Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
1k
labels
stringlengths
4
1.38k
body
stringlengths
1
262k
index
stringclasses
16 values
text_combine
stringlengths
96
262k
label
stringclasses
2 values
text
stringlengths
96
252k
binary_label
int64
0
1
646,709
21,057,394,501
IssuesEvent
2022-04-01 05:46:35
turbot/steampipe-plugin-oci
https://api.github.com/repos/turbot/steampipe-plugin-oci
closed
Add table oci_resourcemanager_stack
enhancement new table priority:medium
**References** Add any related links that will help us understand the resource, including vendor documentation, related GitHub issues, and Go SDK documentation. Reference https://registry.terraform.io/providers/oracle/oci/latest/docs/data-sources/resourcemanager_stacks
1.0
Add table oci_resourcemanager_stack - **References** Add any related links that will help us understand the resource, including vendor documentation, related GitHub issues, and Go SDK documentation. Reference https://registry.terraform.io/providers/oracle/oci/latest/docs/data-sources/resourcemanager_stacks
priority
add table oci resourcemanager stack references add any related links that will help us understand the resource including vendor documentation related github issues and go sdk documentation reference
1
759,545
26,600,631,652
IssuesEvent
2023-01-23 15:31:53
kir-dev/konzisite-api
https://api.github.com/repos/kir-dev/konzisite-api
closed
Only return consultations where the user is member of the targetGroups
high priority
In `GET /consultations/` - If the user isn't signed in, only return the consultations where there's no target groups - Otherwise also return the consultations where the user is member of at least one of the target groups In `GET /consultations/:id` - return with 403 if the user is not in any of the target groups
1.0
Only return consultations where the user is member of the targetGroups - In `GET /consultations/` - If the user isn't signed in, only return the consultations where there's no target groups - Otherwise also return the consultations where the user is member of at least one of the target groups In `GET /consultations/:id` - return with 403 if the user is not in any of the target groups
priority
only return consultations where the user is member of the targetgroups in get consultations if the user isn t signed in only return the consultations where there s no target groups otherwise also return the consultations where the user is member of at least one of the target groups in get consultations id return with if the user is not in any of the target groups
1
59,326
3,105,473,842
IssuesEvent
2015-08-31 21:06:11
UniVR/GolfVR
https://api.github.com/repos/UniVR/GolfVR
opened
Explain rules introduction
priority:low type:idea
Explain the rules before the game begin _Watch the ball to shoot (the time the ball is watched will define the power) _... (to be defined)
1.0
Explain rules introduction - Explain the rules before the game begin _Watch the ball to shoot (the time the ball is watched will define the power) _... (to be defined)
priority
explain rules introduction explain the rules before the game begin watch the ball to shoot the time the ball is watched will define the power to be defined
1
72,321
9,567,087,357
IssuesEvent
2019-05-06 01:39:48
CompileIO/compile.io
https://api.github.com/repos/CompileIO/compile.io
closed
Project Documentation Review
documentation
# Description of Issue As a stakeholder, I'd like to have a well documented project so that if this project went open-source, developers would have little to no trouble with the on-boarding process. # Acceptance Criteria - [x] Review Code and address areas lacking/needing Documentation - [ ] Address additional Documentation concerns that may not be directly code-related (how to set-up environment, required software download instructions, design philosophy, etc.)
1.0
Project Documentation Review - # Description of Issue As a stakeholder, I'd like to have a well documented project so that if this project went open-source, developers would have little to no trouble with the on-boarding process. # Acceptance Criteria - [x] Review Code and address areas lacking/needing Documentation - [ ] Address additional Documentation concerns that may not be directly code-related (how to set-up environment, required software download instructions, design philosophy, etc.)
non_priority
project documentation review description of issue as a stakeholder i d like to have a well documented project so that if this project went open source developers would have little to no trouble with the on boarding process acceptance criteria review code and address areas lacking needing documentation address additional documentation concerns that may not be directly code related how to set up environment required software download instructions design philosophy etc
0
178,958
14,686,013,198
IssuesEvent
2021-01-01 12:40:21
corona-warn-app/cwa-website
https://api.github.com/repos/corona-warn-app/cwa-website
closed
ENA.ExposureNotificationError-Fehler2
documentation
<!-- Thanks for reporting an issue on the website 🙌 ❤️ Before opening a new issue, please make sure that we do not have any duplicates already open. You can ensure this by searching the issue list for this repository. If there is a duplicate, please close your issue and add a comment to the existing issue instead. --> ## Where to find the issue <!-- Be as specific as possible by naming the URL path, page, and ideally paragraph. --> ## Describe the issue <!-- Please let us know what exactly is the issue with that part of the website --> ## Suggested change <!-- If you have ideas on how to fix this issue, please note them here, or consider creating a Pull Request --> https://github.com/corona-warn-app/cwa-app-ios/issues/1453 Sporadic occurrences of error notification - "ENA.ExposureNotificationError-Fehler2" - can be solved with work-around https://www.coronawarn.app/de/faq/#ios_black_screen - add error message to title
1.0
ENA.ExposureNotificationError-Fehler2 - <!-- Thanks for reporting an issue on the website 🙌 ❤️ Before opening a new issue, please make sure that we do not have any duplicates already open. You can ensure this by searching the issue list for this repository. If there is a duplicate, please close your issue and add a comment to the existing issue instead. --> ## Where to find the issue <!-- Be as specific as possible by naming the URL path, page, and ideally paragraph. --> ## Describe the issue <!-- Please let us know what exactly is the issue with that part of the website --> ## Suggested change <!-- If you have ideas on how to fix this issue, please note them here, or consider creating a Pull Request --> https://github.com/corona-warn-app/cwa-app-ios/issues/1453 Sporadic occurrences of error notification - "ENA.ExposureNotificationError-Fehler2" - can be solved with work-around https://www.coronawarn.app/de/faq/#ios_black_screen - add error message to title
non_priority
ena exposurenotificationerror thanks for reporting an issue on the website 🙌 ❤️ before opening a new issue please make sure that we do not have any duplicates already open you can ensure this by searching the issue list for this repository if there is a duplicate please close your issue and add a comment to the existing issue instead where to find the issue describe the issue suggested change sporadic occurrences of error notification ena exposurenotificationerror can be solved with work around add error message to title
0
822,342
30,866,484,082
IssuesEvent
2023-08-03 08:25:03
telerik/kendo-react
https://api.github.com/repos/telerik/kendo-react
opened
[Editor] BackColor and ForeColor are not applied on table cells content if multiple cells are selected
bug pkg:editor Priority 1 SEV: High
If multiple cells/rows are selected in a table, applying changes to the BackColor and ForeColor fails in some scenarios. To observe the issue, open the following example: - https://stackblitz.com/edit/react-icvjor?file=app%2Fmain.jsx Cases that fail: - select with the mouse from row1cell1 to row2cell2 and changing the ForeColor or the BackColor - select with the mouse from row1cell2 to row3cell3 and changing the ForeColor or the BackColor - selecting all cells and changing the ForeColor or the BackColor
1.0
[Editor] BackColor and ForeColor are not applied on table cells content if multiple cells are selected - If multiple cells/rows are selected in a table, applying changes to the BackColor and ForeColor fails in some scenarios. To observe the issue, open the following example: - https://stackblitz.com/edit/react-icvjor?file=app%2Fmain.jsx Cases that fail: - select with the mouse from row1cell1 to row2cell2 and changing the ForeColor or the BackColor - select with the mouse from row1cell2 to row3cell3 and changing the ForeColor or the BackColor - selecting all cells and changing the ForeColor or the BackColor
priority
backcolor and forecolor are not applied on table cells content if multiple cells are selected if multiple cells rows are selected in a table applying changes to the backcolor and forecolor fails in some scenarios to observe the issue open the following example cases that fail select with the mouse from to and changing the forecolor or the backcolor select with the mouse from to and changing the forecolor or the backcolor selecting all cells and changing the forecolor or the backcolor
1
27,684
13,349,348,104
IssuesEvent
2020-08-30 00:11:18
aws/aws-sdk-go
https://api.github.com/repos/aws/aws-sdk-go
closed
Presign performance. Can it it be improved?
performance
We are seeing heavy degrading of our services that generate payload with a significant number of presigned urls in. The effect is dramatic, on Heroku standard 1x machine the performence is a factor 20 lower and a profile pprof shows ~75% of cpu time goes into prsign related work (1/3 of which is some sort of rest xml protocol). ### Version of AWS SDK for Go? Latest as given by `dep ensure -update`. ### Version of Go (`go version`)? go version go1.9.2 linux/amd64 ### What issue did you see? Performance of presign is low. ### Steps to reproduce Create 1 session and 1 s3 object and generate presigned urls of at least 300-400 chars. Compare with not presigning at all. If you have have an runnable example, please include it. I am sorry, it is part of a service.
True
Presign performance. Can it it be improved? - We are seeing heavy degrading of our services that generate payload with a significant number of presigned urls in. The effect is dramatic, on Heroku standard 1x machine the performence is a factor 20 lower and a profile pprof shows ~75% of cpu time goes into prsign related work (1/3 of which is some sort of rest xml protocol). ### Version of AWS SDK for Go? Latest as given by `dep ensure -update`. ### Version of Go (`go version`)? go version go1.9.2 linux/amd64 ### What issue did you see? Performance of presign is low. ### Steps to reproduce Create 1 session and 1 s3 object and generate presigned urls of at least 300-400 chars. Compare with not presigning at all. If you have have an runnable example, please include it. I am sorry, it is part of a service.
non_priority
presign performance can it it be improved we are seeing heavy degrading of our services that generate payload with a significant number of presigned urls in the effect is dramatic on heroku standard machine the performence is a factor lower and a profile pprof shows of cpu time goes into prsign related work of which is some sort of rest xml protocol version of aws sdk for go latest as given by dep ensure update version of go go version go version linux what issue did you see performance of presign is low steps to reproduce create session and object and generate presigned urls of at least chars compare with not presigning at all if you have have an runnable example please include it i am sorry it is part of a service
0
201,682
15,217,765,806
IssuesEvent
2021-02-17 16:59:32
brave/brave-browser
https://api.github.com/repos/brave/brave-browser
closed
Brave nightly build `Bravearm 1.22.30.apk` is crashing
OS/Android QA/Test-Plan-Specified QA/Yes crash regression
<!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue. PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE. INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED--> ## Description <!-- Provide a brief description of the issue --> Brave nightly build `Bravearm 1.22.30.apk` is crashing ## Steps to reproduce <!-- Please add a series of steps to reproduce the issue --> 1. Install `Bravearm.apk` - 1.22.30 2. Launch brave 3. Brave is crashing ## Actual result <!-- Please add screenshots if needed --> Brave crash ## Expected result should not be any crash ## Issue reproduces how often <!-- [Easily reproduced/Intermittent issue/No steps to reproduce] --> Always ## Version/Channel Information: <!--Does this issue happen on any other channels? Or is it specific to a certain channel?--> - Can you reproduce this issue with the current Play Store version? No - Can you reproduce this issue with the current Play Store Beta version? No - Can you reproduce this issue with the current Play Store Nightly version? No ## Device details - Install type (ARM, x86): ARM - Device type (Phone, Tablet, Phablet): Samsung Galaxy J3 - Android version: 5.1.1 ## Brave version 1.22.30 ### Website problems only - Does the issue resolve itself when disabling Brave Shields? na - Does the issue resolve itself when disabling Brave Rewards?na - Is the issue reproducible on the latest version of Chrome? na ### Additional information <!-- Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue --> cc: @brave/legacy_qa @SergeyZhukovsky @samartnik @deeppandya @anthonypkeane
1.0
Brave nightly build `Bravearm 1.22.30.apk` is crashing - <!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue. PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE. INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED--> ## Description <!-- Provide a brief description of the issue --> Brave nightly build `Bravearm 1.22.30.apk` is crashing ## Steps to reproduce <!-- Please add a series of steps to reproduce the issue --> 1. Install `Bravearm.apk` - 1.22.30 2. Launch brave 3. Brave is crashing ## Actual result <!-- Please add screenshots if needed --> Brave crash ## Expected result should not be any crash ## Issue reproduces how often <!-- [Easily reproduced/Intermittent issue/No steps to reproduce] --> Always ## Version/Channel Information: <!--Does this issue happen on any other channels? Or is it specific to a certain channel?--> - Can you reproduce this issue with the current Play Store version? No - Can you reproduce this issue with the current Play Store Beta version? No - Can you reproduce this issue with the current Play Store Nightly version? No ## Device details - Install type (ARM, x86): ARM - Device type (Phone, Tablet, Phablet): Samsung Galaxy J3 - Android version: 5.1.1 ## Brave version 1.22.30 ### Website problems only - Does the issue resolve itself when disabling Brave Shields? na - Does the issue resolve itself when disabling Brave Rewards?na - Is the issue reproducible on the latest version of Chrome? na ### Additional information <!-- Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue --> cc: @brave/legacy_qa @SergeyZhukovsky @samartnik @deeppandya @anthonypkeane
non_priority
brave nightly build bravearm apk is crashing have you searched for similar issues before submitting this issue please check the open issues and add a note before logging a new issue please use the template below to provide information about the issue insufficient info will get the issue closed it will only be reopened after sufficient info is provided description brave nightly build bravearm apk is crashing steps to reproduce install bravearm apk launch brave brave is crashing actual result brave crash expected result should not be any crash issue reproduces how often always version channel information can you reproduce this issue with the current play store version no can you reproduce this issue with the current play store beta version no can you reproduce this issue with the current play store nightly version no device details install type arm arm device type phone tablet phablet samsung galaxy android version brave version website problems only does the issue resolve itself when disabling brave shields na does the issue resolve itself when disabling brave rewards na is the issue reproducible on the latest version of chrome na additional information cc brave legacy qa sergeyzhukovsky samartnik deeppandya anthonypkeane
0
11,559
2,610,141,745
IssuesEvent
2015-02-26 18:44:40
chrsmith/hedgewars
https://api.github.com/repos/chrsmith/hedgewars
closed
Add [save as defaults] button to teams' key settings
auto-migrated Priority-Medium Type-Enhancement
``` Currently players can't use their preferred key settings as spectators or in quick single-player matches. This is especially a problem with special default keys (like the current chat history key) on different keyboard layouts. Making it possible to save the key settings of a preferred team would solve that problem. ``` ----- Original issue reported on code.google.com by `sheepyluva` on 10 Dec 2010 at 6:58 * Blocking: #192
1.0
Add [save as defaults] button to teams' key settings - ``` Currently players can't use their preferred key settings as spectators or in quick single-player matches. This is especially a problem with special default keys (like the current chat history key) on different keyboard layouts. Making it possible to save the key settings of a preferred team would solve that problem. ``` ----- Original issue reported on code.google.com by `sheepyluva` on 10 Dec 2010 at 6:58 * Blocking: #192
priority
add button to teams key settings currently players can t use their preferred key settings as spectators or in quick single player matches this is especially a problem with special default keys like the current chat history key on different keyboard layouts making it possible to save the key settings of a preferred team would solve that problem original issue reported on code google com by sheepyluva on dec at blocking
1
781,178
27,425,875,439
IssuesEvent
2023-03-01 20:14:57
DSpace/dspace-angular
https://api.github.com/repos/DSpace/dspace-angular
closed
[Deque Analysis] MyDSpace page's "serious" accessibility issues
bug accessibility component: MyDSpace medium priority Estimate TBD
> Serious: This issue results in serious barriers for people with disabilities, and will partially prevent them from accessing fundamental features or content. People relying on assistive technologies will experience significant frustration as a result. Issues falling under this category are major problems, and remediation should be a priority. ## Deque Analysis Summary Our MyDSpace page as a total of 5 serious accessibility issues (not including color contrast which are handled in other tickets). 1. (ID 470746) "Hover content disappearing." on the tooltip/hints that appear when you hover over the action buttons (e.g. hover over "View" shows "Select this option to view the Item's metadata"). They all appear to be related to `ngb-tooltip-window`) * RULE: When additional content is triggered on pointer hover or on keyboard focus, that additional content MUST be visually perceived and MUST be dismissible. * HOW TO FIX: Fix this issue by ensuring that content that appears on mouse hover or keyboard focus meets ALL of the following requirements: * _Dismissible:_ If the content obscures or replaces other content, it can be dismissed via keyboard without moving mouse hover or keyboard focus - such as by pressing the Escape key. * _Hoverable:_ If the content is triggered by mouse hover, the user can move the mouse pointer to the content without the content disappearing. * _Persistent:_ The content stays visible until mouse hover or keyboard focus is moved or it is dismissed by the user (see #1 above), or the information is no longer valid. * See also https://www.w3.org/WAI/WCAG21/Understanding/content-on-hover-or-focus 2. (ID 470748) "Non-decorative content is inserted using CSS pseudo-elements." on the two buttons ("Add" and "Import" icons) which appear to the right of the "Drag & Drop your files" area. * RULE : Non-decorative content MUST NOT be inserted using CSS :before and :after pseudo-elements unless there is a way to access the content with CSS turned off. * HOW TO FIX: Fix this issue by including the content directly in the DOM using HTML. 3. (ID 470750) "Buttons have same name but different actions." on the "Edit" and "Delete" buttons. Neither of them have a label/name, so they appear the same. * Fix by adding an `aria-label` to both, or changing the button label (visible & programmatic) to provide a complete description of the button purpose. See also https://dequeuniversity.com/class/forms2/labels/meaningful 4.. (ID 470756, 470758) "Content is lost at 200% zoom" and "Content is lost at 320px width" occurs on the hover over text / tooltip (when hovering over a button). In both cases the tooltip popup is partially hidden by the Admin sidebar menu. (screenshots available in the Deque tickets) Full list of issues is viewable at (requires login): https://axeauditor.dequecloud.com/test-run/0856438a-a19a-11eb-bc31-b7d5be387c86/issues?activeTab=dt-issue&page=0&pageSize=50&sortField=ordinal&sortDir=asc&filter%5Bseverity%5D=3&filter%5Btype%5D=issue&filter%5Bpage_number%5D=10&row=9 ## More Information / Tools * Consider using [Deque's free Chrome plugin](https://chrome.google.com/webstore/detail/axe-devtools-web-accessib/lhdoppojpmngadmnindnejefpokejbdd?hl=en-US) to check your work * Deque's color contrast tool: https://dequeuniversity.com/rules/axe/4.1/color-contrast?application=axeAPI
1.0
[Deque Analysis] MyDSpace page's "serious" accessibility issues - > Serious: This issue results in serious barriers for people with disabilities, and will partially prevent them from accessing fundamental features or content. People relying on assistive technologies will experience significant frustration as a result. Issues falling under this category are major problems, and remediation should be a priority. ## Deque Analysis Summary Our MyDSpace page as a total of 5 serious accessibility issues (not including color contrast which are handled in other tickets). 1. (ID 470746) "Hover content disappearing." on the tooltip/hints that appear when you hover over the action buttons (e.g. hover over "View" shows "Select this option to view the Item's metadata"). They all appear to be related to `ngb-tooltip-window`) * RULE: When additional content is triggered on pointer hover or on keyboard focus, that additional content MUST be visually perceived and MUST be dismissible. * HOW TO FIX: Fix this issue by ensuring that content that appears on mouse hover or keyboard focus meets ALL of the following requirements: * _Dismissible:_ If the content obscures or replaces other content, it can be dismissed via keyboard without moving mouse hover or keyboard focus - such as by pressing the Escape key. * _Hoverable:_ If the content is triggered by mouse hover, the user can move the mouse pointer to the content without the content disappearing. * _Persistent:_ The content stays visible until mouse hover or keyboard focus is moved or it is dismissed by the user (see #1 above), or the information is no longer valid. * See also https://www.w3.org/WAI/WCAG21/Understanding/content-on-hover-or-focus 2. (ID 470748) "Non-decorative content is inserted using CSS pseudo-elements." on the two buttons ("Add" and "Import" icons) which appear to the right of the "Drag & Drop your files" area. * RULE : Non-decorative content MUST NOT be inserted using CSS :before and :after pseudo-elements unless there is a way to access the content with CSS turned off. * HOW TO FIX: Fix this issue by including the content directly in the DOM using HTML. 3. (ID 470750) "Buttons have same name but different actions." on the "Edit" and "Delete" buttons. Neither of them have a label/name, so they appear the same. * Fix by adding an `aria-label` to both, or changing the button label (visible & programmatic) to provide a complete description of the button purpose. See also https://dequeuniversity.com/class/forms2/labels/meaningful 4.. (ID 470756, 470758) "Content is lost at 200% zoom" and "Content is lost at 320px width" occurs on the hover over text / tooltip (when hovering over a button). In both cases the tooltip popup is partially hidden by the Admin sidebar menu. (screenshots available in the Deque tickets) Full list of issues is viewable at (requires login): https://axeauditor.dequecloud.com/test-run/0856438a-a19a-11eb-bc31-b7d5be387c86/issues?activeTab=dt-issue&page=0&pageSize=50&sortField=ordinal&sortDir=asc&filter%5Bseverity%5D=3&filter%5Btype%5D=issue&filter%5Bpage_number%5D=10&row=9 ## More Information / Tools * Consider using [Deque's free Chrome plugin](https://chrome.google.com/webstore/detail/axe-devtools-web-accessib/lhdoppojpmngadmnindnejefpokejbdd?hl=en-US) to check your work * Deque's color contrast tool: https://dequeuniversity.com/rules/axe/4.1/color-contrast?application=axeAPI
priority
mydspace page s serious accessibility issues serious this issue results in serious barriers for people with disabilities and will partially prevent them from accessing fundamental features or content people relying on assistive technologies will experience significant frustration as a result issues falling under this category are major problems and remediation should be a priority deque analysis summary our mydspace page as a total of serious accessibility issues not including color contrast which are handled in other tickets id hover content disappearing on the tooltip hints that appear when you hover over the action buttons e g hover over view shows select this option to view the item s metadata they all appear to be related to ngb tooltip window rule when additional content is triggered on pointer hover or on keyboard focus that additional content must be visually perceived and must be dismissible how to fix fix this issue by ensuring that content that appears on mouse hover or keyboard focus meets all of the following requirements dismissible if the content obscures or replaces other content it can be dismissed via keyboard without moving mouse hover or keyboard focus such as by pressing the escape key hoverable if the content is triggered by mouse hover the user can move the mouse pointer to the content without the content disappearing persistent the content stays visible until mouse hover or keyboard focus is moved or it is dismissed by the user see above or the information is no longer valid see also id non decorative content is inserted using css pseudo elements on the two buttons add and import icons which appear to the right of the drag drop your files area rule non decorative content must not be inserted using css before and after pseudo elements unless there is a way to access the content with css turned off how to fix fix this issue by including the content directly in the dom using html id buttons have same name but different actions on the edit and delete buttons neither of them have a label name so they appear the same fix by adding an aria label to both or changing the button label visible programmatic to provide a complete description of the button purpose see also id content is lost at zoom and content is lost at width occurs on the hover over text tooltip when hovering over a button in both cases the tooltip popup is partially hidden by the admin sidebar menu screenshots available in the deque tickets full list of issues is viewable at requires login more information tools consider using to check your work deque s color contrast tool
1
185,671
6,726,550,547
IssuesEvent
2017-10-17 10:16:07
pingcap/tidb
https://api.github.com/repos/pingcap/tidb
closed
Estimate cardinality more precisely.
bug optimizer priority/P1 statistic
Once we analyze a table, its cardinality for each histogram will not update any more. So we should estimate it as ndv * (new count / old count)
1.0
Estimate cardinality more precisely. - Once we analyze a table, its cardinality for each histogram will not update any more. So we should estimate it as ndv * (new count / old count)
priority
estimate cardinality more precisely once we analyze a table its cardinality for each histogram will not update any more so we should estimate it as ndv new count old count
1
146,233
19,393,981,389
IssuesEvent
2021-12-18 01:47:32
peterwkc85/Spock_Testing_Framework
https://api.github.com/repos/peterwkc85/Spock_Testing_Framework
opened
CVE-2021-42550 (Medium) detected in logback-classic-0.9.26.jar
security vulnerability
## CVE-2021-42550 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>logback-classic-0.9.26.jar</b></p></summary> <p>Logback: the reliable, generic, fast and flexible logging library for Java.</p> <p>Library home page: <a href="http://logback.qos.ch">http://logback.qos.ch</a></p> <p>Path to dependency file: Spock_Testing_Framework/java-testing-with-spock-master/java-testing-with-spock-master/chapter7/web-ui-example/build.gradle</p> <p>Path to vulnerable library: radle/caches/modules-2/files-2.1/ch.qos.logback/logback-classic/0.9.26/42253815f22c35f3a9b9a34fd0feca62eec8c78e/logback-classic-0.9.26.jar</p> <p> Dependency Hierarchy: - :x: **logback-classic-0.9.26.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers. <p>Publish Date: 2021-12-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42550>CVE-2021-42550</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://logback.qos.ch/news.html">http://logback.qos.ch/news.html</a></p> <p>Release Date: 2021-12-16</p> <p>Fix Resolution: ch.qos.logback:logback-classic:1.2.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-42550 (Medium) detected in logback-classic-0.9.26.jar - ## CVE-2021-42550 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>logback-classic-0.9.26.jar</b></p></summary> <p>Logback: the reliable, generic, fast and flexible logging library for Java.</p> <p>Library home page: <a href="http://logback.qos.ch">http://logback.qos.ch</a></p> <p>Path to dependency file: Spock_Testing_Framework/java-testing-with-spock-master/java-testing-with-spock-master/chapter7/web-ui-example/build.gradle</p> <p>Path to vulnerable library: radle/caches/modules-2/files-2.1/ch.qos.logback/logback-classic/0.9.26/42253815f22c35f3a9b9a34fd0feca62eec8c78e/logback-classic-0.9.26.jar</p> <p> Dependency Hierarchy: - :x: **logback-classic-0.9.26.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers. <p>Publish Date: 2021-12-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42550>CVE-2021-42550</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://logback.qos.ch/news.html">http://logback.qos.ch/news.html</a></p> <p>Release Date: 2021-12-16</p> <p>Fix Resolution: ch.qos.logback:logback-classic:1.2.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in logback classic jar cve medium severity vulnerability vulnerable library logback classic jar logback the reliable generic fast and flexible logging library for java library home page a href path to dependency file spock testing framework java testing with spock master java testing with spock master web ui example build gradle path to vulnerable library radle caches modules files ch qos logback logback classic logback classic jar dependency hierarchy x logback classic jar vulnerable library vulnerability details in logback version and prior versions an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from ldap servers publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos logback logback classic step up your open source security game with whitesource
0
11,705
5,076,084,966
IssuesEvent
2016-12-27 23:37:11
portainer/portainer
https://api.github.com/repos/portainer/portainer
opened
Setup a cache busting mechanism
area/build-system kind/enhancement
When upgrading Portainer, the JS/CSS files can be cached by the browser and this can lead to bugs/strange behaviours. This can be achieved by using a combination of grunt plugins: * https://github.com/sebdeckers/grunt-rev * https://github.com/yeoman/grunt-usemin This should help versioning the assets before release which gives us the ability to let the browser cache the files for the current version only.
1.0
Setup a cache busting mechanism - When upgrading Portainer, the JS/CSS files can be cached by the browser and this can lead to bugs/strange behaviours. This can be achieved by using a combination of grunt plugins: * https://github.com/sebdeckers/grunt-rev * https://github.com/yeoman/grunt-usemin This should help versioning the assets before release which gives us the ability to let the browser cache the files for the current version only.
non_priority
setup a cache busting mechanism when upgrading portainer the js css files can be cached by the browser and this can lead to bugs strange behaviours this can be achieved by using a combination of grunt plugins this should help versioning the assets before release which gives us the ability to let the browser cache the files for the current version only
0
91,230
11,488,211,698
IssuesEvent
2020-02-11 13:31:03
toggl/mobileapp
https://api.github.com/repos/toggl/mobileapp
closed
Use HH:mm format for 24-hour format
carry-over-to-native foundation needs-design
Higher echelons of power have decided that `HH:mm` format should be used on all clients for 24-hour mode (instead of previous `H:mm`).
