2/2 Running 0 3m39s
sctpe1iwf-6ccdd84b5b-6cpst 2/2 Running 0 3m39s
sctpf1iwf-84f4674866-b9hhd 2/2 Running 0 3m39s
sctpxniwf-949dbbcff-b8tb4 2/2 Running 0 3m39s
srmsvc-89cfdf49d-zt4qb 2/2 Running 0 3m29s
ueconmgr-7c5df88f7b-6z27c 2/2 Running 0 3m39s
```
3. cellmapping entry is added
4. function mapping is added
5. gnb mapping is added
### environment
red hat8.5
| 1.0 | cp for na build deploy failing - ### description :
build of maviner xnf delpoy failed with error "task Wait for CUCP and CUUP deployment to be up failed"
### steps to reproduce :
step1 : log in to cp for na
step2 : manage entity and fill the data
step3 : click on build
### expected results
1. build should be successful
2. 'oc get pods -n cu02' should return all the pods in 'Running' status
3. cellmapping entry should be added
4. function mapping should be added
5. gnb mapping should be added
### actual result
1. build has failed
2. pods are all running
```
[ibm@redhat-bastion ~]$ oc get pods -n cu02
NAME READY STATUS RESTARTS AGE
bccsvc-0 2/2 Running 0 3m29s
dalsvc-fd977b546-plhqw 2/2 Running 0 3m29s
dprmsvc-7b65c79bdc-pfhxw 2/2 Running 0 3m29s
gnbmgr-7cf7d666dd-lsrjx 2/2 Running 0 3m39s
gwsvc-748c97b8bc-7zxs8 2/2 Running 0 3m29s
intfmgrsvc-86978846d9-5z7ms 2/2 Running 0 3m29s
iwfsvc-0 2/2 Running 0 3m29s
ngclientiwf-7b9bc64d97-pkdlr 2/2 Running 0 3m39s
sctpe1iwf-6ccdd84b5b-6cpst 2/2 Running 0 3m39s
sctpf1iwf-84f4674866-b9hhd 2/2 Running 0 3m39s
sctpxniwf-949dbbcff-b8tb4 2/2 Running 0 3m39s
srmsvc-89cfdf49d-zt4qb 2/2 Running 0 3m29s
ueconmgr-7c5df88f7b-6z27c 2/2 Running 0 3m39s
```
3. cellmapping entry is added
4. function mapping is added
5. gnb mapping is added
### environment
red hat8.5
| priority | cp for na build deploy failing description build of maviner xnf delpoy failed with error task wait for cucp and cuup deployment to be up failed steps to reproduce log in to cp for na manage entity and fill the data click on build expected results build should be successful oc get pods n should return all the pods in running status cellmapping entry should be added function mapping should be added gnb mapping should be added actual result build has failed pods are all running oc get pods n name ready status restarts age bccsvc running dalsvc plhqw running dprmsvc pfhxw running gnbmgr lsrjx running gwsvc running intfmgrsvc running iwfsvc running ngclientiwf pkdlr running running running sctpxniwf running srmsvc running ueconmgr running cellmapping entry is added function mapping is added gnb mapping is added environment red | 1 |
4,235 | 10,756,544,163 | IssuesEvent | 2019-10-31 11:26:21 | poanetwork/blockscout | https://api.github.com/repos/poanetwork/blockscout | closed | Indexer exits when connecting to local parity | bug :bug: client: parity priority: high severity: 4 team: architecture | When trying to setup everything locally (running both explorer and parity), it seems that indexer fails to connect to parity via websockets:
```
$ mix phx.server
14:10:26.359 application=file_system [error] `inotify-tools` is needed to run `file_system` for your system, check https://github.com/rvoicilas/inotify-tools/wiki for more information about how to install it. If it's already installed but not be found, appoint executable file with `config.exs` or `FILESYSTEM_FSINOTIFY_EXECUTABLE_FILE` env.
14:10:26.360 application=phoenix_live_reload [warn] Could not start Phoenix live-reload because we cannot listen to the file system.
You don't need to worry! This is an optional feature used during development to
refresh your browser when you save files and it does not affect production.
14:10:26.460 application=phoenix [info] Running BlockScoutWeb.Endpoint with Cowboy using http://0.0.0.0:4000
14:10:26.594 [info] Application indexer exited: Indexer.Application.start(:normal, []) returned an error: shutdown: failed to start child: Indexer.BlockFetcher.Supervisor
** (EXIT) shutdown: failed to start child: Indexer.BlockFetcher.Realtime.Supervisor
** (EXIT) shutdown: failed to start child: EthereumJSONRPC.WebSocket.WebSocketClient
** (EXIT) an exception was raised:
** (FunctionClauseError) no function clause matching in EthereumJSONRPC.WebSocket.WebSocketClient.start_link/1
(ethereum_jsonrpc) lib/ethereum_jsonrpc/web_socket/web_socket_client.ex:30: EthereumJSONRPC.WebSocket.WebSocketClient.start_link(["ws://localhost:8546", [name: Indexer.BlockFetcher.Realtime.WebSocket]])
(stdlib) supervisor.erl:379: :supervisor.do_start_child_i/3
(stdlib) supervisor.erl:365: :supervisor.do_start_child/2
(stdlib) supervisor.erl:349: anonymous fn/3 in :supervisor.start_children/2
(stdlib) supervisor.erl:1157: :supervisor.children_map/4
(stdlib) supervisor.erl:315: :supervisor.init_children/2
(stdlib) gen_server.erl:374: :gen_server.init_it/2
(stdlib) gen_server.erl:342: :gen_server.init_it/6
(stdlib) proc_lib.erl:249: :proc_lib.init_p_do_apply/3
** (Mix) Could not start application indexer: Indexer.Application.start(:normal, []) returned an error: shutdown: failed to start child: Indexer.BlockFetcher.Supervisor
** (EXIT) shutdown: failed to start child: Indexer.BlockFetcher.Realtime.Supervisor
** (EXIT) shutdown: failed to start child: EthereumJSONRPC.WebSocket.WebSocketClient
** (EXIT) an exception was raised:
** (FunctionClauseError) no function clause matching in EthereumJSONRPC.WebSocket.WebSocketClient.start_link/1
(ethereum_jsonrpc) lib/ethereum_jsonrpc/web_socket/web_socket_client.ex:30: EthereumJSONRPC.WebSocket.WebSocketClient.start_link(["ws://localhost:8546", [name: Indexer.BlockFetcher.Realtime.WebSocket]])
(stdlib) supervisor.erl:379: :supervisor.do_start_child_i/3
(stdlib) supervisor.erl:365: :supervisor.do_start_child/2
(stdlib) supervisor.erl:349: anonymous fn/3 in :supervisor.start_children/2
(stdlib) supervisor.erl:1157: :supervisor.children_map/4
(stdlib) supervisor.erl:315: :supervisor.init_children/2
(stdlib) gen_server.erl:374: :gen_server.init_it/2
(stdlib) gen_server.erl:342: :gen_server.init_it/6
(stdlib) proc_lib.erl:249: :proc_lib.init_p_do_apply/3
```
although I can check with a web3js script that websockets work
### Environment
* Elixir & Erlang/OTP versions (`elixir -version`):
```
Erlang/OTP 21 [erts-10.0.5] [source] [64-bit] [smp:4:4] [ds:4:4:10] [async-threads:1] [hipe]
Elixir 1.7.3 (compiled with Erlang/OTP 21)
```
* Operating System: `Ubuntu 16.04`
### Steps to reproduce
Let me know if you need details on how to setup parity locally and reproduce this in-full
### Expected behaviour
Indexer starts
### Actual behaviour
Indexer doesn't start
| 1.0 | Indexer exits when connecting to local parity - When trying to setup everything locally (running both explorer and parity), it seems that indexer fails to connect to parity via websockets:
```
$ mix phx.server
14:10:26.359 application=file_system [error] `inotify-tools` is needed to run `file_system` for your system, check https://github.com/rvoicilas/inotify-tools/wiki for more information about how to install it. If it's already installed but not be found, appoint executable file with `config.exs` or `FILESYSTEM_FSINOTIFY_EXECUTABLE_FILE` env.
14:10:26.360 application=phoenix_live_reload [warn] Could not start Phoenix live-reload because we cannot listen to the file system.
You don't need to worry! This is an optional feature used during development to
refresh your browser when you save files and it does not affect production.
14:10:26.460 application=phoenix [info] Running BlockScoutWeb.Endpoint with Cowboy using http://0.0.0.0:4000
14:10:26.594 [info] Application indexer exited: Indexer.Application.start(:normal, []) returned an error: shutdown: failed to start child: Indexer.BlockFetcher.Supervisor
** (EXIT) shutdown: failed to start child: Indexer.BlockFetcher.Realtime.Supervisor
** (EXIT) shutdown: failed to start child: EthereumJSONRPC.WebSocket.WebSocketClient
** (EXIT) an exception was raised:
** (FunctionClauseError) no function clause matching in EthereumJSONRPC.WebSocket.WebSocketClient.start_link/1
(ethereum_jsonrpc) lib/ethereum_jsonrpc/web_socket/web_socket_client.ex:30: EthereumJSONRPC.WebSocket.WebSocketClient.start_link(["ws://localhost:8546", [name: Indexer.BlockFetcher.Realtime.WebSocket]])
(stdlib) supervisor.erl:379: :supervisor.do_start_child_i/3
(stdlib) supervisor.erl:365: :supervisor.do_start_child/2
(stdlib) supervisor.erl:349: anonymous fn/3 in :supervisor.start_children/2
(stdlib) supervisor.erl:1157: :supervisor.children_map/4
(stdlib) supervisor.erl:315: :supervisor.init_children/2
(stdlib) gen_server.erl:374: :gen_server.init_it/2
(stdlib) gen_server.erl:342: :gen_server.init_it/6
(stdlib) proc_lib.erl:249: :proc_lib.init_p_do_apply/3
** (Mix) Could not start application indexer: Indexer.Application.start(:normal, []) returned an error: shutdown: failed to start child: Indexer.BlockFetcher.Supervisor
** (EXIT) shutdown: failed to start child: Indexer.BlockFetcher.Realtime.Supervisor
** (EXIT) shutdown: failed to start child: EthereumJSONRPC.WebSocket.WebSocketClient
** (EXIT) an exception was raised:
** (FunctionClauseError) no function clause matching in EthereumJSONRPC.WebSocket.WebSocketClient.start_link/1
(ethereum_jsonrpc) lib/ethereum_jsonrpc/web_socket/web_socket_client.ex:30: EthereumJSONRPC.WebSocket.WebSocketClient.start_link(["ws://localhost:8546", [name: Indexer.BlockFetcher.Realtime.WebSocket]])
(stdlib) supervisor.erl:379: :supervisor.do_start_child_i/3
(stdlib) supervisor.erl:365: :supervisor.do_start_child/2
(stdlib) supervisor.erl:349: anonymous fn/3 in :supervisor.start_children/2
(stdlib) supervisor.erl:1157: :supervisor.children_map/4
(stdlib) supervisor.erl:315: :supervisor.init_children/2
(stdlib) gen_server.erl:374: :gen_server.init_it/2
(stdlib) gen_server.erl:342: :gen_server.init_it/6
(stdlib) proc_lib.erl:249: :proc_lib.init_p_do_apply/3
```
although I can check with a web3js script that websockets work
### Environment
* Elixir & Erlang/OTP versions (`elixir -version`):
```
Erlang/OTP 21 [erts-10.0.5] [source] [64-bit] [smp:4:4] [ds:4:4:10] [async-threads:1] [hipe]
Elixir 1.7.3 (compiled with Erlang/OTP 21)
```
* Operating System: `Ubuntu 16.04`
### Steps to reproduce
Let me know if you need details on how to setup parity locally and reproduce this in-full
### Expected behaviour
Indexer starts
### Actual behaviour
Indexer doesn't start
| non_priority | indexer exits when connecting to local parity when trying to setup everything locally running both explorer and parity it seems that indexer fails to connect to parity via websockets mix phx server application file system inotify tools is needed to run file system for your system check for more information about how to install it if it s already installed but not be found appoint executable file with config exs or filesystem fsinotify executable file env application phoenix live reload could not start phoenix live reload because we cannot listen to the file system you don t need to worry this is an optional feature used during development to refresh your browser when you save files and it does not affect production application phoenix running blockscoutweb endpoint with cowboy using application indexer exited indexer application start normal returned an error shutdown failed to start child indexer blockfetcher supervisor exit shutdown failed to start child indexer blockfetcher realtime supervisor exit shutdown failed to start child ethereumjsonrpc websocket websocketclient exit an exception was raised functionclauseerror no function clause matching in ethereumjsonrpc websocket websocketclient start link ethereum jsonrpc lib ethereum jsonrpc web socket web socket client ex ethereumjsonrpc websocket websocketclient start link stdlib supervisor erl supervisor do start child i stdlib supervisor erl supervisor do start child stdlib supervisor erl anonymous fn in supervisor start children stdlib supervisor erl supervisor children map stdlib supervisor erl supervisor init children stdlib gen server erl gen server init it stdlib gen server erl gen server init it stdlib proc lib erl proc lib init p do apply mix could not start application indexer indexer application start normal returned an error shutdown failed to start child indexer blockfetcher supervisor exit shutdown failed to start child indexer blockfetcher realtime supervisor exit shutdown failed to start child ethereumjsonrpc websocket websocketclient exit an exception was raised functionclauseerror no function clause matching in ethereumjsonrpc websocket websocketclient start link ethereum jsonrpc lib ethereum jsonrpc web socket web socket client ex ethereumjsonrpc websocket websocketclient start link stdlib supervisor erl supervisor do start child i stdlib supervisor erl supervisor do start child stdlib supervisor erl anonymous fn in supervisor start children stdlib supervisor erl supervisor children map stdlib supervisor erl supervisor init children stdlib gen server erl gen server init it stdlib gen server erl gen server init it stdlib proc lib erl proc lib init p do apply although i can check with a script that websockets work environment elixir erlang otp versions elixir version erlang otp elixir compiled with erlang otp operating system ubuntu steps to reproduce let me know if you need details on how to setup parity locally and reproduce this in full expected behaviour indexer starts actual behaviour indexer doesn t start | 0 |
456,736 | 13,150,983,173 | IssuesEvent | 2020-08-09 14:31:06 | chrisjsewell/docutils | https://api.github.com/repos/chrisjsewell/docutils | closed | Figures in Latex columns [SF:bugs:262] | bugs closed-fixed priority-5 |
author: crouz
created: 2014-07-21 14:26:19.444000
assigned: None
SF_url: https://sourceforge.net/p/docutils/bugs/262
attachments:
- https://sourceforge.net/p/docutils/bugs/262/attachment/TODO.pdf
- https://sourceforge.net/p/docutils/bugs/262/attachment/docutils.conf
- https://sourceforge.net/p/docutils/bugs/262/attachment/ex.txt
Figures are improperly placed when generating Latex documents with more than one column.
Changing: \noindent\makebox[\textwidth]
to: \noindent\makebox[\linewidth]
for the generated figures seems to work well for both single and multi column documents.
