Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
957
labels
stringlengths
4
795
body
stringlengths
1
259k
index
stringclasses
12 values
text_combine
stringlengths
96
259k
label
stringclasses
2 values
text
stringlengths
96
252k
binary_label
int64
0
1
40,503
16,488,471,878
IssuesEvent
2021-05-24 21:58:04
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
Improvement upon responsibility calrification
Pri2 assigned-to-author container-service/svc doc-bug triaged
There needs to be more clarity for situations where agent nodes exhibit events like failed dns, time sync or kubelet events and node auto repair doesn't fix the issue. Since these impact applications running on these nodes, what are the recommendations for cx to avoid such events , for example if node time sync is in failed state and pods running application get into significant time drift. Where does the responsibility for managing critical system services lie and how are they supposed to be alerted on and mitigated. https://docs.microsoft.com/en-us/azure/aks/support-policies#managed-features-in-aks --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 36ecef62-68f2-9e81-f4b6-da2b49d1a653 * Version Independent ID: a6c2c35a-8a12-a9de-0a4e-669cf8506892 * Content: [Support policies for Azure Kubernetes Service (AKS) - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/support-policies) * Content Source: [articles/aks/support-policies.md](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/aks/support-policies.md) * Service: **container-service** * GitHub Login: @mlearned * Microsoft Alias: **mlearned**
1.0
Improvement upon responsibility calrification - There needs to be more clarity for situations where agent nodes exhibit events like failed dns, time sync or kubelet events and node auto repair doesn't fix the issue. Since these impact applications running on these nodes, what are the recommendations for cx to avoid such events , for example if node time sync is in failed state and pods running application get into significant time drift. Where does the responsibility for managing critical system services lie and how are they supposed to be alerted on and mitigated. https://docs.microsoft.com/en-us/azure/aks/support-policies#managed-features-in-aks --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 36ecef62-68f2-9e81-f4b6-da2b49d1a653 * Version Independent ID: a6c2c35a-8a12-a9de-0a4e-669cf8506892 * Content: [Support policies for Azure Kubernetes Service (AKS) - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/support-policies) * Content Source: [articles/aks/support-policies.md](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/aks/support-policies.md) * Service: **container-service** * GitHub Login: @mlearned * Microsoft Alias: **mlearned**
non_priority
improvement upon responsibility calrification there needs to be more clarity for situations where agent nodes exhibit events like failed dns time sync or kubelet events and node auto repair doesn t fix the issue since these impact applications running on these nodes what are the recommendations for cx to avoid such events for example if node time sync is in failed state and pods running application get into significant time drift where does the responsibility for managing critical system services lie and how are they supposed to be alerted on and mitigated document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service container service github login mlearned microsoft alias mlearned
0
37,909
12,507,208,695
IssuesEvent
2020-06-02 13:47:55
ghosind/visual-algo
https://api.github.com/repos/ghosind/visual-algo
opened
WS-2020-0070 (High) detected in lodash-4.17.15.tgz
security vulnerability
## WS-2020-0070 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.15.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/visual-algo/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/visual-algo/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - jest-dom-4.2.4.tgz (Root Library) - :x: **lodash-4.17.15.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghosind/visual-algo/commit/3bb1933241744c7ab4b67553a2122e1ba6c2026c">3bb1933241744c7ab4b67553a2122e1ba6c2026c</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> a prototype pollution vulnerability in lodash. It allows an attacker to inject properties on Object.prototype <p>Publish Date: 2020-04-28 <p>URL: <a href=https://hackerone.com/reports/712065>WS-2020-0070</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2020-0070 (High) detected in lodash-4.17.15.tgz - ## WS-2020-0070 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.15.