1.0
Use HH:mm format for 24-hour format - Higher echelons of power have decided that `HH:mm` format should be used on all clients for 24-hour mode (instead of previous `H:mm`).
non_priority
use hh mm format for hour format higher echelons of power have decided that hh mm format should be used on all clients for hour mode instead of previous h mm
0
383,460
11,356,338,345
IssuesEvent
2020-01-24 22:25:49
DlfinBroom/UnleashedRage
https://api.github.com/repos/DlfinBroom/UnleashedRage
closed
GetLatestIssue() method in ComicPageDB does not work
Bug Database High Priority
GetLatestIssue() will always return a null value The database part of the code will always throw an exception and catch the exception, returning a null value
1.0
GetLatestIssue() method in ComicPageDB does not work - GetLatestIssue() will always return a null value The database part of the code will always throw an exception and catch the exception, returning a null value
priority
getlatestissue method in comicpagedb does not work getlatestissue will always return a null value the database part of the code will always throw an exception and catch the exception returning a null value
1
270,148
23,494,002,569
IssuesEvent
2022-08-17 22:00:02
rectorphp/rector
https://api.github.com/repos/rectorphp/rector
closed
NodeFactory->createArray doesn't support boolean Node elements
feature failing test case needed
# Bug Report <!-- First, thank you for reporting a bug. That takes time and we appreciate that! --> | Subject | Details | | :------------- | :---------------------------------------------------------------| | Rector version | 0.13.2 | <!-- Please describe your problem here. --> ## Minimal PHP Code Causing Issue ```php <?php class MyRule extends AbstractRector { public function getNodeTypes(): array { return [Node\Expr\MethodCall::class]; } public function refactor(Node $node) { // String works! // return $this->nodeFactory->createArray([new Node\Scalar\String_('hello')]); // Boolean isn't :( return $this->nodeFactory->createArray([$this->nodeFactory->createTrue()]); return null; } public function getRuleDefinition(): RuleDefinition { return new RuleDefinition('', []); } } ``` ## Expected Behaviour It generates a node with array `[true]` ## Actual Exception: ``` In NodeFactory.php line 517: Not implemented yet. Go to "Rector\Core\PhpParser\Node\NodeFactory::createArrayItem()" and add check for "PhpParser\Node\Expr\ConstFetch" node. ```
1.0
NodeFactory->createArray doesn't support boolean Node elements - # Bug Report <!-- First, thank you for reporting a bug. That takes time and we appreciate that! --> | Subject | Details | | :------------- | :---------------------------------------------------------------| | Rector version | 0.13.2 | <!-- Please describe your problem here. --> ## Minimal PHP Code Causing Issue ```php <?php class MyRule extends AbstractRector { public function getNodeTypes(): array { return [Node\Expr\MethodCall::class]; } public function refactor(Node $node) { // String works! // return $this->nodeFactory->createArray([new Node\Scalar\String_('hello')]); // Boolean isn't :( return $this->nodeFactory->createArray([$this->nodeFactory->createTrue()]); return null; } public function getRuleDefinition(): RuleDefinition { return new RuleDefinition('', []); } } ``` ## Expected Behaviour It generates a node with array `[true]` ## Actual Exception: ``` In NodeFactory.php line 517: Not implemented yet. Go to "Rector\Core\PhpParser\Node\NodeFactory::createArrayItem()" and add check for "PhpParser\Node\Expr\ConstFetch" node. ```
non_priority
nodefactory createarray doesn t support boolean node elements bug report subject details rector version minimal php code causing issue php php class myrule extends abstractrector public function getnodetypes array return public function refactor node node string works return this nodefactory createarray boolean isn t return this nodefactory createarray return null public function getruledefinition ruledefinition return new ruledefinition expected behaviour it generates a node with array actual exception in nodefactory php line not implemented yet go to rector core phpparser node nodefactory createarrayitem and add check for phpparser node expr constfetch node
0
618,271
19,431,293,523
IssuesEvent
2021-12-21 12:18:09
openforis/arena
https://api.github.com/repos/openforis/arena
closed
Collect Import Report: Show full Xpath expression
Priority_2
A long equation without spaces is now shown only partially: ![image](https://user-images.githubusercontent.com/45661798/146363698-f202101c-99d1-41c8-aa5b-f79b3c165b52.png)
1.0
Collect Import Report: Show full Xpath expression - A long equation without spaces is now shown only partially: ![image](https://user-images.githubusercontent.com/45661798/146363698-f202101c-99d1-41c8-aa5b-f79b3c165b52.png)
priority
collect import report show full xpath expression a long equation without spaces is now shown only partially
1
166,242
12,917,736,011
IssuesEvent
2020-07-16 00:39:20
KCarlile/flashchord
https://api.github.com/repos/KCarlile/flashchord
closed
Add @Flash_Chord Twitter link
easy enhancement passed testing ready for testing
## Background In order for people to follow updates for Flash Chord, we have a Twitter account for announcing new features and other information: https://twitter.com/flash_chord ## Acceptance Criteria - The Twitter icon followed by the `@Flash_Chord` handle text are linked to https://twitter.com/flash_chord in the footer (copyright section) and on the About page - The README.md file includes a link to the Twitter account for reference, but without icon ## Approach - https://twitter.com/flash_chord link as `@Flash_Chord` text - Prefix the Twitter handle text with the Twitter icon, found here: https://about.twitter.com/en_us/company/brand-resources.html - Put this link in the copyright footer and also on the About page where appropriate
2.0
Add @Flash_Chord Twitter link - ## Background In order for people to follow updates for Flash Chord, we have a Twitter account for announcing new features and other information: https://twitter.com/flash_chord ## Acceptance Criteria - The Twitter icon followed by the `@Flash_Chord` handle text are linked to https://twitter.com/flash_chord in the footer (copyright section) and on the About page - The README.md file includes a link to the Twitter account for reference, but without icon ## Approach - https://twitter.com/flash_chord link as `@Flash_Chord` text - Prefix the Twitter handle text with the Twitter icon, found here: https://about.twitter.com/en_us/company/brand-resources.html - Put this link in the copyright footer and also on the About page where appropriate
non_priority
add flash chord twitter link background in order for people to follow updates for flash chord we have a twitter account for announcing new features and other information acceptance criteria the twitter icon followed by the flash chord handle text are linked to in the footer copyright section and on the about page the readme md file includes a link to the twitter account for reference but without icon approach link as flash chord text prefix the twitter handle text with the twitter icon found here put this link in the copyright footer and also on the about page where appropriate
0
823,247
30,961,804,284
IssuesEvent
2023-08-08 05:03:13
rpm-software-management/dnf5
https://api.github.com/repos/rpm-software-management/dnf5
closed
Handle duplicate REPOIDs somehow
Priority: HIGH
DNF4 warns like this: > Repository REPOID is listed more than once in the configuration And uses just one of them? Or merges the config? With DNF5 it seems the `REPOID` is loaded twice as `libdnf::Repo`, per: ``` $ dnf5 repo list REPOID Some repo name REPOID Some repo name - the duplicate ```
1.0
Handle duplicate REPOIDs somehow - DNF4 warns like this: > Repository REPOID is listed more than once in the configuration And uses just one of them? Or merges the config? With DNF5 it seems the `REPOID` is loaded twice as `libdnf::Repo`, per: ``` $ dnf5 repo list REPOID Some repo name REPOID Some repo name - the duplicate ```
priority
handle duplicate repoids somehow warns like this repository repoid is listed more than once in the configuration and uses just one of them or merges the config with it seems the repoid is loaded twice as libdnf repo per repo list repoid some repo name repoid some repo name the duplicate
1
74,241
15,325,439,518
IssuesEvent
2021-02-26 01:19:01
idonthaveafifaaddiction/MapLoom
https://api.github.com/repos/idonthaveafifaaddiction/MapLoom
opened
WS-2017-0116 (Medium) detected in angular-v1.2.21
security vulnerability
## WS-2017-0116 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>angular-v1.2.21</b></p></summary> <p>null</p> <p>Path to dependency file: MapLoom/bower.json</p> <p>Path to vulnerable library: MapLoom/vendor/angular/.bower.json,MapLoom/vendor/angular/.bower.json</p> <p> Dependency Hierarchy: - :x: **angular-v1.2.21** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The use element can reference external svg's (same origin) and can include xlink javascript urls or foreign object that can execute xss. <p>Publish Date: 2015-12-05 <p>URL: <a href=https://github.com/angular/angular.js/commit/7a668cdd7d08a7016883eb3c671cbcd586223ae8>WS-2017-0116</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/angular/angular.js/pull/13453">https://github.com/angular/angular.js/pull/13453</a></p> <p>Release Date: 2015-12-05</p> <p>Fix Resolution: angular - 1.5.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Bower","packageName":"angular","packageVersion":"v1.2.21","packageFilePaths":["/bower.json"],"isTransitiveDependency":false,"dependencyTree":"angular:v1.2.21","isMinimumFixVersionAvailable":true,"minimumFixVersion":"angular - 1.5.0"}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2017-0116","vulnerabilityDetails":"The use element can reference external svg\u0027s (same origin) and can include xlink javascript urls or foreign object that can execute xss.","vulnerabilityUrl":"https://github.com/angular/angular.js/commit/7a668cdd7d08a7016883eb3c671cbcd586223ae8","cvss3Severity":"medium","cvss3Score":"5.8","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
WS-2017-0116 (Medium) detected in angular-v1.2.21 - ## WS-2017-0116 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>angular-v1.2.21</b></p></summary> <p>null</p> <p>Path to dependency file: MapLoom/bower.json</p> <p>Path to vulnerable library: MapLoom/vendor/angular/.bower.json,MapLoom/vendor/angular/.bower.json</p> <p> Dependency Hierarchy: - :x: **angular-v1.2.21** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The use element can reference external svg's (same origin) and can include xlink javascript urls or foreign object that can execute xss. <p>Publish Date: 2015-12-05 <p>URL: <a href=https://github.com/angular/angular.js/commit/7a668cdd7d08a7016883eb3c671cbcd586223ae8>WS-2017-0116</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/angular/angular.js/pull/13453">https://github.com/angular/angular.js/pull/13453</a></p> <p>Release Date: 2015-12-05</p> <p>Fix Resolution: angular - 1.5.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Bower","packageName":"angular","packageVersion":"v1.2.21","packageFilePaths":["/bower.json"],"isTransitiveDependency":false,"dependencyTree":"angular:v1.2.21","isMinimumFixVersionAvailable":true,"minimumFixVersion":"angular - 1.5.0"}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2017-0116","vulnerabilityDetails":"The use element can reference external svg\u0027s (same origin) and can include xlink javascript urls or foreign object that can execute xss.","vulnerabilityUrl":"https://github.com/angular/angular.js/commit/7a668cdd7d08a7016883eb3c671cbcd586223ae8","cvss3Severity":"medium","cvss3Score":"5.8","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
ws medium detected in angular ws medium severity vulnerability vulnerable library angular null path to dependency file maploom bower json path to vulnerable library maploom vendor angular bower json maploom vendor angular bower json dependency hierarchy x angular vulnerable library found in base branch master vulnerability details the use element can reference external svg s same origin and can include xlink javascript urls or foreign object that can execute xss publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope changed impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution angular isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree angular isminimumfixversionavailable true minimumfixversion angular basebranches vulnerabilityidentifier ws vulnerabilitydetails the use element can reference external svg same origin and can include xlink javascript urls or foreign object that can execute xss vulnerabilityurl
0
445,707
12,835,347,805
IssuesEvent
2020-07-07 12:44:05
radical-cybertools/radical.pilot
https://api.github.com/repos/radical-cybertools/radical.pilot
closed
Long queue times result in non-starting pilots on BW
comp:agent layer:utils priority:v2 topic:communication type:bug type:performance
In short a job just simply didn't start (no errors in the logs) on BW with `gsissh` from local cluster. The DEBUG log (not captured) shows a heartbeat from SAGA (I think) about the job queue status (PENDING), that (the heartbeat) at some point just stops. That is the last line in the log, no errors. Wonder if the folders will be enough to find the problem. They are here: [rp.remote.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz](https://github.com/radical-cybertools/radical.pilot/files/1984692/rp.remote.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz) [rp.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz](https://github.com/radical-cybertools/radical.pilot/files/1984694/rp.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz) Tagging @andre-merzky @jdakka
1.0
Long queue times result in non-starting pilots on BW - In short a job just simply didn't start (no errors in the logs) on BW with `gsissh` from local cluster. The DEBUG log (not captured) shows a heartbeat from SAGA (I think) about the job queue status (PENDING), that (the heartbeat) at some point just stops. That is the last line in the log, no errors. Wonder if the folders will be enough to find the problem. They are here: [rp.remote.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz](https://github.com/radical-cybertools/radical.pilot/files/1984692/rp.remote.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz) [rp.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz](https://github.com/radical-cybertools/radical.pilot/files/1984694/rp.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz) Tagging @andre-merzky @jdakka
priority
long queue times result in non starting pilots on bw in short a job just simply didn t start no errors in the logs on bw with gsissh from local cluster the debug log not captured shows a heartbeat from saga i think about the job queue status pending that the heartbeat at some point just stops that is the last line in the log no errors wonder if the folders will be enough to find the problem they are here tagging andre merzky jdakka
1
288,131
8,826,361,208
IssuesEvent
2019-01-03 01:33:12
Lustrel/money-management
https://api.github.com/repos/Lustrel/money-management
closed
Move Select2 files to "assets" folder
high-priority
It seems that Heroku doesn't recognize the `bundles` folder. This way, we need to move all Select2 related files to the `assets` folder, since it seems that Heroku can load files from there.
1.0
Move Select2 files to "assets" folder - It seems that Heroku doesn't recognize the `bundles` folder. This way, we need to move all Select2 related files to the `assets` folder, since it seems that Heroku can load files from there.
priority
move files to assets folder it seems that heroku doesn t recognize the bundles folder this way we need to move all related files to the assets folder since it seems that heroku can load files from there
1
600,902
18,361,495,299
IssuesEvent
2021-10-09 09:31:49
AY2122S1-CS2103T-T17-3/tp
https://api.github.com/repos/AY2122S1-CS2103T-T17-3/tp
closed
Add command doesn't work
bug priority.HIGH severity.High
Todo: - update UG (UG still says `create` to create a person) - fix the add command When I typed in `add n/John Doe` I got the following error. ``` Invalid command format! add: Adds a person to the address book. Parameters: n/NAME p/PHONE e/EMAIL a/ADDRESS [t/TAG]... Example: add n/John Doe p/98765432 e/johnd@example.com a/311, Clementi Ave 2, #02-25 t/friends t/owesMoney ```
1.0
Add command doesn't work - Todo: - update UG (UG still says `create` to create a person) - fix the add command When I typed in `add n/John Doe` I got the following error. ``` Invalid command format! add: Adds a person to the address book. Parameters: n/NAME p/PHONE e/EMAIL a/ADDRESS [t/TAG]... Example: add n/John Doe p/98765432 e/johnd@example.com a/311, Clementi Ave 2, #02-25 t/friends t/owesMoney ```
priority
add command doesn t work todo update ug ug still says create to create a person fix the add command when i typed in add n john doe i got the following error invalid command format add adds a person to the address book parameters n name p phone e email a address example add n john doe p e johnd example com a clementi ave t friends t owesmoney
1
56,970
15,531,838,061
IssuesEvent
2021-03-14 01:56:35
primefaces/primefaces
https://api.github.com/repos/primefaces/primefaces
closed
SlideMenu - scrollbar appears, no height adjustment
Stale defect
SlideMenu shows vertical scrollbar if count of menuitems in next slides (submenus) is greater than the count of menuitems in prev. (initial) slide. I think a dynamic (at runtime) adjustment of SlideMenu's height is missing.
1.0
SlideMenu - scrollbar appears, no height adjustment - SlideMenu shows vertical scrollbar if count of menuitems in next slides (submenus) is greater than the count of menuitems in prev. (initial) slide. I think a dynamic (at runtime) adjustment of SlideMenu's height is missing.
non_priority
slidemenu scrollbar appears no height adjustment slidemenu shows vertical scrollbar if count of menuitems in next slides submenus is greater than the count of menuitems in prev initial slide i think a dynamic at runtime adjustment of slidemenu s height is missing
0
225,614
17,272,032,286
IssuesEvent
2021-07-22 21:16:44
endojs/endo
https://api.github.com/repos/endojs/endo
closed
add readme/mission-statement to SES repo
documentation
We need more justification/motivation Add code snippets similar to the DWeb Summit talk
1.0
add readme/mission-statement to SES repo - We need more justification/motivation Add code snippets similar to the DWeb Summit talk
non_priority
add readme mission statement to ses repo we need more justification motivation add code snippets similar to the dweb summit talk
0
264,778
28,212,805,029
IssuesEvent
2023-04-05 06:32:36
hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933
https://api.github.com/repos/hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933
closed
CVE-2020-0179 (High) detected in avandroid-10.0.0_r33 - autoclosed
Mend: dependency security vulnerability
## CVE-2020-0179 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>avandroid-10.0.0_r33</b></p></summary> <p> <p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/av>https://android.googlesource.com/platform/frameworks/av</a></p> <p>Found in HEAD commit: <a href="https://github.com/hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933/commit/e5975426a81f934f3cf32ef72736eb9cdbf7678b">e5975426a81f934f3cf32ef72736eb9cdbf7678b</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/media/mtp/MtpServer.cpp</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In doSendObjectInfo of MtpServer.cpp, there is a possible path traversal attack due to insufficient input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is required for exploitation.Product: AndroidVersions: Android-10Android ID: A-130656917 <p>Publish Date: 2020-06-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-0179>CVE-2020-0179</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://android.googlesource.com/platform/frameworks/av/+/refs/tags/android-10.0.0_r37">https://android.googlesource.com/platform/frameworks/av/+/refs/tags/android-10.0.0_r37</a></p> <p>Release Date: 2020-06-11</p> <p>Fix Resolution: android-10.0.0_r37</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-0179 (High) detected in avandroid-10.0.0_r33 - autoclosed - ## CVE-2020-0179 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>avandroid-10.0.0_r33</b></p></summary> <p> <p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/av>https://android.googlesource.com/platform/frameworks/av</a></p> <p>Found in HEAD commit: <a href="https://github.com/hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933/commit/e5975426a81f934f3cf32ef72736eb9cdbf7678b">e5975426a81f934f3cf32ef72736eb9cdbf7678b</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/media/mtp/MtpServer.cpp</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In doSendObjectInfo of MtpServer.cpp, there is a possible path traversal attack due to insufficient input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is required for exploitation.Product: AndroidVersions: Android-10Android ID: A-130656917 <p>Publish Date: 2020-06-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-0179>CVE-2020-0179</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://android.googlesource.com/platform/frameworks/av/+/refs/tags/android-10.0.0_r37">https://android.googlesource.com/platform/frameworks/av/+/refs/tags/android-10.0.0_r37</a></p> <p>Release Date: 2020-06-11</p> <p>Fix Resolution: android-10.0.0_r37</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in avandroid autoclosed cve high severity vulnerability vulnerable library avandroid library home page a href found in head commit a href found in base branch main vulnerable source files media mtp mtpserver cpp vulnerability details in dosendobjectinfo of mtpserver cpp there is a possible path traversal attack due to insufficient input validation this could lead to local escalation of privilege with no additional execution privileges needed user interaction is required for exploitation product androidversions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with mend
0
603,623
18,669,936,099
IssuesEvent
2021-10-30 14:12:11
AY2122S1-CS2103T-T09-4/tp
https://api.github.com/repos/AY2122S1-CS2103T-T09-4/tp
closed
[PE-D] UG updating to match your app (2)
priority.High severity.High
![image.png](https://raw.githubusercontent.com/Pulpy-y/ped/main/files/be436ce4-8311-4c8d-98b4-ac4518737007.png) Again, you may want to change this to `del 3` <!--session: 1635494405543-941eecba-97e4-468b-b880-fe6464b30d81--> <!--Version: Web v3.4.1--> ------------- Labels: `severity.VeryLow` `type.DocumentationBug` original: Pulpy-y/ped#3
1.0
[PE-D] UG updating to match your app (2) - ![image.png](https://raw.githubusercontent.com/Pulpy-y/ped/main/files/be436ce4-8311-4c8d-98b4-ac4518737007.png) Again, you may want to change this to `del 3` <!--session: 1635494405543-941eecba-97e4-468b-b880-fe6464b30d81--> <!--Version: Web v3.4.1--> ------------- Labels: `severity.VeryLow` `type.DocumentationBug` original: Pulpy-y/ped#3
priority
ug updating to match your app again you may want to change this to del labels severity verylow type documentationbug original pulpy y ped
1
684,402
23,416,878,126
IssuesEvent
2022-08-13 04:34:31
HaDuve/TravelCostNative
https://api.github.com/repos/HaDuve/TravelCostNative
closed
Add Trip Input Form
enhancement High Priority Frontend
- [x] new modal for the input fields - [x] trip name - [x] total budget - [ ] invite other travellers
1.0
Add Trip Input Form - - [x] new modal for the input fields - [x] trip name - [x] total budget - [ ] invite other travellers
priority
add trip input form new modal for the input fields trip name total budget invite other travellers
1
425,341
12,339,051,995
IssuesEvent
2020-05-14 17:27:37
mozilla/addons-server
https://api.github.com/repos/mozilla/addons-server
closed
prevent the `include_in_legacy` Block property from being set
priority: p4 state: pull request ready
The Block property `include_in_legacy` can be set/unset currently which doesn't make any sense when legacy blocklist submission is disabled (the default). Otherwise the Block doesn't actually get uploaded to the legacy blocklist. It should be read-only unless `blocklist_legacy_submit` is also enabled.
1.0
prevent the `include_in_legacy` Block property from being set - The Block property `include_in_legacy` can be set/unset currently which doesn't make any sense when legacy blocklist submission is disabled (the default). Otherwise the Block doesn't actually get uploaded to the legacy blocklist. It should be read-only unless `blocklist_legacy_submit` is also enabled.
priority
prevent the include in legacy block property from being set the block property include in legacy can be set unset currently which doesn t make any sense when legacy blocklist submission is disabled the default otherwise the block doesn t actually get uploaded to the legacy blocklist it should be read only unless blocklist legacy submit is also enabled
1
544,250
15,891,583,183
IssuesEvent
2021-04-10 19:50:59
zeoflow/memo
https://api.github.com/repos/zeoflow/memo
closed
`@CompoundMethod` annotation
@feature @priority-medium
**Is your feature request related to a problem? Please describe.** The `@CompoundMethod` annotation should be used for retrieving values based on different fields ###### We also happily accept [pull requests](https://github.com/zeoflow/memo/pulls).
1.0
`@CompoundMethod` annotation - **Is your feature request related to a problem? Please describe.** The `@CompoundMethod` annotation should be used for retrieving values based on different fields ###### We also happily accept [pull requests](https://github.com/zeoflow/memo/pulls).
priority
compoundmethod annotation is your feature request related to a problem please describe the compoundmethod annotation should be used for retrieving values based on different fields we also happily accept
1
593,527
18,010,506,320
IssuesEvent
2021-09-16 08:03:18
ballerina-platform/ballerina-lang
https://api.github.com/repos/ballerina-platform/ballerina-lang
closed
When the type is inferred via `var` and the inferred type is from an un-imported module shell emit `Unknown Type 'XXX`` error
Type/Bug Priority/Blocker Team/CompilerFETools Points/2 Area/Shell
**Description:** ```shell =$ var t = int.typeIds() took 0 ms =$ t took 530 ms | error: unknown type 'TypeId' | TypeId[]? & readonly 't = <TypeId[]? & readonly> __recall_any("'t"); | ^----^ | Compilation aborted due to errors. ``` **Steps to reproduce:** **Affected Versions:** Swan Lake beta-2 **OS, DB, other environment details and versions:** **Related Issues (optional):** <!-- Any related issues such as sub tasks, issues reported in other repositories (e.g component repositories), similar problems, etc. --> **Suggested Labels (optional):** <!-- Optional comma separated list of suggested labels. Non committers can’t assign labels to issues, so this will help issue creators who are not a committer to suggest possible labels--> **Suggested Assignees (optional):** <!--Optional comma separated list of suggested team members who should attend the issue. Non committers can’t assign issues to assignees, so this will help issue creators who are not a committer to suggest possible assignees-->
1.0
When the type is inferred via `var` and the inferred type is from an un-imported module shell emit `Unknown Type 'XXX`` error - **Description:** ```shell =$ var t = int.typeIds() took 0 ms =$ t took 530 ms | error: unknown type 'TypeId' | TypeId[]? & readonly 't = <TypeId[]? & readonly> __recall_any("'t"); | ^----^ | Compilation aborted due to errors. ``` **Steps to reproduce:** **Affected Versions:** Swan Lake beta-2 **OS, DB, other environment details and versions:** **Related Issues (optional):** <!-- Any related issues such as sub tasks, issues reported in other repositories (e.g component repositories), similar problems, etc. --> **Suggested Labels (optional):** <!-- Optional comma separated list of suggested labels. Non committers can’t assign labels to issues, so this will help issue creators who are not a committer to suggest possible labels--> **Suggested Assignees (optional):** <!--Optional comma separated list of suggested team members who should attend the issue. Non committers can’t assign issues to assignees, so this will help issue creators who are not a committer to suggest possible assignees-->
priority
when the type is inferred via var and the inferred type is from an un imported module shell emit unknown type xxx error description shell var t int typeids took ms t took ms error unknown type typeid typeid readonly t recall any t compilation aborted due to errors steps to reproduce affected versions swan lake beta os db other environment details and versions related issues optional suggested labels optional suggested assignees optional
1
68,858
8,357,316,509
IssuesEvent
2018-10-02 21:10:24
ManageIQ/manageiq-v2v
https://api.github.com/repos/ManageIQ/manageiq-v2v
opened
Show the Mapping type in the Infrastructure Mappings list view
enhancement needs-design v1.1
We should show the mapping type in the list view now that we have multiple types (RHV and OpenStack). Question is where to put it?
1.0
Show the Mapping type in the Infrastructure Mappings list view - We should show the mapping type in the list view now that we have multiple types (RHV and OpenStack). Question is where to put it?
non_priority
show the mapping type in the infrastructure mappings list view we should show the mapping type in the list view now that we have multiple types rhv and openstack question is where to put it
0
51,158
6,496,708,279
IssuesEvent
2017-08-22 11:11:53
tarantool/doc
https://api.github.com/repos/tarantool/doc
closed
Inconsistent version switcher at doc main
design LT
after PR merge https://github.com/tarantool/doc/pull/216: at the doc main page, a horizontal version switcher at the top is present in 1.7/1.8 and missing in 1.6 (it duplicates the "Manual for other versions" list from the left menu, so the horizontal switcher should be removed from the doc **main page** in all versions)
1.0
Inconsistent version switcher at doc main - after PR merge https://github.com/tarantool/doc/pull/216: at the doc main page, a horizontal version switcher at the top is present in 1.7/1.8 and missing in 1.6 (it duplicates the "Manual for other versions" list from the left menu, so the horizontal switcher should be removed from the doc **main page** in all versions)
non_priority
inconsistent version switcher at doc main after pr merge at the doc main page a horizontal version switcher at the top is present in and missing in it duplicates the manual for other versions list from the left menu so the horizontal switcher should be removed from the doc main page in all versions
0
70,738
15,105,644,432
IssuesEvent
2021-02-08 13:19:45
rammatzkvosky/epsagon-java
https://api.github.com/repos/rammatzkvosky/epsagon-java
opened
CVE-2020-36182 (High) detected in jackson-databind-2.9.10.5.jar
security vulnerability
## CVE-2020-36182 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.10.5.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: epsagon-java/epsagon/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.10.5/jackson-databind-2.9.10.5.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.10.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/rammatzkvosky/epsagon-java/commit/d9503d651e6d79077ee11302da9edca9a60e6954">d9503d651e6d79077ee11302da9edca9a60e6954</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS. <p>Publish Date: 2021-01-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36182>CVE-2020-36182</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/3004">https://github.com/FasterXML/jackson-databind/issues/3004</a></p> <p>Release Date: 2021-01-07</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.10.5","packageFilePaths":["/epsagon/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.10.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36182","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36182","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-36182 (High) detected in jackson-databind-2.9.10.5.jar - ## CVE-2020-36182 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.10.5.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: epsagon-java/epsagon/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.10.5/jackson-databind-2.9.10.5.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.10.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/rammatzkvosky/epsagon-java/commit/d9503d651e6d79077ee11302da9edca9a60e6954">d9503d651e6d79077ee11302da9edca9a60e6954</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS. <p>Publish Date: 2021-01-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36182>CVE-2020-36182</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/3004">https://github.com/FasterXML/jackson-databind/issues/3004</a></p> <p>Release Date: 2021-01-07</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.10.5","packageFilePaths":["/epsagon/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.10.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36182","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36182","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file epsagon java epsagon pom xml path to vulnerable library canner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp cpdsadapter driveradaptercpds publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind basebranches vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp cpdsadapter driveradaptercpds vulnerabilityurl
0
5,636
2,957,571,778
IssuesEvent
2015-07-08 16:59:57
GoogleCloudPlatform/kubernetes
https://api.github.com/repos/GoogleCloudPlatform/kubernetes
closed
`kubectl describe` docs: explain what happens if the object doesn't exist
component/CLI kind/documentation priority/P2 team/friction team/UX
In kube-apiserver.INFO, I see a failed API call being attempted roughly every second: ``` kube-apiserver.INFO:I0624 15:26:22.970228 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.662407ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45055] kube-apiserver.INFO:I0624 15:26:24.262562 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.80702ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45057] kube-apiserver.INFO:I0624 15:26:25.558359 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.764591ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45064] kube-apiserver.INFO:I0624 15:26:25.566240 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything-1jq7j: (2.054047ms) 200 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45064] kube-apiserver.INFO:I0624 15:26:26.855882 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (2.237989ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45066] kube-apiserver.INFO:I0624 15:26:28.151144 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.868889ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45068] kube-apiserver.INFO:I0624 15:26:29.445528 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.792321ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45070] ``` Note that legit endpoints, eg "/api/v1/namespaces/ns-mything/pods/mything-1jq7j", are also in the mix, and those are successful. Also note that many other endpoints are being checked, all successfully -- the specific endpoint is the only one returning a 404. That invalid endpoint indeed returns 404: ``` $ curl -v http://10.0.0.2:8080/api/v1/namespaces/ns-mything/pods/mything > GET /api/v1/namespaces/ns-mything/pods/mything HTTP/1.1 > User-Agent: curl/7.22.0 (x86_64-pc-linux-gnu) libcurl/7.22.0 OpenSSL/1.0.1 zlib/1.2.3.4 libidn/1.23 librtmp/2.3 > Host: 10.0.0.2:8080 > Accept: */* > < HTTP/1.1 404 Not Found < Content-Type: application/json < Date: Wed, 24 Jun 2015 15:47:21 GMT < Content-Length: 233 < { "kind": "Status", "apiVersion": "v1", "metadata": {}, "status": "Failure", "message": "pods \"mything\" not found", "reason": "NotFound", "details": { "name": "mything", "kind": "pods" }, "code": 404 } ``` The problem is that "mything" is not a pod -- rather, "mything-1jq7j" and "mything-rdd7e" are pods, "mything" is just the common base name. ``` $ kubectl --server=10.0.0.2:8080 --namespace=ns-mything get pods NAME READY REASON RESTARTS AGE mything-1jq7j 1/1 Running 0 17h mything-rdd7e 1/1 Running 0 17h kubectl --server=10.0.0.2:8080 --namespace=ns-mything get rc CONTROLLER CONTAINER(S) IMAGE(S) SELECTOR REPLICAS mything mything dev.foo.com:5000/foo/mything:314159a10cee8edd3059d0fce4036c72c2527392 name=mything 2 ``` My rc/pod config: ``` { "apiVersion": "v1", "kind": "ReplicationController", "metadata": { "name": "mything", "namespace": "ns-mything", "labels": { "name": "mything" } }, "spec": { "replicas": 2, "selector": { "name": "mything" }, "template": { "metadata": { "labels": { "name": "mything" } }, "spec": { "containers": [{ "name": "mything", "image": "dev.foo.com:5000/foo/mything:314159a10cee8edd3059d0fce4036c72c2527392", "ports": [], "env": [ {"name": "FOO", "value": "bar"} ] }] } } } } ``` Is this a wayward API call / bug in kubernetes, or an indication that I've missed something in my setup?