Used version: docutils 0.12 [release]
---
commenter: milde
posted: 2014-11-10 16:04:16.457000
title: #262 Figures in Latex columns
- **status**: open --> closed-fixed
---
commenter: milde
posted: 2014-11-10 16:04:16.737000
title: #262 Figures in Latex columns
Fixed. Thanks for the report.
| 1.0 | Figures in Latex columns [SF:bugs:262] -
author: crouz
created: 2014-07-21 14:26:19.444000
assigned: None
SF_url: https://sourceforge.net/p/docutils/bugs/262
attachments:
- https://sourceforge.net/p/docutils/bugs/262/attachment/TODO.pdf
- https://sourceforge.net/p/docutils/bugs/262/attachment/docutils.conf
- https://sourceforge.net/p/docutils/bugs/262/attachment/ex.txt
Figures are improperly placed when generating Latex documents with more than one column.
Changing: \noindent\makebox[\textwidth]
to: \noindent\makebox[\linewidth]
for the generated figures seems to work well for both single and multi column documents.
Used version: docutils 0.12 [release]
---
commenter: milde
posted: 2014-11-10 16:04:16.457000
title: #262 Figures in Latex columns
- **status**: open --> closed-fixed
---
commenter: milde
posted: 2014-11-10 16:04:16.737000
title: #262 Figures in Latex columns
Fixed. Thanks for the report.
| priority | figures in latex columns author crouz created assigned none sf url attachments figures are improperly placed when generating latex documents with more than one column changing noindent makebox to noindent makebox for the generated figures seems to work well for both single and multi column documents used version docutils commenter milde posted title figures in latex columns status open closed fixed commenter milde posted title figures in latex columns fixed thanks for the report | 1 |
755,826 | 26,441,681,355 | IssuesEvent | 2023-01-16 01:20:26 | devsapp/fc | https://api.github.com/repos/devsapp/fc | closed | 需要支持Custom health check | high priority | 如题,API文档已经支持这个功能。
create/update/get/list function 返回函数信息需要增加custom health check 属性。
https://help.aliyun.com/document_detail/415747.html
https://help.aliyun.com/document_detail/415749.html
https://help.aliyun.com/document_detail/415750.html
https://help.aliyun.com/document_detail/415752.html
custom health check 结构体定义。
https://help.aliyun.com/document_detail/451288.html | 1.0 | 需要支持Custom health check - 如题,API文档已经支持这个功能。
create/update/get/list function 返回函数信息需要增加custom health check 属性。
https://help.aliyun.com/document_detail/415747.html
https://help.aliyun.com/document_detail/415749.html
https://help.aliyun.com/document_detail/415750.html
https://help.aliyun.com/document_detail/415752.html
custom health check 结构体定义。
https://help.aliyun.com/document_detail/451288.html | priority | 需要支持custom health check 如题,api文档已经支持这个功能。 create update get list function 返回函数信息需要增加custom health check 属性。 custom health check 结构体定义。 | 1 |
277,360 | 8,628,680,376 | IssuesEvent | 2018-11-21 18:06:53 | googleapis/google-api-java-client-services | https://api.github.com/repos/googleapis/google-api-java-client-services | closed | Synthesis failed for cloudresourcemanager | autosynth failure priority: p1 type: bug | Hello! Autosynth couldn't regenerate cloudresourcemanager. :broken_heart:
Here's the output from running `synth.py`:
```
Cloning into 'working_repo'...
Switched to branch 'autosynth-cloudresourcemanager'
[35msynthtool > [31m[43mYou are running the synthesis script directly, this will be disabled in a future release of Synthtool. Please use python3 -m synthtool instead.[0m
[35msynthtool > [36mCloning https://github.com/googleapis/discovery-artifact-manager.git.[0m
[35msynthtool > [36mCleaning output directory.[0m
[35msynthtool > [36mInstalling dependencies.[0m
[35msynthtool > [34mGenerating cloudresourcemanager v1.[0m
[35msynthtool > [34m 1.26.0[0m
[35msynthtool > [34m 1.27.0[0m
[35msynthtool > [34mGenerating cloudresourcemanager v1beta1.[0m
[35msynthtool > [34m 1.26.0[0m
[35msynthtool > [34m 1.27.0[0m
[35msynthtool > [34mGenerating cloudresourcemanager v2beta1.[0m
[35msynthtool > [34m 1.26.0[0m
[35msynthtool > [34m 1.27.0[0m
[35msynthtool > [34mGenerating cloudresourcemanager v2.[0m
[35msynthtool > [34m 1.26.0[0m
[35msynthtool > [34m 1.27.0[0m
Changed files:
On branch autosynth-cloudresourcemanager
nothing to commit, working tree clean
Traceback (most recent call last):
File "/home/kbuilder/.pyenv/versions/3.6.1/lib/python3.6/runpy.py", line 193, in _run_module_as_main
"__main__", mod_spec)
File "/home/kbuilder/.pyenv/versions/3.6.1/lib/python3.6/runpy.py", line 85, in _run_code
exec(code, run_globals)
File "/tmpfs/src/git/autosynth/autosynth/synth.py", line 166, in <module>
main()
File "/tmpfs/src/git/autosynth/autosynth/synth.py", line 151, in main
commit_changes(pr_title)
File "/tmpfs/src/git/autosynth/autosynth/synth.py", line 95, in commit_changes
subprocess.check_call(["git", "commit", "-m", message])
File "/home/kbuilder/.pyenv/versions/3.6.1/lib/python3.6/subprocess.py", line 291, in check_call
raise CalledProcessError(retcode, cmd)
subprocess.CalledProcessError: Command '['git', 'commit', '-m', 'Regenerate cloudresourcemanager client']' returned non-zero exit status 1.
```
Google internal developers can see the full log [here](https://sponge/91b3323c-a008-4dcf-b2c2-ad1051d3386a).
| 1.0 | Synthesis failed for cloudresourcemanager - Hello! Autosynth couldn't regenerate cloudresourcemanager. :broken_heart:
Here's the output from running `synth.py`:
```
Cloning into 'working_repo'...
Switched to branch 'autosynth-cloudresourcemanager'
[35msynthtool > [31m[43mYou are running the synthesis script directly, this will be disabled in a future release of Synthtool. Please use python3 -m synthtool instead.[0m
[35msynthtool > [36mCloning https://github.com/googleapis/discovery-artifact-manager.git.[0m
[35msynthtool > [36mCleaning output directory.[0m
[35msynthtool > [36mInstalling dependencies.[0m
[35msynthtool > [34mGenerating cloudresourcemanager v1.[0m
[35msynthtool > [34m 1.26.0[0m
[35msynthtool > [34m 1.27.0[0m
[35msynthtool > [34mGenerating cloudresourcemanager v1beta1.[0m
[35msynthtool > [34m 1.26.0[0m
[35msynthtool > [34m 1.27.0[0m
[35msynthtool > [34mGenerating cloudresourcemanager v2beta1.[0m
[35msynthtool > [34m 1.26.0[0m
[35msynthtool > [34m 1.27.0[0m
[35msynthtool > [34mGenerating cloudresourcemanager v2.[0m
[35msynthtool > [34m 1.26.0[0m
[35msynthtool > [34m 1.27.0[0m
Changed files:
On branch autosynth-cloudresourcemanager
nothing to commit, working tree clean
Traceback (most recent call last):
File "/home/kbuilder/.pyenv/versions/3.6.1/lib/python3.6/runpy.py", line 193, in _run_module_as_main
"__main__", mod_spec)
File "/home/kbuilder/.pyenv/versions/3.6.1/lib/python3.6/runpy.py", line 85, in _run_code
exec(code, run_globals)
File "/tmpfs/src/git/autosynth/autosynth/synth.py", line 166, in <module>
main()
File "/tmpfs/src/git/autosynth/autosynth/synth.py", line 151, in main
commit_changes(pr_title)
File "/tmpfs/src/git/autosynth/autosynth/synth.py", line 95, in commit_changes
subprocess.check_call(["git", "commit", "-m", message])
File "/home/kbuilder/.pyenv/versions/3.6.1/lib/python3.6/subprocess.py", line 291, in check_call
raise CalledProcessError(retcode, cmd)
subprocess.CalledProcessError: Command '['git', 'commit', '-m', 'Regenerate cloudresourcemanager client']' returned non-zero exit status 1.
```
Google internal developers can see the full log [here](https://sponge/91b3323c-a008-4dcf-b2c2-ad1051d3386a).
| priority | synthesis failed for cloudresourcemanager hello autosynth couldn t regenerate cloudresourcemanager broken heart here s the output from running synth py cloning into working repo switched to branch autosynth cloudresourcemanager are running the synthesis script directly this will be disabled in a future release of synthtool please use m synthtool instead output directory dependencies cloudresourcemanager cloudresourcemanager cloudresourcemanager cloudresourcemanager changed files on branch autosynth cloudresourcemanager nothing to commit working tree clean traceback most recent call last file home kbuilder pyenv versions lib runpy py line in run module as main main mod spec file home kbuilder pyenv versions lib runpy py line in run code exec code run globals file tmpfs src git autosynth autosynth synth py line in main file tmpfs src git autosynth autosynth synth py line in main commit changes pr title file tmpfs src git autosynth autosynth synth py line in commit changes subprocess check call file home kbuilder pyenv versions lib subprocess py line in check call raise calledprocesserror retcode cmd subprocess calledprocesserror command returned non zero exit status google internal developers can see the full log | 1 |
199,991 | 6,996,904,207 | IssuesEvent | 2017-12-16 07:24:01 | shavitush/bhoptimer | https://api.github.com/repos/shavitush/bhoptimer | opened | Slide zones | enhancement high priority new feature | Something like this: https://www.youtube.com/watch?v=qeNFaTqja_Q
Because bhop_arcane wasn't designed properly :/
Implementation ideas will be great. I'll start working on this today, hopefully I can figure it out. | 1.0 | Slide zones - Something like this: https://www.youtube.com/watch?v=qeNFaTqja_Q
Because bhop_arcane wasn't designed properly :/
Implementation ideas will be great. I'll start working on this today, hopefully I can figure it out. | priority | slide zones something like this because bhop arcane wasn t designed properly implementation ideas will be great i ll start working on this today hopefully i can figure it out | 1 |
179,442 | 6,625,228,939 | IssuesEvent | 2017-09-22 14:42:32 | AGGA-IRIT/Radium-Engine | https://api.github.com/repos/AGGA-IRIT/Radium-Engine | closed | Loader issue: faces are missing | bug High priority IO | Some files are only partially loaded : [io_crash_models.zip](https://github.com/AGGA-IRIT/Radium-Engine/files/1288271/io_crash_models.zip)
The bug has been introduced by accepting PR #227 . | 1.0 | Loader issue: faces are missing - Some files are only partially loaded : [io_crash_models.zip](https://github.com/AGGA-IRIT/Radium-Engine/files/1288271/io_crash_models.zip)
The bug has been introduced by accepting PR #227 . | priority | loader issue faces are missing some files are only partially loaded the bug has been introduced by accepting pr | 1 |
43,392 | 11,212,199,471 | IssuesEvent | 2020-01-06 17:01:51 | spack/spack | https://api.github.com/repos/spack/spack | opened | Recent versions of QT5 do not build with the intel compiler | build-error | While working with the qt variant on a package I discovered that QT5 does not compile with the Intel compiler. It seems to be a problem with defining overflow builtins, which may be related to the underlying GCC used with the Intel compiler. Note that PR #14387 sets a `conflicts` directive to help prevent wasted build time.
---
### Steps to reproduce the issue
```console
$ spack install qt %intel ^freetype@2.7.1 ^harfbuzz@2.1.3 ^icu4c@58.2
...
3 errors found in build log:
76 c++ -c -o qlist.o -std=c++11 -ffunction-sections -fdata-sections -O2 -g -I/dev/shm/gpjohnsn/spack-stage-q
t-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-s
zivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/library -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szi
vpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-sz
ivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/unix -I/dev/shm/gpjohnsn/spack-stage-qt-5.1
3.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/win32 -I/dev/shm/gpjohnsn/spack-stage
-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/mac -I/dev/shm/gpjohnsn/spack-
stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include -I/dev/shm/gpjohnsn/spack-stage-qt
-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore -I/dev/shm/gpjohnsn/spack-stage-qt-
5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1 -I/dev/shm/gpjohnsn/spack-sta
ge-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1/QtCore -I../src/corelib
/global -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/mkspecs/
linux-g++ -DQT_VERSION_STR=\"5.13.1\" -DQT_VERSION_MAJOR=5 -DQT_VERSION_MINOR=13 -DQT_VERSION_PATCH=1 -DQT_B
UILD_QMAKE -DQT_BOOTSTRAPPED -DPROEVALUATOR_FULL -DQT_NO_FOREACH /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szi
vpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/src/corelib/tools/qlist.cpp
77 c++ -c -o qlocale.o -std=c++11 -ffunction-sections -fdata-sections -O2 -g -I/dev/shm/gpjohnsn/spack-stage
-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1
-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/library -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-s
zivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-
szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/unix -I/dev/shm/gpjohnsn/spack-stage-qt-5
.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/win32 -I/dev/shm/gpjohnsn/spack-sta
ge-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/mac -I/dev/shm/gpjohnsn/spac
k-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include -I/dev/shm/gpjohnsn/spack-stage-
qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore -I/dev/shm/gpjohnsn/spack-stage-q
t-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1 -I/dev/shm/gpjohnsn/spack-s
tage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1/QtCore -I../src/corel
ib/global -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/mkspec
s/linux-g++ -DQT_VERSION_STR=\"5.13.1\" -DQT_VERSION_MAJOR=5 -DQT_VERSION_MINOR=13 -DQT_VERSION_PATCH=1 -DQT
_BUILD_QMAKE -DQT_BOOTSTRAPPED -DPROEVALUATOR_FULL -DQT_NO_FOREACH /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-s
zivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/src/corelib/tools/qlocale.cpp
78 c++ -c -o qlocale_tools.o -std=c++11 -ffunction-sections -fdata-sections -O2 -g -I/dev/shm/gpjohnsn/spack
-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake -I/dev/shm/gpjohnsn/spack-stage-qt-
5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/library -I/dev/shm/gpjohnsn/spack-stage-qt-5.
13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators -I/dev/shm/gpjohnsn/spack-stage-qt-5
.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/unix -I/dev/shm/gpjohnsn/spack-stag
e-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/win32 -I/dev/shm/gpjohnsn/spa
ck-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/mac -I/dev/shm/gpjohns
n/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include -I/dev/shm/gpjohnsn/spack-
stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore -I/dev/shm/gpjohnsn/spack-s
tage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1 -I/dev/shm/gpjohnsn/s
pack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1/QtCore -I../src
/corelib/global -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/
mkspecs/linux-g++ -DQT_VERSION_STR=\"5.13.1\" -DQT_VERSION_MAJOR=5 -DQT_VERSION_MINOR=13 -DQT_VERSION_PATCH=
1 -DQT_BUILD_QMAKE -DQT_BOOTSTRAPPED -DPROEVALUATOR_FULL -DQT_NO_FOREACH /dev/shm/gpjohnsn/spack-stage-qt-5.