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/visual-algo/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/visual-algo/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - jest-dom-4.2.4.tgz (Root Library) - :x: **lodash-4.17.15.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghosind/visual-algo/commit/3bb1933241744c7ab4b67553a2122e1ba6c2026c">3bb1933241744c7ab4b67553a2122e1ba6c2026c</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> a prototype pollution vulnerability in lodash. It allows an attacker to inject properties on Object.prototype <p>Publish Date: 2020-04-28 <p>URL: <a href=https://hackerone.com/reports/712065>WS-2020-0070</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws high detected in lodash tgz ws high severity vulnerability vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file tmp ws scm visual algo package json path to vulnerable library tmp ws scm visual algo node modules lodash package json dependency hierarchy jest dom tgz root library x lodash tgz vulnerable library found in head commit a href vulnerability details a prototype pollution vulnerability in lodash it allows an attacker to inject properties on object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with whitesource
0
349,602
31,814,990,137
IssuesEvent
2023-09-13 19:44:21
NVIDIA/spark-rapids
https://api.github.com/repos/NVIDIA/spark-rapids
closed
[BUG] test_parquet_testing_error_files - Failed: DID NOT RAISE <class 'Exception'> in databricks runtime 12.2
bug ? - Needs Triage test
**Describe the bug** found the test failures in recent nightly build, like rapids_databricks_nightly-dev-github build ID: 830 and premerge CI w/ databricks test, like rapids-databricks_premerge-github ID:216 Currently databricks runtimes (10.4,11.4) passed the same cases well, but 12.2 runtime (spark332db) would fail `fixed_length_byte_array.parquet-Exception: Failed: DID NOT RAISE <class 'Exception'>` ``` [2023-09-13T07:56:37.609Z] FAILED ../../src/main/python/parquet_testing_test.py::test_parquet_testing_error_files[confs1-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception] - Failed: DID NOT RAISE <class 'Exception'> [2023-09-13T07:56:37.609Z] FAILED ../../src/main/python/parquet_testing_test.py::test_parquet_testing_error_files[confs0-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception][INJECT_OOM] - Failed: DID NOT RAISE <class 'Exception'> ``` ```[2023-09-13T05:58:45.805Z] _ test_parquet_testing_error_files[confs0-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception] _ [2023-09-13T05:58:45.805Z] [gw3] linux -- Python 3.8.10 /usr/bin/python [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] path = '/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet' [2023-09-13T05:58:45.805Z] errobj = 'Exception' [2023-09-13T05:58:45.805Z] confs = {'spark.rapids.sql.format.parquet.reader.footer.type': 'NATIVE', 'spark.sql.legacy.parquet.datetimeRebaseModeInRead': 'CORRECTED', 'spark.sql.legacy.parquet.int96RebaseModeInRead': 'CORRECTED'} [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] @pytest.mark.parametrize(("path", "errobj"), gen_testing_params_for_errors()) [2023-09-13T05:58:45.805Z] @pytest.mark.parametrize("confs", [_native_reader_confs, _java_reader_confs]) [2023-09-13T05:58:45.805Z] def test_parquet_testing_error_files(path, errobj, confs): [2023-09-13T05:58:45.805Z] error_msg = errobj [2023-09-13T05:58:45.805Z] print("error_msg:", error_msg) [2023-09-13T05:58:45.805Z] if type(error_msg) != str: [2023-09-13T05:58:45.805Z] error_msg, xfail_reason = errobj [2023-09-13T05:58:45.805Z] pytest.xfail(xfail_reason) [2023-09-13T05:58:45.805Z] > assert_gpu_and_cpu_error( [2023-09-13T05:58:45.805Z] lambda spark: spark.read.parquet(path).collect(), [2023-09-13T05:58:45.805Z] conf=confs, [2023-09-13T05:58:45.805Z] error_message=error_msg) [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] ../../src/main/python/parquet_testing_test.py:137: [2023-09-13T05:58:45.805Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ [2023-09-13T05:58:45.805Z] ../../src/main/python/asserts.py:632: in assert_gpu_and_cpu_error [2023-09-13T05:58:45.805Z] assert_spark_exception(lambda: with_gpu_session(df_fun, conf), error_message) [2023-09-13T05:58:45.805Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] func = <function assert_gpu_and_cpu_error.