1.0
`kubectl describe` docs: explain what happens if the object doesn't exist - In kube-apiserver.INFO, I see a failed API call being attempted roughly every second: ``` kube-apiserver.INFO:I0624 15:26:22.970228 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.662407ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45055] kube-apiserver.INFO:I0624 15:26:24.262562 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.80702ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45057] kube-apiserver.INFO:I0624 15:26:25.558359 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.764591ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45064] kube-apiserver.INFO:I0624 15:26:25.566240 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything-1jq7j: (2.054047ms) 200 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45064] kube-apiserver.INFO:I0624 15:26:26.855882 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (2.237989ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45066] kube-apiserver.INFO:I0624 15:26:28.151144 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.868889ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45068] kube-apiserver.INFO:I0624 15:26:29.445528 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.792321ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45070] ``` Note that legit endpoints, eg "/api/v1/namespaces/ns-mything/pods/mything-1jq7j", are also in the mix, and those are successful. Also note that many other endpoints are being checked, all successfully -- the specific endpoint is the only one returning a 404. That invalid endpoint indeed returns 404: ``` $ curl -v http://10.0.0.2:8080/api/v1/namespaces/ns-mything/pods/mything > GET /api/v1/namespaces/ns-mything/pods/mything HTTP/1.1 > User-Agent: curl/7.22.0 (x86_64-pc-linux-gnu) libcurl/7.22.0 OpenSSL/1.0.1 zlib/1.2.3.4 libidn/1.23 librtmp/2.3 > Host: 10.0.0.2:8080 > Accept: */* > < HTTP/1.1 404 Not Found < Content-Type: application/json < Date: Wed, 24 Jun 2015 15:47:21 GMT < Content-Length: 233 < { "kind": "Status", "apiVersion": "v1", "metadata": {}, "status": "Failure", "message": "pods \"mything\" not found", "reason": "NotFound", "details": { "name": "mything", "kind": "pods" }, "code": 404 } ``` The problem is that "mything" is not a pod -- rather, "mything-1jq7j" and "mything-rdd7e" are pods, "mything" is just the common base name. ``` $ kubectl --server=10.0.0.2:8080 --namespace=ns-mything get pods NAME READY REASON RESTARTS AGE mything-1jq7j 1/1 Running 0 17h mything-rdd7e 1/1 Running 0 17h kubectl --server=10.0.0.2:8080 --namespace=ns-mything get rc CONTROLLER CONTAINER(S) IMAGE(S) SELECTOR REPLICAS mything mything dev.foo.com:5000/foo/mything:314159a10cee8edd3059d0fce4036c72c2527392 name=mything 2 ``` My rc/pod config: ``` { "apiVersion": "v1", "kind": "ReplicationController", "metadata": { "name": "mything", "namespace": "ns-mything", "labels": { "name": "mything" } }, "spec": { "replicas": 2, "selector": { "name": "mything" }, "template": { "metadata": { "labels": { "name": "mything" } }, "spec": { "containers": [{ "name": "mything", "image": "dev.foo.com:5000/foo/mything:314159a10cee8edd3059d0fce4036c72c2527392", "ports": [], "env": [ {"name": "FOO", "value": "bar"} ] }] } } } } ``` Is this a wayward API call / bug in kubernetes, or an indication that I've missed something in my setup?
non_priority
kubectl describe docs explain what happens if the object doesn t exist in kube apiserver info i see a failed api call being attempted roughly every second kube apiserver info handlers go get api namespaces ns mything pods mything kube apiserver info handlers go get api namespaces ns mything pods mything kube apiserver info handlers go get api namespaces ns mything pods mything kube apiserver info handlers go get api namespaces ns mything pods mything kube apiserver info handlers go get api namespaces ns mything pods mything kube apiserver info handlers go get api namespaces ns mything pods mything kube apiserver info handlers go get api namespaces ns mything pods mything note that legit endpoints eg api namespaces ns mything pods mything are also in the mix and those are successful also note that many other endpoints are being checked all successfully the specific endpoint is the only one returning a that invalid endpoint indeed returns curl v get api namespaces ns mything pods mything http user agent curl pc linux gnu libcurl openssl zlib libidn librtmp host accept http not found content type application json date wed jun gmt content length kind status apiversion metadata status failure message pods mything not found reason notfound details name mything kind pods code the problem is that mything is not a pod rather mything and mything are pods mything is just the common base name kubectl server namespace ns mything get pods name ready reason restarts age mything running mything running kubectl server namespace ns mything get rc controller container s image s selector replicas mything mything dev foo com foo mything name mything my rc pod config apiversion kind replicationcontroller metadata name mything namespace ns mything labels name mything spec replicas selector name mything template metadata labels name mything spec containers name mything image dev foo com foo mything ports env name foo value bar is this a wayward api call bug in kubernetes or an indication that i ve missed something in my setup
0
143,474
5,517,705,042
IssuesEvent
2017-03-18 01:04:03
prologinsandbox/site-issues
https://api.github.com/repos/prologinsandbox/site-issues
closed
Nombre de problèmes résolus incorrect
priority:minor state:resolved type:bug
> ###### Originally posted 2015-10-31 11:55 by *some anonymous* on Bitbucket Au questionnaire de sélection 2016, j'ai résolu entièrement 4 problèmes, et j'ai fait plusieurs tentatives ratées sur le dernier. Pourtant, sur la page d'accueil, il est affiché "5/5 problèmes résolus".
1.0
Nombre de problèmes résolus incorrect - > ###### Originally posted 2015-10-31 11:55 by *some anonymous* on Bitbucket Au questionnaire de sélection 2016, j'ai résolu entièrement 4 problèmes, et j'ai fait plusieurs tentatives ratées sur le dernier. Pourtant, sur la page d'accueil, il est affiché "5/5 problèmes résolus".
priority
nombre de problèmes résolus incorrect originally posted by some anonymous on bitbucket au questionnaire de sélection j ai résolu entièrement problèmes et j ai fait plusieurs tentatives ratées sur le dernier pourtant sur la page d accueil il est affiché problèmes résolus
1
487,326
14,040,502,624
IssuesEvent
2020-11-01 03:00:53
codidact/qpixel
https://api.github.com/repos/codidact/qpixel
opened
Tools button isn't clickable for some users (Chrome)
area: frontend complexity: unassessed priority: medium type: bug
https://meta.codidact.com/questions/278096 The reporting user has enough reputation to use one of the tools (Change Category), but clicking on the button doesn't do anything. The question reports: Chrome for Windows (Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.102 Safari/537.36) And a comment adds Chrome on Android. (I can't reproduce in Chrome on a Mac.) The console shows an Uncaught TypeError: https://i.stack.imgur.com/BOuM2.png
1.0
Tools button isn't clickable for some users (Chrome) - https://meta.codidact.com/questions/278096 The reporting user has enough reputation to use one of the tools (Change Category), but clicking on the button doesn't do anything. The question reports: Chrome for Windows (Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.102 Safari/537.36) And a comment adds Chrome on Android. (I can't reproduce in Chrome on a Mac.) The console shows an Uncaught TypeError: https://i.stack.imgur.com/BOuM2.png
priority
tools button isn t clickable for some users chrome the reporting user has enough reputation to use one of the tools change category but clicking on the button doesn t do anything the question reports chrome for windows mozilla windows nt applewebkit khtml like gecko chrome safari and a comment adds chrome on android i can t reproduce in chrome on a mac the console shows an uncaught typeerror
1
105,069
16,624,021,386
IssuesEvent
2021-06-03 07:17:53
Thanraj/OpenSSL_1.0.1_stable
https://api.github.com/repos/Thanraj/OpenSSL_1.0.1_stable
opened
CVE-2008-5077 (Medium) detected in opensslOpenSSL_1_0_1u
security vulnerability
## CVE-2008-5077 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_1u</b></p></summary> <p> <p>Android (AOSP) build for libcrypto and libssl on branch VidityOpenSSL</p> <p>Library home page: <a href=https://github.com/nikolakolarovic/openssl.git>https://github.com/nikolakolarovic/openssl.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/Thanraj/OpenSSL_1.0.1_stable/commit/42e09f8ba04040e5027381a7166c52edccb3f402">42e09f8ba04040e5027381a7166c52edccb3f402</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_1.0.1_stable/apps/spkac.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_1.0.1_stable/apps/spkac.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_1.0.1_stable/apps/spkac.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys. <p>Publish Date: 2009-01-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2008-5077>CVE-2008-5077</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.8</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.openssl.org/news/secadv/20090107.txt">https://www.openssl.org/news/secadv/20090107.txt</a></p> <p>Release Date: 2009-01-07</p> <p>Fix Resolution: 0.9.8j</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2008-5077 (Medium) detected in opensslOpenSSL_1_0_1u - ## CVE-2008-5077 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_1u</b></p></summary> <p> <p>Android (AOSP) build for libcrypto and libssl on branch VidityOpenSSL</p> <p>Library home page: <a href=https://github.com/nikolakolarovic/openssl.git>https://github.com/nikolakolarovic/openssl.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/Thanraj/OpenSSL_1.0.1_stable/commit/42e09f8ba04040e5027381a7166c52edccb3f402">42e09f8ba04040e5027381a7166c52edccb3f402</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_1.0.1_stable/apps/spkac.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_1.0.1_stable/apps/spkac.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_1.0.1_stable/apps/spkac.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys. <p>Publish Date: 2009-01-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2008-5077>CVE-2008-5077</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.8</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.openssl.org/news/secadv/20090107.txt">https://www.openssl.org/news/secadv/20090107.txt</a></p> <p>Release Date: 2009-01-07</p> <p>Fix Resolution: 0.9.8j</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in opensslopenssl cve medium severity vulnerability vulnerable library opensslopenssl android aosp build for libcrypto and libssl on branch vidityopenssl library home page a href found in head commit a href found in base branch master vulnerable source files openssl stable apps spkac c openssl stable apps spkac c openssl stable apps spkac c vulnerability details openssl and earlier does not properly check the return value from the evp verifyfinal function which allows remote attackers to bypass validation of the certificate chain via a malformed ssl tls signature for dsa and ecdsa keys publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
765,095
26,833,056,972
IssuesEvent
2023-02-02 17:18:50
vortexntnu/pca9685-interface
https://api.github.com/repos/vortexntnu/pca9685-interface
closed
Limit ESC Driver code to run thrusters at 70%
enhancement High Priority
Max thrust must be set to 70%. More than that and we risk draining to much current from the batteries X-X - Set Max backwards thrust PWM: 1220 - Set Max forward thrust PWM: 1780 Set max thrust on ESC Hardware with the specific software it uses - Set Max backwards thrust PWM: 1220 - Set Max forward thrust PWM: 1780
1.0
Limit ESC Driver code to run thrusters at 70% - Max thrust must be set to 70%. More than that and we risk draining to much current from the batteries X-X - Set Max backwards thrust PWM: 1220 - Set Max forward thrust PWM: 1780 Set max thrust on ESC Hardware with the specific software it uses - Set Max backwards thrust PWM: 1220 - Set Max forward thrust PWM: 1780
priority
limit esc driver code to run thrusters at max thrust must be set to more than that and we risk draining to much current from the batteries x x set max backwards thrust pwm set max forward thrust pwm set max thrust on esc hardware with the specific software it uses set max backwards thrust pwm set max forward thrust pwm
1
233,092
7,693,577,662
IssuesEvent
2018-05-18 04:38:28
ElektraInitiative/libelektra
https://api.github.com/repos/ElektraInitiative/libelektra
opened
doc: changes to icheck script
low priority
Forgot to add section to doc/news/_preparation_next_release.md mentioning that the icheck script now no longer leaves the base directory.
1.0
doc: changes to icheck script - Forgot to add section to doc/news/_preparation_next_release.md mentioning that the icheck script now no longer leaves the base directory.
priority
doc changes to icheck script forgot to add section to doc news preparation next release md mentioning that the icheck script now no longer leaves the base directory
1
162,765
6,167,977,210
IssuesEvent
2017-06-30 00:53:57
afranka70/AbOutIssues
https://api.github.com/repos/afranka70/AbOutIssues
closed
Add "Administrator" designation to Users
AbOutPE Administrator New Feature Priority2 Users
# AbOut Version DevPEv0.2 # Description The current User list does not show the user role: ![image](https://cloud.githubusercontent.com/assets/25726083/26749595/abb140d4-47cb-11e7-996d-96c1084fc955.png) In DevPEv0.3 with the AbOutPE1 database, a few users can take the role of administrator. The only other role is 'instructor'. Since the instructors may need to contact an administrator this role should show on the list: ![image](https://cloud.githubusercontent.com/assets/25726083/26749648/bfacca9e-47cc-11e7-8d71-4e66b4646bad.png) Assuming that at the time this screen was requested only Frank Ackerman and Kodie Neumiller had their User/adminFlag set to 1. # Related issues
1.0
Add "Administrator" designation to Users - # AbOut Version DevPEv0.2 # Description The current User list does not show the user role: ![image](https://cloud.githubusercontent.com/assets/25726083/26749595/abb140d4-47cb-11e7-996d-96c1084fc955.png) In DevPEv0.3 with the AbOutPE1 database, a few users can take the role of administrator. The only other role is 'instructor'. Since the instructors may need to contact an administrator this role should show on the list: ![image](https://cloud.githubusercontent.com/assets/25726083/26749648/bfacca9e-47cc-11e7-8d71-4e66b4646bad.png) Assuming that at the time this screen was requested only Frank Ackerman and Kodie Neumiller had their User/adminFlag set to 1. # Related issues
priority
add administrator designation to users about version description the current user list does not show the user role in with the database a few users can take the role of administrator the only other role is instructor since the instructors may need to contact an administrator this role should show on the list assuming that at the time this screen was requested only frank ackerman and kodie neumiller had their user adminflag set to related issues
1
18,800
13,237,323,439
IssuesEvent
2020-08-18 21:26:27
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Strings are not automatically converted to StringNames
bug topic:gdscript usability
<!-- Please search existing issues for potential duplicates before filing yours: https://github.com/godotengine/godot/issues?q=is%3Aissue --> **Godot version:** <!-- Specify commit hash if using non-official build. --> 08d3d06 **Issue description:** <!-- What happened, and what was expected. --> This doesn't work: ``` connect("body_entered", Callable(self, "entered")) ``` You need to use StringName explicitly: ``` connect("body_entered", Callable(self, StringName("entered"))) ``` Strings used to be converted automatically.
True
Strings are not automatically converted to StringNames - <!-- Please search existing issues for potential duplicates before filing yours: https://github.com/godotengine/godot/issues?q=is%3Aissue --> **Godot version:** <!-- Specify commit hash if using non-official build. --> 08d3d06 **Issue description:** <!-- What happened, and what was expected. --> This doesn't work: ``` connect("body_entered", Callable(self, "entered")) ``` You need to use StringName explicitly: ``` connect("body_entered", Callable(self, StringName("entered"))) ``` Strings used to be converted automatically.
non_priority
strings are not automatically converted to stringnames please search existing issues for potential duplicates before filing yours godot version issue description this doesn t work connect body entered callable self entered you need to use stringname explicitly connect body entered callable self stringname entered strings used to be converted automatically
0
403,022
27,398,204,158
IssuesEvent
2023-02-28 21:34:51
o3de/o3de.org
https://api.github.com/repos/o3de/o3de.org
closed
Multiplayer Template
feature/networking kind/documentation priority/major sig/network triage/accepted
## Describe the issue briefly The Multiplayer Template should be mentioned somewhere in documentation for users trying to set up multiplayer ## Which page(s) / section(s) are affected? Please add a link for how to use the Multiplayer Template here so new users dont fall into a rabbit hole of having to edit cmake files + create their own spawners etc. https://www.o3de.org/docs/user-guide/networking/multiplayer/configuration/ ## Does this work have an engineering dependency? What is it? No
1.0
Multiplayer Template - ## Describe the issue briefly The Multiplayer Template should be mentioned somewhere in documentation for users trying to set up multiplayer ## Which page(s) / section(s) are affected? Please add a link for how to use the Multiplayer Template here so new users dont fall into a rabbit hole of having to edit cmake files + create their own spawners etc. https://www.o3de.org/docs/user-guide/networking/multiplayer/configuration/ ## Does this work have an engineering dependency? What is it? No
non_priority
multiplayer template describe the issue briefly the multiplayer template should be mentioned somewhere in documentation for users trying to set up multiplayer which page s section s are affected please add a link for how to use the multiplayer template here so new users dont fall into a rabbit hole of having to edit cmake files create their own spawners etc does this work have an engineering dependency what is it no
0
71,141
15,183,284,824
IssuesEvent
2021-02-15 07:53:32
devikab2b/mavenwitthwhitesource
https://api.github.com/repos/devikab2b/mavenwitthwhitesource
opened
CVE-2020-8908 (Low) detected in guava-11.0.2.jar
security vulnerability
## CVE-2020-8908 - Low Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>guava-11.0.2.jar</b></p></summary> <p>Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more. This project is a complete packaging of all the Guava libraries into a single jar. Individual portions of Guava can be used by downloading the appropriate module and its dependencies. Guava (complete) has only one code dependency - javax.annotation, per the JSR-305 spec.</p> <p>Library home page: <a href="http://code.google.com/p/guava-libraries">http://code.google.com/p/guava-libraries</a></p> <p>Path to dependency file: mavenwitthwhitesource/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/11.0.2/guava-11.0.2.jar</p> <p> Dependency Hierarchy: - spark-core_2.12-3.1.0.jar (Root Library) - hadoop-client-3.2.0.jar - hadoop-common-3.2.0.jar - :x: **guava-11.0.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/devikab2b/mavenwitthwhitesource/commit/091097f9d56e9bca2b5bc60c2ce79dd7d4ddf2f6">091097f9d56e9bca2b5bc60c2ce79dd7d4ddf2f6</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A temp directory creation vulnerability exist in Guava versions prior to 30.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava com.google.common.io.Files.createTempDir(). The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the files open. We recommend updating Guava to version 30.0 or later, or update to Java 7 or later, or to explicitly change the permissions after the creation of the directory if neither are possible. <p>Publish Date: 2020-12-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8908>CVE-2020-8908</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>3.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908</a></p> <p>Release Date: 2020-12-10</p> <p>Fix Resolution: v30.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-8908 (Low) detected in guava-11.0.2.jar - ## CVE-2020-8908 - Low Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>guava-11.0.2.jar</b></p></summary> <p>Guava is a suite of core and expanded libraries that include utility classes, google's collections, io classes, and much much more. This project is a complete packaging of all the Guava libraries into a single jar. Individual portions of Guava can be used by downloading the appropriate module and its dependencies. Guava (complete) has only one code dependency - javax.annotation, per the JSR-305 spec.</p> <p>Library home page: <a href="http://code.google.com/p/guava-libraries">http://code.google.com/p/guava-libraries</a></p> <p>Path to dependency file: mavenwitthwhitesource/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/11.0.2/guava-11.0.2.jar</p> <p> Dependency Hierarchy: - spark-core_2.12-3.1.0.jar (Root Library) - hadoop-client-3.2.0.jar - hadoop-common-3.2.0.jar - :x: **guava-11.0.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/devikab2b/mavenwitthwhitesource/commit/091097f9d56e9bca2b5bc60c2ce79dd7d4ddf2f6">091097f9d56e9bca2b5bc60c2ce79dd7d4ddf2f6</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A temp directory creation vulnerability exist in Guava versions prior to 30.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava com.google.common.io.Files.createTempDir(). The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the files open. We recommend updating Guava to version 30.0 or later, or update to Java 7 or later, or to explicitly change the permissions after the creation of the directory if neither are possible. <p>Publish Date: 2020-12-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8908>CVE-2020-8908</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>3.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908</a></p> <p>Release Date: 2020-12-10</p> <p>Fix Resolution: v30.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve low detected in guava jar cve low severity vulnerability vulnerable library guava jar guava is a suite of core and expanded libraries that include utility classes google s collections io classes and much much more this project is a complete packaging of all the guava libraries into a single jar individual portions of guava can be used by downloading the appropriate module and its dependencies guava complete has only one code dependency javax annotation per the jsr spec library home page a href path to dependency file mavenwitthwhitesource pom xml path to vulnerable library home wss scanner repository com google guava guava guava jar dependency hierarchy spark core jar root library hadoop client jar hadoop common jar x guava jar vulnerable library found in head commit a href found in base branch main vulnerability details a temp directory creation vulnerability exist in guava versions prior to allowing an attacker with access to the machine to potentially access data in a temporary directory created by the guava com google common io files createtempdir the permissions granted to the directory created default to the standard unix like tmp ones leaving the files open we recommend updating guava to version or later or update to java or later or to explicitly change the permissions after the creation of the directory if neither are possible publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
34,665
12,294,678,297
IssuesEvent
2020-05-11 01:06:14
LevyForchh/ant-design-pro
https://api.github.com/repos/LevyForchh/ant-design-pro
opened
WS-2020-0068 (High) detected in yargs-parser-16.1.0.tgz, yargs-parser-10.1.0.tgz
security vulnerability
## WS-2020-0068 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>yargs-parser-16.1.0.tgz</b>, <b>yargs-parser-10.1.0.tgz</b></p></summary> <p> <details><summary><b>yargs-parser-16.1.0.tgz</b></p></summary> <p>the mighty option parser used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-16.1.0.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-16.1.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/ant-design-pro/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/ant-design-pro/node_modules/@ant-design/pro-cli/node_modules/yargs-parser/package.json</p> <p> Dependency Hierarchy: - pro-cli-1.0.20.tgz (Root Library) - :x: **yargs-parser-16.1.0.tgz** (Vulnerable Library) </details> <details><summary><b>yargs-parser-10.1.0.tgz</b></p></summary> <p>the mighty option parser used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-10.1.0.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-10.1.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/ant-design-pro/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/ant-design-pro/node_modules/umi-uni18n/node_modules/meow/node_modules/yargs-parser/package.json</p> <p> Dependency Hierarchy: - fabric-2.0.8.tgz (Root Library) - stylelint-config-rational-order-0.1.2.tgz - stylelint-9.10.1.tgz - meow-5.0.0.tgz - :x: **yargs-parser-10.1.0.tgz** (Vulnerable Library) </details> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Affected versions of yargs-parser are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument --foo.__proto__.bar baz' adds a bar property with value baz to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser. <p>Publish Date: 2020-05-01 <p>URL: <a href=https://www.npmjs.com/advisories/1500>WS-2020-0068</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/package/yargs-parser">https://www.npmjs.com/package/yargs-parser</a></p> <p>Release Date: 2020-05-04</p> <p>Fix Resolution: https://www.npmjs.com/package/yargs-parser/v/18.1.2,https://www.npmjs.com/package/yargs-parser/v/15.0.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"yargs-parser","packageVersion":"16.1.0","isTransitiveDependency":true,"dependencyTree":"@ant-design/pro-cli:1.0.20;yargs-parser:16.1.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"https://www.npmjs.com/package/yargs-parser/v/18.1.2,https://www.npmjs.com/package/yargs-parser/v/15.0.1"},{"packageType":"javascript/Node.js","packageName":"yargs-parser","packageVersion":"10.1.0","isTransitiveDependency":true,"dependencyTree":"@umijs/fabric:2.0.8;stylelint-config-rational-order:0.1.2;stylelint:9.10.1;meow:5.0.0;yargs-parser:10.1.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"https://www.npmjs.com/package/yargs-parser/v/18.1.2,https://www.npmjs.com/package/yargs-parser/v/15.0.1"}],"vulnerabilityIdentifier":"WS-2020-0068","vulnerabilityDetails":"Affected versions of yargs-parser are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument --foo.__proto__.bar baz\u0027 adds a bar property with value baz to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser.","vulnerabilityUrl":"https://www.npmjs.com/advisories/1500","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Adjacent","I":"High"},"extraData":{}}</REMEDIATE> -->
True
WS-2020-0068 (High) detected in yargs-parser-16.1.0.tgz, yargs-parser-10.1.0.tgz - ## WS-2020-0068 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>yargs-parser-16.1.0.tgz</b>, <b>yargs-parser-10.1.0.tgz</b></p></summary> <p> <details><summary><b>yargs-parser-16.1.0.tgz</b></p></summary> <p>the mighty option parser used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-16.1.0.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-16.1.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/ant-design-pro/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/ant-design-pro/node_modules/@ant-design/pro-cli/node_modules/yargs-parser/package.json</p> <p> Dependency Hierarchy: - pro-cli-1.0.20.tgz (Root Library) - :x: **yargs-parser-16.1.0.tgz** (Vulnerable Library) </details> <details><summary><b>yargs-parser-10.1.0.tgz</b></p></summary> <p>the mighty option parser used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-10.1.0.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-10.1.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/ant-design-pro/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/ant-design-pro/node_modules/umi-uni18n/node_modules/meow/node_modules/yargs-parser/package.json</p> <p> Dependency Hierarchy: - fabric-2.0.8.tgz (Root Library) - stylelint-config-rational-order-0.1.2.tgz - stylelint-9.10.1.tgz - meow-5.0.0.tgz - :x: **yargs-parser-10.1.0.tgz** (Vulnerable Library) </details> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Affected versions of yargs-parser are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument --foo.__proto__.bar baz' adds a bar property with value baz to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser. <p>Publish Date: 2020-05-01 <p>URL: <a href=https://www.npmjs.com/advisories/1500>WS-2020-0068</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/package/yargs-parser">https://www.npmjs.com/package/yargs-parser</a></p> <p>Release Date: 2020-05-04</p> <p>Fix Resolution: https://www.npmjs.com/package/yargs-parser/v/18.1.2,https://www.npmjs.com/package/yargs-parser/v/15.0.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"yargs-parser","packageVersion":"16.1.0","isTransitiveDependency":true,"dependencyTree":"@ant-design/pro-cli:1.0.20;yargs-parser:16.1.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"https://www.npmjs.com/package/yargs-parser/v/18.1.2,https://www.npmjs.com/package/yargs-parser/v/15.0.1"},{"packageType":"javascript/Node.js","packageName":"yargs-parser","packageVersion":"10.1.0","isTransitiveDependency":true,"dependencyTree":"@umijs/fabric:2.0.8;stylelint-config-rational-order:0.1.2;stylelint:9.10.1;meow:5.0.0;yargs-parser:10.1.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"https://www.npmjs.com/package/yargs-parser/v/18.1.2,https://www.npmjs.com/package/yargs-parser/v/15.0.1"}],"vulnerabilityIdentifier":"WS-2020-0068","vulnerabilityDetails":"Affected versions of yargs-parser are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument --foo.__proto__.bar baz\u0027 adds a bar property with value baz to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser.","vulnerabilityUrl":"https://www.npmjs.com/advisories/1500","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Adjacent","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
ws high detected in yargs parser tgz yargs parser tgz ws high severity vulnerability vulnerable libraries yargs parser tgz yargs parser tgz yargs parser tgz the mighty option parser used by yargs library home page a href path to dependency file tmp ws scm ant design pro package json path to vulnerable library tmp ws scm ant design pro node modules ant design pro cli node modules yargs parser package json dependency hierarchy pro cli tgz root library x yargs parser tgz vulnerable library yargs parser tgz the mighty option parser used by yargs library home page a href path to dependency file tmp ws scm ant design pro package json path to vulnerable library tmp ws scm ant design pro node modules umi node modules meow node modules yargs parser package json dependency hierarchy fabric tgz root library stylelint config rational order tgz stylelint tgz meow tgz x yargs parser tgz vulnerable library vulnerability details affected versions of yargs parser are vulnerable to prototype pollution arguments are not properly sanitized allowing an attacker to modify the prototype of object causing the addition or modification of an existing property that will exist on all objects parsing the argument foo proto bar baz adds a bar property with value baz to all objects this is only exploitable if attackers have control over the arguments being passed to yargs parser publish date url a href cvss score details base score metrics exploitability metrics attack vector adjacent attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier ws vulnerabilitydetails affected versions of yargs parser are vulnerable to prototype pollution arguments are not properly sanitized allowing an attacker to modify the prototype of object causing the addition or modification of an existing property that will exist on all objects parsing the argument foo proto bar baz adds a bar property with value baz to all objects this is only exploitable if attackers have control over the arguments being passed to yargs parser vulnerabilityurl
0
132,578
5,188,817,102
IssuesEvent
2017-01-20 21:09:37
DSheirer/sdrtrunk
https://api.github.com/repos/DSheirer/sdrtrunk
opened
Add capability to blacklist Tuners by serial number
enhancement Priority-Medium
Add capability for user to select a tuner and designate it as 'blacklisted', meaning that the tuner should not be used by the application. Since this can only be done if/when the application is aware of the tuner, add the capability to the 'Tuners' pane and indicate to the user that they must restart the application for the setting to take effect. On startup, the TunerManager should verify each tuner against the blacklisting and release the USB device when a tuner is blacklisted.
1.0
Add capability to blacklist Tuners by serial number - Add capability for user to select a tuner and designate it as 'blacklisted', meaning that the tuner should not be used by the application. Since this can only be done if/when the application is aware of the tuner, add the capability to the 'Tuners' pane and indicate to the user that they must restart the application for the setting to take effect. On startup, the TunerManager should verify each tuner against the blacklisting and release the USB device when a tuner is blacklisted.
priority
add capability to blacklist tuners by serial number add capability for user to select a tuner and designate it as blacklisted meaning that the tuner should not be used by the application since this can only be done if when the application is aware of the tuner add the capability to the tuners pane and indicate to the user that they must restart the application for the setting to take effect on startup the tunermanager should verify each tuner against the blacklisting and release the usb device when a tuner is blacklisted
1
744,867
25,958,769,527
IssuesEvent
2022-12-18 15:51:19
CosmosOS/Cosmos
https://api.github.com/repos/CosmosOS/Cosmos
closed
Deleting file and directory not working
Bug Up for Grabs Complexity: Medium Priority: Low Area: File System
#### Area of Cosmos - What area of Cosmos are we dealing with? File system #### Expected Behaviour - What do you think that should happen? I should be able to delete files and directories when I want. #### Actual Behaviour - What unexpectedly happens? I can only delete files and directories after I created them, after I close VMware and I re-open it (via the Start button in VS 2019) I can't delete them anymore. **However this only seems to happen to folders and files I create, as I was able to delete the directory TEST, though it got created automatically.** #### Reproduction - How did you get this error to appear? Initialize a CosmosVFS, then create a file or directory, close and open VMware again (from VS 2019 via the Start button, or F5) and try to delete the file or directory you've created. #### Version - Were you using the User Kit or Dev Kit? And what User Kit version or Dev Kit commit (Cosmos, IL2CPU, X#)? Latest User Kit (20200708)
1.0
Deleting file and directory not working - #### Area of Cosmos - What area of Cosmos are we dealing with? File system #### Expected Behaviour - What do you think that should happen? I should be able to delete files and directories when I want. #### Actual Behaviour - What unexpectedly happens? I can only delete files and directories after I created them, after I close VMware and I re-open it (via the Start button in VS 2019) I can't delete them anymore. **However this only seems to happen to folders and files I create, as I was able to delete the directory TEST, though it got created automatically.** #### Reproduction - How did you get this error to appear? Initialize a CosmosVFS, then create a file or directory, close and open VMware again (from VS 2019 via the Start button, or F5) and try to delete the file or directory you've created. #### Version - Were you using the User Kit or Dev Kit? And what User Kit version or Dev Kit commit (Cosmos, IL2CPU, X#)? Latest User Kit (20200708)
priority
deleting file and directory not working area of cosmos what area of cosmos are we dealing with file system expected behaviour what do you think that should happen i should be able to delete files and directories when i want actual behaviour what unexpectedly happens i can only delete files and directories after i created them after i close vmware and i re open it via the start button in vs i can t delete them anymore however this only seems to happen to folders and files i create as i was able to delete the directory test though it got created automatically reproduction how did you get this error to appear initialize a cosmosvfs then create a file or directory close and open vmware again from vs via the start button or and try to delete the file or directory you ve created version were you using the user kit or dev kit and what user kit version or dev kit commit cosmos x latest user kit
1
20,901
10,559,069,657
IssuesEvent
2019-10-04 10:36:13
ChetanSankhala/LoadGenerator
https://api.github.com/repos/ChetanSankhala/LoadGenerator
opened
CVE-2019-14439 (High) detected in jackson-databind-2.9.8.jar
security vulnerability
## CVE-2019-14439 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar,/root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.5.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.5.RELEASE.jar - jackson-datatype-jsr310-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ChetanSankhala/LoadGenerator/commit/e089e2de446515ceaa8823faf12dd7f232e28679">e089e2de446515ceaa8823faf12dd7f232e28679</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath. <p>Publish Date: 2019-07-30 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439>CVE-2019-14439</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439</a></p> <p>Release Date: 2019-07-30</p> <p>Fix Resolution: 2.9.9.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-14439 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2019-14439 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar,/root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.1.5.RELEASE.jar (Root Library) - spring-boot-starter-json-2.1.5.RELEASE.jar - jackson-datatype-jsr310-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ChetanSankhala/LoadGenerator/commit/e089e2de446515ceaa8823faf12dd7f232e28679">e089e2de446515ceaa8823faf12dd7f232e28679</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath. <p>Publish Date: 2019-07-30 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439>CVE-2019-14439</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439</a></p> <p>Release Date: 2019-07-30</p> <p>Fix Resolution: 2.9.9.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library root gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar root gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar jackson datatype jar x jackson databind jar vulnerable library found in head commit a href vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind x before this occurs when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the logback jar in the classpath publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
500,233
14,493,909,364
IssuesEvent
2020-12-11 09:09:11
renovatebot/renovate
https://api.github.com/repos/renovatebot/renovate
closed
Support limiting concurrent requests per host
priority-3-normal type:feature
**What would you like Renovate to be able to do?** Provide a configurable way and sensible defaults for concurrent limits per host. **Describe the solution you'd like** Implement it in the util/http logic. Mostly it should just work, but users can tweak it using hostRules. **Describe alternatives you've considered** Today we try to rate limit by manager and package file, etc. It would be easier to have full concurrency of those and rely on the http layer to do rate limiting instead.