13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/src/corelib/tools/qlocale_tools.cpp
79 c++ -c -o qmap.o -std=c++11 -ffunction-sections -fdata-sections -O2 -g -I/dev/shm/gpjohnsn/spack-stage-qt
-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-sz
ivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/library -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-sziv
polegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szi
vpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/unix -I/dev/shm/gpjohnsn/spack-stage-qt-5.13
.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/win32 -I/dev/shm/gpjohnsn/spack-stage-
qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/mac -I/dev/shm/gpjohnsn/spack-s
tage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include -I/dev/shm/gpjohnsn/spack-stage-qt-
5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore -I/dev/shm/gpjohnsn/spack-stage-qt-5
.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1 -I/dev/shm/gpjohnsn/spack-stag
e-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1/QtCore -I../src/corelib/
global -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/mkspecs/l
inux-g++ -DQT_VERSION_STR=\"5.13.1\" -DQT_VERSION_MAJOR=5 -DQT_VERSION_MINOR=13 -DQT_VERSION_PATCH=1 -DQT_BU
ILD_QMAKE -DQT_BOOTSTRAPPED -DPROEVALUATOR_FULL -DQT_NO_FOREACH /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-sziv
polegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/src/corelib/tools/qmap.cpp
80 c++ -c -o qregexp.o -std=c++11 -ffunction-sections -fdata-sections -O2 -g -I/dev/shm/gpjohnsn/spack-stage
-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1
-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/library -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-s
s/linux-g++ -DQT_VERSION_STR=\"5.13.1\" -DQT_VERSION_MAJOR=5 -DQT_VERSION_MINOR=13 -DQT_VERSION_PATCH=1 -DQT
_BUILD_QMAKE -DQT_BOOTSTRAPPED -DPROEVALUATOR_FULL -DQT_NO_FOREACH /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-s
zivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/src/corelib/tools/qregexp.cpp
81 c++ -c -o qringbuffer.o -std=c++11 -ffunction-sections -fdata-sections -O2 -g -I/dev/shm/gpjohnsn/spack-s
tage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake -I/dev/shm/gpjohnsn/spack-stage-qt-5.
13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/library -I/dev/shm/gpjohnsn/spack-stage-qt-5.13
.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators -I/dev/shm/gpjohnsn/spack-stage-qt-5.1
3.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/unix -I/dev/shm/gpjohnsn/spack-stage-
qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/win32 -I/dev/shm/gpjohnsn/spack
-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/mac -I/dev/shm/gpjohnsn/
spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include -I/dev/shm/gpjohnsn/spack-st
age-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore -I/dev/shm/gpjohnsn/spack-sta
ge-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1 -I/dev/shm/gpjohnsn/spa
ck-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1/QtCore -I../src/c
orelib/global -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/mk
specs/linux-g++ -DQT_VERSION_STR=\"5.13.1\" -DQT_VERSION_MAJOR=5 -DQT_VERSION_MINOR=13 -DQT_VERSION_PATCH=1
-DQT_BUILD_QMAKE -DQT_BOOTSTRAPPED -DPROEVALUATOR_FULL -DQT_NO_FOREACH /dev/shm/gpjohnsn/spack-stage-qt-5.13
.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/src/corelib/tools/qringbuffer.cpp
>> 82 /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.1
3.1/QtCore/private/../../../../../src/corelib/global/qnumeric_p.h(250): error: argument is incompatible with
formal parameter
83 { return __builtin_mul_overflow(v1, v2, r); }
84 ^
85
>> 86 /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.1
3.1/QtCore/private/../../../../../src/corelib/global/qnumeric_p.h(240): error: argument is incompatible with
formal parameter
87 { return __builtin_add_overflow(v1, v2, r); }
88 ^
89
90 compilation aborted for /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/q
tbase/src/corelib/tools/qbytearray.cpp (code 2)
>> 91 gmake: *** [qbytearray.o] Error 2
92 gmake: *** Waiting for unfinished jobs....
```
The problem is with the following code in qnumeric_p.h:
```
// Overflow math.
// This provides efficient implementations for int, unsigned, qsizetype and
// size_t. Implementations for 8- and 16-bit types will work but may not be as
// efficient. Implementations for 64-bit may be missing on 32-bit platforms.
#if (defined(Q_CC_GNU) && (Q_CC_GNU >= 500) || (defined(Q_CC_INTEL) && !defined(Q_OS_WIN))) || QT_HAS_BUILTIN(__builtin_add_overflow)
// GCC 5, ICC 18, and Clang 3.8 have builtins to detect overflows
template <typename T> inline
typename std::enable_if<std::is_unsigned<T>::value || std::is_signed<T>::value, bool>::type
add_overflow(T v1, T v2, T *r)
{ return __builtin_add_overflow(v1, v2, r); }
template <typename T> inline
typename std::enable_if<std::is_unsigned<T>::value || std::is_signed<T>::value, bool>::type
sub_overflow(T v1, T v2, T *r)
{ return __builtin_sub_overflow(v1, v2, r); }
template <typename T> inline
typename std::enable_if<std::is_unsigned<T>::value || std::is_signed<T>::value, bool>::type
mul_overflow(T v1, T v2, T *r)
{ return __builtin_mul_overflow(v1, v2, r); }
#else
// Generic implementations
...
```
That looks like the interfaces might be getting mixed up. There is more to it than that though as adding a module to specify a newer version of GCC, yields the following:
```console
...
Info: creating stash file /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/.qmake.stash
Project ERROR: failed to parse default search paths from compiler output
==> Error: ProcessError: Command exited with status 3:
'./configure' '-no-eglfs' '-no-directfb' '-no-gtk' '-prefix' '/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw' '-v' '-opensource' '-no-opengl' '-release' '-confirm-license' '-openssl-linked' '-L/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/openssl-1.1.1d-vomzrhq3vyt2tkk5bx5nj6avhhei4qx6/lib' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/openssl-1.1.1d-vomzrhq3vyt2tkk5bx5nj6avhhei4qx6/include' '-optimized-qmake' '-no-pch' '-system-freetype' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/freetype-2.7.1-glh2o2djvw4vcaffhizchjtjofqf4sfw/include/freetype2' '-fontconfig' '-openssl-linked' '-system-sqlite' '-shared' '-system-harfbuzz' '-L/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/harfbuzz-2.1.3-ggxas5icupgdslvf4kvfyt6rrlsdxmqk/lib' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/harfbuzz-2.1.3-ggxas5icupgdslvf4kvfyt6rrlsdxmqk/include' '-system-pcre' '-L/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/pcre2-10.31-cbcfe5ynsf5ky7ccezwwc6ngmtnwbxot/lib' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/pcre2-10.31-cbcfe5ynsf5ky7ccezwwc6ngmtnwbxot/include' '-system-doubleconversion' '-L/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/double-conversion-2.0.1-73vy7slnoduzb5m6rejai6degd5k27oi/lib' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/double-conversion-2.0.1-73vy7slnoduzb5m6rejai6degd5k27oi/include' '-system-libpng' '-L/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/libpng-1.6.37-iu6mik7x7gbsb2sevn5bffomgkfwu643/lib' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/libpng-1.6.37-iu6mik7x7gbsb2sevn5bffomgkfwu643/include' '-system-libjpeg' '-L/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/libjpeg-turbo-2.0.3-boohheheifgexzgwwideuon5buoqfxzc/lib64' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/libjpeg-turbo-2.0.3-boohheheifgexzgwwideuon5buoqfxzc/include' '-system-zlib' '-L/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/zlib-1.2.11-csbova4up62su6pxxlvzqf2tjef233ew/lib' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/zlib-1.2.11-csbova4up62su6pxxlvzqf2tjef233ew/include' '-nomake' 'examples' '-no-dbus' '-system-xcb' '-skip' 'webengine' '-skip' 'webglplugin' '-skip' 'wayland'
```
The qmake.stash file looks correct in this scenario.
```
QMAKE_CXX.QT_COMPILER_STDCXX = 201402L
QMAKE_CXX.QMAKE_ICC_VER = 1900
QMAKE_CXX.QMAKE_ICC_UPDATE_VER = 5
QMAKE_CXX.QMAKE_GCC_MAJOR_VERSION = 6
QMAKE_CXX.QMAKE_GCC_MINOR_VERSION = 1
QMAKE_CXX.QMAKE_GCC_PATCH_VERSION = 0
QMAKE_CXX.COMPILER_MACROS = \
QT_COMPILER_STDCXX \
QMAKE_ICC_VER \
QMAKE_ICC_UPDATE_VER \
QMAKE_GCC_MAJOR_VERSION \
QMAKE_GCC_MINOR_VERSION \
QMAKE_GCC_PATCH_VERSION
```
Interestingly, I see the same thing when I patch the source to remove the overflow builtins from qnumeric_p.h so that the generic interface is used.
I see the same behavior with intel-17 and intel-18. So far I have only looked at qt-5.13.1.
### Platform and user environment
```commandline
$ uname -a
Linux argon-build.hpc 3.10.0-862.14.4.el7.x86_64 #1 SMP Wed Sep 26 15:12:11 UTC 2018 x86_64 x86_64 x86_64 GNU/Linuxx86_64 x86_64 GNU/Linux
$ lsb_release -d
Description: CentOS Linux release 7.5.1804 (Core)
```
| 1.0 | Recent versions of QT5 do not build with the intel compiler - While working with the qt variant on a package I discovered that QT5 does not compile with the Intel compiler. It seems to be a problem with defining overflow builtins, which may be related to the underlying GCC used with the Intel compiler. Note that PR #14387 sets a `conflicts` directive to help prevent wasted build time.
---
### Steps to reproduce the issue
```console
$ spack install qt %intel ^freetype@2.7.1 ^harfbuzz@2.1.3 ^icu4c@58.2
...
3 errors found in build log:
76 c++ -c -o qlist.o -std=c++11 -ffunction-sections -fdata-sections -O2 -g -I/dev/shm/gpjohnsn/spack-stage-q
t-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-s
zivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/library -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szi
vpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-sz
ivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/unix -I/dev/shm/gpjohnsn/spack-stage-qt-5.1
3.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/win32 -I/dev/shm/gpjohnsn/spack-stage
-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/mac -I/dev/shm/gpjohnsn/spack-
stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include -I/dev/shm/gpjohnsn/spack-stage-qt
-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore -I/dev/shm/gpjohnsn/spack-stage-qt-
5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1 -I/dev/shm/gpjohnsn/spack-sta
ge-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1/QtCore -I../src/corelib
/global -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/mkspecs/
linux-g++ -DQT_VERSION_STR=\"5.13.1\" -DQT_VERSION_MAJOR=5 -DQT_VERSION_MINOR=13 -DQT_VERSION_PATCH=1 -DQT_B
UILD_QMAKE -DQT_BOOTSTRAPPED -DPROEVALUATOR_FULL -DQT_NO_FOREACH /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szi
vpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/src/corelib/tools/qlist.cpp
77 c++ -c -o qlocale.o -std=c++11 -ffunction-sections -fdata-sections -O2 -g -I/dev/shm/gpjohnsn/spack-stage
-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1
-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/library -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-s
zivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-
szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/unix -I/dev/shm/gpjohnsn/spack-stage-qt-5
.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/win32 -I/dev/shm/gpjohnsn/spack-sta
ge-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/mac -I/dev/shm/gpjohnsn/spac
k-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include -I/dev/shm/gpjohnsn/spack-stage-
qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore -I/dev/shm/gpjohnsn/spack-stage-q
t-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1 -I/dev/shm/gpjohnsn/spack-s
tage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1/QtCore -I../src/corel
ib/global -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/mkspec
s/linux-g++ -DQT_VERSION_STR=\"5.13.1\" -DQT_VERSION_MAJOR=5 -DQT_VERSION_MINOR=13 -DQT_VERSION_PATCH=1 -DQT
_BUILD_QMAKE -DQT_BOOTSTRAPPED -DPROEVALUATOR_FULL -DQT_NO_FOREACH /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-s
zivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/src/corelib/tools/qlocale.cpp
78 c++ -c -o qlocale_tools.o -std=c++11 -ffunction-sections -fdata-sections -O2 -g -I/dev/shm/gpjohnsn/spack
-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake -I/dev/shm/gpjohnsn/spack-stage-qt-
5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/library -I/dev/shm/gpjohnsn/spack-stage-qt-5.
13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators -I/dev/shm/gpjohnsn/spack-stage-qt-5
.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/unix -I/dev/shm/gpjohnsn/spack-stag
e-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/win32 -I/dev/shm/gpjohnsn/spa
ck-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/mac -I/dev/shm/gpjohns
n/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include -I/dev/shm/gpjohnsn/spack-
stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore -I/dev/shm/gpjohnsn/spack-s
tage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1 -I/dev/shm/gpjohnsn/s
pack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1/QtCore -I../src
/corelib/global -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/
mkspecs/linux-g++ -DQT_VERSION_STR=\"5.13.1\" -DQT_VERSION_MAJOR=5 -DQT_VERSION_MINOR=13 -DQT_VERSION_PATCH=
1 -DQT_BUILD_QMAKE -DQT_BOOTSTRAPPED -DPROEVALUATOR_FULL -DQT_NO_FOREACH /dev/shm/gpjohnsn/spack-stage-qt-5.
13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/src/corelib/tools/qlocale_tools.cpp
79 c++ -c -o qmap.o -std=c++11 -ffunction-sections -fdata-sections -O2 -g -I/dev/shm/gpjohnsn/spack-stage-qt
-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-sz
ivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/library -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-sziv
polegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szi
vpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/unix -I/dev/shm/gpjohnsn/spack-stage-qt-5.13
.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/win32 -I/dev/shm/gpjohnsn/spack-stage-
qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/mac -I/dev/shm/gpjohnsn/spack-s
tage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include -I/dev/shm/gpjohnsn/spack-stage-qt-
5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore -I/dev/shm/gpjohnsn/spack-stage-qt-5
.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1 -I/dev/shm/gpjohnsn/spack-stag
e-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1/QtCore -I../src/corelib/
global -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/mkspecs/l
inux-g++ -DQT_VERSION_STR=\"5.13.1\" -DQT_VERSION_MAJOR=5 -DQT_VERSION_MINOR=13 -DQT_VERSION_PATCH=1 -DQT_BU
ILD_QMAKE -DQT_BOOTSTRAPPED -DPROEVALUATOR_FULL -DQT_NO_FOREACH /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-sziv
polegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/src/corelib/tools/qmap.cpp
80 c++ -c -o qregexp.o -std=c++11 -ffunction-sections -fdata-sections -O2 -g -I/dev/shm/gpjohnsn/spack-stage
-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1
-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/library -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-s
s/linux-g++ -DQT_VERSION_STR=\"5.13.1\" -DQT_VERSION_MAJOR=5 -DQT_VERSION_MINOR=13 -DQT_VERSION_PATCH=1 -DQT
_BUILD_QMAKE -DQT_BOOTSTRAPPED -DPROEVALUATOR_FULL -DQT_NO_FOREACH /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-s
zivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/src/corelib/tools/qregexp.cpp
81 c++ -c -o qringbuffer.o -std=c++11 -ffunction-sections -fdata-sections -O2 -g -I/dev/shm/gpjohnsn/spack-s
tage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake -I/dev/shm/gpjohnsn/spack-stage-qt-5.
13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/library -I/dev/shm/gpjohnsn/spack-stage-qt-5.13
.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators -I/dev/shm/gpjohnsn/spack-stage-qt-5.1
3.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/unix -I/dev/shm/gpjohnsn/spack-stage-
qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/win32 -I/dev/shm/gpjohnsn/spack
-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/qmake/generators/mac -I/dev/shm/gpjohnsn/
spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include -I/dev/shm/gpjohnsn/spack-st
age-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore -I/dev/shm/gpjohnsn/spack-sta
ge-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1 -I/dev/shm/gpjohnsn/spa
ck-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.13.1/QtCore -I../src/c
orelib/global -I/dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/mk
specs/linux-g++ -DQT_VERSION_STR=\"5.13.1\" -DQT_VERSION_MAJOR=5 -DQT_VERSION_MINOR=13 -DQT_VERSION_PATCH=1
-DQT_BUILD_QMAKE -DQT_BOOTSTRAPPED -DPROEVALUATOR_FULL -DQT_NO_FOREACH /dev/shm/gpjohnsn/spack-stage-qt-5.13
.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/src/corelib/tools/qringbuffer.cpp
>> 82 /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.1
3.1/QtCore/private/../../../../../src/corelib/global/qnumeric_p.h(250): error: argument is incompatible with
formal parameter
83 { return __builtin_mul_overflow(v1, v2, r); }
84 ^
85
>> 86 /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/qtbase/include/QtCore/5.1
3.1/QtCore/private/../../../../../src/corelib/global/qnumeric_p.h(240): error: argument is incompatible with
formal parameter
87 { return __builtin_add_overflow(v1, v2, r); }
88 ^
89
90 compilation aborted for /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/q
tbase/src/corelib/tools/qbytearray.cpp (code 2)
>> 91 gmake: *** [qbytearray.o] Error 2
92 gmake: *** Waiting for unfinished jobs....