<locals>.<lambda> at 0x7f6010480b80> [2023-09-13T05:58:45.805Z] error_message = 'Exception' [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] def assert_spark_exception(func, error_message): [2023-09-13T05:58:45.805Z] """ [2023-09-13T05:58:45.805Z] Assert that a specific Java exception is thrown [2023-09-13T05:58:45.805Z] :param func: a function to be verified [2023-09-13T05:58:45.805Z] :param error_message: a string such as the one produce by java.lang.Exception.toString [2023-09-13T05:58:45.805Z] :return: Assertion failure if no exception matching error_message has occurred. [2023-09-13T05:58:45.805Z] """ [2023-09-13T05:58:45.805Z] with pytest.raises(Exception) as excinfo: [2023-09-13T05:58:45.805Z] > func() [2023-09-13T05:58:45.805Z] E Failed: DID NOT RAISE <class 'Exception'> [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] ../../src/main/python/asserts.py:618: Failed [2023-09-13T05:58:45.805Z] ----------------------------- Captured stdout call ----------------------------- [2023-09-13T05:58:45.805Z] error_msg: Exception [2023-09-13T05:58:45.805Z] _ test_parquet_testing_error_files[confs1-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception] _ [2023-09-13T05:58:45.805Z] [gw3] linux -- Python 3.8.10 /usr/bin/python [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] path = '/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet' [2023-09-13T05:58:45.805Z] errobj = 'Exception' [2023-09-13T05:58:45.805Z] confs = {'spark.rapids.sql.format.parquet.reader.footer.type': 'JAVA', 'spark.sql.legacy.parquet.datetimeRebaseModeInRead': 'CORRECTED', 'spark.sql.legacy.parquet.int96RebaseModeInRead': 'CORRECTED'} [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] @pytest.mark.parametrize(("path", "errobj"), gen_testing_params_for_errors()) [2023-09-13T05:58:45.805Z] @pytest.mark.parametrize("confs", [_native_reader_confs, _java_reader_confs]) [2023-09-13T05:58:45.805Z] def test_parquet_testing_error_files(path, errobj, confs): [2023-09-13T05:58:45.805Z] error_msg = errobj [2023-09-13T05:58:45.805Z] print("error_msg:", error_msg) [2023-09-13T05:58:45.805Z] if type(error_msg) != str: [2023-09-13T05:58:45.805Z] error_msg, xfail_reason = errobj [2023-09-13T05:58:45.805Z] pytest.xfail(xfail_reason) [2023-09-13T05:58:45.805Z] > assert_gpu_and_cpu_error( [2023-09-13T05:58:45.806Z] lambda spark: spark.read.parquet(path).collect(), [2023-09-13T05:58:45.806Z] conf=confs, [2023-09-13T05:58:45.806Z] error_message=error_msg) [2023-09-13T05:58:45.806Z] [2023-09-13T05:58:45.806Z] ../../src/main/python/parquet_testing_test.py:137: [2023-09-13T05:58:45.806Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ [2023-09-13T05:58:45.806Z] ../../src/main/python/asserts.py:632: in assert_gpu_and_cpu_error [2023-09-13T05:58:45.806Z] assert_spark_exception(lambda: with_gpu_session(df_fun, conf), error_message) [2023-09-13T05:58:45.806Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ [2023-09-13T05:58:45.806Z] [2023-09-13T05:58:45.806Z] func = <function assert_gpu_and_cpu_error.<locals>.<lambda> at 0x7f60022bd310> [2023-09-13T05:58:45.806Z] error_message = 'Exception' [2023-09-13T05:58:45.806Z] [2023-09-13T05:58:45.806Z] def assert_spark_exception(func, error_message): [2023-09-13T05:58:45.806Z] """ [2023-09-13T05:58:45.806Z] Assert that a specific Java exception is thrown [2023-09-13T05:58:45.806Z] :param func: a function to be verified [2023-09-13T05:58:45.806Z] :param error_message: a string such as the one produce by java.lang.Exception.toString [2023-09-13T05:58:45.806Z] :return: Assertion failure if no exception matching error_message has occurred. [2023-09-13T05:58:45.806Z] """ [2023-09-13T05:58:45.806Z] with pytest.raises(Exception) as excinfo: [2023-09-13T05:58:45.806Z] > func() [2023-09-13T05:58:45.806Z] E Failed: DID NOT RAISE <class 'Exception'> ``` **Steps/Code to reproduce bug** run integration case in databricks 12.2 runtime **Expected behavior** Pass the test **Environment details (please complete the following information)** - Environment location: [Standalone, YARN, Kubernetes, Cloud(specify cloud provider)] - Spark configuration settings related to the issue **Additional context** Add any other context about the problem here.