1.0
Support limiting concurrent requests per host - **What would you like Renovate to be able to do?** Provide a configurable way and sensible defaults for concurrent limits per host. **Describe the solution you'd like** Implement it in the util/http logic. Mostly it should just work, but users can tweak it using hostRules. **Describe alternatives you've considered** Today we try to rate limit by manager and package file, etc. It would be easier to have full concurrency of those and rely on the http layer to do rate limiting instead.
priority
support limiting concurrent requests per host what would you like renovate to be able to do provide a configurable way and sensible defaults for concurrent limits per host describe the solution you d like implement it in the util http logic mostly it should just work but users can tweak it using hostrules describe alternatives you ve considered today we try to rate limit by manager and package file etc it would be easier to have full concurrency of those and rely on the http layer to do rate limiting instead
1
830,644
32,019,769,063
IssuesEvent
2023-09-22 02:47:08
UNopenGIS/7
https://api.github.com/repos/UNopenGIS/7
closed
Project Airbase: プロジェクトアイディア
help wanted priority/SHOULD
#214 直前の今考えるべきことではないかも知れませんが、 #221 での議論を踏まえ、 #205 Kalaja Architecture を踏まえて、Raspberry Pi 群をリモートに配置する形で研修環境を提供するというアイディアについて少し練ってみました。後で考えるためにおいておきます。 ## 情報: Kalaja アーキテクチャ ![image](https://github.com/UNopenGIS/7/assets/18297/e12572a8-b182-47c3-ad9a-bf2f1fd45ecc) ## 基本的アイディア - Raspberry Pi をリモート化した場合、問題となるのはアカウントの配布方法であろう。 - とりあえず、**SSHキーベースのログイン**を求めるのが枯れていて順当であろう。 - **事前に公開鍵を集めておいて、jump host 及び hosts に ~/.ssh/authorized_keys をセットアップする**という戦略でどうか。 - Ansible とかで構成管理をするのか。それとも、@yuiseki さんが以前実施されていたように、MicroSD 用イメージをセットアップするという手法をとる方が現実的か。 ## 要検討事項 - [ ] マルチユーザにするのか、pi 相当のシングルユーザでやるのか。マルチユーザを実現するのは(UNIX的には普通であっても、)どれくらい面倒か。そもそも、ユーザ名を決めてもらったり、かぶりをチェックするのは面倒ではないか。メールアドレスがユーザ名になる、といったような割り切った運用にしたほうがよいかも。あるいは、機体番号を割り振って「jump host に入ったら、この機体番号の Raspberry Pi にログインしてね。この機体にだけあなたの公開鍵をセットしておきます。といった運用。」 ## ユーザーストーリー 1. 参加者は、ワークショップに参加したい。参加要領によれば、公開鍵を送れとあるので公開鍵を主催者に送る。 2. 主催者は、公開鍵に機体番号を割り当てて、参加者に案内を返す。 3. ワークショップ当日。参加者はまずジャンプホストにログインする。ジャンプホストにも公開鍵を登録してあるので、参加者はパスワードレスにログインできる。 4. 参加者は、案内に基づき、ジャンプホストから指定機体番号のRaspberry Piにログインする。ここもパスワードレスで進めることができる。演習はすべて指定機体で行う。 5. 演習の結果はIPFSに置かれるので、参加者はCIDを持ち帰ればデータを持ち帰ることができる。 6. ワークショップ後、一定のグレースピリオドを経て、主催者は機体番号のRaspberry Piをリセットする。公開鍵も処分される。 ## 概念整理 1. jump host と Raspberry Pi 機体で構成される施設を Airbase(航空基地)と呼ぶことにします。Kalaja が多数からのリモートユース対応したもの(近代化したもの)が Airbase というイメージです。 2. Airbase とワークショップの場所がネットワーク的に近い、あるいは同一ネットワークである場合には、Airbase だけでワークショップができます。JICA 国家測量研修の場合はそのアレンジメントでしょう。 3. Airbase とワークショップの場所がネットワーク的に遠い場合には、ウェブ地図で致命的な低レイテンシー確保を「ワークショップの側に IPFS Node 及びゲートウェイを置く」ということで実施するべきかも知れません。ワークショップの題材にもよるでしょう。10MB程度のプロジェクトであれば、それほど気にする必要はないかも知れません。Airbase 側で add された CID をワークショップ側の Node で自動的に pin するみたいなことをするのかもしれません。 ## 気になること - Ansible を勤勉に書いていくということは SMG (Smart Maps Group) が得意とする技法(technique)に含まれるのだろうか。エンタープライズすぎたりしないか。 - IaaS や FileCoin を再発明するようなことになるのかもしれない。だとすれば逆にアリモノの技術があるのかも。 ## どう思いますか @yuiseki @smellman @mapconcierge
1.0
Project Airbase: プロジェクトアイディア - #214 直前の今考えるべきことではないかも知れませんが、 #221 での議論を踏まえ、 #205 Kalaja Architecture を踏まえて、Raspberry Pi 群をリモートに配置する形で研修環境を提供するというアイディアについて少し練ってみました。後で考えるためにおいておきます。 ## 情報: Kalaja アーキテクチャ ![image](https://github.com/UNopenGIS/7/assets/18297/e12572a8-b182-47c3-ad9a-bf2f1fd45ecc) ## 基本的アイディア - Raspberry Pi をリモート化した場合、問題となるのはアカウントの配布方法であろう。 - とりあえず、**SSHキーベースのログイン**を求めるのが枯れていて順当であろう。 - **事前に公開鍵を集めておいて、jump host 及び hosts に ~/.ssh/authorized_keys をセットアップする**という戦略でどうか。 - Ansible とかで構成管理をするのか。それとも、@yuiseki さんが以前実施されていたように、MicroSD 用イメージをセットアップするという手法をとる方が現実的か。 ## 要検討事項 - [ ] マルチユーザにするのか、pi 相当のシングルユーザでやるのか。マルチユーザを実現するのは(UNIX的には普通であっても、)どれくらい面倒か。そもそも、ユーザ名を決めてもらったり、かぶりをチェックするのは面倒ではないか。メールアドレスがユーザ名になる、といったような割り切った運用にしたほうがよいかも。あるいは、機体番号を割り振って「jump host に入ったら、この機体番号の Raspberry Pi にログインしてね。この機体にだけあなたの公開鍵をセットしておきます。といった運用。」 ## ユーザーストーリー 1. 参加者は、ワークショップに参加したい。参加要領によれば、公開鍵を送れとあるので公開鍵を主催者に送る。 2. 主催者は、公開鍵に機体番号を割り当てて、参加者に案内を返す。 3. ワークショップ当日。参加者はまずジャンプホストにログインする。ジャンプホストにも公開鍵を登録してあるので、参加者はパスワードレスにログインできる。 4. 参加者は、案内に基づき、ジャンプホストから指定機体番号のRaspberry Piにログインする。ここもパスワードレスで進めることができる。演習はすべて指定機体で行う。 5. 演習の結果はIPFSに置かれるので、参加者はCIDを持ち帰ればデータを持ち帰ることができる。 6. ワークショップ後、一定のグレースピリオドを経て、主催者は機体番号のRaspberry Piをリセットする。公開鍵も処分される。 ## 概念整理 1. jump host と Raspberry Pi 機体で構成される施設を Airbase(航空基地)と呼ぶことにします。Kalaja が多数からのリモートユース対応したもの(近代化したもの)が Airbase というイメージです。 2. Airbase とワークショップの場所がネットワーク的に近い、あるいは同一ネットワークである場合には、Airbase だけでワークショップができます。JICA 国家測量研修の場合はそのアレンジメントでしょう。 3. Airbase とワークショップの場所がネットワーク的に遠い場合には、ウェブ地図で致命的な低レイテンシー確保を「ワークショップの側に IPFS Node 及びゲートウェイを置く」ということで実施するべきかも知れません。ワークショップの題材にもよるでしょう。10MB程度のプロジェクトであれば、それほど気にする必要はないかも知れません。Airbase 側で add された CID をワークショップ側の Node で自動的に pin するみたいなことをするのかもしれません。 ## 気になること - Ansible を勤勉に書いていくということは SMG (Smart Maps Group) が得意とする技法(technique)に含まれるのだろうか。エンタープライズすぎたりしないか。 - IaaS や FileCoin を再発明するようなことになるのかもしれない。だとすれば逆にアリモノの技術があるのかも。 ## どう思いますか @yuiseki @smellman @mapconcierge
priority
project airbase プロジェクトアイディア 直前の今考えるべきことではないかも知れませんが、 での議論を踏まえ、 kalaja architecture を踏まえて、raspberry pi 群をリモートに配置する形で研修環境を提供するというアイディアについて少し練ってみました。後で考えるためにおいておきます。 情報 kalaja アーキテクチャ 基本的アイディア raspberry pi をリモート化した場合、問題となるのはアカウントの配布方法であろう。 とりあえず、 sshキーベースのログイン を求めるのが枯れていて順当であろう。 事前に公開鍵を集めておいて、jump host 及び hosts に ssh authorized keys をセットアップする という戦略でどうか。 ansible とかで構成管理をするのか。それとも、 yuiseki さんが以前実施されていたように、microsd 用イメージをセットアップするという手法をとる方が現実的か。 要検討事項 マルチユーザにするのか、pi 相当のシングルユーザでやるのか。マルチユーザを実現するのは(unix的には普通であっても、)どれくらい面倒か。そもそも、ユーザ名を決めてもらったり、かぶりをチェックするのは面倒ではないか。メールアドレスがユーザ名になる、といったような割り切った運用にしたほうがよいかも。あるいは、機体番号を割り振って「jump host に入ったら、この機体番号の raspberry pi にログインしてね。この機体にだけあなたの公開鍵をセットしておきます。といった運用。」 ユーザーストーリー 参加者は、ワークショップに参加したい。参加要領によれば、公開鍵を送れとあるので公開鍵を主催者に送る。 主催者は、公開鍵に機体番号を割り当てて、参加者に案内を返す。 ワークショップ当日。参加者はまずジャンプホストにログインする。ジャンプホストにも公開鍵を登録してあるので、参加者はパスワードレスにログインできる。 参加者は、案内に基づき、ジャンプホストから指定機体番号のraspberry piにログインする。ここもパスワードレスで進めることができる。演習はすべて指定機体で行う。 演習の結果はipfsに置かれるので、参加者はcidを持ち帰ればデータを持ち帰ることができる。 ワークショップ後、一定のグレースピリオドを経て、主催者は機体番号のraspberry piをリセットする。公開鍵も処分される。 概念整理 jump host と raspberry pi 機体で構成される施設を airbase(航空基地)と呼ぶことにします。kalaja が多数からのリモートユース対応したもの(近代化したもの)が airbase というイメージです。 airbase とワークショップの場所がネットワーク的に近い、あるいは同一ネットワークである場合には、airbase だけでワークショップができます。jica 国家測量研修の場合はそのアレンジメントでしょう。 airbase とワークショップの場所がネットワーク的に遠い場合には、ウェブ地図で致命的な低レイテンシー確保を「ワークショップの側に ipfs node 及びゲートウェイを置く」ということで実施するべきかも知れません。ワークショップの題材にもよるでしょう。 、それほど気にする必要はないかも知れません。airbase 側で add された cid をワークショップ側の node で自動的に pin するみたいなことをするのかもしれません。 気になること ansible を勤勉に書いていくということは smg smart maps group が得意とする技法(technique)に含まれるのだろうか。エンタープライズすぎたりしないか。 iaas や filecoin を再発明するようなことになるのかもしれない。だとすれば逆にアリモノの技術があるのかも。 どう思いますか yuiseki smellman mapconcierge
1
144,473
5,540,865,262
IssuesEvent
2017-03-22 11:14:26
bedita/bedita
https://api.github.com/repos/bedita/bedita
closed
Patching an entity with `date_ranges` adds new ranges instead of replacing
Priority - High Topic - API Type - Bug
When issuing a `PATCH` request on a BEdita object that already had one or more `date_ranges`, the ranges passed in the request are added to the list of object's ranges, instead of replacing existent ones.
1.0
Patching an entity with `date_ranges` adds new ranges instead of replacing - When issuing a `PATCH` request on a BEdita object that already had one or more `date_ranges`, the ranges passed in the request are added to the list of object's ranges, instead of replacing existent ones.
priority
patching an entity with date ranges adds new ranges instead of replacing when issuing a patch request on a bedita object that already had one or more date ranges the ranges passed in the request are added to the list of object s ranges instead of replacing existent ones
1
626,133
19,785,976,500
IssuesEvent
2022-01-18 06:47:32
Valdes-Tresanco-MS/gmx_MMPBSA
https://api.github.com/repos/Valdes-Tresanco-MS/gmx_MMPBSA
closed
Improve gmx_MMPBSA_test
low priority improvement
- [ ] Add a flag to overwrite or not the folder where the repository with the examples was cloned. It would be something like `gmx_MMPBSA_test` [`-nr` / `-noreuse`] (Default = True) `-nr` will store a 'store_false' action - [ ] Add a flag to delete the test folder once finished - [x] Add the use of MPI for the examples if possible
1.0
Improve gmx_MMPBSA_test - - [ ] Add a flag to overwrite or not the folder where the repository with the examples was cloned. It would be something like `gmx_MMPBSA_test` [`-nr` / `-noreuse`] (Default = True) `-nr` will store a 'store_false' action - [ ] Add a flag to delete the test folder once finished - [x] Add the use of MPI for the examples if possible
priority
improve gmx mmpbsa test add a flag to overwrite or not the folder where the repository with the examples was cloned it would be something like gmx mmpbsa test default true nr will store a store false action add a flag to delete the test folder once finished add the use of mpi for the examples if possible
1
55,361
14,403,623,168
IssuesEvent
2020-12-03 16:16:46
jOOQ/jOOQ
https://api.github.com/repos/jOOQ/jOOQ
closed
Wrong SQL generated when DomainDataType is loaded before base SQLDataType for SQLDialect.DEFAULT
C: Functionality E: All Editions P: Medium T: Defect
I'm not sure how easy it is to reproduce this, but a recent change in the integration tests lead to the situation where a PostgreSQL domain type that is based on JSONB from #10309 for this table: ```sql create domain u_10309 as jsonb; create table t_10309 ( id int, c1 jsonb, c2 u_10309, c3 jsonb[], c4 u_10309[], constraint pk_t_10309 primary key (id) ); ``` ... lead to the domain type being registered in `DefaultDataType.TYPES_BY_SQL_DATATYPE[SQLDialect.DEFAULT.ordinal()]` *before* the `SQLDataType.JSON` type. As a side effect, a bind variable cast was missing when inserting the value for column `c2`, producing an error.
1.0
Wrong SQL generated when DomainDataType is loaded before base SQLDataType for SQLDialect.DEFAULT - I'm not sure how easy it is to reproduce this, but a recent change in the integration tests lead to the situation where a PostgreSQL domain type that is based on JSONB from #10309 for this table: ```sql create domain u_10309 as jsonb; create table t_10309 ( id int, c1 jsonb, c2 u_10309, c3 jsonb[], c4 u_10309[], constraint pk_t_10309 primary key (id) ); ``` ... lead to the domain type being registered in `DefaultDataType.TYPES_BY_SQL_DATATYPE[SQLDialect.DEFAULT.ordinal()]` *before* the `SQLDataType.JSON` type. As a side effect, a bind variable cast was missing when inserting the value for column `c2`, producing an error.
non_priority
wrong sql generated when domaindatatype is loaded before base sqldatatype for sqldialect default i m not sure how easy it is to reproduce this but a recent change in the integration tests lead to the situation where a postgresql domain type that is based on jsonb from for this table sql create domain u as jsonb create table t id int jsonb u jsonb u constraint pk t primary key id lead to the domain type being registered in defaultdatatype types by sql datatype before the sqldatatype json type as a side effect a bind variable cast was missing when inserting the value for column producing an error
0
98,243
4,019,086,349
IssuesEvent
2016-05-16 13:43:30
BugBusterSWE/MaaS
https://api.github.com/repos/BugBusterSWE/MaaS
closed
DatabaseModel.ts
backend priority:medium Programmer
Activity #2 Scrivere il modulo DatabaseModel.ts. Vedere la documentazione nella ST per i dettagli Link task: [https://bugbusters.teamwork.com/tasks/6538118](https://bugbusters.teamwork.com/tasks/6538118)
1.0
DatabaseModel.ts - Activity #2 Scrivere il modulo DatabaseModel.ts. Vedere la documentazione nella ST per i dettagli Link task: [https://bugbusters.teamwork.com/tasks/6538118](https://bugbusters.teamwork.com/tasks/6538118)
priority
databasemodel ts activity scrivere il modulo databasemodel ts vedere la documentazione nella st per i dettagli link task
1
387,374
11,460,299,217
IssuesEvent
2020-02-07 09:27:36
nhsconnect/gpconnect-demonstrator
https://api.github.com/repos/nhsconnect/gpconnect-demonstrator
closed
Add representative clinical data to the demonstrator
1.2.3 Low Priority Structured
Placeholder note for now, while clinical data is produced by Pete and colleagues.
1.0
Add representative clinical data to the demonstrator - Placeholder note for now, while clinical data is produced by Pete and colleagues.
priority
add representative clinical data to the demonstrator placeholder note for now while clinical data is produced by pete and colleagues
1
60,236
14,531,609,926
IssuesEvent
2020-12-14 21:03:42
hydrogen-dev/SDK
https://api.github.com/repos/hydrogen-dev/SDK
opened
CVE-2020-13956 (Medium) detected in httpclient-4.5.2.jar
security vulnerability
## CVE-2020-13956 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>httpclient-4.5.2.jar</b></p></summary> <p>Apache HttpComponents Client</p> <p>Path to dependency file: SDK/hydro/raindrop/java/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.2/httpclient-4.5.2.jar</p> <p> Dependency Hierarchy: - unirest-java-1.4.9.jar (Root Library) - :x: **httpclient-4.5.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/hydrogen-dev/SDK/commit/09b63e4979e6a3f5d08731809692a795c8d7b085">09b63e4979e6a3f5d08731809692a795c8d7b085</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution. <p>Publish Date: 2020-12-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13956>CVE-2020-13956</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-13956">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-13956</a></p> <p>Release Date: 2020-07-21</p> <p>Fix Resolution: org.apache.httpcomponents:httpclient:4.5.13;org.apache.httpcomponents:httpclient-osgi:4.5.13;org.apache.httpcomponents.client5:httpclient5:5.0.3;org.apache.httpcomponents.client5:httpclient5-osgi:5.0.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.apache.httpcomponents","packageName":"httpclient","packageVersion":"4.5.2","isTransitiveDependency":true,"dependencyTree":"com.mashape.unirest:unirest-java:1.4.9;org.apache.httpcomponents:httpclient:4.5.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.httpcomponents:httpclient:4.5.13;org.apache.httpcomponents:httpclient-osgi:4.5.13;org.apache.httpcomponents.client5:httpclient5:5.0.3;org.apache.httpcomponents.client5:httpclient5-osgi:5.0.3"}],"vulnerabilityIdentifier":"CVE-2020-13956","vulnerabilityDetails":"Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13956","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-13956 (Medium) detected in httpclient-4.5.2.jar - ## CVE-2020-13956 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>httpclient-4.5.2.jar</b></p></summary> <p>Apache HttpComponents Client</p> <p>Path to dependency file: SDK/hydro/raindrop/java/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.2/httpclient-4.5.2.jar</p> <p> Dependency Hierarchy: - unirest-java-1.4.9.jar (Root Library) - :x: **httpclient-4.5.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/hydrogen-dev/SDK/commit/09b63e4979e6a3f5d08731809692a795c8d7b085">09b63e4979e6a3f5d08731809692a795c8d7b085</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution. <p>Publish Date: 2020-12-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13956>CVE-2020-13956</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-13956">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-13956</a></p> <p>Release Date: 2020-07-21</p> <p>Fix Resolution: org.apache.httpcomponents:httpclient:4.5.13;org.apache.httpcomponents:httpclient-osgi:4.5.13;org.apache.httpcomponents.client5:httpclient5:5.0.3;org.apache.httpcomponents.client5:httpclient5-osgi:5.0.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.apache.httpcomponents","packageName":"httpclient","packageVersion":"4.5.2","isTransitiveDependency":true,"dependencyTree":"com.mashape.unirest:unirest-java:1.4.9;org.apache.httpcomponents:httpclient:4.5.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.httpcomponents:httpclient:4.5.13;org.apache.httpcomponents:httpclient-osgi:4.5.13;org.apache.httpcomponents.client5:httpclient5:5.0.3;org.apache.httpcomponents.client5:httpclient5-osgi:5.0.3"}],"vulnerabilityIdentifier":"CVE-2020-13956","vulnerabilityDetails":"Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13956","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in httpclient jar cve medium severity vulnerability vulnerable library httpclient jar apache httpcomponents client path to dependency file sdk hydro raindrop java pom xml path to vulnerable library home wss scanner repository org apache httpcomponents httpclient httpclient jar dependency hierarchy unirest java jar root library x httpclient jar vulnerable library found in head commit a href found in base branch master vulnerability details apache httpclient versions prior to version and can misinterpret malformed authority component in request uris passed to the library as java net uri object and pick the wrong target host for request execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache httpcomponents httpclient org apache httpcomponents httpclient osgi org apache httpcomponents org apache httpcomponents osgi isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails apache httpclient versions prior to version and can misinterpret malformed authority component in request uris passed to the library as java net uri object and pick the wrong target host for request execution vulnerabilityurl
0
123,333
17,772,209,481
IssuesEvent
2021-08-30 14:51:25
kapseliboi/bitmidi.com
https://api.github.com/repos/kapseliboi/bitmidi.com
opened
CVE-2021-23382 (Medium) detected in postcss-7.0.35.tgz, postcss-7.0.32.tgz
security vulnerability
## CVE-2021-23382 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>postcss-7.0.35.tgz</b>, <b>postcss-7.0.32.tgz</b></p></summary> <p> <details><summary><b>postcss-7.0.35.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz</a></p> <p>Path to dependency file: bitmidi.com/package.json</p> <p>Path to vulnerable library: bitmidi.com/node_modules/postcss/package.json</p> <p> Dependency Hierarchy: - cssnano-4.1.10.tgz (Root Library) - :x: **postcss-7.0.35.tgz** (Vulnerable Library) </details> <details><summary><b>postcss-7.0.32.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.32.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.32.tgz</a></p> <p>Path to dependency file: bitmidi.com/package.json</p> <p>Path to vulnerable library: bitmidi.com/node_modules/purgecss/node_modules/postcss/package.json</p> <p> Dependency Hierarchy: - purgecss-3.0.0.tgz (Root Library) - :x: **postcss-7.0.32.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/kapseliboi/bitmidi.com/commit/8bfbb9b5b1cc23e87e14304a565f6b849e11bdb2">8bfbb9b5b1cc23e87e14304a565f6b849e11bdb2</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*). <p>Publish Date: 2021-04-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23382>CVE-2021-23382</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382</a></p> <p>Release Date: 2021-04-26</p> <p>Fix Resolution: postcss - 8.2.13</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-23382 (Medium) detected in postcss-7.0.35.tgz, postcss-7.0.32.tgz - ## CVE-2021-23382 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>postcss-7.0.35.tgz</b>, <b>postcss-7.0.32.tgz</b></p></summary> <p> <details><summary><b>postcss-7.0.35.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz</a></p> <p>Path to dependency file: bitmidi.com/package.json</p> <p>Path to vulnerable library: bitmidi.com/node_modules/postcss/package.json</p> <p> Dependency Hierarchy: - cssnano-4.1.10.tgz (Root Library) - :x: **postcss-7.0.35.tgz** (Vulnerable Library) </details> <details><summary><b>postcss-7.0.32.tgz</b></p></summary> <p>Tool for transforming styles with JS plugins</p> <p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.32.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.32.tgz</a></p> <p>Path to dependency file: bitmidi.com/package.json</p> <p>Path to vulnerable library: bitmidi.com/node_modules/purgecss/node_modules/postcss/package.json</p> <p> Dependency Hierarchy: - purgecss-3.0.0.tgz (Root Library) - :x: **postcss-7.0.32.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/kapseliboi/bitmidi.com/commit/8bfbb9b5b1cc23e87e14304a565f6b849e11bdb2">8bfbb9b5b1cc23e87e14304a565f6b849e11bdb2</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*). <p>Publish Date: 2021-04-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23382>CVE-2021-23382</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382</a></p> <p>Release Date: 2021-04-26</p> <p>Fix Resolution: postcss - 8.2.13</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in postcss tgz postcss tgz cve medium severity vulnerability vulnerable libraries postcss tgz postcss tgz postcss tgz tool for transforming styles with js plugins library home page a href path to dependency file bitmidi com package json path to vulnerable library bitmidi com node modules postcss package json dependency hierarchy cssnano tgz root library x postcss tgz vulnerable library postcss tgz tool for transforming styles with js plugins library home page a href path to dependency file bitmidi com package json path to vulnerable library bitmidi com node modules purgecss node modules postcss package json dependency hierarchy purgecss tgz root library x postcss tgz vulnerable library found in head commit a href found in base branch master vulnerability details the package postcss before are vulnerable to regular expression denial of service redos via getannotationurl and loadannotation in lib previous map js the vulnerable regexes are caused mainly by the sub pattern s sourcemappingurl publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution postcss step up your open source security game with whitesource
0
72,978
9,634,505,772
IssuesEvent
2019-05-15 21:26:11
confluentinc/schema-registry
https://api.github.com/repos/confluentinc/schema-registry
closed
Update Documentation for MAGIC_BYTE=1
documentation
Regarding: https://github.com/confluentinc/schema-registry/commit/28d5c02df4c355281ddbafb7684a18f5cc14b49f, MAGIC_BYTE was updated to include `1` as well as `0`. cc @mageshn [In documentation](https://github.com/confluentinc/schema-registry/blob/master/docs/serializer-formatter.rst#wire-format), this is no longer accurate. > Confluent serialization format version number; currently always `0`. Should it be documented when 0 or 1 is used?