```
The problem is with the following code in qnumeric_p.h:
```
// Overflow math.
// This provides efficient implementations for int, unsigned, qsizetype and
// size_t. Implementations for 8- and 16-bit types will work but may not be as
// efficient. Implementations for 64-bit may be missing on 32-bit platforms.
#if (defined(Q_CC_GNU) && (Q_CC_GNU >= 500) || (defined(Q_CC_INTEL) && !defined(Q_OS_WIN))) || QT_HAS_BUILTIN(__builtin_add_overflow)
// GCC 5, ICC 18, and Clang 3.8 have builtins to detect overflows
template <typename T> inline
typename std::enable_if<std::is_unsigned<T>::value || std::is_signed<T>::value, bool>::type
add_overflow(T v1, T v2, T *r)
{ return __builtin_add_overflow(v1, v2, r); }
template <typename T> inline
typename std::enable_if<std::is_unsigned<T>::value || std::is_signed<T>::value, bool>::type
sub_overflow(T v1, T v2, T *r)
{ return __builtin_sub_overflow(v1, v2, r); }
template <typename T> inline
typename std::enable_if<std::is_unsigned<T>::value || std::is_signed<T>::value, bool>::type
mul_overflow(T v1, T v2, T *r)
{ return __builtin_mul_overflow(v1, v2, r); }
#else
// Generic implementations
...
```
That looks like the interfaces might be getting mixed up. There is more to it than that though as adding a module to specify a newer version of GCC, yields the following:
```console
...
Info: creating stash file /dev/shm/gpjohnsn/spack-stage-qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw/spack-src/.qmake.stash
Project ERROR: failed to parse default search paths from compiler output
==> Error: ProcessError: Command exited with status 3:
'./configure' '-no-eglfs' '-no-directfb' '-no-gtk' '-prefix' '/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/qt-5.13.1-szivpolegsx2j6hslwuyqkudeufbfhaw' '-v' '-opensource' '-no-opengl' '-release' '-confirm-license' '-openssl-linked' '-L/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/openssl-1.1.1d-vomzrhq3vyt2tkk5bx5nj6avhhei4qx6/lib' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/openssl-1.1.1d-vomzrhq3vyt2tkk5bx5nj6avhhei4qx6/include' '-optimized-qmake' '-no-pch' '-system-freetype' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/freetype-2.7.1-glh2o2djvw4vcaffhizchjtjofqf4sfw/include/freetype2' '-fontconfig' '-openssl-linked' '-system-sqlite' '-shared' '-system-harfbuzz' '-L/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/harfbuzz-2.1.3-ggxas5icupgdslvf4kvfyt6rrlsdxmqk/lib' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/harfbuzz-2.1.3-ggxas5icupgdslvf4kvfyt6rrlsdxmqk/include' '-system-pcre' '-L/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/pcre2-10.31-cbcfe5ynsf5ky7ccezwwc6ngmtnwbxot/lib' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/pcre2-10.31-cbcfe5ynsf5ky7ccezwwc6ngmtnwbxot/include' '-system-doubleconversion' '-L/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/double-conversion-2.0.1-73vy7slnoduzb5m6rejai6degd5k27oi/lib' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/double-conversion-2.0.1-73vy7slnoduzb5m6rejai6degd5k27oi/include' '-system-libpng' '-L/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/libpng-1.6.37-iu6mik7x7gbsb2sevn5bffomgkfwu643/lib' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/libpng-1.6.37-iu6mik7x7gbsb2sevn5bffomgkfwu643/include' '-system-libjpeg' '-L/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/libjpeg-turbo-2.0.3-boohheheifgexzgwwideuon5buoqfxzc/lib64' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/libjpeg-turbo-2.0.3-boohheheifgexzgwwideuon5buoqfxzc/include' '-system-zlib' '-L/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/zlib-1.2.11-csbova4up62su6pxxlvzqf2tjef233ew/lib' '-I/opt/packages/gpjohnsn/apps/linux-centos7-broadwell/intel-19.0.5.281/zlib-1.2.11-csbova4up62su6pxxlvzqf2tjef233ew/include' '-nomake' 'examples' '-no-dbus' '-system-xcb' '-skip' 'webengine' '-skip' 'webglplugin' '-skip' 'wayland'
```
The qmake.stash file looks correct in this scenario.
```
QMAKE_CXX.QT_COMPILER_STDCXX = 201402L
QMAKE_CXX.QMAKE_ICC_VER = 1900
QMAKE_CXX.QMAKE_ICC_UPDATE_VER = 5
QMAKE_CXX.QMAKE_GCC_MAJOR_VERSION = 6
QMAKE_CXX.QMAKE_GCC_MINOR_VERSION = 1
QMAKE_CXX.QMAKE_GCC_PATCH_VERSION = 0
QMAKE_CXX.COMPILER_MACROS = \
QT_COMPILER_STDCXX \
QMAKE_ICC_VER \
QMAKE_ICC_UPDATE_VER \
QMAKE_GCC_MAJOR_VERSION \
QMAKE_GCC_MINOR_VERSION \
QMAKE_GCC_PATCH_VERSION
```
Interestingly, I see the same thing when I patch the source to remove the overflow builtins from qnumeric_p.h so that the generic interface is used.
I see the same behavior with intel-17 and intel-18. So far I have only looked at qt-5.13.1.
### Platform and user environment
```commandline
$ uname -a
Linux argon-build.hpc 3.10.0-862.14.4.el7.x86_64 #1 SMP Wed Sep 26 15:12:11 UTC 2018 x86_64 x86_64 x86_64 GNU/Linuxx86_64 x86_64 GNU/Linux
$ lsb_release -d
Description: CentOS Linux release 7.5.1804 (Core)
```
| non_priority | recent versions of do not build with the intel compiler while working with the qt variant on a package i discovered that does not compile with the intel compiler it seems to be a problem with defining overflow builtins which may be related to the underlying gcc used with the intel compiler note that pr sets a conflicts directive to help prevent wasted build time steps to reproduce the issue console spack install qt intel freetype harfbuzz errors found in build log c c o qlist o std c ffunction sections fdata sections g i dev shm gpjohnsn spack stage q t spack src qtbase qmake i dev shm gpjohnsn spack stage qt s spack src qtbase qmake library i dev shm gpjohnsn spack stage qt szi spack src qtbase qmake generators i dev shm gpjohnsn spack stage qt sz spack src qtbase qmake generators unix i dev shm gpjohnsn spack stage qt spack src qtbase qmake generators i dev shm gpjohnsn spack stage qt spack src qtbase qmake generators mac i dev shm gpjohnsn spack stage qt spack src qtbase include i dev shm gpjohnsn spack stage qt spack src qtbase include qtcore i dev shm gpjohnsn spack stage qt spack src qtbase include qtcore i dev shm gpjohnsn spack sta ge qt spack src qtbase include qtcore qtcore i src corelib global i dev shm gpjohnsn spack stage qt spack src qtbase mkspecs linux g dqt version str dqt version major dqt version minor dqt version patch dqt b uild qmake dqt bootstrapped dproevaluator full dqt no foreach dev shm gpjohnsn spack stage qt szi spack src qtbase src corelib tools qlist cpp c c o qlocale o std c ffunction sections fdata sections g i dev shm gpjohnsn spack stage qt spack src qtbase qmake i dev shm gpjohnsn spack stage qt spack src qtbase qmake library i dev shm gpjohnsn spack stage qt s spack src qtbase qmake generators i dev shm gpjohnsn spack stage qt spack src qtbase qmake generators unix i dev shm gpjohnsn spack stage qt spack src qtbase qmake generators i dev shm gpjohnsn spack sta ge qt spack src qtbase qmake generators mac i dev shm gpjohnsn spac k stage qt spack src qtbase include i dev shm gpjohnsn spack stage qt spack src qtbase include qtcore i dev shm gpjohnsn spack stage q t spack src qtbase include qtcore i dev shm gpjohnsn spack s tage qt spack src qtbase include qtcore qtcore i src corel ib global i dev shm gpjohnsn spack stage qt spack src qtbase mkspec s linux g dqt version str dqt version major dqt version minor dqt version patch dqt build qmake dqt bootstrapped dproevaluator full dqt no foreach dev shm gpjohnsn spack stage qt s spack src qtbase src corelib tools qlocale cpp c c o qlocale tools o std c ffunction sections fdata sections g i dev shm gpjohnsn spack stage qt spack src qtbase qmake i dev shm gpjohnsn spack stage qt spack src qtbase qmake library i dev shm gpjohnsn spack stage qt spack src qtbase qmake generators i dev shm gpjohnsn spack stage qt spack src qtbase qmake generators unix i dev shm gpjohnsn spack stag e qt spack src qtbase qmake generators i dev shm gpjohnsn spa ck stage qt spack src qtbase qmake generators mac i dev shm gpjohns n spack stage qt spack src qtbase include i dev shm gpjohnsn spack stage qt spack src qtbase include qtcore i dev shm gpjohnsn spack s tage qt spack src qtbase include qtcore i dev shm gpjohnsn s pack stage qt spack src qtbase include qtcore qtcore i src corelib global i dev shm gpjohnsn spack stage qt spack src qtbase mkspecs linux g dqt version str dqt version major dqt version minor dqt version patch dqt build qmake dqt bootstrapped dproevaluator full dqt no foreach dev shm gpjohnsn spack stage qt spack src qtbase src corelib tools qlocale tools cpp c c o qmap o std c ffunction sections fdata sections g i dev shm gpjohnsn spack stage qt spack src qtbase qmake i dev shm gpjohnsn spack stage qt sz spack src qtbase qmake library i dev shm gpjohnsn spack stage qt sziv spack src qtbase qmake generators i dev shm gpjohnsn spack stage qt szi spack src qtbase qmake generators unix i dev shm gpjohnsn spack stage qt spack src qtbase qmake generators i dev shm gpjohnsn spack stage qt spack src qtbase qmake generators mac i dev shm gpjohnsn spack s tage qt spack src qtbase include i dev shm gpjohnsn spack stage qt spack src qtbase include qtcore i dev shm gpjohnsn spack stage qt spack src qtbase include qtcore i dev shm gpjohnsn spack stag e qt spack src qtbase include qtcore qtcore i src corelib global i dev shm gpjohnsn spack stage qt spack src qtbase mkspecs l inux g dqt version str dqt version major dqt version minor dqt version patch dqt bu ild qmake dqt bootstrapped dproevaluator full dqt no foreach dev shm gpjohnsn spack stage qt sziv spack src qtbase src corelib tools qmap cpp c c o qregexp o std c ffunction sections fdata sections g i dev shm gpjohnsn spack stage qt spack src qtbase qmake i dev shm gpjohnsn spack stage qt spack src qtbase qmake library i dev shm gpjohnsn spack stage qt s s linux g dqt version str dqt version major dqt version minor dqt version patch dqt build qmake dqt bootstrapped dproevaluator full dqt no foreach dev shm gpjohnsn spack stage qt s spack src qtbase src corelib tools qregexp cpp c c o qringbuffer o std c ffunction sections fdata sections g i dev shm gpjohnsn spack s tage qt spack src qtbase qmake i dev shm gpjohnsn spack stage qt spack src qtbase qmake library i dev shm gpjohnsn spack stage qt spack src qtbase qmake generators i dev shm gpjohnsn spack stage qt spack src qtbase qmake generators unix i dev shm gpjohnsn spack stage qt spack src qtbase qmake generators i dev shm gpjohnsn spack stage qt spack src qtbase qmake generators mac i dev shm gpjohnsn spack stage qt spack src qtbase include i dev shm gpjohnsn spack st age qt spack src qtbase include qtcore i dev shm gpjohnsn spack sta ge qt spack src qtbase include qtcore i dev shm gpjohnsn spa ck stage qt spack src qtbase include qtcore qtcore i src c orelib global i dev shm gpjohnsn spack stage qt spack src qtbase mk specs linux g dqt version str dqt version major dqt version minor dqt version patch dqt build qmake dqt bootstrapped dproevaluator full dqt no foreach dev shm gpjohnsn spack stage qt spack src qtbase src corelib tools qringbuffer cpp dev shm gpjohnsn spack stage qt spack src qtbase include qtcore qtcore private src corelib global qnumeric p h error argument is incompatible with formal parameter return builtin mul overflow r dev shm gpjohnsn spack stage qt spack src qtbase include qtcore qtcore private src corelib global qnumeric p h error argument is incompatible with formal parameter return builtin add overflow r compilation aborted for dev shm gpjohnsn spack stage qt spack src q tbase src corelib tools qbytearray cpp code gmake error gmake waiting for unfinished jobs the problem is with the following code in qnumeric p h overflow math this provides efficient implementations for int unsigned qsizetype and size t implementations for and bit types will work but may not be as efficient implementations for bit may be missing on bit platforms if defined q cc gnu q cc gnu defined q cc intel defined q os win qt has builtin builtin add overflow gcc icc and clang have builtins to detect overflows template inline typename std enable if value std is signed value bool type add overflow t t t r return builtin add overflow r template inline typename std enable if value std is signed value bool type sub overflow t t t r return builtin sub overflow r template inline typename std enable if value std is signed value bool type mul overflow t t t r return builtin mul overflow r else generic implementations that looks like the interfaces might be getting mixed up there is more to it than that though as adding a module to specify a newer version of gcc yields the following console info creating stash file dev shm gpjohnsn spack stage qt spack src qmake stash project error failed to parse default search paths from compiler output error processerror command exited with status configure no eglfs no directfb no gtk prefix opt packages gpjohnsn apps linux broadwell intel qt v opensource no opengl release confirm license openssl linked l opt packages gpjohnsn apps linux broadwell intel openssl lib i opt packages gpjohnsn apps linux broadwell intel openssl include optimized qmake no pch system freetype i opt packages gpjohnsn apps linux broadwell intel freetype include fontconfig openssl linked system sqlite shared system harfbuzz l opt packages gpjohnsn apps linux broadwell intel harfbuzz lib i opt packages gpjohnsn apps linux broadwell intel harfbuzz include system pcre l opt packages gpjohnsn apps linux broadwell intel lib i opt packages gpjohnsn apps linux broadwell intel include system doubleconversion l opt packages gpjohnsn apps linux broadwell intel double conversion lib i opt packages gpjohnsn apps linux broadwell intel double conversion include system libpng l opt packages gpjohnsn apps linux broadwell intel libpng lib i opt packages gpjohnsn apps linux broadwell intel libpng include system libjpeg l opt packages gpjohnsn apps linux broadwell intel libjpeg turbo i opt packages gpjohnsn apps linux broadwell intel libjpeg turbo include system zlib l opt packages gpjohnsn apps linux broadwell intel zlib lib i opt packages gpjohnsn apps linux broadwell intel zlib include nomake examples no dbus system xcb skip webengine skip webglplugin skip wayland the qmake stash file looks correct in this scenario qmake cxx qt compiler stdcxx qmake cxx qmake icc ver qmake cxx qmake icc update ver qmake cxx qmake gcc major version qmake cxx qmake gcc minor version qmake cxx qmake gcc patch version qmake cxx compiler macros qt compiler stdcxx qmake icc ver qmake icc update ver qmake gcc major version qmake gcc minor version qmake gcc patch version interestingly i see the same thing when i patch the source to remove the overflow builtins from qnumeric p h so that the generic interface is used i see the same behavior with intel and intel so far i have only looked at qt platform and user environment commandline uname a linux argon build hpc smp wed sep utc gnu gnu linux lsb release d description centos linux release core | 0 |
152,724 | 5,867,980,866 | IssuesEvent | 2017-05-14 07:54:21 | tootsuite/mastodon | https://api.github.com/repos/tootsuite/mastodon | closed | Unable to add a media (Windows Phone 10) | bug priority - medium ui | Hello,
I searched and I thinked this issue was not opened yet.