1.0
[BUG] test_parquet_testing_error_files - Failed: DID NOT RAISE <class 'Exception'> in databricks runtime 12.2 - **Describe the bug** found the test failures in recent nightly build, like rapids_databricks_nightly-dev-github build ID: 830 and premerge CI w/ databricks test, like rapids-databricks_premerge-github ID:216 Currently databricks runtimes (10.4,11.4) passed the same cases well, but 12.2 runtime (spark332db) would fail `fixed_length_byte_array.parquet-Exception: Failed: DID NOT RAISE <class 'Exception'>` ``` [2023-09-13T07:56:37.609Z] FAILED ../../src/main/python/parquet_testing_test.py::test_parquet_testing_error_files[confs1-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception] - Failed: DID NOT RAISE <class 'Exception'> [2023-09-13T07:56:37.609Z] FAILED ../../src/main/python/parquet_testing_test.py::test_parquet_testing_error_files[confs0-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception][INJECT_OOM] - Failed: DID NOT RAISE <class 'Exception'> ``` ```[2023-09-13T05:58:45.805Z] _ test_parquet_testing_error_files[confs0-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception] _ [2023-09-13T05:58:45.805Z] [gw3] linux -- Python 3.8.10 /usr/bin/python [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] path = '/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet' [2023-09-13T05:58:45.805Z] errobj = 'Exception' [2023-09-13T05:58:45.805Z] confs = {'spark.rapids.sql.format.parquet.reader.footer.type': 'NATIVE', 'spark.sql.legacy.parquet.datetimeRebaseModeInRead': 'CORRECTED', 'spark.sql.legacy.parquet.int96RebaseModeInRead': 'CORRECTED'} [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] @pytest.mark.parametrize(("path", "errobj"), gen_testing_params_for_errors()) [2023-09-13T05:58:45.805Z] @pytest.mark.parametrize("confs", [_native_reader_confs, _java_reader_confs]) [2023-09-13T05:58:45.805Z] def test_parquet_testing_error_files(path, errobj, confs): [2023-09-13T05:58:45.805Z] error_msg = errobj [2023-09-13T05:58:45.805Z] print("error_msg:", error_msg) [2023-09-13T05:58:45.805Z] if type(error_msg) != str: [2023-09-13T05:58:45.805Z] error_msg, xfail_reason = errobj [2023-09-13T05:58:45.805Z] pytest.xfail(xfail_reason) [2023-09-13T05:58:45.805Z] > assert_gpu_and_cpu_error( [2023-09-13T05:58:45.805Z] lambda spark: spark.read.parquet(path).collect(), [2023-09-13T05:58:45.805Z] conf=confs, [2023-09-13T05:58:45.805Z] error_message=error_msg) [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] ../../src/main/python/parquet_testing_test.py:137: [2023-09-13T05:58:45.805Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ [2023-09-13T05:58:45.805Z] ../../src/main/python/asserts.py:632: in assert_gpu_and_cpu_error [2023-09-13T05:58:45.805Z] assert_spark_exception(lambda: with_gpu_session(df_fun, conf), error_message) [2023-09-13T05:58:45.805Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] func = <function assert_gpu_and_cpu_error.<locals>.<lambda> at 0x7f6010480b80> [2023-09-13T05:58:45.805Z] error_message = 'Exception' [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] def assert_spark_exception(func, error_message): [2023-09-13T05:58:45.805Z] """ [2023-09-13T05:58:45.805Z] Assert that a specific Java exception is thrown [2023-09-13T05:58:45.805Z] :param func: a function to be verified [2023-09-13T05:58:45.805Z] :param error_message: a string such as the one produce by java.lang.Exception.toString [2023-09-13T05:58:45.805Z] :return: Assertion failure if no exception matching error_message has occurred. [2023-09-13T05:58:45.805Z] """ [2023-09-13T05:58:45.805Z] with