1.0
Update Documentation for MAGIC_BYTE=1 - Regarding: https://github.com/confluentinc/schema-registry/commit/28d5c02df4c355281ddbafb7684a18f5cc14b49f, MAGIC_BYTE was updated to include `1` as well as `0`. cc @mageshn [In documentation](https://github.com/confluentinc/schema-registry/blob/master/docs/serializer-formatter.rst#wire-format), this is no longer accurate. > Confluent serialization format version number; currently always `0`. Should it be documented when 0 or 1 is used?
non_priority
update documentation for magic byte regarding magic byte was updated to include as well as cc mageshn this is no longer accurate confluent serialization format version number currently always  should it be documented when or is used
0
466,269
13,399,112,834
IssuesEvent
2020-09-03 14:04:08
googleapis/python-securitycenter
https://api.github.com/repos/googleapis/python-securitycenter
closed
Synthesis failed for python-securitycenter
api: securitycenter autosynth failure priority: p1 type: bug
Hello! Autosynth couldn't regenerate python-securitycenter. :broken_heart: Here's the output from running `synth.py`: ``` ages/30/9e/f663a2aa66a09d838042ae1a2c5659828bb9b41ea3a6efa20a20fd92b121/Jinja2-2.11.2-py2.py3-none-any.whl Saved ./Jinja2-2.11.2-py2.py3-none-any.whl Collecting MarkupSafe==1.1.1 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 5)) Using cached https://files.pythonhosted.org/packages/b2/5f/23e0023be6bb885d00ffbefad2942bc51a620328ee910f64abe5a8d18dd1/MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl Saved ./MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl Collecting protobuf==3.13.0 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 6)) Using cached https://files.pythonhosted.org/packages/30/79/510974552cebff2ba04038544799450defe75e96ea5f1675dbf72cc8744f/protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl Saved ./protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl Collecting pypandoc==1.5 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 7)) Using cached https://files.pythonhosted.org/packages/d6/b7/5050dc1769c8a93d3ec7c4bd55be161991c94b8b235f88bf7c764449e708/pypandoc-1.5.tar.gz Complete output from command python setup.py egg_info: Traceback (most recent call last): File "<string>", line 1, in <module> File "/tmpfs/tmp/tmpnk_5ehky/setuptools-tmp/setuptools/__init__.py", line 6, in <module> import distutils.core File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/_distutils_hack/__init__.py", line 82, in create_module return importlib.import_module('._distutils', 'setuptools') File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/importlib/__init__.py", line 126, in import_module return _bootstrap._gcd_import(name[level:], package, level) ModuleNotFoundError: No module named 'setuptools._distutils' ---------------------------------------- (Command "python setup.py egg_info" failed with error code 1 in /tmpfs/tmp/pip-build-w9bb1l9t/pypandoc/ ) ERROR: no such package '@gapic_generator_python_pip_deps//': pip_import failed: Collecting click==7.1.2 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 1)) Using cached https://files.pythonhosted.org/packages/d2/3d/fa76db83bf75c4f8d338c2fd15c8d33fdd7ad23a9b5e57eb6c5de26b430e/click-7.1.2-py2.py3-none-any.whl Saved ./click-7.1.2-py2.py3-none-any.whl Collecting google-api-core==1.22.1 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 2)) Using cached https://files.pythonhosted.org/packages/e0/2d/7c6c75013105e1d2b6eaa1bf18a56995be1dbc673c38885aea31136e9918/google_api_core-1.22.1-py2.py3-none-any.whl Saved ./google_api_core-1.22.1-py2.py3-none-any.whl Collecting googleapis-common-protos==1.52.0 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 3)) Using cached https://files.pythonhosted.org/packages/03/74/3956721ea1eb4bcf7502a311fdaa60b85bd751de4e57d1943afe9b334141/googleapis_common_protos-1.52.0-py2.py3-none-any.whl Saved ./googleapis_common_protos-1.52.0-py2.py3-none-any.whl Collecting jinja2==2.11.2 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 4)) Using cached https://files.pythonhosted.org/packages/30/9e/f663a2aa66a09d838042ae1a2c5659828bb9b41ea3a6efa20a20fd92b121/Jinja2-2.11.2-py2.py3-none-any.whl Saved ./Jinja2-2.11.2-py2.py3-none-any.whl Collecting MarkupSafe==1.1.1 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 5)) Using cached https://files.pythonhosted.org/packages/b2/5f/23e0023be6bb885d00ffbefad2942bc51a620328ee910f64abe5a8d18dd1/MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl Saved ./MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl Collecting protobuf==3.13.0 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 6)) Using cached https://files.pythonhosted.org/packages/30/79/510974552cebff2ba04038544799450defe75e96ea5f1675dbf72cc8744f/protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl Saved ./protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl Collecting pypandoc==1.5 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 7)) Using cached https://files.pythonhosted.org/packages/d6/b7/5050dc1769c8a93d3ec7c4bd55be161991c94b8b235f88bf7c764449e708/pypandoc-1.5.tar.gz Complete output from command python setup.py egg_info: Traceback (most recent call last): File "<string>", line 1, in <module> File "/tmpfs/tmp/tmpnk_5ehky/setuptools-tmp/setuptools/__init__.py", line 6, in <module> import distutils.core File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/_distutils_hack/__init__.py", line 82, in create_module return importlib.import_module('._distutils', 'setuptools') File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/importlib/__init__.py", line 126, in import_module return _bootstrap._gcd_import(name[level:], package, level) ModuleNotFoundError: No module named 'setuptools._distutils' ---------------------------------------- (Command "python setup.py egg_info" failed with error code 1 in /tmpfs/tmp/pip-build-w9bb1l9t/pypandoc/ ) INFO: Elapsed time: 2.236s INFO: 0 processes. FAILED: Build did NOT complete successfully (0 packages loaded) FAILED: Build did NOT complete successfully (0 packages loaded) Traceback (most recent call last): File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main "__main__", mod_spec) File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code exec(code, run_globals) File "/tmpfs/src/github/synthtool/synthtool/__main__.py", line 102, in <module> main() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 829, in __call__ return self.main(*args, **kwargs) File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 782, in main rv = self.invoke(ctx) File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 1066, in invoke return ctx.invoke(self.callback, **ctx.params) File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 610, in invoke return callback(*args, **kwargs) File "/tmpfs/src/github/synthtool/synthtool/__main__.py", line 94, in main spec.loader.exec_module(synth_module) # type: ignore File "<frozen importlib._bootstrap_external>", line 678, in exec_module File "<frozen importlib._bootstrap>", line 219, in _call_with_frames_removed File "/home/kbuilder/.cache/synthtool/python-securitycenter/synth.py", line 32, in <module> include_protos=True File "/tmpfs/src/github/synthtool/synthtool/gcp/gapic_bazel.py", line 46, in py_library return self._generate_code(service, version, "python", **kwargs) File "/tmpfs/src/github/synthtool/synthtool/gcp/gapic_bazel.py", line 183, in _generate_code shell.run(bazel_run_args) File "/tmpfs/src/github/synthtool/synthtool/shell.py", line 39, in run raise exc File "/tmpfs/src/github/synthtool/synthtool/shell.py", line 33, in run encoding="utf-8", File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/subprocess.py", line 438, in run output=stdout, stderr=stderr) subprocess.CalledProcessError: Command '['bazel', '--max_idle_secs=240', 'build', '//google/cloud/securitycenter/v1p1beta1:securitycenter-v1p1beta1-py']' returned non-zero exit status 1. 2020-08-31 05:24:14,733 autosynth [ERROR] > Synthesis failed 2020-08-31 05:24:14,733 autosynth [DEBUG] > Running: git reset --hard HEAD HEAD is now at c70d790 docs: Update Security Command Center UpdateNotificationConfig sample, adding filter to mutable field (#39) 2020-08-31 05:24:14,739 autosynth [DEBUG] > Running: git checkout autosynth Switched to branch 'autosynth' 2020-08-31 05:24:14,744 autosynth [DEBUG] > Running: git clean -fdx Removing __pycache__/ Removing google/__pycache__/ Traceback (most recent call last): File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main "__main__", mod_spec) File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code exec(code, run_globals) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 690, in <module> main() File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 539, in main return _inner_main(temp_dir) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 670, in _inner_main commit_count = synthesize_loop(x, multiple_prs, change_pusher, synthesizer) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 375, in synthesize_loop has_changes = toolbox.synthesize_version_in_new_branch(synthesizer, youngest) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 273, in synthesize_version_in_new_branch synthesizer.synthesize(synth_log_path, self.environ) File "/tmpfs/src/github/synthtool/autosynth/synthesizer.py", line 120, in synthesize synth_proc.check_returncode() # Raise an exception. File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/subprocess.py", line 389, in check_returncode self.stderr) subprocess.CalledProcessError: Command '['/tmpfs/src/github/synthtool/env/bin/python3', '-m', 'synthtool', '--metadata', 'synth.metadata', 'synth.py', '--']' returned non-zero exit status 1. ``` Google internal developers can see the full log [here](http://sponge2/results/invocations/62315112-900b-4eef-8d49-c6c399a38931/targets/github%2Fsynthtool;config=default/tests;query=python-securitycenter;failed=false).
1.0
Synthesis failed for python-securitycenter - Hello! Autosynth couldn't regenerate python-securitycenter. :broken_heart: Here's the output from running `synth.py`: ``` ages/30/9e/f663a2aa66a09d838042ae1a2c5659828bb9b41ea3a6efa20a20fd92b121/Jinja2-2.11.2-py2.py3-none-any.whl Saved ./Jinja2-2.11.2-py2.py3-none-any.whl Collecting MarkupSafe==1.1.1 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 5)) Using cached https://files.pythonhosted.org/packages/b2/5f/23e0023be6bb885d00ffbefad2942bc51a620328ee910f64abe5a8d18dd1/MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl Saved ./MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl Collecting protobuf==3.13.0 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 6)) Using cached https://files.pythonhosted.org/packages/30/79/510974552cebff2ba04038544799450defe75e96ea5f1675dbf72cc8744f/protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl Saved ./protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl Collecting pypandoc==1.5 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 7)) Using cached https://files.pythonhosted.org/packages/d6/b7/5050dc1769c8a93d3ec7c4bd55be161991c94b8b235f88bf7c764449e708/pypandoc-1.5.tar.gz Complete output from command python setup.py egg_info: Traceback (most recent call last): File "<string>", line 1, in <module> File "/tmpfs/tmp/tmpnk_5ehky/setuptools-tmp/setuptools/__init__.py", line 6, in <module> import distutils.core File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/_distutils_hack/__init__.py", line 82, in create_module return importlib.import_module('._distutils', 'setuptools') File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/importlib/__init__.py", line 126, in import_module return _bootstrap._gcd_import(name[level:], package, level) ModuleNotFoundError: No module named 'setuptools._distutils' ---------------------------------------- (Command "python setup.py egg_info" failed with error code 1 in /tmpfs/tmp/pip-build-w9bb1l9t/pypandoc/ ) ERROR: no such package '@gapic_generator_python_pip_deps//': pip_import failed: Collecting click==7.1.2 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 1)) Using cached https://files.pythonhosted.org/packages/d2/3d/fa76db83bf75c4f8d338c2fd15c8d33fdd7ad23a9b5e57eb6c5de26b430e/click-7.1.2-py2.py3-none-any.whl Saved ./click-7.1.2-py2.py3-none-any.whl Collecting google-api-core==1.22.1 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 2)) Using cached https://files.pythonhosted.org/packages/e0/2d/7c6c75013105e1d2b6eaa1bf18a56995be1dbc673c38885aea31136e9918/google_api_core-1.22.1-py2.py3-none-any.whl Saved ./google_api_core-1.22.1-py2.py3-none-any.whl Collecting googleapis-common-protos==1.52.0 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 3)) Using cached https://files.pythonhosted.org/packages/03/74/3956721ea1eb4bcf7502a311fdaa60b85bd751de4e57d1943afe9b334141/googleapis_common_protos-1.52.0-py2.py3-none-any.whl Saved ./googleapis_common_protos-1.52.0-py2.py3-none-any.whl Collecting jinja2==2.11.2 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 4)) Using cached https://files.pythonhosted.org/packages/30/9e/f663a2aa66a09d838042ae1a2c5659828bb9b41ea3a6efa20a20fd92b121/Jinja2-2.11.2-py2.py3-none-any.whl Saved ./Jinja2-2.11.2-py2.py3-none-any.whl Collecting MarkupSafe==1.1.1 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 5)) Using cached https://files.pythonhosted.org/packages/b2/5f/23e0023be6bb885d00ffbefad2942bc51a620328ee910f64abe5a8d18dd1/MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl Saved ./MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl Collecting protobuf==3.13.0 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 6)) Using cached https://files.pythonhosted.org/packages/30/79/510974552cebff2ba04038544799450defe75e96ea5f1675dbf72cc8744f/protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl Saved ./protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl Collecting pypandoc==1.5 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 7)) Using cached https://files.pythonhosted.org/packages/d6/b7/5050dc1769c8a93d3ec7c4bd55be161991c94b8b235f88bf7c764449e708/pypandoc-1.5.tar.gz Complete output from command python setup.py egg_info: Traceback (most recent call last): File "<string>", line 1, in <module> File "/tmpfs/tmp/tmpnk_5ehky/setuptools-tmp/setuptools/__init__.py", line 6, in <module> import distutils.core File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/_distutils_hack/__init__.py", line 82, in create_module return importlib.import_module('._distutils', 'setuptools') File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/importlib/__init__.py", line 126, in import_module return _bootstrap._gcd_import(name[level:], package, level) ModuleNotFoundError: No module named 'setuptools._distutils' ---------------------------------------- (Command "python setup.py egg_info" failed with error code 1 in /tmpfs/tmp/pip-build-w9bb1l9t/pypandoc/ ) INFO: Elapsed time: 2.236s INFO: 0 processes. FAILED: Build did NOT complete successfully (0 packages loaded) FAILED: Build did NOT complete successfully (0 packages loaded) Traceback (most recent call last): File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main "__main__", mod_spec) File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code exec(code, run_globals) File "/tmpfs/src/github/synthtool/synthtool/__main__.py", line 102, in <module> main() File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 829, in __call__ return self.main(*args, **kwargs) File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 782, in main rv = self.invoke(ctx) File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 1066, in invoke return ctx.invoke(self.callback, **ctx.params) File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 610, in invoke return callback(*args, **kwargs) File "/tmpfs/src/github/synthtool/synthtool/__main__.py", line 94, in main spec.loader.exec_module(synth_module) # type: ignore File "<frozen importlib._bootstrap_external>", line 678, in exec_module File "<frozen importlib._bootstrap>", line 219, in _call_with_frames_removed File "/home/kbuilder/.cache/synthtool/python-securitycenter/synth.py", line 32, in <module> include_protos=True File "/tmpfs/src/github/synthtool/synthtool/gcp/gapic_bazel.py", line 46, in py_library return self._generate_code(service, version, "python", **kwargs) File "/tmpfs/src/github/synthtool/synthtool/gcp/gapic_bazel.py", line 183, in _generate_code shell.run(bazel_run_args) File "/tmpfs/src/github/synthtool/synthtool/shell.py", line 39, in run raise exc File "/tmpfs/src/github/synthtool/synthtool/shell.py", line 33, in run encoding="utf-8", File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/subprocess.py", line 438, in run output=stdout, stderr=stderr) subprocess.CalledProcessError: Command '['bazel', '--max_idle_secs=240', 'build', '//google/cloud/securitycenter/v1p1beta1:securitycenter-v1p1beta1-py']' returned non-zero exit status 1. 2020-08-31 05:24:14,733 autosynth [ERROR] > Synthesis failed 2020-08-31 05:24:14,733 autosynth [DEBUG] > Running: git reset --hard HEAD HEAD is now at c70d790 docs: Update Security Command Center UpdateNotificationConfig sample, adding filter to mutable field (#39) 2020-08-31 05:24:14,739 autosynth [DEBUG] > Running: git checkout autosynth Switched to branch 'autosynth' 2020-08-31 05:24:14,744 autosynth [DEBUG] > Running: git clean -fdx Removing __pycache__/ Removing google/__pycache__/ Traceback (most recent call last): File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main "__main__", mod_spec) File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code exec(code, run_globals) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 690, in <module> main() File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 539, in main return _inner_main(temp_dir) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 670, in _inner_main commit_count = synthesize_loop(x, multiple_prs, change_pusher, synthesizer) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 375, in synthesize_loop has_changes = toolbox.synthesize_version_in_new_branch(synthesizer, youngest) File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 273, in synthesize_version_in_new_branch synthesizer.synthesize(synth_log_path, self.environ) File "/tmpfs/src/github/synthtool/autosynth/synthesizer.py", line 120, in synthesize synth_proc.check_returncode() # Raise an exception. File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/subprocess.py", line 389, in check_returncode self.stderr) subprocess.CalledProcessError: Command '['/tmpfs/src/github/synthtool/env/bin/python3', '-m', 'synthtool', '--metadata', 'synth.metadata', 'synth.py', '--']' returned non-zero exit status 1. ``` Google internal developers can see the full log [here](http://sponge2/results/invocations/62315112-900b-4eef-8d49-c6c399a38931/targets/github%2Fsynthtool;config=default/tests;query=python-securitycenter;failed=false).
priority
synthesis failed for python securitycenter hello autosynth couldn t regenerate python securitycenter broken heart here s the output from running synth py ages none any whl saved none any whl collecting markupsafe from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved markupsafe whl collecting protobuf from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved protobuf whl collecting pypandoc from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached complete output from command python setup py egg info traceback most recent call last file line in file tmpfs tmp tmpnk setuptools tmp setuptools init py line in import distutils core file tmpfs src github synthtool env lib site packages distutils hack init py line in create module return importlib import module distutils setuptools file home kbuilder pyenv versions lib importlib init py line in import module return bootstrap gcd import name package level modulenotfounderror no module named setuptools distutils command python setup py egg info failed with error code in tmpfs tmp pip build pypandoc error no such package gapic generator python pip deps pip import failed collecting click from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved click none any whl collecting google api core from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved google api core none any whl collecting googleapis common protos from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved googleapis common protos none any whl collecting from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved none any whl collecting markupsafe from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved markupsafe whl collecting protobuf from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved protobuf whl collecting pypandoc from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached complete output from command python setup py egg info traceback most recent call last file line in file tmpfs tmp tmpnk setuptools tmp setuptools init py line in import distutils core file tmpfs src github synthtool env lib site packages distutils hack init py line in create module return importlib import module distutils setuptools file home kbuilder pyenv versions lib importlib init py line in import module return bootstrap gcd import name package level modulenotfounderror no module named setuptools distutils command python setup py egg info failed with error code in tmpfs tmp pip build pypandoc info elapsed time info processes failed build did not complete successfully packages loaded failed build did not complete successfully packages loaded traceback most recent call last file home kbuilder pyenv versions lib runpy py line in run module as main main mod spec file home kbuilder pyenv versions lib runpy py line in run code exec code run globals file tmpfs src github synthtool synthtool main py line in main file tmpfs src github synthtool env lib site packages click core py line in call return self main args kwargs file tmpfs src github synthtool env lib site packages click core py line in main rv self invoke ctx file tmpfs src github synthtool env lib site packages click core py line in invoke return ctx invoke self callback ctx params file tmpfs src github synthtool env lib site packages click core py line in invoke return callback args kwargs file tmpfs src github synthtool synthtool main py line in main spec loader exec module synth module type ignore file line in exec module file line in call with frames removed file home kbuilder cache synthtool python securitycenter synth py line in include protos true file tmpfs src github synthtool synthtool gcp gapic bazel py line in py library return self generate code service version python kwargs file tmpfs src github synthtool synthtool gcp gapic bazel py line in generate code shell run bazel run args file tmpfs src github synthtool synthtool shell py line in run raise exc file tmpfs src github synthtool synthtool shell py line in run encoding utf file home kbuilder pyenv versions lib subprocess py line in run output stdout stderr stderr subprocess calledprocesserror command returned non zero exit status autosynth synthesis failed autosynth running git reset hard head head is now at docs update security command center updatenotificationconfig sample adding filter to mutable field autosynth running git checkout autosynth switched to branch autosynth autosynth running git clean fdx removing pycache removing google pycache traceback most recent call last file home kbuilder pyenv versions lib runpy py line in run module as main main mod spec file home kbuilder pyenv versions lib runpy py line in run code exec code run globals file tmpfs src github synthtool autosynth synth py line in main file tmpfs src github synthtool autosynth synth py line in main return inner main temp dir file tmpfs src github synthtool autosynth synth py line in inner main commit count synthesize loop x multiple prs change pusher synthesizer file tmpfs src github synthtool autosynth synth py line in synthesize loop has changes toolbox synthesize version in new branch synthesizer youngest file tmpfs src github synthtool autosynth synth py line in synthesize version in new branch synthesizer synthesize synth log path self environ file tmpfs src github synthtool autosynth synthesizer py line in synthesize synth proc check returncode raise an exception file home kbuilder pyenv versions lib subprocess py line in check returncode self stderr subprocess calledprocesserror command returned non zero exit status google internal developers can see the full log
1
341,408
10,295,395,113
IssuesEvent
2019-08-27 22:06:19
metabase/metabase
https://api.github.com/repos/metabase/metabase
opened
Unbinned geo mapping broken
Priority:P2 Type:Bug Visualization/
Sample dataset; Orders grouped by Users/long, Users/lat, both unbinned: Problem 1: The default map is grid which errors out on un-binned coordinates Problem 2: If I manually choose pin map, nothing gets mapped, while pin map works for binned coordinates.
1.0
Unbinned geo mapping broken - Sample dataset; Orders grouped by Users/long, Users/lat, both unbinned: Problem 1: The default map is grid which errors out on un-binned coordinates Problem 2: If I manually choose pin map, nothing gets mapped, while pin map works for binned coordinates.
priority
unbinned geo mapping broken sample dataset orders grouped by users long users lat both unbinned problem the default map is grid which errors out on un binned coordinates problem if i manually choose pin map nothing gets mapped while pin map works for binned coordinates
1
745,785
26,000,667,625
IssuesEvent
2022-12-20 15:05:28
o3de/o3de
https://api.github.com/repos/o3de/o3de
closed
[Terrain] Painting on a tiny texture doesn't allow for per-pixel painting.
kind/bug sig/content triage/accepted priority/minor feature/terrain
**Describe the bug** When a tiny texture is mapped to a large world space, and the paintbrush is the size of a pixel, painting doesn't let you paint anything. **Steps to reproduce** Steps to reproduce the behavior: 1. Create a new level. 2. Add a Terrain World and a Terrain World Renderer component. 3. Create an entity named 'Terrain' at (0, 0, 50) with an Axis Aligned Box Shape of (256, 256, 100), Terrain Layer Spawner, and Terrain Height Gradient List. 4. Create a child entity named 'Height' with an Image Gradient, a Gradient Transform Modifier, and a Shape Reference pointing back to Terrain. 5. Add the Height entity to the Terrain Height Gradient List. 6. On the Image Gradient, choose "Create New Image" and create an image that is 4x4 in size. Save it in the level folder. 7. Edit the image. 8. Try to paint with a Paint Brush sized 64 m in the upper left corner of the terrain. This should paint the first pixel in the image. ![image](https://user-images.githubusercontent.com/82224783/207464737-3281f00c-ac8b-4ff6-a723-be68160a56c3.png) **Expected behavior** The first pixel should turn white. **Actual behavior** Only large rapid brush strokes will cause any pixels to change color. **Found in Branch** development **Additional context** This is happening because the Image Gradient is trying to query the paintbrush for opacity on the corners of the square around the brush, which are all 0 because the brush is a circle, not a square. The Image Gradient should query from the center of each square representing a pixel, not the corners.
1.0
[Terrain] Painting on a tiny texture doesn't allow for per-pixel painting. - **Describe the bug** When a tiny texture is mapped to a large world space, and the paintbrush is the size of a pixel, painting doesn't let you paint anything. **Steps to reproduce** Steps to reproduce the behavior: 1. Create a new level. 2. Add a Terrain World and a Terrain World Renderer component. 3. Create an entity named 'Terrain' at (0, 0, 50) with an Axis Aligned Box Shape of (256, 256, 100), Terrain Layer Spawner, and Terrain Height Gradient List. 4. Create a child entity named 'Height' with an Image Gradient, a Gradient Transform Modifier, and a Shape Reference pointing back to Terrain. 5. Add the Height entity to the Terrain Height Gradient List. 6. On the Image Gradient, choose "Create New Image" and create an image that is 4x4 in size. Save it in the level folder. 7. Edit the image. 8. Try to paint with a Paint Brush sized 64 m in the upper left corner of the terrain. This should paint the first pixel in the image. ![image](https://user-images.githubusercontent.com/82224783/207464737-3281f00c-ac8b-4ff6-a723-be68160a56c3.png) **Expected behavior** The first pixel should turn white. **Actual behavior** Only large rapid brush strokes will cause any pixels to change color. **Found in Branch** development **Additional context** This is happening because the Image Gradient is trying to query the paintbrush for opacity on the corners of the square around the brush, which are all 0 because the brush is a circle, not a square. The Image Gradient should query from the center of each square representing a pixel, not the corners.