When I try to add a media to a toot from Edge on Windows Phone 10 (Lumia 550), I've got a refresh, but media is not added and text is erased. This happens everytime I try.
I reproduce with mastodon.gougere.fr and mastodon.xyz.
xakan | 1.0 | Unable to add a media (Windows Phone 10) - Hello,
I searched and I thinked this issue was not opened yet.
When I try to add a media to a toot from Edge on Windows Phone 10 (Lumia 550), I've got a refresh, but media is not added and text is erased. This happens everytime I try.
I reproduce with mastodon.gougere.fr and mastodon.xyz.
xakan | priority | unable to add a media windows phone hello i searched and i thinked this issue was not opened yet when i try to add a media to a toot from edge on windows phone lumia i ve got a refresh but media is not added and text is erased this happens everytime i try i reproduce with mastodon gougere fr and mastodon xyz xakan | 1 |
31,459 | 4,706,841,589 | IssuesEvent | 2016-10-13 18:21:58 | L-EARN/NoCheatZ-4 | https://api.github.com/repos/L-EARN/NoCheatZ-4 | closed | False AutoPistol | g:AllGames o:AllOS s:CRITICAL s:integration-test t:False Detection | > 08/15/2016 05:03:39 PM [ Server Tick #20107, SourceTV:NoCheatZ-autorecords/de_dust2-08-15-2016_05-01-20 PM.dem : Tick #17776 ] ShotTester triggered a detection : BlackDogvkcsgo.ru [STEAM_1:1:97460027 - :27005] is using a AutoPistol.
08/15/2016 05:03:39 PM [ Server Tick #20107, SourceTV:NoCheatZ-autorecords/de_dust2-08-15-2016_05-01-20 PM.dem : Tick #17776 ] :::: ShotStatsT {
:::::::: Attack1 Button Up At (Time) : 3291.723389,
:::::::: Attack1 Button Down At (Time) : 3291.700195,
:::::::: Clicks {
:::::::::::: Clicks Count : 51,
:::::::::::: Detection Ratio : 102.000000,
:::::::::::: Average Button Down Hold Time : 0.120094 s
:::::::: },
:::::::: ShortClicks {
:::::::::::: Clicks Count : 39,
:::::::::::: Detection Ratio : 78.000000,
:::::::::::: Average Button Down Hold Time : 0.078004 s
:::::::: },
:::::::: WithHand {
:::::::::::: Clicks Count : 0,
:::::::::::: Detection Ratio : 0.000000,
:::::::::::: Average Button Down Hold Time : 0.000000 s
:::::::: },
:::::::: WithPistol {
:::::::::::: Clicks Count : 39,
:::::::::::: Detection Ratio : 78.000000,
:::::::::::: Average Button Down Hold Time : 0.078004 s
:::::::: },
:::::::: WithAuto {
:::::::::::: Clicks Count : 0,
:::::::::::: Detection Ratio : 0.000000,
:::::::::::: Average Button Down Hold Time : 0.000000 s
:::::::: },
:::::::: OnTarget {
:::::::::::: Clicks Count : 0,
:::::::::::: Detection Ratio : 0.000000,
:::::::::::: Average Button Down Hold Time : 0.000000 s
:::::::: },
:::::::: Consecutive Detections Count : 19,
:::::::: Last Detection Time : 3291.707520
:::: }
08/15/2016 05:03:39 PM [ Server Tick #20107, SourceTV:NoCheatZ-autorecords/de_dust2-08-15-2016_05-01-20 PM.dem : Tick #17776 ] Banned BlackDogvkcsgo.ru [STEAM_1:1:97460027 - :27005] with reason : Banned by NoCheatZ 4
> 08/15/2016 05:20:44 PM [ Server Tick #151280, SourceTV:NoCheatZ-autorecords/de_dust2-08-15-2016_05-01-20 PM.dem : Tick #148949 ] ShotTester triggered a detection : PAYET [STEAM_1:1:105103638 - 59017] is using a AutoPistol.
08/15/2016 05:20:44 PM [ Server Tick #151280, SourceTV:NoCheatZ-autorecords/de_dust2-08-15-2016_05-01-20 PM.dem : Tick #148949 ] :::: ShotStatsT {
:::::::: Attack1 Button Up At (Time) : 4316.512207,
:::::::: Attack1 Button Down At (Time) : 4316.473633,
:::::::: Clicks {
:::::::::::: Clicks Count : 53,
:::::::::::: Detection Ratio : 101.923080,
:::::::::::: Average Button Down Hold Time : 4.251497 s
:::::::: },
:::::::: ShortClicks {
:::::::::::: Clicks Count : 21,
:::::::::::: Detection Ratio : 40.384617,
:::::::::::: Average Button Down Hold Time : 0.091246 s
:::::::: },
:::::::: WithHand {
:::::::::::: Clicks Count : 0,
:::::::::::: Detection Ratio : 0.000000,
:::::::::::: Average Button Down Hold Time : 0.000000 s
:::::::: },
:::::::: WithPistol {
:::::::::::: Clicks Count : 21,
:::::::::::: Detection Ratio : 40.384617,
:::::::::::: Average Button Down Hold Time : 0.091246 s
:::::::: },
:::::::: WithAuto {
:::::::::::: Clicks Count : 0,
:::::::::::: Detection Ratio : 0.000000,
:::::::::::: Average Button Down Hold Time : 0.000000 s
:::::::: },
:::::::: OnTarget {
:::::::::::: Clicks Count : 0,
:::::::::::: Detection Ratio : 0.000000,
:::::::::::: Average Button Down Hold Time : 0.000000 s
:::::::: },
:::::::: Consecutive Detections Count : 21,
:::::::: Last Detection Time : 4316.512207
:::: }
08/15/2016 05:20:44 PM [ Server Tick #151280, SourceTV:NoCheatZ-autorecords/de_dust2-08-15-2016_05-01-20 PM.dem : Tick #148949 ] Banned PAYET [STEAM_1:1:105103638 - :59017] with reason : Banned by NoCheatZ 4
This is full demo from autodemo plugin (ncz AutoTVRecord disable)
http://www.csgo.org/files/17-01_17-26_de_dust2.zip
On these demo i did not see any strange actions from this 2 banned players. May be this bans can be related with network issue on server side? Today in datacenter where i host my server some problems and every 10 minutes network is down (for 5-10 sec). | 1.0 | False AutoPistol - > 08/15/2016 05:03:39 PM [ Server Tick #20107, SourceTV:NoCheatZ-autorecords/de_dust2-08-15-2016_05-01-20 PM.dem : Tick #17776 ] ShotTester triggered a detection : BlackDogvkcsgo.ru [STEAM_1:1:97460027 - :27005] is using a AutoPistol.
08/15/2016 05:03:39 PM [ Server Tick #20107, SourceTV:NoCheatZ-autorecords/de_dust2-08-15-2016_05-01-20 PM.dem : Tick #17776 ] :::: ShotStatsT {
:::::::: Attack1 Button Up At (Time) : 3291.723389,
:::::::: Attack1 Button Down At (Time) : 3291.700195,
:::::::: Clicks {
:::::::::::: Clicks Count : 51,
:::::::::::: Detection Ratio : 102.000000,
:::::::::::: Average Button Down Hold Time : 0.120094 s
:::::::: },
:::::::: ShortClicks {
:::::::::::: Clicks Count : 39,
:::::::::::: Detection Ratio : 78.000000,
:::::::::::: Average Button Down Hold Time : 0.078004 s
:::::::: },
:::::::: WithHand {
:::::::::::: Clicks Count : 0,
:::::::::::: Detection Ratio : 0.000000,
:::::::::::: Average Button Down Hold Time : 0.000000 s
:::::::: },
:::::::: WithPistol {
:::::::::::: Clicks Count : 39,
:::::::::::: Detection Ratio : 78.000000,
:::::::::::: Average Button Down Hold Time : 0.078004 s
:::::::: },
:::::::: WithAuto {
:::::::::::: Clicks Count : 0,
:::::::::::: Detection Ratio : 0.000000,
:::::::::::: Average Button Down Hold Time : 0.000000 s
:::::::: },
:::::::: OnTarget {
:::::::::::: Clicks Count : 0,
:::::::::::: Detection Ratio : 0.000000,
:::::::::::: Average Button Down Hold Time : 0.000000 s
:::::::: },
:::::::: Consecutive Detections Count : 19,
:::::::: Last Detection Time : 3291.707520
:::: }
08/15/2016 05:03:39 PM [ Server Tick #20107, SourceTV:NoCheatZ-autorecords/de_dust2-08-15-2016_05-01-20 PM.dem : Tick #17776 ] Banned BlackDogvkcsgo.ru [STEAM_1:1:97460027 - :27005] with reason : Banned by NoCheatZ 4
> 08/15/2016 05:20:44 PM [ Server Tick #151280, SourceTV:NoCheatZ-autorecords/de_dust2-08-15-2016_05-01-20 PM.dem : Tick #148949 ] ShotTester triggered a detection : PAYET [STEAM_1:1:105103638 - 59017] is using a AutoPistol.
08/15/2016 05:20:44 PM [ Server Tick #151280, SourceTV:NoCheatZ-autorecords/de_dust2-08-15-2016_05-01-20 PM.dem : Tick #148949 ] :::: ShotStatsT {
:::::::: Attack1 Button Up At (Time) : 4316.512207,
:::::::: Attack1 Button Down At (Time) : 4316.473633,
:::::::: Clicks {
:::::::::::: Clicks Count : 53,
:::::::::::: Detection Ratio : 101.923080,
:::::::::::: Average Button Down Hold Time : 4.251497 s
:::::::: },
:::::::: ShortClicks {
:::::::::::: Clicks Count : 21,
:::::::::::: Detection Ratio : 40.384617,
:::::::::::: Average Button Down Hold Time : 0.091246 s
:::::::: },
:::::::: WithHand {
:::::::::::: Clicks Count : 0,
:::::::::::: Detection Ratio : 0.000000,
:::::::::::: Average Button Down Hold Time : 0.000000 s
:::::::: },
:::::::: WithPistol {
:::::::::::: Clicks Count : 21,
:::::::::::: Detection Ratio : 40.384617,
:::::::::::: Average Button Down Hold Time : 0.091246 s
:::::::: },
:::::::: WithAuto {
:::::::::::: Clicks Count : 0,
:::::::::::: Detection Ratio : 0.000000,
:::::::::::: Average Button Down Hold Time : 0.000000 s
:::::::: },
:::::::: OnTarget {
:::::::::::: Clicks Count : 0,
:::::::::::: Detection Ratio : 0.000000,
:::::::::::: Average Button Down Hold Time : 0.000000 s
:::::::: },
:::::::: Consecutive Detections Count : 21,
:::::::: Last Detection Time : 4316.512207
:::: }
08/15/2016 05:20:44 PM [ Server Tick #151280, SourceTV:NoCheatZ-autorecords/de_dust2-08-15-2016_05-01-20 PM.dem : Tick #148949 ] Banned PAYET [STEAM_1:1:105103638 - :59017] with reason : Banned by NoCheatZ 4
This is full demo from autodemo plugin (ncz AutoTVRecord disable)
http://www.csgo.org/files/17-01_17-26_de_dust2.zip
On these demo i did not see any strange actions from this 2 banned players. May be this bans can be related with network issue on server side? Today in datacenter where i host my server some problems and every 10 minutes network is down (for 5-10 sec). | non_priority | false autopistol pm shottester triggered a detection blackdogvkcsgo ru is using a autopistol pm shotstatst button up at time button down at time clicks clicks count detection ratio average button down hold time s shortclicks clicks count detection ratio average button down hold time s withhand clicks count detection ratio average button down hold time s withpistol clicks count detection ratio average button down hold time s withauto clicks count detection ratio average button down hold time s ontarget clicks count detection ratio average button down hold time s consecutive detections count last detection time pm banned blackdogvkcsgo ru with reason banned by nocheatz pm shottester triggered a detection payet is using a autopistol pm shotstatst button up at time button down at time clicks clicks count detection ratio average button down hold time s shortclicks clicks count detection ratio average button down hold time s withhand clicks count detection ratio average button down hold time s withpistol clicks count detection ratio average button down hold time s withauto clicks count detection ratio average button down hold time s ontarget clicks count detection ratio average button down hold time s consecutive detections count last detection time pm banned payet with reason banned by nocheatz this is full demo from autodemo plugin ncz autotvrecord disable on these demo i did not see any strange actions from this banned players may be this bans can be related with network issue on server side today in datacenter where i host my server some problems and every minutes network is down for sec | 0 |
581,626 | 17,313,455,053 | IssuesEvent | 2021-07-27 00:21:25 | usc-isi-i2/kgtk | https://api.github.com/repos/usc-isi-i2/kgtk | opened | `kgtk replace-nodes`: Generalize Input | enhancement priority 1 | Extend `kgtk replace-nodes` to use alternate input column names, and to make the `label` column optional.
One modification for this is to be abe to process the Table Linker's ouput directly. | 1.0 | `kgtk replace-nodes`: Generalize Input - Extend `kgtk replace-nodes` to use alternate input column names, and to make the `label` column optional.
One modification for this is to be abe to process the Table Linker's ouput directly. | priority | kgtk replace nodes generalize input extend kgtk replace nodes to use alternate input column names and to make the label column optional one modification for this is to be abe to process the table linker s ouput directly | 1 |
487,128 | 14,019,704,901 | IssuesEvent | 2020-10-29 18:34:07 | ampproject/amphtml | https://api.github.com/repos/ampproject/amphtml | opened | Ensure that shadowroot templates do not cause vulnerabilities | P1: High Priority Type: Bug | The new [Declarative Shadow DOM API](https://github.com/mfreed7/declarative-shadow-dom/blob/master/README.md#syntax) is promising a lot of benefits for LCP and CLS metrics. However, it also poses some risks. What previously was assumed to be inert DOM can soon be parsed into the live Shadow DOM. For some details on how this can be exploited, see [slides 9 and 10 in this presentation](https://docs.google.com/presentation/d/1CR4TivoLxvpWreOy88iBVyrCGY68VYTrGttDgCaGBO4/edit#slide=id.ga5141bda34_0_59).
For AMP this is relevant for the validator and possibly for the sanitizer.