pytest.raises(Exception) as excinfo: [2023-09-13T05:58:45.805Z] > func() [2023-09-13T05:58:45.805Z] E Failed: DID NOT RAISE <class 'Exception'> [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] ../../src/main/python/asserts.py:618: Failed [2023-09-13T05:58:45.805Z] ----------------------------- Captured stdout call ----------------------------- [2023-09-13T05:58:45.805Z] error_msg: Exception [2023-09-13T05:58:45.805Z] _ test_parquet_testing_error_files[confs1-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception] _ [2023-09-13T05:58:45.805Z] [gw3] linux -- Python 3.8.10 /usr/bin/python [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] path = '/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet' [2023-09-13T05:58:45.805Z] errobj = 'Exception' [2023-09-13T05:58:45.805Z] confs = {'spark.rapids.sql.format.parquet.reader.footer.type': 'JAVA', 'spark.sql.legacy.parquet.datetimeRebaseModeInRead': 'CORRECTED', 'spark.sql.legacy.parquet.int96RebaseModeInRead': 'CORRECTED'} [2023-09-13T05:58:45.805Z] [2023-09-13T05:58:45.805Z] @pytest.mark.parametrize(("path", "errobj"), gen_testing_params_for_errors()) [2023-09-13T05:58:45.805Z] @pytest.mark.parametrize("confs", [_native_reader_confs, _java_reader_confs]) [2023-09-13T05:58:45.805Z] def test_parquet_testing_error_files(path, errobj, confs): [2023-09-13T05:58:45.805Z] error_msg = errobj [2023-09-13T05:58:45.805Z] print("error_msg:", error_msg) [2023-09-13T05:58:45.805Z] if type(error_msg) != str: [2023-09-13T05:58:45.805Z] error_msg, xfail_reason = errobj [2023-09-13T05:58:45.805Z] pytest.xfail(xfail_reason) [2023-09-13T05:58:45.805Z] > assert_gpu_and_cpu_error( [2023-09-13T05:58:45.806Z] lambda spark: spark.read.parquet(path).collect(), [2023-09-13T05:58:45.806Z] conf=confs, [2023-09-13T05:58:45.806Z] error_message=error_msg) [2023-09-13T05:58:45.806Z] [2023-09-13T05:58:45.806Z] ../../src/main/python/parquet_testing_test.py:137: [2023-09-13T05:58:45.806Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ [2023-09-13T05:58:45.806Z] ../../src/main/python/asserts.py:632: in assert_gpu_and_cpu_error [2023-09-13T05:58:45.806Z] assert_spark_exception(lambda: with_gpu_session(df_fun, conf), error_message) [2023-09-13T05:58:45.806Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ [2023-09-13T05:58:45.806Z] [2023-09-13T05:58:45.806Z] func = <function assert_gpu_and_cpu_error.<locals>.<lambda> at 0x7f60022bd310> [2023-09-13T05:58:45.806Z] error_message = 'Exception' [2023-09-13T05:58:45.806Z] [2023-09-13T05:58:45.806Z] def assert_spark_exception(func, error_message): [2023-09-13T05:58:45.806Z] """ [2023-09-13T05:58:45.806Z] Assert that a specific Java exception is thrown [2023-09-13T05:58:45.806Z] :param func: a function to be verified [2023-09-13T05:58:45.806Z] :param error_message: a string such as the one produce by java.lang.Exception.toString [2023-09-13T05:58:45.806Z] :return: Assertion failure if no exception matching error_message has occurred. [2023-09-13T05:58:45.806Z] """ [2023-09-13T05:58:45.806Z] with pytest.raises(Exception) as excinfo: [2023-09-13T05:58:45.806Z] > func() [2023-09-13T05:58:45.806Z] E Failed: DID NOT RAISE <class 'Exception'> ``` **Steps/Code to reproduce bug** run integration case in databricks 12.2 runtime **Expected behavior** Pass the test **Environment details (please complete the following information)** - Environment location: [Standalone, YARN, Kubernetes, Cloud(specify cloud provider)] - Spark configuration settings related to the issue **Additional context** Add any other context about the problem here.