priority
painting on a tiny texture doesn t allow for per pixel painting describe the bug when a tiny texture is mapped to a large world space and the paintbrush is the size of a pixel painting doesn t let you paint anything steps to reproduce steps to reproduce the behavior create a new level add a terrain world and a terrain world renderer component create an entity named terrain at with an axis aligned box shape of terrain layer spawner and terrain height gradient list create a child entity named height with an image gradient a gradient transform modifier and a shape reference pointing back to terrain add the height entity to the terrain height gradient list on the image gradient choose create new image and create an image that is in size save it in the level folder edit the image try to paint with a paint brush sized m in the upper left corner of the terrain this should paint the first pixel in the image expected behavior the first pixel should turn white actual behavior only large rapid brush strokes will cause any pixels to change color found in branch development additional context this is happening because the image gradient is trying to query the paintbrush for opacity on the corners of the square around the brush which are all because the brush is a circle not a square the image gradient should query from the center of each square representing a pixel not the corners
1
63,244
3,194,335,609
IssuesEvent
2015-09-30 11:32:24
fusioninventory/fusioninventory-for-glpi
https://api.github.com/repos/fusioninventory/fusioninventory-for-glpi
closed
SNMP: Allow deletion of OIDs
Category: SNMP Component: For junior contributor Component: Found in version Priority: Normal Status: Closed Tracker: Bug
--- Author Name: **Mat Simon** (@matsimon) Original Redmine Issue: 1846, http://forge.fusioninventory.org/issues/1846 Original Date: 2012-10-08 Original Assignee: David Durieux --- If one needs to add an additional OID for let's say firnware information, one sometimes needs to try and error. Please add removal option (Example may have wrongly been added with Netgear GS110TP switch during test)
1.0
SNMP: Allow deletion of OIDs - --- Author Name: **Mat Simon** (@matsimon) Original Redmine Issue: 1846, http://forge.fusioninventory.org/issues/1846 Original Date: 2012-10-08 Original Assignee: David Durieux --- If one needs to add an additional OID for let's say firnware information, one sometimes needs to try and error. Please add removal option (Example may have wrongly been added with Netgear GS110TP switch during test)
priority
snmp allow deletion of oids author name mat simon matsimon original redmine issue original date original assignee david durieux if one needs to add an additional oid for let s say firnware information one sometimes needs to try and error please add removal option example may have wrongly been added with netgear switch during test
1
351,419
10,518,291,263
IssuesEvent
2019-09-29 09:44:38
pixelfed/pixelfed
https://api.github.com/repos/pixelfed/pixelfed
closed
[Masterpost] Missing functionality and related issues from the beta launch
🚨 Priority: Critical
Figured it'd be good to maintain a list of things that are currently missing and would be expected to be implemented. ## Timeline/posts Posts - [x] ~Posting UI should be separated from timeline (#89, #86 #168, fixed #349 )~ - [x] ~Post without a caption (#110)~ - [x] ~Show caption limit before posting (#121, fixed by #127)~ - [x] ~Show size/format limit before posting~ - [ ] Preserve caption for editing if too long (#236) - [x] ~Show live character count for JS users (#346)~ - [x] ~Preview image before posting (#171)~ - [x] ~Preview multiple images before posting (https://github.com/dansup/pixelfed/issues/171#issuecomment-397224719, fixed by #524 )~ - [x] ~Delete images (#98)~ - [x] ~Show own posts in personal timeline (#85) (fixed by #190)~ - [x] ~Filters~ - [x] ~Separate filters for each image in album (#266, fixed in #524)~ - [x] ~Edit filters after upload (#798)~ - [ ] Edit album order (#798) - [ ] Embed code (currently #) (#776) Likes - [x] ~Indicate liked posts with filled heart rather than underline (#70) (fixed #186 #187 #188)~ - [x] ~Indicate liked posts on post page, not just on timeline (#207)~ - [ ] Animation for liking a post (potentially fixed by #222) - [x] ~Storing liked/unliked state without having to refresh the page (#87) (fixed by #186)~ - [x] ~Listing who liked a post (#213)~ Comments - [x] ~Comment button should link to all comments (#161)~ - [x] ~Load more comments~ - [x] ~Parse mentions (#231)~ - [x] ~Parse hashtags~ - [x] ~Parse links~ - [x] ~Like comments~ - [x] ~Reply to comments~ - [x] ~Delete comments (#97)~ - [x] ~Show comment in context on permalink (#234)~ - [ ] Show live character count for JS users - [ ] Preserve comment for editing if too long (WIP #236) Save - [x] ~Saving posts not implemented fully -- can't unsave posts (#64)~ ## Search/tags: - [x] ~Hashtag suggestion breaks with 3+ characters or # sign (#76, fixed by #488)~ - [ ] Sort tag suggestions by how many posts they have - [x] ~Irregular suggestions (#88)~ - [x] ~Hashtag page avatars (#69)~ ## Discover: - [x] ~Scroll through profile suggestions, show more than just 3 at a time (deprecated)~ - [x] ~Allow for temporarily / permanently clearing a suggestion (deprecated)~ - [x] ~Do not clear suggestion immediately after following (only clear on page refresh, to allow undo) (deprecated)~ - [x] ~Do not suggest your own account (#74) (fixed by #108) (deprecated)~ - [x] ~Uniform square thumbnails (potentially fixed by #168)~ ## Activity: - [x] ~"Follow" button should change after following someone (#63) (fixed by #95)~ - [x] ~Notifications of liked posts should link to those posts (#58)~ - [ ] New notification indicator ## Profile: - [x] ~Count only images as "posts" (#84) (fixed by https://github.com/dansup/pixelfed/commit/ae6a59e782713bfd73924dbf271e646fe00bc656)~ - [x] ~Follower/following lists should allow un/following accounts (#65) (fixed by #105)~ - [x] ~Detect and regenerate failed thumbnails (#67)~ - [x] ~Unsave posts from "Saved" tab~ - [ ] Parse mentions in bio - [ ] Parse hashtags in bio - [ ] Parse links in bio - [ ] Allow editing bio directly from My Profile - [x] ~Show bio on follower/following pages~ ## Settings: - [x] ~Character count while setting bio (#59)~ - [x] ~Reduced motion (#226)~ - [ ] Finish user settings (#3) - [x] ~Change avatar/email~ - [x] ~Email/notification/~privacy~/security settings~ - [ ] Import/export data (#814) - [x] Applications/Developers OAuth ## Documentation: - [x] ~"About" is sparse~ - [x] ~"Features" (removed)~ - [x] ~"Help" (some empty pages)~ - [ ] "Fediverse" is sparse - [ ] "Open source" is sparse - [x] ~"Terms"~ - [x] ~"Privacy" policy~ - [ ] "Platform"/API terms is orphaned https://pixelfed.social/site/platform - [x] ~"Libraries" (removed)~ ## Footer links: - [x] ~"API" links to /timeline instead of api docs~ - [x] ~"Directory" (removed)~ - [x] ~"Profiles" (removed)~ - [x] ~"Hashtags" (removed)~ - [x] ~"Language" links nowhere~ - [x] ~"C 2018 PIXELFED.ORG" links nowhere (should link to pixelfed.org?)~ - [x] ~is copyright even the right symbol here? Shouldn't it instead reflect the license of the project somehow?~ Registration (#373): - [ ] Terms - [ ] Data policy - [ ] Cookie policy ## Other things on the roadmap: - "Major features" (#6) - [x] ~Image albums/video upload~ - [ ] ~Mentions~/DMs - [x] ~View public timeline while logged out (#214, replaced with Discover page)~
1.0
[Masterpost] Missing functionality and related issues from the beta launch - Figured it'd be good to maintain a list of things that are currently missing and would be expected to be implemented. ## Timeline/posts Posts - [x] ~Posting UI should be separated from timeline (#89, #86 #168, fixed #349 )~ - [x] ~Post without a caption (#110)~ - [x] ~Show caption limit before posting (#121, fixed by #127)~ - [x] ~Show size/format limit before posting~ - [ ] Preserve caption for editing if too long (#236) - [x] ~Show live character count for JS users (#346)~ - [x] ~Preview image before posting (#171)~ - [x] ~Preview multiple images before posting (https://github.com/dansup/pixelfed/issues/171#issuecomment-397224719, fixed by #524 )~ - [x] ~Delete images (#98)~ - [x] ~Show own posts in personal timeline (#85) (fixed by #190)~ - [x] ~Filters~ - [x] ~Separate filters for each image in album (#266, fixed in #524)~ - [x] ~Edit filters after upload (#798)~ - [ ] Edit album order (#798) - [ ] Embed code (currently #) (#776) Likes - [x] ~Indicate liked posts with filled heart rather than underline (#70) (fixed #186 #187 #188)~ - [x] ~Indicate liked posts on post page, not just on timeline (#207)~ - [ ] Animation for liking a post (potentially fixed by #222) - [x] ~Storing liked/unliked state without having to refresh the page (#87) (fixed by #186)~ - [x] ~Listing who liked a post (#213)~ Comments - [x] ~Comment button should link to all comments (#161)~ - [x] ~Load more comments~ - [x] ~Parse mentions (#231)~ - [x] ~Parse hashtags~ - [x] ~Parse links~ - [x] ~Like comments~ - [x] ~Reply to comments~ - [x] ~Delete comments (#97)~ - [x] ~Show comment in context on permalink (#234)~ - [ ] Show live character count for JS users - [ ] Preserve comment for editing if too long (WIP #236) Save - [x] ~Saving posts not implemented fully -- can't unsave posts (#64)~ ## Search/tags: - [x] ~Hashtag suggestion breaks with 3+ characters or # sign (#76, fixed by #488)~ - [ ] Sort tag suggestions by how many posts they have - [x] ~Irregular suggestions (#88)~ - [x] ~Hashtag page avatars (#69)~ ## Discover: - [x] ~Scroll through profile suggestions, show more than just 3 at a time (deprecated)~ - [x] ~Allow for temporarily / permanently clearing a suggestion (deprecated)~ - [x] ~Do not clear suggestion immediately after following (only clear on page refresh, to allow undo) (deprecated)~ - [x] ~Do not suggest your own account (#74) (fixed by #108) (deprecated)~ - [x] ~Uniform square thumbnails (potentially fixed by #168)~ ## Activity: - [x] ~"Follow" button should change after following someone (#63) (fixed by #95)~ - [x] ~Notifications of liked posts should link to those posts (#58)~ - [ ] New notification indicator ## Profile: - [x] ~Count only images as "posts" (#84) (fixed by https://github.com/dansup/pixelfed/commit/ae6a59e782713bfd73924dbf271e646fe00bc656)~ - [x] ~Follower/following lists should allow un/following accounts (#65) (fixed by #105)~ - [x] ~Detect and regenerate failed thumbnails (#67)~ - [x] ~Unsave posts from "Saved" tab~ - [ ] Parse mentions in bio - [ ] Parse hashtags in bio - [ ] Parse links in bio - [ ] Allow editing bio directly from My Profile - [x] ~Show bio on follower/following pages~ ## Settings: - [x] ~Character count while setting bio (#59)~ - [x] ~Reduced motion (#226)~ - [ ] Finish user settings (#3) - [x] ~Change avatar/email~ - [x] ~Email/notification/~privacy~/security settings~ - [ ] Import/export data (#814) - [x] Applications/Developers OAuth ## Documentation: - [x] ~"About" is sparse~ - [x] ~"Features" (removed)~ - [x] ~"Help" (some empty pages)~ - [ ] "Fediverse" is sparse - [ ] "Open source" is sparse - [x] ~"Terms"~ - [x] ~"Privacy" policy~ - [ ] "Platform"/API terms is orphaned https://pixelfed.social/site/platform - [x] ~"Libraries" (removed)~ ## Footer links: - [x] ~"API" links to /timeline instead of api docs~ - [x] ~"Directory" (removed)~ - [x] ~"Profiles" (removed)~ - [x] ~"Hashtags" (removed)~ - [x] ~"Language" links nowhere~ - [x] ~"C 2018 PIXELFED.ORG" links nowhere (should link to pixelfed.org?)~ - [x] ~is copyright even the right symbol here? Shouldn't it instead reflect the license of the project somehow?~ Registration (#373): - [ ] Terms - [ ] Data policy - [ ] Cookie policy ## Other things on the roadmap: - "Major features" (#6) - [x] ~Image albums/video upload~ - [ ] ~Mentions~/DMs - [x] ~View public timeline while logged out (#214, replaced with Discover page)~
priority
missing functionality and related issues from the beta launch figured it d be good to maintain a list of things that are currently missing and would be expected to be implemented timeline posts posts posting ui should be separated from timeline fixed post without a caption show caption limit before posting fixed by show size format limit before posting preserve caption for editing if too long show live character count for js users preview image before posting preview multiple images before posting fixed by delete images show own posts in personal timeline fixed by filters separate filters for each image in album fixed in edit filters after upload edit album order embed code currently likes indicate liked posts with filled heart rather than underline fixed indicate liked posts on post page not just on timeline animation for liking a post potentially fixed by storing liked unliked state without having to refresh the page fixed by listing who liked a post comments comment button should link to all comments load more comments parse mentions parse hashtags parse links like comments reply to comments delete comments show comment in context on permalink show live character count for js users preserve comment for editing if too long wip save saving posts not implemented fully can t unsave posts search tags hashtag suggestion breaks with characters or sign fixed by sort tag suggestions by how many posts they have irregular suggestions hashtag page avatars discover scroll through profile suggestions show more than just at a time deprecated allow for temporarily permanently clearing a suggestion deprecated do not clear suggestion immediately after following only clear on page refresh to allow undo deprecated do not suggest your own account fixed by deprecated uniform square thumbnails potentially fixed by activity follow button should change after following someone fixed by notifications of liked posts should link to those posts new notification indicator profile count only images as posts fixed by follower following lists should allow un following accounts fixed by detect and regenerate failed thumbnails unsave posts from saved tab parse mentions in bio parse hashtags in bio parse links in bio allow editing bio directly from my profile show bio on follower following pages settings character count while setting bio reduced motion finish user settings change avatar email email notification privacy security settings import export data applications developers oauth documentation about is sparse features removed help some empty pages fediverse is sparse open source is sparse terms privacy policy platform api terms is orphaned libraries removed footer links api links to timeline instead of api docs directory removed profiles removed hashtags removed language links nowhere c pixelfed org links nowhere should link to pixelfed org is copyright even the right symbol here shouldn t it instead reflect the license of the project somehow registration terms data policy cookie policy other things on the roadmap major features image albums video upload mentions dms view public timeline while logged out replaced with discover page
1
264,547
8,316,517,518
IssuesEvent
2018-09-25 09:16:24
telerik/kendo-ui-core
https://api.github.com/repos/telerik/kendo-ui-core
closed
Command with template throws an error when command.visible handler is added
Bug C: Grid Kendo1 Priority 1 SEV: Low
### Reproduction of the problem 1. Run [this dojo](https://dojo.telerik.com/OHeXajOF) 1. Error occurs and the content of the grid does not render ### Environment * **Kendo UI version:** 2018.3.911
1.0
Command with template throws an error when command.visible handler is added - ### Reproduction of the problem 1. Run [this dojo](https://dojo.telerik.com/OHeXajOF) 1. Error occurs and the content of the grid does not render ### Environment * **Kendo UI version:** 2018.3.911
priority
command with template throws an error when command visible handler is added reproduction of the problem run error occurs and the content of the grid does not render environment kendo ui version
1
152,821
19,697,598,591
IssuesEvent
2022-01-12 13:45:14
RG4421/mmRTLS
https://api.github.com/repos/RG4421/mmRTLS
closed
CVE-2021-35065 (Medium) detected in glob-parent-2.0.0.tgz, glob-parent-5.1.2.tgz - autoclosed
security vulnerability
## CVE-2021-35065 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-5.1.2.tgz</b></p></summary> <p> <details><summary><b>glob-parent-2.0.0.tgz</b></p></summary> <p>Strips glob magic from a string to provide the parent path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p> <p>Path to dependency file: /ctrlSrv/processor/package.json</p> <p>Path to vulnerable library: /ctrlSrv/processor/node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - babel-cli-6.26.0.tgz (Root Library) - chokidar-1.7.0.tgz - :x: **glob-parent-2.0.0.tgz** (Vulnerable Library) </details> <details><summary><b>glob-parent-5.1.2.tgz</b></p></summary> <p>Extract the non-magic parent path from a glob string.</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz</a></p> <p> Dependency Hierarchy: - eslint-7.26.0.tgz (Root Library) - :x: **glob-parent-5.1.2.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS) <p>Publish Date: 2021-06-22 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/gulpjs/glob-parent/pull/49">https://github.com/gulpjs/glob-parent/pull/49</a></p> <p>Release Date: 2021-06-22</p> <p>Fix Resolution: glob-parent - 6.0.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"2.0.0","packageFilePaths":["/ctrlSrv/processor/package.json"],"isTransitiveDependency":true,"dependencyTree":"babel-cli:6.26.0;chokidar:1.7.0;glob-parent:2.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false},{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"5.1.2","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"eslint:7.26.0;glob-parent:5.1.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-35065","vulnerabilityDetails":"The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS) ","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-35065 (Medium) detected in glob-parent-2.0.0.tgz, glob-parent-5.1.2.tgz - autoclosed - ## CVE-2021-35065 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-5.1.2.tgz</b></p></summary> <p> <details><summary><b>glob-parent-2.0.0.tgz</b></p></summary> <p>Strips glob magic from a string to provide the parent path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p> <p>Path to dependency file: /ctrlSrv/processor/package.json</p> <p>Path to vulnerable library: /ctrlSrv/processor/node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - babel-cli-6.26.0.tgz (Root Library) - chokidar-1.7.0.tgz - :x: **glob-parent-2.0.0.tgz** (Vulnerable Library) </details> <details><summary><b>glob-parent-5.1.2.tgz</b></p></summary> <p>Extract the non-magic parent path from a glob string.</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz</a></p> <p> Dependency Hierarchy: - eslint-7.26.0.tgz (Root Library) - :x: **glob-parent-5.1.2.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS) <p>Publish Date: 2021-06-22 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/gulpjs/glob-parent/pull/49">https://github.com/gulpjs/glob-parent/pull/49</a></p> <p>Release Date: 2021-06-22</p> <p>Fix Resolution: glob-parent - 6.0.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"2.0.0","packageFilePaths":["/ctrlSrv/processor/package.json"],"isTransitiveDependency":true,"dependencyTree":"babel-cli:6.26.0;chokidar:1.7.0;glob-parent:2.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false},{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"5.1.2","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"eslint:7.26.0;glob-parent:5.1.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-35065","vulnerabilityDetails":"The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS) ","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in glob parent tgz glob parent tgz autoclosed cve medium severity vulnerability vulnerable libraries glob parent tgz glob parent tgz glob parent tgz strips glob magic from a string to provide the parent path library home page a href path to dependency file ctrlsrv processor package json path to vulnerable library ctrlsrv processor node modules glob parent package json dependency hierarchy babel cli tgz root library chokidar tgz x glob parent tgz vulnerable library glob parent tgz extract the non magic parent path from a glob string library home page a href dependency hierarchy eslint tgz root library x glob parent tgz vulnerable library found in base branch main vulnerability details the package glob parent before are vulnerable to regular expression denial of service redos publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree babel cli chokidar glob parent isminimumfixversionavailable true minimumfixversion glob parent isbinary false packagetype javascript node js packagename glob parent packageversion packagefilepaths istransitivedependency true dependencytree eslint glob parent isminimumfixversionavailable true minimumfixversion glob parent isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the package glob parent before are vulnerable to regular expression denial of service redos vulnerabilityurl
0
195,012
6,901,654,760
IssuesEvent
2017-11-25 10:39:10
gabrielkrell/strain-rig
https://api.github.com/repos/gabrielkrell/strain-rig
closed
Use interrupts to move motor
Priority: High Status: Completed Type: Enhancement
For best results, the motor should get a tick about every 110µs. Printing everything to serial takes way longer than that, so we should use interrupts to make sure it always happens.
1.0
Use interrupts to move motor - For best results, the motor should get a tick about every 110µs. Printing everything to serial takes way longer than that, so we should use interrupts to make sure it always happens.
priority
use interrupts to move motor for best results the motor should get a tick about every printing everything to serial takes way longer than that so we should use interrupts to make sure it always happens
1
387,575
26,727,321,463
IssuesEvent
2023-01-29 21:35:28
aws/aws-cdk
https://api.github.com/repos/aws/aws-cdk
opened
aws_cdk.RemovalPolicy: Default is stated incorrectly as Destroy
needs-triage documentation
### Describe the issue **Destroy** is indicated as the default which is incorrect for AWS CDK as can be seen in: - CDK Developer Guide RemovalPolicy.RETAIN Keep the contents of the resource when destroying the stack (default). The resource is orphaned from the stack and must be deleted manually. If you attempt to re-deploy the stack while the resource still exists, you will receive an error message due to a name conflict ![cdk](https://user-images.githubusercontent.com/18490774/215356637-92455717-7382-4389-bc9f-dd1a324fe305.jpg) - API reference --> S3/Bucket class that shows: removal_policy (Optional[RemovalPolicy]) removal_policy (Optional[[RemovalPolicy] – Policy to apply when the bucket is removed from this stack. Default: - The bucket will be orphaned. In essence, **Retain** is the default, not **Destroy**. Could we kindly have this updated. Many thanks for the help. ### Links https://docs.aws.amazon.com/cdk/api/v2/python/aws_cdk/RemovalPolicy.html#aws_cdk.RemovalPolicy.DESTROY
1.0
aws_cdk.RemovalPolicy: Default is stated incorrectly as Destroy - ### Describe the issue **Destroy** is indicated as the default which is incorrect for AWS CDK as can be seen in: - CDK Developer Guide RemovalPolicy.RETAIN Keep the contents of the resource when destroying the stack (default). The resource is orphaned from the stack and must be deleted manually. If you attempt to re-deploy the stack while the resource still exists, you will receive an error message due to a name conflict ![cdk](https://user-images.githubusercontent.com/18490774/215356637-92455717-7382-4389-bc9f-dd1a324fe305.jpg) - API reference --> S3/Bucket class that shows: removal_policy (Optional[RemovalPolicy]) removal_policy (Optional[[RemovalPolicy] – Policy to apply when the bucket is removed from this stack. Default: - The bucket will be orphaned. In essence, **Retain** is the default, not **Destroy**. Could we kindly have this updated. Many thanks for the help. ### Links https://docs.aws.amazon.com/cdk/api/v2/python/aws_cdk/RemovalPolicy.html#aws_cdk.RemovalPolicy.DESTROY
non_priority
aws cdk removalpolicy default is stated incorrectly as destroy describe the issue destroy is indicated as the default which is incorrect for aws cdk as can be seen in cdk developer guide removalpolicy retain keep the contents of the resource when destroying the stack default the resource is orphaned from the stack and must be deleted manually if you attempt to re deploy the stack while the resource still exists you will receive an error message due to a name conflict api reference bucket class that shows removal policy optional removal policy optional – policy to apply when the bucket is removed from this stack default the bucket will be orphaned in essence retain is the default not destroy could we kindly have this updated many thanks for the help links
0
474,084
13,652,456,629
IssuesEvent
2020-09-27 07:37:51
AY2021S1-CS2103T-T10-4/tp
https://api.github.com/repos/AY2021S1-CS2103T-T10-4/tp
closed
Delete classes
priority.High type.Story
As a tutor, I want to delete classes so that I can remove classes that I have stopped teaching.
1.0
Delete classes - As a tutor, I want to delete classes so that I can remove classes that I have stopped teaching.
priority
delete classes as a tutor i want to delete classes so that i can remove classes that i have stopped teaching
1
319,178
9,739,657,954
IssuesEvent
2019-06-01 13:30:51
Abnaxos/compose
https://api.github.com/repos/Abnaxos/compose
closed
Method not accessible: wrong error message
component: model priority: major type: bug
The error message for inaccessible methods is wrong: "Method not accessible to <inaccessible method>". The correct message should be something like "Method <inaccessible method> not accessible to <class>".
1.0
Method not accessible: wrong error message - The error message for inaccessible methods is wrong: "Method not accessible to <inaccessible method>". The correct message should be something like "Method <inaccessible method> not accessible to <class>".
priority
method not accessible wrong error message the error message for inaccessible methods is wrong method not accessible to the correct message should be something like method not accessible to
1
55,272
3,072,617,101
IssuesEvent
2015-08-19 17:49:36
RobotiumTech/robotium
https://api.github.com/repos/RobotiumTech/robotium
closed
Strange behaviours on big projects
bug imported Priority-Medium
_From [alex.gi...@gmail.com](https://code.google.com/u/106277910938818275510/) on April 18, 2012 03:18:02_ What steps will reproduce the problem? 1.Create test steps with one intent flagged ACTIVITY_CLEAR_TOP or other flags that Robotium conception does not take into account. 2.Call solo.finishOpenedActivities() What is the expected output? What do you see instead? My test should terminate. Instead, I can get functional exceptions, outOfMemoryExceptions due to activities that are unfrozen while they should no more exist, hanging InstrumentationTestRunner, ... What version of the product are you using? On what operating system? Will crash on any SDK and every version of robotium Please provide any additional information below. This is a conception flaw. I think the problem was raised on issue #219 , and rejected. But the problem does exist. The whole conception of keeping a hard reference upon the "stack" of activities is wrong. Android activity manager is much more complex than a simple stack, and stacking activities into an inner object leaks the robotium tests, and bypasses the application expected functional workflow. When a hard reference is kept upon an activity, you prevent Android from managing activities and garbage collecting objects the way it wants to, then the tested application behaves strangely : OutOfMemory (because you keep reference upon an activity that has reference upon bitmaps that can not be garbagecollected), functional exceptions because finishOpenedActivities() calls finish() on activities that should no more exist (for example when an intent is started with flag ACTIVITY_CLEAR_TOP, or NO_HISTORY), hence implemented activity does not handle this unnatural behaviour. A temporary patch should be to keep a stack of WeakReference<Activity> within the activity stack, to prevent robotium from leaking the whole application then randomly crashing the instrumentationtestrunner. But I don't get the point of keeping the stack at all... Why should this be necessary in a blackbox test ? Robotium is a great framework, but this point of conception really is painful. This problem keeps crashing our Jenkins continuous integration, holding all executors whenever it happens, and forcing us to allocate 256Mo heaps emulators to prevent OutOfMemory ! If I can help in any way, please let me know. _Original issue: http://code.google.com/p/robotium/issues/detail?id=249_
1.0
Strange behaviours on big projects - _From [alex.gi...@gmail.com](https://code.google.com/u/106277910938818275510/) on April 18, 2012 03:18:02_ What steps will reproduce the problem? 1.Create test steps with one intent flagged ACTIVITY_CLEAR_TOP or other flags that Robotium conception does not take into account. 2.Call solo.finishOpenedActivities() What is the expected output? What do you see instead? My test should terminate. Instead, I can get functional exceptions, outOfMemoryExceptions due to activities that are unfrozen while they should no more exist, hanging InstrumentationTestRunner, ... What version of the product are you using? On what operating system? Will crash on any SDK and every version of robotium Please provide any additional information below. This is a conception flaw. I think the problem was raised on issue #219 , and rejected. But the problem does exist. The whole conception of keeping a hard reference upon the "stack" of activities is wrong. Android activity manager is much more complex than a simple stack, and stacking activities into an inner object leaks the robotium tests, and bypasses the application expected functional workflow. When a hard reference is kept upon an activity, you prevent Android from managing activities and garbage collecting objects the way it wants to, then the tested application behaves strangely : OutOfMemory (because you keep reference upon an activity that has reference upon bitmaps that can not be garbagecollected), functional exceptions because finishOpenedActivities() calls finish() on activities that should no more exist (for example when an intent is started with flag ACTIVITY_CLEAR_TOP, or NO_HISTORY), hence implemented activity does not handle this unnatural behaviour. A temporary patch should be to keep a stack of WeakReference<Activity> within the activity stack, to prevent robotium from leaking the whole application then randomly crashing the instrumentationtestrunner. But I don't get the point of keeping the stack at all... Why should this be necessary in a blackbox test ? Robotium is a great framework, but this point of conception really is painful. This problem keeps crashing our Jenkins continuous integration, holding all executors whenever it happens, and forcing us to allocate 256Mo heaps emulators to prevent OutOfMemory ! If I can help in any way, please let me know. _Original issue: http://code.google.com/p/robotium/issues/detail?id=249_
priority
strange behaviours on big projects from on april what steps will reproduce the problem create test steps with one intent flagged activity clear top or other flags that robotium conception does not take into account call solo finishopenedactivities what is the expected output what do you see instead my test should terminate instead i can get functional exceptions outofmemoryexceptions due to activities that are unfrozen while they should no more exist hanging instrumentationtestrunner what version of the product are you using on what operating system will crash on any sdk and every version of robotium please provide any additional information below this is a conception flaw i think the problem was raised on issue and rejected but the problem does exist the whole conception of keeping a hard reference upon the stack of activities is wrong android activity manager is much more complex than a simple stack and stacking activities into an inner object leaks the robotium tests and bypasses the application expected functional workflow when a hard reference is kept upon an activity you prevent android from managing activities and garbage collecting objects the way it wants to then the tested application behaves strangely outofmemory because you keep reference upon an activity that has reference upon bitmaps that can not be garbagecollected functional exceptions because finishopenedactivities calls finish on activities that should no more exist for example when an intent is started with flag activity clear top or no history hence implemented activity does not handle this unnatural behaviour a temporary patch should be to keep a stack of weakreference within the activity stack to prevent robotium from leaking the whole application then randomly crashing the instrumentationtestrunner but i don t get the point of keeping the stack at all why should this be necessary in a blackbox test robotium is a great framework but this point of conception really is painful this problem keeps crashing our jenkins continuous integration holding all executors whenever it happens and forcing us to allocate heaps emulators to prevent outofmemory if i can help in any way please let me know original issue
1
4,858
6,882,412,990
IssuesEvent
2017-11-21 03:48:20
ZcashFoundation/GrantProposals-2017Q4
https://api.github.com/repos/ZcashFoundation/GrantProposals-2017Q4
reopened
ZEC <-> XLM Service
financial-interoperability online-service
# ZEC <-> XLM Service ## Motivation and overview The overarching motivation is widespread adoption of cryptocurrencies and privacy-focused cryptocurrencies, to protect our civil liberties. Stellar's built-in exchange and Anchor functionality has made it an ideal choice for remittance and money transfer in general. Zcash's privacy and selective transparency of transactions makes it an attractive privacy-enabled currency to integrate into the Stellar network. The ZEC <-> XLM service would publicly auditable to its users, and subsequently, users may transfer money out of internal wallets via private transactions, providing them the privacy they wanted. ## Technical approach - Web API: exposing routes to authenticate and initiate wallet transactions - Asynchronous job queue to monitor users' accounts for incoming / outgoing transaction statuses - Data store: Secure storage of users' Zcash and Stellar private keys - Zcash + Stellar nodes - Front end user interface ## Evaluation plan Fully functional Zcash and Stellar web-based wallet (much like Coinbase's Wallet). - Become a Zcash Anchor on the Stellar Network - 1000 users within 3 months of launching all features - Enable anonymous remittance - $1,000,000 USD of monthly transactions within 1 year ## Security considerations - **External Security Audits and penetration testing** - Web-based wallets carry an inherent risk; you are trusting them with your secret key(s) - 2 factor auth and strong password requirements - Zcash and Stellar reserve funds should be held in offline wallets, and transactions should be programatically created and initiated in a way such that private keys for large wallets are not exposed to the internet - As a web-wallet for cryptocurrencies, we would be subject to attacks ## Schedule 1. Launch Stellar Wallet functionality (0.5 months) 2. Launch Zcash Wallet functionality for public transactions (1 month) 3. Support private Zcash transactions (1 month) 4. Become an official Zcash Stellar Anchor, and allow for seamless ZEC <-> XLM exchange (1 month) 5. Security auditing and penetration testing (throughout) ## Budget and justification (approx.) $13,000 USD - Time compensation: $5,000 USD - Design contracting fees: $5,000 USD - Security audit / penetration testing: $2,000 - Hosting / External Fees Fund: $1,000 USD
1.0
ZEC <-> XLM Service - # ZEC <-> XLM Service ## Motivation and overview The overarching motivation is widespread adoption of cryptocurrencies and privacy-focused cryptocurrencies, to protect our civil liberties. Stellar's built-in exchange and Anchor functionality has made it an ideal choice for remittance and money transfer in general. Zcash's privacy and selective transparency of transactions makes it an attractive privacy-enabled currency to integrate into the Stellar network. The ZEC <-> XLM service would publicly auditable to its users, and subsequently, users may transfer money out of internal wallets via private transactions, providing them the privacy they wanted. ## Technical approach - Web API: exposing routes to authenticate and initiate wallet transactions - Asynchronous job queue to monitor users' accounts for incoming / outgoing transaction statuses - Data store: Secure storage of users' Zcash and Stellar private keys - Zcash + Stellar nodes - Front end user interface ## Evaluation plan Fully functional Zcash and Stellar web-based wallet (much like Coinbase's Wallet). - Become a Zcash Anchor on the Stellar Network - 1000 users within 3 months of launching all features - Enable anonymous remittance - $1,000,000 USD of monthly transactions within 1 year ## Security considerations - **External Security Audits and penetration testing** - Web-based wallets carry an inherent risk; you are trusting them with your secret key(s) - 2 factor auth and strong password requirements - Zcash and Stellar reserve funds should be held in offline wallets, and transactions should be programatically created and initiated in a way such that private keys for large wallets are not exposed to the internet - As a web-wallet for cryptocurrencies, we would be subject to attacks ## Schedule 1. Launch Stellar Wallet functionality (0.5 months) 2. Launch Zcash Wallet functionality for public transactions (1 month) 3. Support private Zcash transactions (1 month) 4. Become an official Zcash Stellar Anchor, and allow for seamless ZEC <-> XLM exchange (1 month) 5. Security auditing and penetration testing (throughout) ## Budget and justification (approx.) $13,000 USD - Time compensation: $5,000 USD - Design contracting fees: $5,000 USD - Security audit / penetration testing: $2,000 - Hosting / External Fees Fund: $1,000 USD
non_priority
zec xlm service zec xlm service motivation and overview the overarching motivation is widespread adoption of cryptocurrencies and privacy focused cryptocurrencies to protect our civil liberties stellar s built in exchange and anchor functionality has made it an ideal choice for remittance and money transfer in general zcash s privacy and selective transparency of transactions makes it an attractive privacy enabled currency to integrate into the stellar network the zec xlm service would publicly auditable to its users and subsequently users may transfer money out of internal wallets via private transactions providing them the privacy they wanted technical approach web api exposing routes to authenticate and initiate wallet transactions asynchronous job queue to monitor users accounts for incoming outgoing transaction statuses data store secure storage of users zcash and stellar private keys zcash stellar nodes front end user interface evaluation plan fully functional zcash and stellar web based wallet much like coinbase s wallet become a zcash anchor on the stellar network users within months of launching all features enable anonymous remittance usd of monthly transactions within year security considerations external security audits and penetration testing web based wallets carry an inherent risk you are trusting them with your secret key s factor auth and strong password requirements zcash and stellar reserve funds should be held in offline wallets and transactions should be programatically created and initiated in a way such that private keys for large wallets are not exposed to the internet as a web wallet for cryptocurrencies we would be subject to attacks schedule launch stellar wallet functionality months launch zcash wallet functionality for public transactions month support private zcash transactions month become an official zcash stellar anchor and allow for seamless zec xlm exchange month security auditing and penetration testing throughout budget and justification approx usd time compensation usd design contracting fees usd security audit penetration testing hosting external fees fund usd
0
5,641
5,842,253,260
IssuesEvent
2017-05-10 05:06:25
hzi-braunschweig/SORMAS-Open
https://api.github.com/repos/hzi-braunschweig/SORMAS-Open
closed
App Error Report Form [1]
Infrastructure sormas-app
- [x] user should be able to send manual error or problem information to the system - [x] use a simple text field - [x] should be possible from any view/activity
1.0
App Error Report Form [1] - - [x] user should be able to send manual error or problem information to the system - [x] use a simple text field - [x] should be possible from any view/activity
non_priority
app error report form user should be able to send manual error or problem information to the system use a simple text field should be possible from any view activity
0
621,911
19,599,346,374
IssuesEvent
2022-01-05 22:18:01
softmatterlab/Braph-2.0-Matlab
https://api.github.com/repos/softmatterlab/Braph-2.0-Matlab
opened
Minimize and Close Plot
low priority GUI
Write functions to minimize and close figures as in cb_bring_to_front(): - [ ] base functions cb_minimize() and cb_close() in Plot - [ ] follow-up functions where needed (e.g., GUI, PlotElement, PPBrainAtlas_Surf, PPGroup_SUBDIct, ...) - [ ] change callbacks for closing windows to these functions.