For validator, we need to ensure that either:
1. The validator fully validates `<template>` contents for AMP conformance.
2. Or we disallow `<template shadowroot>` entirely.
For sanitizer, we need to ensure that either:
1. The `<template>` is not allowed.
2. Or `<template shadowroot>` is not allowed.
/cc @ampproject/wg-security-privacy | 1.0 | Ensure that shadowroot templates do not cause vulnerabilities - The new [Declarative Shadow DOM API](https://github.com/mfreed7/declarative-shadow-dom/blob/master/README.md#syntax) is promising a lot of benefits for LCP and CLS metrics. However, it also poses some risks. What previously was assumed to be inert DOM can soon be parsed into the live Shadow DOM. For some details on how this can be exploited, see [slides 9 and 10 in this presentation](https://docs.google.com/presentation/d/1CR4TivoLxvpWreOy88iBVyrCGY68VYTrGttDgCaGBO4/edit#slide=id.ga5141bda34_0_59).
For AMP this is relevant for the validator and possibly for the sanitizer.
For validator, we need to ensure that either:
1. The validator fully validates `<template>` contents for AMP conformance.
2. Or we disallow `<template shadowroot>` entirely.
For sanitizer, we need to ensure that either:
1. The `<template>` is not allowed.
2. Or `<template shadowroot>` is not allowed.
/cc @ampproject/wg-security-privacy | priority | ensure that shadowroot templates do not cause vulnerabilities the new is promising a lot of benefits for lcp and cls metrics however it also poses some risks what previously was assumed to be inert dom can soon be parsed into the live shadow dom for some details on how this can be exploited see for amp this is relevant for the validator and possibly for the sanitizer for validator we need to ensure that either the validator fully validates contents for amp conformance or we disallow entirely for sanitizer we need to ensure that either the is not allowed or is not allowed cc ampproject wg security privacy | 1 |
319,503 | 9,745,208,417 | IssuesEvent | 2019-06-03 09:04:49 | alphagov/govuk-frontend | https://api.github.com/repos/alphagov/govuk-frontend | closed | Error page titles not added for GOV.UK Frontend review application | Effort: hours Priority: low accessibility audit: may-2019 | This issue is from a May 2019 external accessibility audit report.
**WCAG Reference**: Usability feedback only, there is no WCAG related guidelines.
**Issue ID**: DAC_Issue25
**URL**: http://govuk-frontend-v3.herokuapp.com/full-page-examples/applicant-details
**Page**: Applicant details
## Screen Shot

When users commit an error, it is highly recommended that this is made clear within the page title to ensure that users are immediately aware that they are on the same page but errors are present. This is extremely helpful for screen reader users as this is the first piece of information that is read back to them when the page reloads.
## Current Code Ref(s)
```html
<title>GOV.UK - The best place to find government services and information</title>
```
## Screen reader comments
> “An error was committed, but the phrase ‘Error’ did not appear at the beginning of the page title. This issue was present for JAWS, NVDA and VoiceOver for iPhone and Mac.”
## Solution
Ensure that the page title contains the prefix text ‘Error:’ to enable users to determine that errors are present on the page.
### Example
```html
<title>Error: Page title – service name – GOV.UK </title>
``` | 1.0 | Error page titles not added for GOV.UK Frontend review application - This issue is from a May 2019 external accessibility audit report.
**WCAG Reference**: Usability feedback only, there is no WCAG related guidelines.
**Issue ID**: DAC_Issue25
**URL**: http://govuk-frontend-v3.herokuapp.com/full-page-examples/applicant-details
**Page**: Applicant details
## Screen Shot

When users commit an error, it is highly recommended that this is made clear within the page title to ensure that users are immediately aware that they are on the same page but errors are present. This is extremely helpful for screen reader users as this is the first piece of information that is read back to them when the page reloads.
## Current Code Ref(s)
```html
<title>GOV.UK - The best place to find government services and information</title>
```
## Screen reader comments
> “An error was committed, but the phrase ‘Error’ did not appear at the beginning of the page title. This issue was present for JAWS, NVDA and VoiceOver for iPhone and Mac.”
## Solution
Ensure that the page title contains the prefix text ‘Error:’ to enable users to determine that errors are present on the page.
### Example
```html
<title>Error: Page title – service name – GOV.UK </title>
``` | priority | error page titles not added for gov uk frontend review application this issue is from a may external accessibility audit report wcag reference usability feedback only there is no wcag related guidelines issue id dac url page applicant details screen shot when users commit an error it is highly recommended that this is made clear within the page title to ensure that users are immediately aware that they are on the same page but errors are present this is extremely helpful for screen reader users as this is the first piece of information that is read back to them when the page reloads current code ref s html gov uk the best place to find government services and information screen reader comments “an error was committed but the phrase ‘error’ did not appear at the beginning of the page title this issue was present for jaws nvda and voiceover for iphone and mac ” solution ensure that the page title contains the prefix text ‘error ’ to enable users to determine that errors are present on the page example html error page title – service name – gov uk | 1 |
676,015 | 23,113,372,247 | IssuesEvent | 2022-07-27 14:42:26 | status-im/status-desktop | https://api.github.com/repos/status-im/status-desktop | opened | `UserImage` component doesn't take privacy settings into account inside message replies | bug Chat priority 2: medium E:Bugfixes E:Settings | Here's a an example message history:

There's a reply, notice how the image of the message to be replied is shown while it's not shown in the original profile image.
The reason it's not shown in the original message is because by default, we don't show profile image.
When turning this setting on for "everyone" it looks like this:

This means, inside message replies `UserImage` doesn't seem to honor the settings.
| 1.0 | `UserImage` component doesn't take privacy settings into account inside message replies - Here's a an example message history:

There's a reply, notice how the image of the message to be replied is shown while it's not shown in the original profile image.
The reason it's not shown in the original message is because by default, we don't show profile image.
When turning this setting on for "everyone" it looks like this:

This means, inside message replies `UserImage` doesn't seem to honor the settings.
| priority | userimage component doesn t take privacy settings into account inside message replies here s a an example message history there s a reply notice how the image of the message to be replied is shown while it s not shown in the original profile image the reason it s not shown in the original message is because by default we don t show profile image when turning this setting on for everyone it looks like this this means inside message replies userimage doesn t seem to honor the settings | 1 |
115,958 | 24,833,807,589 | IssuesEvent | 2022-10-26 07:09:05 | roanlinde/nodegoat | https://api.github.com/repos/roanlinde/nodegoat | opened | CVE: 2020-7729 found in grunt - Version: 1.0.3 [JS] | Severity: Medium Veracode Dependency Scanning | Veracode Software Composition Analysis
===============================
Attribute | Details
| --- | --- |
Library | grunt
Description | The JavaScript Task Runner
Language | JS
Vulnerability | Arbtirary Code Execution
Vulnerability description | grunt is vulnerable to arbitrary code execution. The library uses an insecure `.load` function from js-yaml by default and allows an attacker to inject and execute arbitrary code.
CVE | 2020-7729
CVSS score | 4.6
Vulnerability present in version/s | 0.4.0-rc1-1.2.1
Found library version/s | 1.0.3
Vulnerability fixed in version | 1.3.0
Library latest version | 1.5.3
Fix |
Links:
- https://sca.analysiscenter.veracode.com/vulnerability-database/libraries/1643?version=1.0.3
- https://sca.analysiscenter.veracode.com/vulnerability-database/vulnerabilities/26494
- Patch: https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7 | 1.0 | CVE: 2020-7729 found in grunt - Version: 1.0.3 [JS] - Veracode Software Composition Analysis
===============================
Attribute | Details
| --- | --- |
Library | grunt
Description | The JavaScript Task Runner
Language | JS
Vulnerability | Arbtirary Code Execution
Vulnerability description | grunt is vulnerable to arbitrary code execution. The library uses an insecure `.load` function from js-yaml by default and allows an attacker to inject and execute arbitrary code.
CVE | 2020-7729
CVSS score | 4.6
Vulnerability present in version/s | 0.4.0-rc1-1.2.1
Found library version/s | 1.0.3
Vulnerability fixed in version | 1.3.0
Library latest version | 1.5.3
Fix |
Links:
- https://sca.analysiscenter.veracode.com/vulnerability-database/libraries/1643?version=1.0.3
- https://sca.analysiscenter.veracode.com/vulnerability-database/vulnerabilities/26494
- Patch: https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7 | non_priority | cve found in grunt version veracode software composition analysis attribute details library grunt description the javascript task runner language js vulnerability arbtirary code execution vulnerability description grunt is vulnerable to arbitrary code execution the library uses an insecure load function from js yaml by default and allows an attacker to inject and execute arbitrary code cve cvss score vulnerability present in version s found library version s vulnerability fixed in version library latest version fix links patch | 0 |
492,885 | 14,222,103,609 | IssuesEvent | 2020-11-17 16:28:57 | ChainSafe/gossamer | https://api.github.com/repos/ChainSafe/gossamer | closed | investigate network expireStatus | Priority: 4 - Low network | expireStatus wakes up every 6 minutes, while sendStatus wakes up every 5 minutes. this may cause them to become out of sync, causing peers to be dropped unnecessarily. | 1.0 | investigate network expireStatus - expireStatus wakes up every 6 minutes, while sendStatus wakes up every 5 minutes. this may cause them to become out of sync, causing peers to be dropped unnecessarily. | priority | investigate network expirestatus expirestatus wakes up every minutes while sendstatus wakes up every minutes this may cause them to become out of sync causing peers to be dropped unnecessarily | 1 |
204,661 | 23,270,003,325 | IssuesEvent | 2022-08-04 21:39:45 | sourcegraph/sourcegraph | https://api.github.com/repos/sourcegraph/sourcegraph | closed | Security: Vulnerability Scanning Tracking issue | tracking team/security vuln-scanning | ### Plan
Tracks all the issues related to [vulnerability scanning](https://sourcegraph.productboard.com/feature-board/2119755-cloud/features/5982381/detail) as part of the larger goal of enabling [private code on Sourcegraph Cloud](https://about.sourcegraph.com/company/goals#private-code-on-sourcegraph-cloud).
### Tracked issues
<!-- BEGIN WORK -->
<!-- BEGIN ASSIGNEE: -->
@unassigned
- [ ] https://github.com/sourcegraph/sourcegraph/issues/17851
<!-- END ASSIGNEE -->
<!-- BEGIN ASSIGNEE: andreeleuterio -->
@andreeleuterio
- [ ] https://github.com/sourcegraph/sourcegraph/issues/17839 🛠️ 🏳️ [Security: Vulnerability Scanning](https://github.com/sourcegraph/sourcegraph/milestone/92)
- [ ] https://github.com/sourcegraph/sourcegraph/issues/17847
- [ ] https://github.com/sourcegraph/sourcegraph/issues/17848
<!-- END ASSIGNEE -->
<!-- END WORK -->
#### Legend
- 👩 Customer issue
- 🐛 Bug
- 🧶 Technical debt
- 🎩 Quality of life
- 🛠️ [Roadmap](https://docs.google.com/document/d/1cBsE9801DcBF9chZyMnxRdolqM_1c2pPyGQz15QAvYI/edit#heading=h.5nwl5fv52ess)
- 🕵️ [Spike](https://en.wikipedia.org/wiki/Spike_(software_development))
- 🔒 Security issue
- :shipit: Pull Request
| True | Security: Vulnerability Scanning Tracking issue - ### Plan
Tracks all the issues related to [vulnerability scanning](https://sourcegraph.productboard.com/feature-board/2119755-cloud/features/5982381/detail) as part of the larger goal of enabling [private code on Sourcegraph Cloud](https://about.sourcegraph.com/company/goals#private-code-on-sourcegraph-cloud).
### Tracked issues
<!-- BEGIN WORK -->
<!-- BEGIN ASSIGNEE: -->
@unassigned
- [ ] https://github.com/sourcegraph/sourcegraph/issues/17851
<!-- END ASSIGNEE -->
<!-- BEGIN ASSIGNEE: andreeleuterio -->
@andreeleuterio
- [ ] https://github.com/sourcegraph/sourcegraph/issues/17839 🛠️ 🏳️ [Security: Vulnerability Scanning](https://github.com/sourcegraph/sourcegraph/milestone/92)
- [ ] https://github.com/sourcegraph/sourcegraph/issues/17847
- [ ] https://github.com/sourcegraph/sourcegraph/issues/17848
<!-- END ASSIGNEE -->
<!-- END WORK -->
#### Legend
- 👩 Customer issue
- 🐛 Bug
- 🧶 Technical debt
- 🎩 Quality of life
- 🛠️ [Roadmap](https://docs.google.com/document/d/1cBsE9801DcBF9chZyMnxRdolqM_1c2pPyGQz15QAvYI/edit#heading=h.5nwl5fv52ess)
- 🕵️ [Spike](https://en.wikipedia.org/wiki/Spike_(software_development))
- 🔒 Security issue
- :shipit: Pull Request
| non_priority | security vulnerability scanning tracking issue plan tracks all the issues related to as part of the larger goal of enabling tracked issues unassigned andreeleuterio 🛠️ 🏳️ legend 👩 customer issue 🐛 bug 🧶 technical debt 🎩 quality of life 🛠️ 🕵️ 🔒 security issue shipit pull request | 0 |
144,548 | 13,110,067,815 | IssuesEvent | 2020-08-04 19:55:27 | nemgrouplimited/symbol-explorer | https://api.github.com/repos/nemgrouplimited/symbol-explorer | opened | Add docs for PageAssembler | documentation | - [ ] What is PageAssembler
- [ ] How to add new page layout
- [ ] Structure of JSON markup
- [ ] Layout types
- [ ] Page path
- [ ] KeepAlive
- [ ] CardTable properties
- [ ] Store data managers
- [ ] How to add new menu item | 1.0 | Add docs for PageAssembler - - [ ] What is PageAssembler
- [ ] How to add new page layout
- [ ] Structure of JSON markup
- [ ] Layout types
- [ ] Page path
- [ ] KeepAlive
- [ ] CardTable properties
- [ ] Store data managers
- [ ] How to add new menu item | non_priority | add docs for pageassembler what is pageassembler how to add new page layout structure of json markup layout types page path keepalive cardtable properties store data managers how to add new menu item | 0 |
270,449 | 8,460,542,472 | IssuesEvent | 2018-10-22 19:08:52 | Javacord/Javacord | https://api.github.com/repos/Javacord/Javacord | opened | Add getters to DiscordApiBuilder | improvement low priority | We are missing some getters in the `DiscordApiBuilder` at the moment, e.g. `DiscordApiBuilder#getTotalShards()`. | 1.0 | Add getters to DiscordApiBuilder - We are missing some getters in the `DiscordApiBuilder` at the moment, e.g. `DiscordApiBuilder#getTotalShards()`. | priority | add getters to discordapibuilder we are missing some getters in the discordapibuilder at the moment e g discordapibuilder gettotalshards | 1 |
226,701 | 7,522,370,920 | IssuesEvent | 2018-04-12 20:12:16 | CS2103JAN2018-F12-B4/main | https://api.github.com/repos/CS2103JAN2018-F12-B4/main | closed | Locate a customer directly. | priority.medium type.enhancement | Possible enhancement: be able to locate a customer directly instead of having to pull a pre-defined list first. | 1.0 | Locate a customer directly. - Possible enhancement: be able to locate a customer directly instead of having to pull a pre-defined list first. | priority | locate a customer directly possible enhancement be able to locate a customer directly instead of having to pull a pre defined list first | 1 |
306 | 2,571,181,250 | IssuesEvent | 2015-02-10 15:07:59 | Graylog2/graylog2-web-interface | https://api.github.com/repos/Graylog2/graylog2-web-interface | closed | Format large numbers | usability | We are still not properly formatting large numbers on:
- [ ] Sources
- [ ] Metrics
- [ ] Number of messages per second
- [ ] Nodes | True | Format large numbers - We are still not properly formatting large numbers on:
- [ ] Sources
- [ ] Metrics
- [ ] Number of messages per second
- [ ] Nodes | non_priority | format large numbers we are still not properly formatting large numbers on sources metrics number of messages per second nodes | 0 |
639,824 | 20,766,881,631 | IssuesEvent | 2022-03-15 21:38:24 | grpc/grpc | https://api.github.com/repos/grpc/grpc | closed | Fork support is only compatible with the epoll1 and poll polling strategies | kind/bug lang/Python priority/P2 | ### What version of gRPC and what language are you using?
v1.44.0
Python
### What operating system (Linux, Windows,...) and version?
OS X
### What runtime / compiler are you using (e.g. python version or version of gcc)
3.9.2
### What did you do?
Since the release of `v1.44.0` we're getting errors thrown that says:
```
Fork support is only compatible with the epoll1 and poll polling strategies
```
We haven't made any other changes to our code, and this didn't happen beforehand. I looked through the changelog, and it's difficult to understand why these errors are now surfacing.