non_priority
test parquet testing error files failed did not raise in databricks runtime describe the bug found the test failures in recent nightly build like rapids databricks nightly dev github build id and premerge ci w databricks test like rapids databricks premerge github id currently databricks runtimes passed the same cases well but runtime would fail fixed length byte array parquet exception failed did not raise failed src main python parquet testing test py test parquet testing error files failed did not raise failed src main python parquet testing test py test parquet testing error files failed did not raise test parquet testing error files linux python usr bin python path home ubuntu spark rapids thirdparty parquet testing data fixed length byte array parquet errobj exception confs spark rapids sql format parquet reader footer type native spark sql legacy parquet datetimerebasemodeinread corrected spark sql legacy parquet corrected pytest mark parametrize path errobj gen testing params for errors pytest mark parametrize confs def test parquet testing error files path errobj confs error msg errobj print error msg error msg if type error msg str error msg xfail reason errobj pytest xfail xfail reason assert gpu and cpu error lambda spark spark read parquet path collect conf confs error message error msg src main python parquet testing test py src main python asserts py in assert gpu and cpu error assert spark exception lambda with gpu session df fun conf error message func at error message exception def assert spark exception func error message assert that a specific java exception is thrown param func a function to be verified param error message a string such as the one produce by java lang exception tostring return assertion failure if no exception matching error message has occurred with pytest raises exception as excinfo func e failed did not raise src main python asserts py failed captured stdout call error msg exception test parquet testing error files linux python usr bin python path home ubuntu spark rapids thirdparty parquet testing data fixed length byte array parquet errobj exception confs spark rapids sql format parquet reader footer type java spark sql legacy parquet datetimerebasemodeinread corrected spark sql legacy parquet corrected pytest mark parametrize path errobj gen testing params for errors pytest mark parametrize confs def test parquet testing error files path errobj confs error msg errobj print error msg error msg if type error msg str error msg xfail reason errobj pytest xfail xfail reason assert gpu and cpu error lambda spark spark read parquet path collect conf confs error message error msg src main python parquet testing test py src main python asserts py in assert gpu and cpu error assert spark exception lambda with gpu session df fun conf error message func at error message exception def assert spark exception func error message assert that a specific java exception is thrown param func a function to be verified param error message a string such as the one produce by java lang exception tostring return assertion failure if no exception matching error message has occurred with pytest raises exception as excinfo func e failed did not raise steps code to reproduce bug run integration case in databricks runtime expected behavior pass the test environment details please complete the following information environment location spark configuration settings related to the issue additional context add any other context about the problem here
0
70,116
15,051,903,620
IssuesEvent
2021-02-03 14:37:58
fuzzdbunit/fuzzdbunit
https://api.github.com/repos/fuzzdbunit/fuzzdbunit
closed
CVE-2020-25649 (High) detected in jackson-databind-2.9.8.jar
security vulnerability
## CVE-2020-25649 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: fuzzdbunit/samples/sample-selenium-test/build.gradle</p> <p>Path to vulnerable library: /tmp/ws-ua_20210130101853_TOITPP/downloadResource_JFIXEQ/20210130102045/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - selenium-jupiter-3.3.5.jar (Root Library) - docker-client-8.16.0.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/fuzzdbunit/fuzzdbunit/commit/7399449c10bf63469f249dcebe17f5cd629379fa">7399449c10bf63469f249dcebe17f5cd629379fa</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity. <p>Publish Date: 2020-12-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25649>CVE-2020-25649</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2589">https://github.com/FasterXML/jackson-databind/issues/2589</a></p> <p>Release Date: 2020-12-03</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.6.7.4,2.9.10.7,2.10.5.1,2.11.0.rc1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-25649 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2020-25649 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: fuzzdbunit/samples/sample-selenium-test/build.gradle</p> <p>Path to vulnerable library: /tmp/ws-ua_20210130101853_TOITPP/downloadResource_JFIXEQ/20210130102045/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - selenium-jupiter-3.3.5.jar (Root Library) - docker-client-8.16.0.