1.0
Minimize and Close Plot - Write functions to minimize and close figures as in cb_bring_to_front(): - [ ] base functions cb_minimize() and cb_close() in Plot - [ ] follow-up functions where needed (e.g., GUI, PlotElement, PPBrainAtlas_Surf, PPGroup_SUBDIct, ...) - [ ] change callbacks for closing windows to these functions.
priority
minimize and close plot write functions to minimize and close figures as in cb bring to front base functions cb minimize and cb close in plot follow up functions where needed e g gui plotelement ppbrainatlas surf ppgroup subdict change callbacks for closing windows to these functions
1
57,024
3,081,231,394
IssuesEvent
2015-08-22 14:19:05
bitfighter/bitfighter
https://api.github.com/repos/bitfighter/bitfighter
closed
Add self-healing turrets/ffps to help
019 bug imported Priority-Medium
_From [watusim...@bitfighter.org](https://code.google.com/u/105427273526970468779/) on October 19, 2013 18:13:35_ Add self-healing turret and ffp to help. Probably alternate between regular and self-healing rather than use new slots. Text should alternate as well to explain the different images. Graphics should alternate on their own rhythm and not be syncopated with other rotating items. (See help page with asteroids for an example of what I'm talking about.) _Original issue: http://code.google.com/p/bitfighter/issues/detail?id=255_
1.0
Add self-healing turrets/ffps to help - _From [watusim...@bitfighter.org](https://code.google.com/u/105427273526970468779/) on October 19, 2013 18:13:35_ Add self-healing turret and ffp to help. Probably alternate between regular and self-healing rather than use new slots. Text should alternate as well to explain the different images. Graphics should alternate on their own rhythm and not be syncopated with other rotating items. (See help page with asteroids for an example of what I'm talking about.) _Original issue: http://code.google.com/p/bitfighter/issues/detail?id=255_
priority
add self healing turrets ffps to help from on october add self healing turret and ffp to help probably alternate between regular and self healing rather than use new slots text should alternate as well to explain the different images graphics should alternate on their own rhythm and not be syncopated with other rotating items see help page with asteroids for an example of what i m talking about original issue
1
100,310
30,670,502,847
IssuesEvent
2023-07-25 21:59:06
actonlang/acton
https://api.github.com/repos/actonlang/acton
closed
Fix makefile deps on lib_deps/libActonDeps..
bug build system
lib_deps/libActonDeps actually requires deps/*.o but doesn't declare a dependency on it
1.0
Fix makefile deps on lib_deps/libActonDeps.. - lib_deps/libActonDeps actually requires deps/*.o but doesn't declare a dependency on it
non_priority
fix makefile deps on lib deps libactondeps lib deps libactondeps actually requires deps o but doesn t declare a dependency on it
0
12,536
14,857,702,816
IssuesEvent
2021-01-18 15:46:37
Cyberark-workato-dev/conjur-authn-k8s-client
https://api.github.com/repos/Cyberark-workato-dev/conjur-authn-k8s-client
opened
new bug from JIRA 00
Bugtype/Compatibility ONYX-6432 Severity/Low
##description Steps to reproduce: Current Results: Expected Results: Error Messages: Logs: Other Symptoms: Tenant ID / Pod Number: ##Found in version 11.4 ##Workaround Complexity There's an easy workaround ##Workaround Description asd ##Link to JIRA bug https://ca-il-jira-test.il.cyber-ark.com/browse/ONYX-6432
True
new bug from JIRA 00 - ##description Steps to reproduce: Current Results: Expected Results: Error Messages: Logs: Other Symptoms: Tenant ID / Pod Number: ##Found in version 11.4 ##Workaround Complexity There's an easy workaround ##Workaround Description asd ##Link to JIRA bug https://ca-il-jira-test.il.cyber-ark.com/browse/ONYX-6432
non_priority
new bug from jira description steps to reproduce current results expected results error messages logs other symptoms tenant id pod number found in version workaround complexity there s an easy workaround workaround description asd link to jira bug
0
396,180
11,704,955,991
IssuesEvent
2020-03-07 12:58:49
eJourn-al/eJournal
https://api.github.com/repos/eJourn-al/eJournal
closed
Files can sometimes get stored with the wrong filename
Priority: Critical Status: Available Type: Bug Workload: Medium
**Describe the bug** Files get stored with the wrong filename. When using sites like webp.net to resize the image, the filename sometimes does not get changed propperly. This causes our system to store them wrongly. **To Reproduce** Steps to reproduce the behavior: 1. Resize on image on webp.net 2. Upload it (with the weird filename from webp) 3. See that you are not able to download it
1.0
Files can sometimes get stored with the wrong filename - **Describe the bug** Files get stored with the wrong filename. When using sites like webp.net to resize the image, the filename sometimes does not get changed propperly. This causes our system to store them wrongly. **To Reproduce** Steps to reproduce the behavior: 1. Resize on image on webp.net 2. Upload it (with the weird filename from webp) 3. See that you are not able to download it
priority
files can sometimes get stored with the wrong filename describe the bug files get stored with the wrong filename when using sites like webp net to resize the image the filename sometimes does not get changed propperly this causes our system to store them wrongly to reproduce steps to reproduce the behavior resize on image on webp net upload it with the weird filename from webp see that you are not able to download it
1
604,359
18,682,582,400
IssuesEvent
2021-11-01 08:15:11
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
support.mozilla.org - video or audio doesn't play
priority-important browser-fenix engine-gecko
<!-- @browser: Firefox Mobile 94.0 --> <!-- @ua_header: Mozilla/5.0 (Android 10; Mobile; rv:94.0) Gecko/94.0 Firefox/94.0 --> <!-- @reported_with: android-components-reporter --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/91967 --> <!-- @extra_labels: browser-fenix --> **URL**: https://support.mozilla.org/pl/kb/unikanie-i-zglaszanie-oszustw-do-pomocy-technicznej-mozilli **Browser / Version**: Firefox Mobile 94.0 **Operating System**: Android 10 **Tested Another Browser**: Yes Chrome **Problem type**: Video or audio doesn't play **Description**: There is no audio **Steps to Reproduce**: Firefox Beta Chrome Beta Android 10 <details> <summary>View the screenshot</summary> <img alt="Screenshot" src="https://webcompat.com/uploads/2021/10/504ae66e-e5cf-442c-9f21-70507fdb09b3.jpeg"> </details> <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20211021185848</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> </details> [View console log messages](https://webcompat.com/console_logs/2021/10/fb952260-d86d-49d5-914b-06e2baccd5f3) _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
support.mozilla.org - video or audio doesn't play - <!-- @browser: Firefox Mobile 94.0 --> <!-- @ua_header: Mozilla/5.0 (Android 10; Mobile; rv:94.0) Gecko/94.0 Firefox/94.0 --> <!-- @reported_with: android-components-reporter --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/91967 --> <!-- @extra_labels: browser-fenix --> **URL**: https://support.mozilla.org/pl/kb/unikanie-i-zglaszanie-oszustw-do-pomocy-technicznej-mozilli **Browser / Version**: Firefox Mobile 94.0 **Operating System**: Android 10 **Tested Another Browser**: Yes Chrome **Problem type**: Video or audio doesn't play **Description**: There is no audio **Steps to Reproduce**: Firefox Beta Chrome Beta Android 10 <details> <summary>View the screenshot</summary> <img alt="Screenshot" src="https://webcompat.com/uploads/2021/10/504ae66e-e5cf-442c-9f21-70507fdb09b3.jpeg"> </details> <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20211021185848</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> </details> [View console log messages](https://webcompat.com/console_logs/2021/10/fb952260-d86d-49d5-914b-06e2baccd5f3) _From [webcompat.com](https://webcompat.com/) with ❤️_
priority
support mozilla org video or audio doesn t play url browser version firefox mobile operating system android tested another browser yes chrome problem type video or audio doesn t play description there is no audio steps to reproduce firefox beta chrome beta android view the screenshot img alt screenshot src browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel beta hastouchscreen true mixed active content blocked false mixed passive content blocked false tracking content blocked false from with ❤️
1
40,803
10,580,528,452
IssuesEvent
2019-10-08 07:01:18
yodaos-project/ShadowNode
https://api.github.com/repos/yodaos-project/ShadowNode
opened
Best practice of building on macOS
build doc
We should document the best practice of building on macOS with dbus installed with brew. As pkg-config could find dbus related stuff: https://github.com/yodaos-project/ShadowNode/blob/master/cmake/iotjs.cmake#L405-L407 It might be much more convenient to `brew install pkg-config` then build.
1.0
Best practice of building on macOS - We should document the best practice of building on macOS with dbus installed with brew. As pkg-config could find dbus related stuff: https://github.com/yodaos-project/ShadowNode/blob/master/cmake/iotjs.cmake#L405-L407 It might be much more convenient to `brew install pkg-config` then build.
non_priority
best practice of building on macos we should document the best practice of building on macos with dbus installed with brew as pkg config could find dbus related stuff it might be much more convenient to brew install pkg config then build
0
160,544
20,109,715,937
IssuesEvent
2022-02-07 14:03:31
jgeraigery/herman-1
https://api.github.com/repos/jgeraigery/herman-1
opened
CVE-2020-36181 (High) detected in jackson-databind-2.6.7.3.jar
security vulnerability
## CVE-2020-36181 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.7.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.7.3/jackson-databind-2.6.7.3.jar</p> <p> Dependency Hierarchy: - aws-java-sdk-ecs-1.11.714.jar (Root Library) - aws-java-sdk-core-1.11.714.jar - :x: **jackson-databind-2.6.7.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/herman-1/commit/eaf3c717d8aba82b2651ce79d0eab468670a7ce1">eaf3c717d8aba82b2651ce79d0eab468670a7ce1</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS. <p>Publish Date: 2021-01-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36181>CVE-2020-36181</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/3004">https://github.com/FasterXML/jackson-databind/issues/3004</a></p> <p>Release Date: 2021-01-06</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.6.7.3","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.amazonaws:aws-java-sdk-ecs:1.11.714;com.amazonaws:aws-java-sdk-core:1.11.714;com.fasterxml.jackson.core:jackson-databind:2.6.7.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36181","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36181","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-36181 (High) detected in jackson-databind-2.6.7.3.jar - ## CVE-2020-36181 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.7.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.7.3/jackson-databind-2.6.7.3.jar</p> <p> Dependency Hierarchy: - aws-java-sdk-ecs-1.11.714.jar (Root Library) - aws-java-sdk-core-1.11.714.jar - :x: **jackson-databind-2.6.7.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/herman-1/commit/eaf3c717d8aba82b2651ce79d0eab468670a7ce1">eaf3c717d8aba82b2651ce79d0eab468670a7ce1</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS. <p>Publish Date: 2021-01-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36181>CVE-2020-36181</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/3004">https://github.com/FasterXML/jackson-databind/issues/3004</a></p> <p>Release Date: 2021-01-06</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.6.7.3","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.amazonaws:aws-java-sdk-ecs:1.11.714;com.amazonaws:aws-java-sdk-core:1.11.714;com.fasterxml.jackson.core:jackson-databind:2.6.7.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36181","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36181","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy aws java sdk ecs jar root library aws java sdk core jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp dbcp cpdsadapter driveradaptercpds publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com amazonaws aws java sdk ecs com amazonaws aws java sdk core com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp dbcp cpdsadapter driveradaptercpds vulnerabilityurl
0
282,428
24,474,846,527
IssuesEvent
2022-10-08 03:19:46
lowRISC/opentitan
https://api.github.com/repos/lowRISC/opentitan
closed
[test-triage] chip_rv_dm_ndm_reset_req
Component:TestTriage
### Hierarchy of regression failure Chip Level ### Failure Description UVM_ERROR @ 4213.817590 us: (sw_logger_if.sv:521) [rv_dm_ndm_reset_req_prog_sim_dv(sw/device/tests/sim_dv/rv_dm_ndm_reset_req.c:214)] CHECK-fail: reg[1]: obs:0x0 exp:0x44 ### Steps to Reproduce GH revision: [9c0b24ddb](https://github.com/lowrisc/opentitan/tree/9c0b24ddbeb5616bd8db661ec1395f2d4f326bc4) util/dvsim/dvsim.py hw/top_earlgrey/dv/chip_sim_cfg.hjson -i chip_rv_dm_ndm_reset_req --build-seed 2483310614 --fixed-seed 581187855 ### Tests with similar or related failures _No response_
1.0
[test-triage] chip_rv_dm_ndm_reset_req - ### Hierarchy of regression failure Chip Level ### Failure Description UVM_ERROR @ 4213.817590 us: (sw_logger_if.sv:521) [rv_dm_ndm_reset_req_prog_sim_dv(sw/device/tests/sim_dv/rv_dm_ndm_reset_req.c:214)] CHECK-fail: reg[1]: obs:0x0 exp:0x44 ### Steps to Reproduce GH revision: [9c0b24ddb](https://github.com/lowrisc/opentitan/tree/9c0b24ddbeb5616bd8db661ec1395f2d4f326bc4) util/dvsim/dvsim.py hw/top_earlgrey/dv/chip_sim_cfg.hjson -i chip_rv_dm_ndm_reset_req --build-seed 2483310614 --fixed-seed 581187855 ### Tests with similar or related failures _No response_
non_priority
chip rv dm ndm reset req hierarchy of regression failure chip level failure description uvm error us sw logger if sv check fail reg obs exp steps to reproduce gh revision util dvsim dvsim py hw top earlgrey dv chip sim cfg hjson i chip rv dm ndm reset req build seed fixed seed tests with similar or related failures no response
0
179,980
30,335,880,013
IssuesEvent
2023-07-11 09:32:13
audacity/audacity
https://api.github.com/repos/audacity/audacity
closed
[Design] Add new track and new types of tracks
Design / UX Task medium feature
Visual hint in the main UI for adding a new audio (or other types) tracks, and ability to specify what kind of track if other
1.0
[Design] Add new track and new types of tracks - Visual hint in the main UI for adding a new audio (or other types) tracks, and ability to specify what kind of track if other
non_priority
add new track and new types of tracks visual hint in the main ui for adding a new audio or other types tracks and ability to specify what kind of track if other
0
12,029
18,783,349,365
IssuesEvent
2021-11-08 09:32:45
The-GNTL-Project/Exchange
https://api.github.com/repos/The-GNTL-Project/Exchange
closed
Fees being charged on orders rather than transactions
bug go live requirement testing
Fees should be charged on the value of completed transactions at time of execution, not on the order value at the time the order is placed. Charging a full fee on a partially fulfilled order disincentivizes placing any order that risks not being completely filled, and imo will be highly off-putting to big money and small high-frequency traders alike.
1.0
Fees being charged on orders rather than transactions - Fees should be charged on the value of completed transactions at time of execution, not on the order value at the time the order is placed. Charging a full fee on a partially fulfilled order disincentivizes placing any order that risks not being completely filled, and imo will be highly off-putting to big money and small high-frequency traders alike.
non_priority
fees being charged on orders rather than transactions fees should be charged on the value of completed transactions at time of execution not on the order value at the time the order is placed charging a full fee on a partially fulfilled order disincentivizes placing any order that risks not being completely filled and imo will be highly off putting to big money and small high frequency traders alike
0
115,154
11,866,531,082
IssuesEvent
2020-03-26 04:01:44
WilliamChan4/SENG2021_TheFastGroup
https://api.github.com/repos/WilliamChan4/SENG2021_TheFastGroup
opened
Rename pipelines Staging and Production and Add Badges to GitHub
documentation enhancement
The pipelines should be renamed to staging and production and the badges for both the pipelines and deployments put on the README.md page.
1.0
Rename pipelines Staging and Production and Add Badges to GitHub - The pipelines should be renamed to staging and production and the badges for both the pipelines and deployments put on the README.md page.
non_priority
rename pipelines staging and production and add badges to github the pipelines should be renamed to staging and production and the badges for both the pipelines and deployments put on the readme md page
0
747,105
26,073,625,321
IssuesEvent
2022-12-24 06:19:33
CreeperMagnet/the-creepers-code
https://api.github.com/repos/CreeperMagnet/the-creepers-code
closed
Teapots can be duplicated by riding a boat into them
priority: high
This can be fixed by... I don't know. There's too many of these stupid boat bugs. I'll probably have to change its kill method from a teleport now.
1.0
Teapots can be duplicated by riding a boat into them - This can be fixed by... I don't know. There's too many of these stupid boat bugs. I'll probably have to change its kill method from a teleport now.
priority
teapots can be duplicated by riding a boat into them this can be fixed by i don t know there s too many of these stupid boat bugs i ll probably have to change its kill method from a teleport now
1
271,581
8,485,379,223
IssuesEvent
2018-10-26 07:36:01
swe-ms-boun/2018fall-swe574-g1
https://api.github.com/repos/swe-ms-boun/2018fall-swe574-g1
opened
Annotations page
module.annotation priority.low tier.ui type.feature
* Development of annotations page. Associated requirements: * The system should allow registered users to view their annotations. * The system should allow the registered users to go to the memories by using their annotations. * Registered users should be able to view their all tags they use when annotating the memories on the annotations page. * The system shall display a total number of annotations on the annotations page.
1.0
Annotations page - * Development of annotations page. Associated requirements: * The system should allow registered users to view their annotations. * The system should allow the registered users to go to the memories by using their annotations. * Registered users should be able to view their all tags they use when annotating the memories on the annotations page. * The system shall display a total number of annotations on the annotations page.
priority
annotations page development of annotations page associated requirements the system should allow registered users to view their annotations the system should allow the registered users to go to the memories by using their annotations registered users should be able to view their all tags they use when annotating the memories on the annotations page the system shall display a total number of annotations on the annotations page
1
75,836
7,494,474,232
IssuesEvent
2018-04-07 10:09:13
rakudo/rakudo
https://api.github.com/repos/rakudo/rakudo
closed
LTA Error when Proc::Async.bind-stdout/err get unopened IO::Handle
LTA testneeded
``` with Proc::Async.new: :out, :err, $*EXECUTABLE, $program.absolute { my $out-path := make-temp-file; my $err-path := make-temp-file; .bind-stdout: $out-path.IO.open: :w, :!out-buffer; .bind-stderr: $err-path.IO.open: :w, :!out-buffer; ... ``` gives `"get native descriptor requires an object with REPR MVMOSHandle (got Scalar with REPR P6opaque)"` ``` $ perl6 -v This is Rakudo version 2018.03-129-g7572983a4 built on MoarVM version 2018.03-35-gafdcad424 implementing Perl 6.c. ```
1.0
LTA Error when Proc::Async.bind-stdout/err get unopened IO::Handle - ``` with Proc::Async.new: :out, :err, $*EXECUTABLE, $program.absolute { my $out-path := make-temp-file; my $err-path := make-temp-file; .bind-stdout: $out-path.IO.open: :w, :!out-buffer; .bind-stderr: $err-path.IO.open: :w, :!out-buffer; ... ``` gives `"get native descriptor requires an object with REPR MVMOSHandle (got Scalar with REPR P6opaque)"` ``` $ perl6 -v This is Rakudo version 2018.03-129-g7572983a4 built on MoarVM version 2018.03-35-gafdcad424 implementing Perl 6.c. ```
non_priority
lta error when proc async bind stdout err get unopened io handle with proc async new out err executable program absolute my out path make temp file my err path make temp file bind stdout out path io open w out buffer bind stderr err path io open w out buffer gives get native descriptor requires an object with repr mvmoshandle got scalar with repr v this is rakudo version built on moarvm version implementing perl c
0
352,003
10,526,318,830
IssuesEvent
2019-09-30 16:50:14
ronaldoapf/PDS1
https://api.github.com/repos/ronaldoapf/PDS1
closed
User Story 2: Criar setores
Epic Priority "Must" User Story
## Como adminstrador do aplicativo de setores desejo criar um mapa de setores para Monte Carmelo, com objetivo de agrupar as regiões da cidade. > Com a criação do mapa de setores a prefeitura terá grandes benefícios no que diz respeito a organização administrativa da cidade. Vale ressaltar que o administrador tem o papel de atualizar os setores e manter a base de dados da aplicação. Critérios de Aceitação: - Identificar regiões semelhantes - Criar base de dados - Criar setores já existentes na cidade - Criar novos setores de acordo com crescimento da cidade e povoamento da base de dados ### Tarefas: - [ ] Utilizar api do OpenStreetMap para coletar dados e criar uma base de dados (8 dias) - [ ] Implementar o banco de dados a partir da base obtida pela API OpenStreetMap (3 dias) - [ ] Cruzar as informações no banco de dados para montar a setorização (5 dias) - [ ] Implementar uma interface para o usuário, prefeitura e administrador (1 dia) - [ ] Implementar interface para criação de setores (1 dia) ### INVEST - Independent: A estória é independente devido ao fato que não será necessário implementar outra estória para utilizá la, e pode ser implementada a qualquer momento. - Negotiable : A estória é negociável, devido ao fato de que seu objetivo é montar um mapa de setores baseado na coleta de informações via OpenStreetMap e IBGE, logo caso seja necessário efetuar alguma mudança com relação ao tipo de informação que sera mostrada ou exibida por setores, esta vai se adaptar. - Valuable : O grande valor desta estória é que ela é um dos pilares para o funcionamento do sistema, a partir dela é possível executar todas as funcionalidades propostas no sistema. - Estimable: A user story levaria 21 dias para ser feita de acordo com a estimativa feita pelo grupo. Levando em consideração que os critérios de aceitação e as tarefas a serem realizadas são de extrema importância para o pontapé inicial do sistema. - Testable: ### Hierarquia - Epic: Criar setores - Feature : Coleta de dados para criação dos setores - User storys: - Buscar dados do IBGE. - Buscar dados do OpenStreetMap. ## 3 C's - Cartão: Título: Criar um mapa de setores para a cidade de Monte Carmelo. Ator: Administrador do aplicativo Objetivo: Agrupar as regiões semelhantes, com o intuito de criar setores. Benefícios: Usar livremente o mapa de setores para identificar alguma região ou setor, saber aonde o usuário está realmente localizado no setor. - Conversa: Formulários para identificar se há mesmo novos setores ou se o mesmo já está cadastrado na base de dados. - Confirmação:
1.0
User Story 2: Criar setores - ## Como adminstrador do aplicativo de setores desejo criar um mapa de setores para Monte Carmelo, com objetivo de agrupar as regiões da cidade. > Com a criação do mapa de setores a prefeitura terá grandes benefícios no que diz respeito a organização administrativa da cidade. Vale ressaltar que o administrador tem o papel de atualizar os setores e manter a base de dados da aplicação. Critérios de Aceitação: - Identificar regiões semelhantes - Criar base de dados - Criar setores já existentes na cidade - Criar novos setores de acordo com crescimento da cidade e povoamento da base de dados ### Tarefas: - [ ] Utilizar api do OpenStreetMap para coletar dados e criar uma base de dados (8 dias) - [ ] Implementar o banco de dados a partir da base obtida pela API OpenStreetMap (3 dias) - [ ] Cruzar as informações no banco de dados para montar a setorização (5 dias) - [ ] Implementar uma interface para o usuário, prefeitura e administrador (1 dia) - [ ] Implementar interface para criação de setores (1 dia) ### INVEST - Independent: A estória é independente devido ao fato que não será necessário implementar outra estória para utilizá la, e pode ser implementada a qualquer momento. - Negotiable : A estória é negociável, devido ao fato de que seu objetivo é montar um mapa de setores baseado na coleta de informações via OpenStreetMap e IBGE, logo caso seja necessário efetuar alguma mudança com relação ao tipo de informação que sera mostrada ou exibida por setores, esta vai se adaptar. - Valuable : O grande valor desta estória é que ela é um dos pilares para o funcionamento do sistema, a partir dela é possível executar todas as funcionalidades propostas no sistema. - Estimable: A user story levaria 21 dias para ser feita de acordo com a estimativa feita pelo grupo. Levando em consideração que os critérios de aceitação e as tarefas a serem realizadas são de extrema importância para o pontapé inicial do sistema. - Testable: ### Hierarquia - Epic: Criar setores - Feature : Coleta de dados para criação dos setores - User storys: - Buscar dados do IBGE. - Buscar dados do OpenStreetMap. ## 3 C's - Cartão: Título: Criar um mapa de setores para a cidade de Monte Carmelo. Ator: Administrador do aplicativo Objetivo: Agrupar as regiões semelhantes, com o intuito de criar setores. Benefícios: Usar livremente o mapa de setores para identificar alguma região ou setor, saber aonde o usuário está realmente localizado no setor. - Conversa: Formulários para identificar se há mesmo novos setores ou se o mesmo já está cadastrado na base de dados. - Confirmação:
priority
user story criar setores como adminstrador do aplicativo de setores desejo criar um mapa de setores para monte carmelo com objetivo de agrupar as regiões da cidade com a criação do mapa de setores a prefeitura terá grandes benefícios no que diz respeito a organização administrativa da cidade vale ressaltar que o administrador tem o papel de atualizar os setores e manter a base de dados da aplicação critérios de aceitação identificar regiões semelhantes criar base de dados criar setores já existentes na cidade criar novos setores de acordo com crescimento da cidade e povoamento da base de dados tarefas utilizar api do openstreetmap para coletar dados e criar uma base de dados dias implementar o banco de dados a partir da base obtida pela api openstreetmap dias cruzar as informações no banco de dados para montar a setorização dias implementar uma interface para o usuário prefeitura e administrador dia implementar interface para criação de setores dia invest independent a estória é independente devido ao fato que não será necessário implementar outra estória para utilizá la e pode ser implementada a qualquer momento negotiable a estória é negociável devido ao fato de que seu objetivo é montar um mapa de setores baseado na coleta de informações via openstreetmap e ibge logo caso seja necessário efetuar alguma mudança com relação ao tipo de informação que sera mostrada ou exibida por setores esta vai se adaptar valuable o grande valor desta estória é que ela é um dos pilares para o funcionamento do sistema a partir dela é possível executar todas as funcionalidades propostas no sistema estimable a user story levaria dias para ser feita de acordo com a estimativa feita pelo grupo levando em consideração que os critérios de aceitação e as tarefas a serem realizadas são de extrema importância para o pontapé inicial do sistema testable hierarquia epic criar setores feature coleta de dados para criação dos setores user storys buscar dados do ibge buscar dados do openstreetmap c s cartão título criar um mapa de setores para a cidade de monte carmelo ator administrador do aplicativo objetivo agrupar as regiões semelhantes com o intuito de criar setores benefícios usar livremente o mapa de setores para identificar alguma região ou setor saber aonde o usuário está realmente localizado no setor conversa formulários para identificar se há mesmo novos setores ou se o mesmo já está cadastrado na base de dados confirmação
1
688,392
23,580,337,676
IssuesEvent
2022-08-23 07:05:38
pystardust/ani-cli
https://api.github.com/repos/pystardust/ani-cli
closed
Allow other programs using terminal to use ani-cli
type: feature request priority 4: wishlist
**Is your feature request related to a problem? Please describe.** There is a problem with trackma when it hooks ani-cli for play. It seems to keep opening and closing the episodes as it goes down the line until there are none left. I left a issue with them at https://github.com/z411/trackma/issues/637 **Describe the solution you'd like** After trying to fix it for a while, I think I have come to the conclusion that when ani-cli tries to put up the after player launch menu, it tries to take over the terminal or something, and forces the current player to close? Honestly I am a layman so I don't know the specifics, but originally I commented out your ending while loop at the end of the ani-cli script. This made it so that trackma seemed to work as intended but obviously now the menu after launching the player is gone if I use ani-cli alone. Changed line 597 from ```while : ; do``` to ```while [ -t 1 ] ; do``` According to what I searched is supposed to check if ani-cli is active in the terminal, and then won't open the menu if it isn't. There might be alternatives to this, and this might break something, but I don't know any programming so this is just me fiddling a little and seemed to fix my problem with trackma as well as allowed the menu to come up when directly using ani-cli. I put this under feature request because technically this is causing an issue on trackma's end and there isn't anything wrong on your side.
1.0
Allow other programs using terminal to use ani-cli - **Is your feature request related to a problem? Please describe.** There is a problem with trackma when it hooks ani-cli for play. It seems to keep opening and closing the episodes as it goes down the line until there are none left. I left a issue with them at https://github.com/z411/trackma/issues/637 **Describe the solution you'd like** After trying to fix it for a while, I think I have come to the conclusion that when ani-cli tries to put up the after player launch menu, it tries to take over the terminal or something, and forces the current player to close? Honestly I am a layman so I don't know the specifics, but originally I commented out your ending while loop at the end of the ani-cli script. This made it so that trackma seemed to work as intended but obviously now the menu after launching the player is gone if I use ani-cli alone. Changed line 597 from ```while : ; do``` to ```while [ -t 1 ] ; do``` According to what I searched is supposed to check if ani-cli is active in the terminal, and then won't open the menu if it isn't. There might be alternatives to this, and this might break something, but I don't know any programming so this is just me fiddling a little and seemed to fix my problem with trackma as well as allowed the menu to come up when directly using ani-cli. I put this under feature request because technically this is causing an issue on trackma's end and there isn't anything wrong on your side.
priority
allow other programs using terminal to use ani cli is your feature request related to a problem please describe there is a problem with trackma when it hooks ani cli for play it seems to keep opening and closing the episodes as it goes down the line until there are none left i left a issue with them at describe the solution you d like after trying to fix it for a while i think i have come to the conclusion that when ani cli tries to put up the after player launch menu it tries to take over the terminal or something and forces the current player to close honestly i am a layman so i don t know the specifics but originally i commented out your ending while loop at the end of the ani cli script this made it so that trackma seemed to work as intended but obviously now the menu after launching the player is gone if i use ani cli alone changed line from while do to while do according to what i searched is supposed to check if ani cli is active in the terminal and then won t open the menu if it isn t there might be alternatives to this and this might break something but i don t know any programming so this is just me fiddling a little and seemed to fix my problem with trackma as well as allowed the menu to come up when directly using ani cli i put this under feature request because technically this is causing an issue on trackma s end and there isn t anything wrong on your side
1
11,064
7,047,609,758
IssuesEvent
2018-01-02 14:20:26
Yakindu/statecharts
https://api.github.com/repos/Yakindu/statecharts
closed
Split sc editor and interface editor in multipage editor
Comp-Graphical Editor is-Feature-Request is-Usability-Issue Status-Consolidate
Currently, the interface declaration is a textfield inside of the graphical editor. This solution has certain advantages and drawbacks. Pro: - The interface declaration and the statechart can be seen simultaneously side by side. Elements in the statechart can easily be referenced in the interface declaration. - The statechart and the interface declaration can be printed at once. Con: - The intferface declaration isn't edited in a real text editor, the text field needs to be double clicked to edit it, the whole text moves a bit when activating the editing mode, and editing feels sluggish. All in all, it feels like editing a text label in photoshop or similar. - The interface text label doesn't have line numbering - Scrolling inside of the text label is not possible, the whole statechart needs to be scrolled, which turns awkward for huge statecharts It's also questionable if one really needs to see both the statechart and the declaration. All in all, the statechart pretty much speaks for itself - all events / variables of an interface are prefixed with the interface name anyways, it's clearly visible if an interface is an _in_\- or an _out_-event, and the type of variables can be deferred by usage or maybe via tooltip on hover. Also, I wouldn't want to print the statechart declaration on the same page as the diagram itself, because it's hard to fit a bigger statechart on a standard page anyways without losing information. So, moving the interface declaration inside of another tab with a real text editor seems to be a better solution than the current one all in all, except for very tiny statecharts. An option to show both tabs side by side or to undock the editor would be nice, if this is possible with eclipse.