### What did you expect to see?
Not an error
### What did you see instead?
```
Fork support is only compatible with the epoll1 and poll polling strategies
```
### Anything else we should know about your project / environment?
| 1.0 | Fork support is only compatible with the epoll1 and poll polling strategies - ### What version of gRPC and what language are you using?
v1.44.0
Python
### What operating system (Linux, Windows,...) and version?
OS X
### What runtime / compiler are you using (e.g. python version or version of gcc)
3.9.2
### What did you do?
Since the release of `v1.44.0` we're getting errors thrown that says:
```
Fork support is only compatible with the epoll1 and poll polling strategies
```
We haven't made any other changes to our code, and this didn't happen beforehand. I looked through the changelog, and it's difficult to understand why these errors are now surfacing.
### What did you expect to see?
Not an error
### What did you see instead?
```
Fork support is only compatible with the epoll1 and poll polling strategies
```
### Anything else we should know about your project / environment?
| priority | fork support is only compatible with the and poll polling strategies what version of grpc and what language are you using python what operating system linux windows and version os x what runtime compiler are you using e g python version or version of gcc what did you do since the release of we re getting errors thrown that says fork support is only compatible with the and poll polling strategies we haven t made any other changes to our code and this didn t happen beforehand i looked through the changelog and it s difficult to understand why these errors are now surfacing what did you expect to see not an error what did you see instead fork support is only compatible with the and poll polling strategies anything else we should know about your project environment | 1 |
459,670 | 13,196,866,701 | IssuesEvent | 2020-08-13 21:34:36 | internetarchive/openlibrary | https://api.github.com/repos/internetarchive/openlibrary | closed | Switch Archive.org items to use `openlibrary_edition` instead of `openlibrary` keys | Affects: Data CH: sync-ia-ol Data Cleanup Needs: Lead Priority: 3 State: Work In Progress Theme: Identifiers Type: Refactor/Clean-up | # Remediate legacy `openlibrary` keys
As of 2019-07-01, there are [19,280 of these items](https://archive.org/search.php?query=openlibrary%3A%2A%20AND%20%21openlibrary_edition%3A%2A) on Archive.org which have `openlibrary` metadata keys and **no** `openlibrary_edition` or `openlibrary_work` keys. For these items we need to use the `openlibrary` key to lookup the Open Library items and use their corresponding `ocaid` keys to write back the accurate `openlibrary_edition` or `openlibrary_work` keys to Archive.org (and then remove the legacy `openlibrary` key on the Archive.org item). Additionally, there are [396,107 Archive.org items](https://archive.org/search.php?query=openlibrary%3A%2A%20AND%20openlibrary_edition%3A%2A) which have `openlibrary` keys **and** `openlibrary_edition` keys. For these, we just need to remove the `openlibrary` keys and keep the `openlibrary_*` keys.
# Historical
The data in this section is out of date (first from 2018-08):
There are 158,285 (admin) & 39,187 (incognito) archive.org items which have a field called `openlibrary` (legacy) and don't have an `openlibrary_edition` field (which is how we map archive.org items to their corresponding openlibrary editions). When @hornc checked these 39k archive.org IDs in Open Library, we determined that ~15k of these corresponding Open Library items did *not* have `ocaid`s linking them back to archive.org.
These results can be reproduced using this corresponding query:
https://archive.org/search.php?query=openlibrary%3A%2A%20AND%20%21openlibrary_edition%3A%2A
## Solution
We need to loop over these ~39k archive.org items which have `openlibrary` fields (and no `openlibrary_edition`) and check whether the corresponding openlibrary edition has an `ocaid`. We suspect from previously doing this that there are ~15k of these. We will then update the openlibrary editions by adding/updating the `ocaid`, performing a dummy-edit in the case where the edition is orphan (in order to create a work), and then writing-back these values to archive.org such that the archive.org item has the correct `openlibrary_edition` and `openlibrary_work`.
## Follow-up
@hornc, can you please link us to that list of OLIDs which need to be updated? | 1.0 | Switch Archive.org items to use `openlibrary_edition` instead of `openlibrary` keys - # Remediate legacy `openlibrary` keys
As of 2019-07-01, there are [19,280 of these items](https://archive.org/search.php?query=openlibrary%3A%2A%20AND%20%21openlibrary_edition%3A%2A) on Archive.org which have `openlibrary` metadata keys and **no** `openlibrary_edition` or `openlibrary_work` keys. For these items we need to use the `openlibrary` key to lookup the Open Library items and use their corresponding `ocaid` keys to write back the accurate `openlibrary_edition` or `openlibrary_work` keys to Archive.org (and then remove the legacy `openlibrary` key on the Archive.org item). Additionally, there are [396,107 Archive.org items](https://archive.org/search.php?query=openlibrary%3A%2A%20AND%20openlibrary_edition%3A%2A) which have `openlibrary` keys **and** `openlibrary_edition` keys. For these, we just need to remove the `openlibrary` keys and keep the `openlibrary_*` keys.
# Historical
The data in this section is out of date (first from 2018-08):
There are 158,285 (admin) & 39,187 (incognito) archive.org items which have a field called `openlibrary` (legacy) and don't have an `openlibrary_edition` field (which is how we map archive.org items to their corresponding openlibrary editions). When @hornc checked these 39k archive.org IDs in Open Library, we determined that ~15k of these corresponding Open Library items did *not* have `ocaid`s linking them back to archive.org.
These results can be reproduced using this corresponding query:
https://archive.org/search.php?query=openlibrary%3A%2A%20AND%20%21openlibrary_edition%3A%2A
## Solution
We need to loop over these ~39k archive.org items which have `openlibrary` fields (and no `openlibrary_edition`) and check whether the corresponding openlibrary edition has an `ocaid`. We suspect from previously doing this that there are ~15k of these. We will then update the openlibrary editions by adding/updating the `ocaid`, performing a dummy-edit in the case where the edition is orphan (in order to create a work), and then writing-back these values to archive.org such that the archive.org item has the correct `openlibrary_edition` and `openlibrary_work`.
## Follow-up
@hornc, can you please link us to that list of OLIDs which need to be updated? | priority | switch archive org items to use openlibrary edition instead of openlibrary keys remediate legacy openlibrary keys as of there are on archive org which have openlibrary metadata keys and no openlibrary edition or openlibrary work keys for these items we need to use the openlibrary key to lookup the open library items and use their corresponding ocaid keys to write back the accurate openlibrary edition or openlibrary work keys to archive org and then remove the legacy openlibrary key on the archive org item additionally there are which have openlibrary keys and openlibrary edition keys for these we just need to remove the openlibrary keys and keep the openlibrary keys historical the data in this section is out of date first from there are admin incognito archive org items which have a field called openlibrary legacy and don t have an openlibrary edition field which is how we map archive org items to their corresponding openlibrary editions when hornc checked these archive org ids in open library we determined that of these corresponding open library items did not have ocaid s linking them back to archive org these results can be reproduced using this corresponding query solution we need to loop over these archive org items which have openlibrary fields and no openlibrary edition and check whether the corresponding openlibrary edition has an ocaid we suspect from previously doing this that there are of these we will then update the openlibrary editions by adding updating the ocaid performing a dummy edit in the case where the edition is orphan in order to create a work and then writing back these values to archive org such that the archive org item has the correct openlibrary edition and openlibrary work follow up hornc can you please link us to that list of olids which need to be updated | 1 |
85,038 | 15,729,273,271 | IssuesEvent | 2021-03-29 14:41:17 | TIBCOSoftware/TCSTK-Cloud-CLI | https://api.github.com/repos/TIBCOSoftware/TCSTK-Cloud-CLI | closed | CVE-2020-28500 (Medium) detected in lodash-4.17.20.tgz | security vulnerability | ## CVE-2020-28500 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.20.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.20.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.20.tgz</a></p>
<p>Path to dependency file: TCSTK-Cloud-CLI/package.json</p>
<p>Path to vulnerable library: TCSTK-Cloud-CLI/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- :x: **lodash-4.17.20.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/TIBCOSoftware/TCSTK-Cloud-CLI/commit/cdfb2672c3987316b9ff74d298186635cef3a749">cdfb2672c3987316b9ff74d298186635cef3a749</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
All versions of package lodash; all versions of package org.fujion.webjars:lodash are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Steps to reproduce (provided by reporter Liyuan Chen): var lo = require('lodash'); function build_blank (n) { var ret = "1" for (var i = 0; i < n; i++) { ret += " " } return ret + "1"; } var s = build_blank(50000) var time0 = Date.now(); lo.trim(s) var time_cost0 = Date.now() - time0; console.log("time_cost0: " + time_cost0) var time1 = Date.now(); lo.toNumber(s) var time_cost1 = Date.now() - time1; console.log("time_cost1: " + time_cost1) var time2 = Date.now(); lo.trimEnd(s) var time_cost2 = Date.now() - time2; console.log("time_cost2: " + time_cost2)
<p>Publish Date: 2021-02-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500>CVE-2020-28500</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"lodash","packageVersion":"4.17.20","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"lodash:4.17.20","isMinimumFixVersionAvailable":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28500","vulnerabilityDetails":"All versions of package lodash; all versions of package org.fujion.webjars:lodash are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Steps to reproduce (provided by reporter Liyuan Chen): var lo \u003d require(\u0027lodash\u0027); function build_blank (n) { var ret \u003d \"1\" for (var i \u003d 0; i \u003c n; i++) { ret +\u003d \" \" } return ret + \"1\"; } var s \u003d build_blank(50000) var time0 \u003d Date.now(); lo.trim(s) var time_cost0 \u003d Date.now() - time0; console.log(\"time_cost0: \" + time_cost0) var time1 \u003d Date.now(); lo.toNumber(s) var time_cost1 \u003d Date.now() - time1; console.log(\"time_cost1: \" + time_cost1) var time2 \u003d Date.now(); lo.trimEnd(s) var time_cost2 \u003d Date.now() - time2; console.log(\"time_cost2: \" + time_cost2)","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-28500 (Medium) detected in lodash-4.17.20.tgz - ## CVE-2020-28500 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.20.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.20.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.20.tgz</a></p>
<p>Path to dependency file: TCSTK-Cloud-CLI/package.json</p>
<p>Path to vulnerable library: TCSTK-Cloud-CLI/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- :x: **lodash-4.17.20.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/TIBCOSoftware/TCSTK-Cloud-CLI/commit/cdfb2672c3987316b9ff74d298186635cef3a749">cdfb2672c3987316b9ff74d298186635cef3a749</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
All versions of package lodash; all versions of package org.fujion.webjars:lodash are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Steps to reproduce (provided by reporter Liyuan Chen): var lo = require('lodash'); function build_blank (n) { var ret = "1" for (var i = 0; i < n; i++) { ret += " " } return ret + "1"; } var s = build_blank(50000) var time0 = Date.now(); lo.trim(s) var time_cost0 = Date.now() - time0; console.log("time_cost0: " + time_cost0) var time1 = Date.now(); lo.toNumber(s) var time_cost1 = Date.now() - time1; console.log("time_cost1: " + time_cost1) var time2 = Date.now(); lo.trimEnd(s) var time_cost2 = Date.now() - time2; console.log("time_cost2: " + time_cost2)
<p>Publish Date: 2021-02-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500>CVE-2020-28500</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"lodash","packageVersion":"4.17.20","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"lodash:4.17.20","isMinimumFixVersionAvailable":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28500","vulnerabilityDetails":"All versions of package lodash; all versions of package org.fujion.webjars:lodash are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Steps to reproduce (provided by reporter Liyuan Chen): var lo \u003d require(\u0027lodash\u0027); function build_blank (n) { var ret \u003d \"1\" for (var i \u003d 0; i \u003c n; i++) { ret +\u003d \" \" } return ret + \"1\"; } var s \u003d build_blank(50000) var time0 \u003d Date.now(); lo.trim(s) var time_cost0 \u003d Date.now() - time0; console.log(\"time_cost0: \" + time_cost0) var time1 \u003d Date.now(); lo.toNumber(s) var time_cost1 \u003d Date.now() - time1; console.log(\"time_cost1: \" + time_cost1) var time2 \u003d Date.now(); lo.trimEnd(s) var time_cost2 \u003d Date.now() - time2; console.log(\"time_cost2: \" + time_cost2)","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in lodash tgz cve medium severity vulnerability vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file tcstk cloud cli package json path to vulnerable library tcstk cloud cli node modules lodash package json dependency hierarchy x lodash tgz vulnerable library found in head commit a href found in base branch master vulnerability details all versions of package lodash all versions of package org fujion webjars lodash are vulnerable to regular expression denial of service redos via the tonumber trim and trimend functions steps to reproduce provided by reporter liyuan chen var lo require lodash function build blank n var ret for var i i n i ret return ret var s build blank var date now lo trim s var time date now console log time time var date now lo tonumber s var time date now console log time time var date now lo trimend s var time date now console log time time publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree lodash isminimumfixversionavailable false basebranches vulnerabilityidentifier cve vulnerabilitydetails all versions of package lodash all versions of package org fujion webjars lodash are vulnerable to regular expression denial of service redos via the tonumber trim and trimend functions steps to reproduce provided by reporter liyuan chen var lo require function build blank n var ret for var i i n i ret return ret var s build blank var date now lo trim s var time date now console log time time var date now lo tonumber s var time date now console log time time var date now lo trimend s var time date now console log time time vulnerabilityurl | 0 |
175,862 | 21,337,646,598 | IssuesEvent | 2022-04-18 16:24:29 | jyom-wss-test/WebGoat | https://api.github.com/repos/jyom-wss-test/WebGoat | opened | jquery-ui-1.12.1.min.js: 3 vulnerabilities (highest severity is: 6.1) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-ui-1.12.1.min.js</b></p></summary>
<p>A curated set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js">https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js</a></p>
<p>Path to vulnerable library: /src/main/resources/webgoat/static/js/libs/jquery-ui.min.js</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/jyom-wss-test/WebGoat/commit/70b60dc14a34b16ed9aa3b739cb5fda1351397f0">70b60dc14a34b16ed9aa3b739cb5fda1351397f0</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2021-41184](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41184) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-ui-1.12.1.min.js | Direct | jquery-ui - 1.13.0 | ❌ |
| [CVE-2021-41183](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41183) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-ui-1.12.1.min.js | Direct | jquery-ui - 1.13.0 | ❌ |
| [CVE-2021-41182](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41182) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-ui-1.12.1.min.js | Direct | jquery-ui - 1.13.0 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-41184</summary>
### Vulnerable Library - <b>jquery-ui-1.12.1.min.js</b></p>
<p>A curated set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js">https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js</a></p>
<p>Path to vulnerable library: /src/main/resources/webgoat/static/js/libs/jquery-ui.min.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-ui-1.12.1.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jyom-wss-test/WebGoat/commit/70b60dc14a34b16ed9aa3b739cb5fda1351397f0">70b60dc14a34b16ed9aa3b739cb5fda1351397f0</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.
<p>Publish Date: 2021-10-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41184>CVE-2021-41184</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41184">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41184</a></p>
<p>Release Date: 2021-10-26</p>
<p>Fix Resolution: jquery-ui - 1.13.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-41183</summary>
### Vulnerable Library - <b>jquery-ui-1.12.1.min.js</b></p>
<p>A curated set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js">https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js</a></p>
<p>Path to vulnerable library: /src/main/resources/webgoat/static/js/libs/jquery-ui.min.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-ui-1.12.1.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jyom-wss-test/WebGoat/commit/70b60dc14a34b16ed9aa3b739cb5fda1351397f0">70b60dc14a34b16ed9aa3b739cb5fda1351397f0</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources.
<p>Publish Date: 2021-10-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41183>CVE-2021-41183</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41183">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41183</a></p>
<p>Release Date: 2021-10-26</p>
<p>Fix Resolution: jquery-ui - 1.13.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-41182</summary>
### Vulnerable Library - <b>jquery-ui-1.12.1.min.js</b></p>
<p>A curated set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js">https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js</a></p>
<p>Path to vulnerable library: /src/main/resources/webgoat/static/js/libs/jquery-ui.min.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-ui-1.12.1.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jyom-wss-test/WebGoat/commit/70b60dc14a34b16ed9aa3b739cb5fda1351397f0">70b60dc14a34b16ed9aa3b739cb5fda1351397f0</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.
<p>Publish Date: 2021-10-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41182>CVE-2021-41182</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41182">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41182</a></p>
<p>Release Date: 2021-10-26</p>
<p>Fix Resolution: jquery-ui - 1.13.0</p>
</p>
<p></p>
</details>
<!-- <REMEDIATE>[{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jqueryui","packageVersion":"1.12.1","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jqueryui:1.12.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery-ui - 1.13.0","isBinary":true}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-41184","vulnerabilityDetails":"jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41184","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jqueryui","packageVersion":"1.12.1","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jqueryui:1.12.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery-ui - 1.13.0","isBinary":true}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-41183","vulnerabilityDetails":"jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41183","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jqueryui","packageVersion":"1.12.1","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jqueryui:1.12.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery-ui - 1.13.0","isBinary":true}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-41182","vulnerabilityDetails":"jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41182","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}]</REMEDIATE> --> | True | jquery-ui-1.12.1.min.js: 3 vulnerabilities (highest severity is: 6.1) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-ui-1.12.1.min.js</b></p></summary>
<p>A curated set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js">https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js</a></p>
<p>Path to vulnerable library: /src/main/resources/webgoat/static/js/libs/jquery-ui.min.js</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/jyom-wss-test/WebGoat/commit/70b60dc14a34b16ed9aa3b739cb5fda1351397f0">70b60dc14a34b16ed9aa3b739cb5fda1351397f0</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2021-41184](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41184) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-ui-1.12.1.min.js | Direct | jquery-ui - 1.13.0 | ❌ |
| [CVE-2021-41183](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41183) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-ui-1.12.1.min.js | Direct | jquery-ui - 1.13.0 | ❌ |
| [CVE-2021-41182](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41182) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-ui-1.12.1.min.js | Direct | jquery-ui - 1.13.0 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-41184</summary>
### Vulnerable Library - <b>jquery-ui-1.12.1.min.js</b></p>
<p>A curated set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js">https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js</a></p>
<p>Path to vulnerable library: /src/main/resources/webgoat/static/js/libs/jquery-ui.min.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-ui-1.12.1.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jyom-wss-test/WebGoat/commit/70b60dc14a34b16ed9aa3b739cb5fda1351397f0">70b60dc14a34b16ed9aa3b739cb5fda1351397f0</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.
<p>Publish Date: 2021-10-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41184>CVE-2021-41184</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41184">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41184</a></p>
<p>Release Date: 2021-10-26</p>
<p>Fix Resolution: jquery-ui - 1.13.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-41183</summary>
### Vulnerable Library - <b>jquery-ui-1.12.1.min.js</b></p>
<p>A curated set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js">https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js</a></p>
<p>Path to vulnerable library: /src/main/resources/webgoat/static/js/libs/jquery-ui.min.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-ui-1.12.1.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jyom-wss-test/WebGoat/commit/70b60dc14a34b16ed9aa3b739cb5fda1351397f0">70b60dc14a34b16ed9aa3b739cb5fda1351397f0</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources.
<p>Publish Date: 2021-10-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41183>CVE-2021-41183</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41183">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41183</a></p>
<p>Release Date: 2021-10-26</p>
<p>Fix Resolution: jquery-ui - 1.13.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-41182</summary>
### Vulnerable Library - <b>jquery-ui-1.12.1.min.js</b></p>
<p>A curated set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js">https://cdnjs.cloudflare.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js</a></p>
<p>Path to vulnerable library: /src/main/resources/webgoat/static/js/libs/jquery-ui.min.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-ui-1.12.1.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jyom-wss-test/WebGoat/commit/70b60dc14a34b16ed9aa3b739cb5fda1351397f0">70b60dc14a34b16ed9aa3b739cb5fda1351397f0</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.
<p>Publish Date: 2021-10-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41182>CVE-2021-41182</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41182">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41182</a></p>
<p>Release Date: 2021-10-26</p>
<p>Fix Resolution: jquery-ui - 1.13.0</p>
</p>
<p></p>
</details>
<!-- <REMEDIATE>[{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jqueryui","packageVersion":"1.12.1","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jqueryui:1.12.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery-ui - 1.13.0","isBinary":true}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-41184","vulnerabilityDetails":"jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41184","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jqueryui","packageVersion":"1.12.1","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jqueryui:1.12.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery-ui - 1.13.0","isBinary":true}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-41183","vulnerabilityDetails":"jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41183","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jqueryui","packageVersion":"1.12.1","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jqueryui:1.12.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery-ui - 1.13.0","isBinary":true}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-41182","vulnerabilityDetails":"jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41182","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}]</REMEDIATE> --> | non_priority | jquery ui min js vulnerabilities highest severity is vulnerable library jquery ui min js a curated set of user interface interactions effects widgets and themes built on top of the jquery javascript library library home page a href path to vulnerable library src main resources webgoat static js libs jquery ui min js found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available medium jquery ui min js direct jquery ui medium jquery ui min js direct jquery ui medium jquery ui min js direct jquery ui details cve vulnerable library jquery ui min js a curated set of user interface interactions effects widgets and themes built on top of the jquery javascript library library home page a href path to vulnerable library src main resources webgoat static js libs jquery ui min js dependency hierarchy x jquery ui min js vulnerable library found in head commit a href found in base branch develop vulnerability details jquery ui is the official jquery user interface library prior to version accepting the value of the of option of the position util from untrusted sources may execute untrusted code the issue is fixed in jquery ui any string value passed to the of option is now treated as a css selector a workaround is to not accept the value of the of option from untrusted sources publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery ui cve vulnerable library jquery ui min js a curated set of user interface interactions effects widgets and themes built on top of the jquery javascript library library home page a href path to vulnerable library src main resources webgoat static js libs jquery ui min js dependency hierarchy x jquery ui min js vulnerable library found in head commit a href found in base branch develop vulnerability details jquery ui is the official jquery user interface library prior to version accepting the value of various text options of the datepicker widget from untrusted sources may execute untrusted code the issue is fixed in jquery ui the values passed to various text options are now always treated as pure text not html a workaround is to not accept the value of the text options from untrusted sources publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery ui cve vulnerable library jquery ui min js a curated set of user interface interactions effects widgets and themes built on top of the jquery javascript library library home page a href path to vulnerable library src main resources webgoat static js libs jquery ui min js dependency hierarchy x jquery ui min js vulnerable library found in head commit a href found in base branch develop vulnerability details jquery ui is the official jquery user interface library prior to version accepting the value of the altfield option of the datepicker widget from untrusted sources may execute untrusted code the issue is fixed in jquery ui any string value passed to the altfield option is now treated as a css selector a workaround is to not accept the value of the altfield option from untrusted sources publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery ui istransitivedependency false dependencytree jqueryui isminimumfixversionavailable true minimumfixversion jquery ui isbinary true basebranches vulnerabilityidentifier cve vulnerabilitydetails jquery ui is the official jquery user interface library prior to version accepting the value of the of option of the position util from untrusted sources may execute untrusted code the issue is fixed in jquery ui any string value passed to the of option is now treated as a css selector a workaround is to not accept the value of the of option from untrusted sources vulnerabilityurl istransitivedependency false dependencytree jqueryui isminimumfixversionavailable true minimumfixversion jquery ui isbinary true basebranches vulnerabilityidentifier cve vulnerabilitydetails jquery ui is the official jquery user interface library prior to version accepting the value of various text options of the datepicker widget from untrusted sources may execute untrusted code the issue is fixed in jquery ui the values passed to various text options are now always treated as pure text not html a workaround is to not accept the value of the text options from untrusted sources vulnerabilityurl istransitivedependency false dependencytree jqueryui isminimumfixversionavailable true minimumfixversion jquery ui isbinary true basebranches vulnerabilityidentifier cve vulnerabilitydetails jquery ui is the official jquery user interface library prior to version accepting the value of the altfield option of the datepicker widget from untrusted sources may execute untrusted code the issue is fixed in jquery ui any string value passed to the altfield option is now treated as a css selector a workaround is to not accept the value of the altfield option from untrusted sources vulnerabilityurl | 0 |
174,585 | 6,541,345,175 | IssuesEvent | 2017-09-01 19:29:11 | Ecotrust/hnfp | https://api.github.com/repos/Ecotrust/hnfp | closed | Incident reports | priority | A steward can report incidents(*e.g.*, a road closure)
- [x] add form
- [x] add inputs
*inputs fields to be collected for incident report**:
- [x] location based on entry or gps
- [ ] photos (optional)
- [x] Incident type
- [x] details
- [x] upload report
- [ ] success/failure confirmation to steward
- [ ] notify land manager
- [ ] notify steward once read by land manager
- [ ] add response form for land manager resonse
- [ ] notify steward of response
- [ ] add land manager verification button
- [ ] change report status to Alert, if needed
- [ ] change report status to verified, else land manager adds why
- [ ] make viewable on map
- [ ] enable comments for report
| 1.0 | Incident reports - A steward can report incidents(*e.g.*, a road closure)
- [x] add form
- [x] add inputs
*inputs fields to be collected for incident report**:
- [x] location based on entry or gps
- [ ] photos (optional)
- [x] Incident type
- [x] details
- [x] upload report
- [ ] success/failure confirmation to steward
- [ ] notify land manager
- [ ] notify steward once read by land manager
- [ ] add response form for land manager resonse
- [ ] notify steward of response
- [ ] add land manager verification button
- [ ] change report status to Alert, if needed
- [ ] change report status to verified, else land manager adds why
- [ ] make viewable on map
- [ ] enable comments for report
| priority | incident reports a steward can report incidents e g a road closure add form add inputs inputs fields to be collected for incident report location based on entry or gps photos optional incident type details upload report success failure confirmation to steward notify land manager notify steward once read by land manager add response form for land manager resonse notify steward of response add land manager verification button change report status to alert if needed change report status to verified else land manager adds why make viewable on map enable comments for report | 1 |
443,001 | 30,869,913,610 | IssuesEvent | 2023-08-03 10:34:20 | StyraInc/regal | https://api.github.com/repos/StyraInc/regal | opened | Add community section to the footer of each rule doc | documentation good first issue | In order to provide users an easy way to reach out if they have issues with a rule or its docs, would like to tweak it, or have something added, it would be a nice touch if we added a community section footer to each rule doc, i.e. those found in `docs/rules`.
A footer like that already exists in the README, so we could just modify that slightly.
> Community
> If you've found a problem with this rule or its documentation, would like to suggest improvements, new rules, or just talk about Regal in general, please join the `#regal` channel in the Styra communit [Slack](https://communityinviter.com/apps/styracommunity/signup)!
| 1.0 | Add community section to the footer of each rule doc - In order to provide users an easy way to reach out if they have issues with a rule or its docs, would like to tweak it, or have something added, it would be a nice touch if we added a community section footer to each rule doc, i.e. those found in `docs/rules`.
A footer like that already exists in the README, so we could just modify that slightly.
> Community
> If you've found a problem with this rule or its documentation, would like to suggest improvements, new rules, or just talk about Regal in general, please join the `#regal` channel in the Styra communit [Slack](https://communityinviter.com/apps/styracommunity/signup)!
| non_priority | add community section to the footer of each rule doc in order to provide users an easy way to reach out if they have issues with a rule or its docs would like to tweak it or have something added it would be a nice touch if we added a community section footer to each rule doc i e those found in docs rules a footer like that already exists in the readme so we could just modify that slightly community if you ve found a problem with this rule or its documentation would like to suggest improvements new rules or just talk about regal in general please join the regal channel in the styra communit | 0 |
58,127 | 3,087,817,953 | IssuesEvent | 2015-08-25 13:55:19 | pavel-pimenov/flylinkdc-r5xx | https://api.github.com/repos/pavel-pimenov/flylinkdc-r5xx | closed | Неверное отображение кумулятивной статистики приянтого/отданного по команде /stats | bug imported Priority-Medium | _From [mike.kor...@gmail.com](https://code.google.com/u/101495626515388303633/) on October 28, 2013 00:37:39_
1. На протяжении многих бета версий ( r502 ) видел нулевую статистику отданного/принятого:
-=[ Total download: 0 Б. Total upload: 0 Б ]=-
2. Однако если выдать в чат команду /r , то статистика пишется правильная.
3. После этой команды /r по команде /stats тоже начинают выводиться правильные данные.
**Attachment:** [Fly_r15808_statistics.png](http://code.google.com/p/flylinkdc/issues/detail?id=1363)
_Original issue: http://code.google.com/p/flylinkdc/issues/detail?id=1363_ | 1.0 | Неверное отображение кумулятивной статистики приянтого/отданного по команде /stats - _From [mike.kor...@gmail.com](https://code.google.com/u/101495626515388303633/) on October 28, 2013 00:37:39_
1. На протяжении многих бета версий ( r502 ) видел нулевую статистику отданного/принятого:
-=[ Total download: 0 Б. Total upload: 0 Б ]=-
2. Однако если выдать в чат команду /r , то статистика пишется правильная.
3. После этой команды /r по команде /stats тоже начинают выводиться правильные данные.
**Attachment:** [Fly_r15808_statistics.png](http://code.google.com/p/flylinkdc/issues/detail?id=1363)
_Original issue: http://code.google.com/p/flylinkdc/issues/detail?id=1363_ | priority | неверное отображение кумулятивной статистики приянтого отданного по команде stats from on october на протяжении многих бета версий видел нулевую статистику отданного принятого однако если выдать в чат команду r то статистика пишется правильная после этой команды r по команде stats тоже начинают выводиться правильные данные attachment original issue | 1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.