True
Split sc editor and interface editor in multipage editor - Currently, the interface declaration is a textfield inside of the graphical editor. This solution has certain advantages and drawbacks. Pro: - The interface declaration and the statechart can be seen simultaneously side by side. Elements in the statechart can easily be referenced in the interface declaration. - The statechart and the interface declaration can be printed at once. Con: - The intferface declaration isn't edited in a real text editor, the text field needs to be double clicked to edit it, the whole text moves a bit when activating the editing mode, and editing feels sluggish. All in all, it feels like editing a text label in photoshop or similar. - The interface text label doesn't have line numbering - Scrolling inside of the text label is not possible, the whole statechart needs to be scrolled, which turns awkward for huge statecharts It's also questionable if one really needs to see both the statechart and the declaration. All in all, the statechart pretty much speaks for itself - all events / variables of an interface are prefixed with the interface name anyways, it's clearly visible if an interface is an _in_\- or an _out_-event, and the type of variables can be deferred by usage or maybe via tooltip on hover. Also, I wouldn't want to print the statechart declaration on the same page as the diagram itself, because it's hard to fit a bigger statechart on a standard page anyways without losing information. So, moving the interface declaration inside of another tab with a real text editor seems to be a better solution than the current one all in all, except for very tiny statecharts. An option to show both tabs side by side or to undock the editor would be nice, if this is possible with eclipse.
non_priority
split sc editor and interface editor in multipage editor currently the interface declaration is a textfield inside of the graphical editor this solution has certain advantages and drawbacks pro the interface declaration and the statechart can be seen simultaneously side by side elements in the statechart can easily be referenced in the interface declaration the statechart and the interface declaration can be printed at once con the intferface declaration isn t edited in a real text editor the text field needs to be double clicked to edit it the whole text moves a bit when activating the editing mode and editing feels sluggish all in all it feels like editing a text label in photoshop or similar the interface text label doesn t have line numbering scrolling inside of the text label is not possible the whole statechart needs to be scrolled which turns awkward for huge statecharts it s also questionable if one really needs to see both the statechart and the declaration all in all the statechart pretty much speaks for itself all events variables of an interface are prefixed with the interface name anyways it s clearly visible if an interface is an in or an out event and the type of variables can be deferred by usage or maybe via tooltip on hover also i wouldn t want to print the statechart declaration on the same page as the diagram itself because it s hard to fit a bigger statechart on a standard page anyways without losing information so moving the interface declaration inside of another tab with a real text editor seems to be a better solution than the current one all in all except for very tiny statecharts an option to show both tabs side by side or to undock the editor would be nice if this is possible with eclipse
0
327,293
28,052,010,886
IssuesEvent
2023-03-29 06:42:51
ALTA-LapakUMKM-Group-2/LapakUMKM-APITesting
https://api.github.com/repos/ALTA-LapakUMKM-Group-2/LapakUMKM-APITesting
closed
[User-016] POST Update User With Complete Data In Json
Manual Api Testing
**Given** Post update data users **When** User fills in the json data by complete data **Then** Send post update data **And** API Should be 200 OK **And** Validate post update data resource json schema
1.0
[User-016] POST Update User With Complete Data In Json - **Given** Post update data users **When** User fills in the json data by complete data **Then** Send post update data **And** API Should be 200 OK **And** Validate post update data resource json schema
non_priority
post update user with complete data in json given post update data users when user fills in the json data by complete data then send post update data and api should be ok and validate post update data resource json schema
0
17,206
9,654,438,719
IssuesEvent
2019-05-19 14:07:00
Beep6581/RawTherapee
https://api.github.com/repos/Beep6581/RawTherapee
closed
Don't preprocess and demosaic again when using coarse rotation or flip
performance
Currently, when using coarse rotation or flip, the image gets raw preprocessed and demosaiced again, which imho is not necessary. This simple patch fixes it: ```diff diff --git a/rtengine/refreshmap.cc b/rtengine/refreshmap.cc index 7a5214d75..d741b1744 100644 --- a/rtengine/refreshmap.cc +++ b/rtengine/refreshmap.cc @@ -83,9 +83,9 @@ int refreshmap[rtengine::NUMOFEVENTS] = { RGBCURVE, // EvSHSHTonalW, RGBCURVE, // EvSHLContrast, RETINEX, // EvSHRadius, - ALL, // EvCTRotate, - ALL, // EvCTHFlip, - ALL, // EvCTVFlip, + ALLNORAW, // EvCTRotate, + ALLNORAW, // EvCTHFlip, + ALLNORAW, // EvCTVFlip, TRANSFORM, // EvROTDegree, TRANSFORM, // EvTransAutoFill, TRANSFORM, // EvDISTAmount, ``` Any objections to commit this patch?
True
Don't preprocess and demosaic again when using coarse rotation or flip - Currently, when using coarse rotation or flip, the image gets raw preprocessed and demosaiced again, which imho is not necessary. This simple patch fixes it: ```diff diff --git a/rtengine/refreshmap.cc b/rtengine/refreshmap.cc index 7a5214d75..d741b1744 100644 --- a/rtengine/refreshmap.cc +++ b/rtengine/refreshmap.cc @@ -83,9 +83,9 @@ int refreshmap[rtengine::NUMOFEVENTS] = { RGBCURVE, // EvSHSHTonalW, RGBCURVE, // EvSHLContrast, RETINEX, // EvSHRadius, - ALL, // EvCTRotate, - ALL, // EvCTHFlip, - ALL, // EvCTVFlip, + ALLNORAW, // EvCTRotate, + ALLNORAW, // EvCTHFlip, + ALLNORAW, // EvCTVFlip, TRANSFORM, // EvROTDegree, TRANSFORM, // EvTransAutoFill, TRANSFORM, // EvDISTAmount, ``` Any objections to commit this patch?
non_priority
don t preprocess and demosaic again when using coarse rotation or flip currently when using coarse rotation or flip the image gets raw preprocessed and demosaiced again which imho is not necessary this simple patch fixes it diff diff git a rtengine refreshmap cc b rtengine refreshmap cc index a rtengine refreshmap cc b rtengine refreshmap cc int refreshmap rgbcurve evshshtonalw rgbcurve evshlcontrast retinex evshradius all evctrotate all evcthflip all evctvflip allnoraw evctrotate allnoraw evcthflip allnoraw evctvflip transform evrotdegree transform evtransautofill transform evdistamount any objections to commit this patch
0
249,171
26,889,995,815
IssuesEvent
2023-02-06 08:08:47
valtech-ch/microservice-kubernetes-cluster
https://api.github.com/repos/valtech-ch/microservice-kubernetes-cluster
closed
CVE-2022-25857 (High) detected in snakeyaml-1.30.jar - autoclosed
security vulnerability
## CVE-2022-25857 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snakeyaml-1.30.jar</b></p></summary> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /security/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - logstash-logback-encoder-7.2.jar (Root Library) - jackson-databind-2.13.4.2.jar - jackson-bom-2.13.4.pom - jackson-dataformat-yaml-2.13.4.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/valtech-ch/microservice-kubernetes-cluster/commit/335a4047c89f52dfe860e93daefb32dc86a521a2">335a4047c89f52dfe860e93daefb32dc86a521a2</a></p> <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections. <p>Publish Date: 2022-08-30 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25857>CVE-2022-25857</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857</a></p> <p>Release Date: 2022-08-30</p> <p>Fix Resolution: org.yaml:snakeyaml:1.31</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-25857 (High) detected in snakeyaml-1.30.jar - autoclosed - ## CVE-2022-25857 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snakeyaml-1.30.jar</b></p></summary> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /security/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - logstash-logback-encoder-7.2.jar (Root Library) - jackson-databind-2.13.4.2.jar - jackson-bom-2.13.4.pom - jackson-dataformat-yaml-2.13.4.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/valtech-ch/microservice-kubernetes-cluster/commit/335a4047c89f52dfe860e93daefb32dc86a521a2">335a4047c89f52dfe860e93daefb32dc86a521a2</a></p> <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections. <p>Publish Date: 2022-08-30 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25857>CVE-2022-25857</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857</a></p> <p>Release Date: 2022-08-30</p> <p>Fix Resolution: org.yaml:snakeyaml:1.31</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in snakeyaml jar autoclosed cve high severity vulnerability vulnerable library snakeyaml jar yaml parser and emitter for java library home page a href path to dependency file security build gradle path to vulnerable library home wss scanner gradle caches modules files org yaml snakeyaml snakeyaml jar home wss scanner gradle caches modules files org yaml snakeyaml snakeyaml jar home wss scanner gradle caches modules files org yaml snakeyaml snakeyaml jar home wss scanner gradle caches modules files org yaml snakeyaml snakeyaml jar home wss scanner gradle caches modules files org yaml snakeyaml snakeyaml jar dependency hierarchy logstash logback encoder jar root library jackson databind jar jackson bom pom jackson dataformat yaml jar x snakeyaml jar vulnerable library found in head commit a href found in base branch develop vulnerability details the package org yaml snakeyaml from and before are vulnerable to denial of service dos due missing to nested depth limitation for collections publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org yaml snakeyaml step up your open source security game with mend
0
18,518
2,615,172,712
IssuesEvent
2015-03-01 06:54:46
chrsmith/html5rocks
https://api.github.com/repos/chrsmith/html5rocks
opened
How to get started with WebSocket
auto-migrated Milestone-X New Priority-P2 Tutorial Type-Feature
``` Write an tutorial article introducing how to get started with WebSocket. This article will include: - how to build server, what options you have - how to send/receive text data using WebSocket - how to send/receive binary data using WebSocket ``` Original issue reported on code.google.com by `agek...@google.com` on 7 Feb 2012 at 9:47
1.0
How to get started with WebSocket - ``` Write an tutorial article introducing how to get started with WebSocket. This article will include: - how to build server, what options you have - how to send/receive text data using WebSocket - how to send/receive binary data using WebSocket ``` Original issue reported on code.google.com by `agek...@google.com` on 7 Feb 2012 at 9:47
priority
how to get started with websocket write an tutorial article introducing how to get started with websocket this article will include how to build server what options you have how to send receive text data using websocket how to send receive binary data using websocket original issue reported on code google com by agek google com on feb at
1
133,929
29,670,450,083
IssuesEvent
2023-06-11 10:41:35
dtcxzyw/llvm-ci
https://api.github.com/repos/dtcxzyw/llvm-ci
closed
Regressions Report [rv32gc-O3-thinlto] April 27th 2023, 2:15:47 pm
regression codegen reasonable
## Metadata + Workflow URL: https://github.com/dtcxzyw/llvm-ci/actions/runs/4820681730 ## Change Logs from fe3ed6550ef277f5c47a9ccdbdd466fa225f4a99 to 51297a7a720c83f831b072df4666877673f87cfa [51297a7a720c83f831b072df4666877673f87cfa](https://github.com/llvm/llvm-project/commit/51297a7a720c83f831b072df4666877673f87cfa) [MLIR][OpenMP][NFC] Minor code cleanup [044f27f62fa5c771385fdac34150307d652e60d6](https://github.com/llvm/llvm-project/commit/044f27f62fa5c771385fdac34150307d652e60d6) [AArch64] Precommit tests for VECTOR_SHUFFLE [8b56da5e9f3ba737a5ff4bf5dee654416849042f](https://github.com/llvm/llvm-project/commit/8b56da5e9f3ba737a5ff4bf5dee654416849042f) [IR] Change shufflevector undef mask to poison [90d30fde12d80b633ce157b5f070a33e96018bbc](https://github.com/llvm/llvm-project/commit/90d30fde12d80b633ce157b5f070a33e96018bbc) [InstCombine] Add frozen for the condition value of SelectInst [f539b6ffc25144703498176558035c499825dc48](https://github.com/llvm/llvm-project/commit/f539b6ffc25144703498176558035c499825dc48) [NFC] Add tests from my fix for GH62362. [fa0014a68bb452ff12af6e4af5e6e919dbe8584b](https://github.com/llvm/llvm-project/commit/fa0014a68bb452ff12af6e4af5e6e919dbe8584b) [SCEV] Drop LCSSA check in createNodeFromSelectLikePHI() [079c525f206228c3343048bb5a74a8e9a428de1a](https://github.com/llvm/llvm-project/commit/079c525f206228c3343048bb5a74a8e9a428de1a) [SCEV] Try simplifying phi before createNodeFromSelectLikePHI() [6cfcf0242f3260a3a90bac68e9f271548caa8372](https://github.com/llvm/llvm-project/commit/6cfcf0242f3260a3a90bac68e9f271548caa8372) [clangd] Fix the include-cleaner-batch-fix.test failure on some platforms [bd1109307ad16a142d0a185f06e36d256d948e5a](https://github.com/llvm/llvm-project/commit/bd1109307ad16a142d0a185f06e36d256d948e5a) [DebugInfo][InstCombine] Fix missing source and variable locations after foldOpIntoPhi [a3e56a8792ffaf3a3d3538736e1042b8db45ab89](https://github.com/llvm/llvm-project/commit/a3e56a8792ffaf3a3d3538736e1042b8db45ab89) [KMSAN] Enable on SystemZ ## Regressions (Size) |Name|Baseline MD5|Current MD5|Baseline Size|Current Size|Ratio| |:--|:--:|:--:|--:|--:|--:| |MultiSource/Applications/ClamAV/clamscan|046626912c5e4be2b649f1585be3b154|f10359246d34349500a20f00c9332540|452634|452714|1.000| ## Differences (Size) |Name|Baseline MD5|Current MD5|Baseline Size|Current Size|Ratio| |:--|:--:|:--:|--:|--:|--:| |MultiSource/Applications/ClamAV/clamscan|046626912c5e4be2b649f1585be3b154|f10359246d34349500a20f00c9332540|452634|452714|1.000| |MultiSource/Applications/SIBsim4/SIBsim4|ca71f43885c2b833d1b31da81031315f|e2e79cb5471e6b0dce307a49ce6545db|31894|31894|1.000| |GeoMeans|N/A|N/A|452634.000|452714.000|1.000| ## Differences (Time) |Name|Baseline MD5|Current MD5|Baseline Time|Current Time|Ratio| |:--|:--:|:--:|--:|--:|--:| |MultiSource/Applications/SIBsim4/SIBsim4|ca71f43885c2b833d1b31da81031315f|e2e79cb5471e6b0dce307a49ce6545db|11.67499309|11.67499309|1.000| |MultiSource/Applications/ClamAV/clamscan|046626912c5e4be2b649f1585be3b154|f10359246d34349500a20f00c9332540|0.464783438|0.464783324|1.000| |GeoMeans|N/A|N/A|0.465|0.465|1.000|
1.0
Regressions Report [rv32gc-O3-thinlto] April 27th 2023, 2:15:47 pm - ## Metadata + Workflow URL: https://github.com/dtcxzyw/llvm-ci/actions/runs/4820681730 ## Change Logs from fe3ed6550ef277f5c47a9ccdbdd466fa225f4a99 to 51297a7a720c83f831b072df4666877673f87cfa [51297a7a720c83f831b072df4666877673f87cfa](https://github.com/llvm/llvm-project/commit/51297a7a720c83f831b072df4666877673f87cfa) [MLIR][OpenMP][NFC] Minor code cleanup [044f27f62fa5c771385fdac34150307d652e60d6](https://github.com/llvm/llvm-project/commit/044f27f62fa5c771385fdac34150307d652e60d6) [AArch64] Precommit tests for VECTOR_SHUFFLE [8b56da5e9f3ba737a5ff4bf5dee654416849042f](https://github.com/llvm/llvm-project/commit/8b56da5e9f3ba737a5ff4bf5dee654416849042f) [IR] Change shufflevector undef mask to poison [90d30fde12d80b633ce157b5f070a33e96018bbc](https://github.com/llvm/llvm-project/commit/90d30fde12d80b633ce157b5f070a33e96018bbc) [InstCombine] Add frozen for the condition value of SelectInst [f539b6ffc25144703498176558035c499825dc48](https://github.com/llvm/llvm-project/commit/f539b6ffc25144703498176558035c499825dc48) [NFC] Add tests from my fix for GH62362. [fa0014a68bb452ff12af6e4af5e6e919dbe8584b](https://github.com/llvm/llvm-project/commit/fa0014a68bb452ff12af6e4af5e6e919dbe8584b) [SCEV] Drop LCSSA check in createNodeFromSelectLikePHI() [079c525f206228c3343048bb5a74a8e9a428de1a](https://github.com/llvm/llvm-project/commit/079c525f206228c3343048bb5a74a8e9a428de1a) [SCEV] Try simplifying phi before createNodeFromSelectLikePHI() [6cfcf0242f3260a3a90bac68e9f271548caa8372](https://github.com/llvm/llvm-project/commit/6cfcf0242f3260a3a90bac68e9f271548caa8372) [clangd] Fix the include-cleaner-batch-fix.test failure on some platforms [bd1109307ad16a142d0a185f06e36d256d948e5a](https://github.com/llvm/llvm-project/commit/bd1109307ad16a142d0a185f06e36d256d948e5a) [DebugInfo][InstCombine] Fix missing source and variable locations after foldOpIntoPhi [a3e56a8792ffaf3a3d3538736e1042b8db45ab89](https://github.com/llvm/llvm-project/commit/a3e56a8792ffaf3a3d3538736e1042b8db45ab89) [KMSAN] Enable on SystemZ ## Regressions (Size) |Name|Baseline MD5|Current MD5|Baseline Size|Current Size|Ratio| |:--|:--:|:--:|--:|--:|--:| |MultiSource/Applications/ClamAV/clamscan|046626912c5e4be2b649f1585be3b154|f10359246d34349500a20f00c9332540|452634|452714|1.000| ## Differences (Size) |Name|Baseline MD5|Current MD5|Baseline Size|Current Size|Ratio| |:--|:--:|:--:|--:|--:|--:| |MultiSource/Applications/ClamAV/clamscan|046626912c5e4be2b649f1585be3b154|f10359246d34349500a20f00c9332540|452634|452714|1.000| |MultiSource/Applications/SIBsim4/SIBsim4|ca71f43885c2b833d1b31da81031315f|e2e79cb5471e6b0dce307a49ce6545db|31894|31894|1.000| |GeoMeans|N/A|N/A|452634.000|452714.000|1.000| ## Differences (Time) |Name|Baseline MD5|Current MD5|Baseline Time|Current Time|Ratio| |:--|:--:|:--:|--:|--:|--:| |MultiSource/Applications/SIBsim4/SIBsim4|ca71f43885c2b833d1b31da81031315f|e2e79cb5471e6b0dce307a49ce6545db|11.67499309|11.67499309|1.000| |MultiSource/Applications/ClamAV/clamscan|046626912c5e4be2b649f1585be3b154|f10359246d34349500a20f00c9332540|0.464783438|0.464783324|1.000| |GeoMeans|N/A|N/A|0.465|0.465|1.000|
non_priority
regressions report april pm metadata workflow url change logs from to minor code cleanup precommit tests for vector shuffle change shufflevector undef mask to poison add frozen for the condition value of selectinst add tests from my fix for drop lcssa check in createnodefromselectlikephi try simplifying phi before createnodefromselectlikephi fix the include cleaner batch fix test failure on some platforms fix missing source and variable locations after foldopintophi enable on systemz regressions size name baseline current baseline size current size ratio multisource applications clamav clamscan differences size name baseline current baseline size current size ratio multisource applications clamav clamscan multisource applications geomeans n a n a differences time name baseline current baseline time current time ratio multisource applications multisource applications clamav clamscan geomeans n a n a
0
20,029
27,945,268,113
IssuesEvent
2023-03-24 02:09:54
TakosThings/Fluent-Discord
https://api.github.com/repos/TakosThings/Fluent-Discord
opened
Plugin name here
better discord plugin compatibility
### Plugin Link https://betterdiscord.app/plugin/QuickMention ### Notes I think this is the same plugin from Vencord, that I'm using... not sure though Vencord Plugin: https://gist.github.com/Vendicated/8696cde7b92548064a3ae92ead84d033#QuickMention
True
Plugin name here - ### Plugin Link https://betterdiscord.app/plugin/QuickMention ### Notes I think this is the same plugin from Vencord, that I'm using... not sure though Vencord Plugin: https://gist.github.com/Vendicated/8696cde7b92548064a3ae92ead84d033#QuickMention
non_priority
plugin name here plugin link notes i think this is the same plugin from vencord that i m using not sure though vencord plugin
0
331,642
10,075,805,505
IssuesEvent
2019-07-24 14:57:30
clearlinux/distribution
https://api.github.com/repos/clearlinux/distribution
closed
Bundle "virt-manager" depends on bundle "virt-manager-gui" to work, possible to merge the 2 into one?
bug desktop medium priority
**Is your feature request related to a problem? Please describe.** I'm not sure what is the reason for having both "virt-manager" and "virt-manager-gui". "virt-manager" installs the GUI, but it fails (see screenshot) because it's missing Gtk-vnc. Once I install "virt-manager-gui" (which contains Gtk-vnc), the issue is resolved. **Describe the solution you'd like** They both perform GUI functions for libvirt. Why not merge the 2 bundles or add the Gtk-vnc bundle into "virt-manager" to resolve the dependency issue? ![IMG_2464](https://user-images.githubusercontent.com/29260389/56700173-c317c100-66ad-11e9-9e70-4b8ce937ec82.jpg)
1.0
Bundle "virt-manager" depends on bundle "virt-manager-gui" to work, possible to merge the 2 into one? - **Is your feature request related to a problem? Please describe.** I'm not sure what is the reason for having both "virt-manager" and "virt-manager-gui". "virt-manager" installs the GUI, but it fails (see screenshot) because it's missing Gtk-vnc. Once I install "virt-manager-gui" (which contains Gtk-vnc), the issue is resolved. **Describe the solution you'd like** They both perform GUI functions for libvirt. Why not merge the 2 bundles or add the Gtk-vnc bundle into "virt-manager" to resolve the dependency issue? ![IMG_2464](https://user-images.githubusercontent.com/29260389/56700173-c317c100-66ad-11e9-9e70-4b8ce937ec82.jpg)
priority
bundle virt manager depends on bundle virt manager gui to work possible to merge the into one is your feature request related to a problem please describe i m not sure what is the reason for having both virt manager and virt manager gui virt manager installs the gui but it fails see screenshot because it s missing gtk vnc once i install virt manager gui which contains gtk vnc the issue is resolved describe the solution you d like they both perform gui functions for libvirt why not merge the bundles or add the gtk vnc bundle into virt manager to resolve the dependency issue
1
682,118
23,333,297,486
IssuesEvent
2022-08-09 07:46:15
grpc/grpc
https://api.github.com/repos/grpc/grpc
closed
cross compile for aarch64 use bazel meet error
kind/bug lang/c++ priority/P2 untriaged
Like the issues #30257. I had update boringssl with newest master_with_bazel branch but the problem is exist. Some build errors as bellow. ..... external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S: Assembler messages: external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:303: Error: unknown pseudo-op: `.att_syntax' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:306: Error: unknown mnemonic `push' -- `push %rbp' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:308: Error: bad register expression external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:309: Error: unknown mnemonic `movq' -- `movq %rsp,%rbp' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:310: Error: bad register expression external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:311: Error: unknown mnemonic `push' -- `push %r12' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:312: Error: bad register expression external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:320: Error: operand 1 must be an integer register -- `mov %rcx,%r8' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:321: Error: unknown mnemonic `addq' -- `addq $6144+12288+512+9408+32,%r8' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:322: Error: operand 1 must be an integer register -- `mov %r8,%rax' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:323: Error: unknown mnemonic `subq' -- `subq $6144,%r8' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:324: Error: operand 1 must be an integer register -- `mov %r8,%r11' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:325: Error: unknown mnemonic `subq' -- `subq $12288,%r8' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:326: Error: operand 1 must be an integer register -- `mov %r8,%r12' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:327: Error: unknown mnemonic `subq' -- `subq $512,%r8' .... By the way, I find when build poly_rq_mul.S will meet the error. This is my build comand. /usr/bin/aarch64-linux-gnu-gcc boringssl/src/crypto/hrss/asm/poly_rq_mul.S /usr/bin/aarch64-linux-gnu-gcc boringssl/src/crypto/hrss/asm/poly_rq_mul.S -march=armv8-a The paramters is not correct? Anyone knows how to build the s file? Thanks very much!
1.0
cross compile for aarch64 use bazel meet error - Like the issues #30257. I had update boringssl with newest master_with_bazel branch but the problem is exist. Some build errors as bellow. ..... external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S: Assembler messages: external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:303: Error: unknown pseudo-op: `.att_syntax' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:306: Error: unknown mnemonic `push' -- `push %rbp' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:308: Error: bad register expression external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:309: Error: unknown mnemonic `movq' -- `movq %rsp,%rbp' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:310: Error: bad register expression external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:311: Error: unknown mnemonic `push' -- `push %r12' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:312: Error: bad register expression external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:320: Error: operand 1 must be an integer register -- `mov %rcx,%r8' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:321: Error: unknown mnemonic `addq' -- `addq $6144+12288+512+9408+32,%r8' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:322: Error: operand 1 must be an integer register -- `mov %r8,%rax' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:323: Error: unknown mnemonic `subq' -- `subq $6144,%r8' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:324: Error: operand 1 must be an integer register -- `mov %r8,%r11' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:325: Error: unknown mnemonic `subq' -- `subq $12288,%r8' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:326: Error: operand 1 must be an integer register -- `mov %r8,%r12' external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:327: Error: unknown mnemonic `subq' -- `subq $512,%r8' .... By the way, I find when build poly_rq_mul.S will meet the error. This is my build comand. /usr/bin/aarch64-linux-gnu-gcc boringssl/src/crypto/hrss/asm/poly_rq_mul.S /usr/bin/aarch64-linux-gnu-gcc boringssl/src/crypto/hrss/asm/poly_rq_mul.S -march=armv8-a The paramters is not correct? Anyone knows how to build the s file? Thanks very much!
priority
cross compile for use bazel meet error like the issues i had update boringssl with newest master with bazel branch but the problem is exist some build errors as bellow external boringssl src crypto hrss asm poly rq mul s assembler messages external boringssl src crypto hrss asm poly rq mul s error unknown pseudo op att syntax external boringssl src crypto hrss asm poly rq mul s error unknown mnemonic push push rbp external boringssl src crypto hrss asm poly rq mul s error bad register expression external boringssl src crypto hrss asm poly rq mul s error unknown mnemonic movq movq rsp rbp external boringssl src crypto hrss asm poly rq mul s error bad register expression external boringssl src crypto hrss asm poly rq mul s error unknown mnemonic push push external boringssl src crypto hrss asm poly rq mul s error bad register expression external boringssl src crypto hrss asm poly rq mul s error operand must be an integer register mov rcx external boringssl src crypto hrss asm poly rq mul s error unknown mnemonic addq addq external boringssl src crypto hrss asm poly rq mul s error operand must be an integer register mov rax external boringssl src crypto hrss asm poly rq mul s error unknown mnemonic subq subq external boringssl src crypto hrss asm poly rq mul s error operand must be an integer register mov external boringssl src crypto hrss asm poly rq mul s error unknown mnemonic subq subq external boringssl src crypto hrss asm poly rq mul s error operand must be an integer register mov external boringssl src crypto hrss asm poly rq mul s error unknown mnemonic subq subq by the way i find when build poly rq mul s will meet the error this is my build comand usr bin linux gnu gcc boringssl src crypto hrss asm poly rq mul s usr bin linux gnu gcc boringssl src crypto hrss asm poly rq mul s march a the paramters is not correct anyone knows how to build the s file? thanks very much
1
37,079
12,467,796,769
IssuesEvent
2020-05-28 17:42:03
geofffranks/spruce
https://api.github.com/repos/geofffranks/spruce
closed
CVE-2020-11022 (Medium) detected in jquery-2.1.0.js
security vulnerability
## CVE-2020-11022 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-2.1.0.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.0/jquery.js</a></p> <p>Path to dependency file: /tmp/ws-scm/spruce/vendor/github.com/smartystreets/goconvey/web/client/index.html</p> <p>Path to vulnerable library: /spruce/vendor/github.com/smartystreets/goconvey/web/client/resources/js/lib/jquery.js,/spruce/vendor/github.com/smartystreets/goconvey/web/client/resources/js/lib/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.1.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/geofffranks/spruce/commit/66c58daa21fb1d7c8b0ff833ad4544035c070300">66c58daa21fb1d7c8b0ff833ad4544035c070300</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-11022 (Medium) detected in jquery-2.1.0.js - ## CVE-2020-11022 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-2.1.0.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.0/jquery.js</a></p> <p>Path to dependency file: /tmp/ws-scm/spruce/vendor/github.com/smartystreets/goconvey/web/client/index.html</p> <p>Path to vulnerable library: /spruce/vendor/github.com/smartystreets/goconvey/web/client/resources/js/lib/jquery.js,/spruce/vendor/github.com/smartystreets/goconvey/web/client/resources/js/lib/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.1.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/geofffranks/spruce/commit/66c58daa21fb1d7c8b0ff833ad4544035c070300">66c58daa21fb1d7c8b0ff833ad4544035c070300</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in jquery js cve medium severity vulnerability vulnerable library jquery js javascript library for dom operations library home page a href path to dependency file tmp ws scm spruce vendor github com smartystreets goconvey web client index html path to vulnerable library spruce vendor github com smartystreets goconvey web client resources js lib jquery js spruce vendor github com smartystreets goconvey web client resources js lib jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href vulnerability details in jquery versions greater than or equal to and before passing html from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
109,828
11,659,450,743
IssuesEvent
2020-03-03 00:04:42
gatsbyjs/gatsby
https://api.github.com/repos/gatsbyjs/gatsby
closed
gatsby tutorial sidebar animation bug
stale? type: documentation
**Summary** I'm going through the [gatsby tutorial part one](https://www.gatsbyjs.org/tutorial/part-one/) and noticed that the sidebar animation shows the "linking between pages" highlighted when not in that section and that when in the "linking between pages" section the sidebar animation has "deploying a gatsby site" selected. I've also tested this in multiple browsers on my mac with the same results. **OS / browser versions** macOS version: 10.15.2 safari version: 13.0.4 firefox version: 71.0 chrome version: 79.0.3945.88 **Steps to reproduce** 1. Go to "linking between pages" anchor (https://www.gatsbyjs.org/tutorial/part-one/#linking-between-pages) 2. Notice "linking between pages" sidebar item is not highlighted 3. Scroll up out of "linking between pages" section until it's sidebar item highlights. **Screenshots** - Linking between pages sidebar item highlights outside of it's section - Linking between pages section does not have its sidebar item highlighted ![image](https://user-images.githubusercontent.com/8563758/71775848-1df7fc80-2f4d-11ea-8f69-763cb1a9c0ce.png) ![image](https://user-images.githubusercontent.com/8563758/71775854-37994400-2f4d-11ea-82cc-1a875524861c.png)
1.0
gatsby tutorial sidebar animation bug - **Summary** I'm going through the [gatsby tutorial part one](https://www.gatsbyjs.org/tutorial/part-one/) and noticed that the sidebar animation shows the "linking between pages" highlighted when not in that section and that when in the "linking between pages" section the sidebar animation has "deploying a gatsby site" selected. I've also tested this in multiple browsers on my mac with the same results. **OS / browser versions** macOS version: 10.15.2 safari version: 13.0.4 firefox version: 71.0 chrome version: 79.0.3945.88 **Steps to reproduce** 1. Go to "linking between pages" anchor (https://www.gatsbyjs.org/tutorial/part-one/#linking-between-pages) 2. Notice "linking between pages" sidebar item is not highlighted 3. Scroll up out of "linking between pages" section until it's sidebar item highlights. **Screenshots** - Linking between pages sidebar item highlights outside of it's section - Linking between pages section does not have its sidebar item highlighted ![image](https://user-images.githubusercontent.com/8563758/71775848-1df7fc80-2f4d-11ea-8f69-763cb1a9c0ce.png) ![image](https://user-images.githubusercontent.com/8563758/71775854-37994400-2f4d-11ea-82cc-1a875524861c.png)
non_priority
gatsby tutorial sidebar animation bug summary i m going through the and noticed that the sidebar animation shows the linking between pages highlighted when not in that section and that when in the linking between pages section the sidebar animation has deploying a gatsby site selected i ve also tested this in multiple browsers on my mac with the same results os browser versions macos version safari version firefox version chrome version steps to reproduce go to linking between pages anchor notice linking between pages sidebar item is not highlighted scroll up out of linking between pages section until it s sidebar item highlights screenshots linking between pages sidebar item highlights outside of it s section linking between pages section does not have its sidebar item highlighted
0