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/fuzzdbunit/fuzzdbunit/commit/7399449c10bf63469f249dcebe17f5cd629379fa">7399449c10bf63469f249dcebe17f5cd629379fa</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity. <p>Publish Date: 2020-12-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25649>CVE-2020-25649</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2589">https://github.com/FasterXML/jackson-databind/issues/2589</a></p> <p>Release Date: 2020-12-03</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.6.7.4,2.9.10.7,2.10.5.1,2.11.0.rc1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file fuzzdbunit samples sample selenium test build gradle path to vulnerable library tmp ws ua toitpp downloadresource jfixeq jackson databind jar dependency hierarchy selenium jupiter jar root library docker client jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a flaw was found in fasterxml jackson databind where it did not have entity expansion secured properly this flaw allows vulnerability to xml external entity xxe attacks the highest threat from this vulnerability is data integrity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
0
468
6,818,039,421
IssuesEvent
2017-11-07 02:46:05
librsync/librsync
https://api.github.com/repos/librsync/librsync
closed
Please use GNUInstallDirs
portability
Please use the GNUInstallDirs CMake module instead of writing install dir names explicitly. This helps with portability and especially with correct libdir names on various Linux platforms. Here is a patch which is used in Debian: ``` --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -20,6 +20,7 @@ project(librsync C) cmake_minimum_required(VERSION 2.6) INCLUDE(CMakeDependentOption) +include(GNUInstallDirs) set(LIBRSYNC_MAJOR_VERSION 2) set(LIBRSYNC_MINOR_VERSION 0) @@ -124,11 +125,11 @@ if(APPLE) set(CMAKE_MACOSX_RPATH ON) set(CMAKE_SKIP_BUILD_RPATH FALSE) set(CMAKE_BUILD_WITH_INSTALL_RPATH FALSE) - set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/lib") + set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/${CMAKE_INSTALL_LIBDIR}") set(CMAKE_INSTALL_RPATH_USE_LINK_PATH TRUE) - list(FIND CMAKE_PLATFORM_IMPLICIT_LINK_DIRECTORIES "${CMAKE_INSTALL_PREFIX}/lib" isSystemDir) + list(FIND CMAKE_PLATFORM_IMPLICIT_LINK_DIRECTORIES "${CMAKE_INSTALL_PREFIX}/${CMAKE_INSTALL_LIBDIR}" isSystemDir) if("${isSystemDir}" STREQUAL "-1") - set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/lib") + set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/${CMAKE_INSTALL_LIBDIR}") endif() endif() @@ -332,7 +333,7 @@ endif (ENABLE_COMPRESSION) set_target_properties(rsync PROPERTIES VERSION ${LIBRSYNC_VERSION} SOVERSION ${LIBRSYNC_MAJOR_VERSION}) -install(TARGETS rsync ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION lib) +install(TARGETS rsync ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION ${CMAKE_INSTALL_LIBDIR}) ########### next target ############### @@ -349,7 +350,7 @@ if (BUILD_RDIFF) message (WARNING "Popt library is required for rdiff target") endif (POPT_FOUND) - install(TARGETS rdiff ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION bin) + install(TARGETS rdiff ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION ${CMAKE_INSTALL_BINDIR}) endif (BUILD_RDIFF) @@ -357,7 +358,7 @@ endif (BUILD_RDIFF) install(FILES src/librsync.h - DESTINATION include) + DESTINATION ${CMAKE_INSTALL_INCLUDEDIR}) message (STATUS "CMAKE_C_FLAGS = ${CMAKE_C_FLAGS}") ```
True
Please use GNUInstallDirs - Please use the GNUInstallDirs CMake module instead of writing install dir names explicitly. This helps with portability and especially with correct libdir names on various Linux platforms. Here is a patch which is used in Debian: ``` --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -20,6 +20,7 @@ project(librsync C) cmake_minimum_required(VERSION 2.6) INCLUDE(CMakeDependentOption) +include(GNUInstallDirs) set(LIBRSYNC_MAJOR_VERSION 2) set(LIBRSYNC_MINOR_VERSION 0) @@ -124,11 +125,11 @@ if(APPLE) set(CMAKE_MACOSX_RPATH ON) set(CMAKE_SKIP_BUILD_RPATH FALSE) set(CMAKE_BUILD_WITH_INSTALL_RPATH FALSE) - set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/lib") + set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/${CMAKE_INSTALL_LIBDIR}") set(CMAKE_INSTALL_RPATH_USE_LINK_PATH TRUE) - list(FIND CMAKE_PLATFORM_IMPLICIT_LINK_DIRECTORIES "${CMAKE_INSTALL_PREFIX}/lib" isSystemDir) + list(FIND CMAKE_PLATFORM_IMPLICIT_LINK_DIRECTORIES "${CMAKE_INSTALL_PREFIX}/${CMAKE_INSTALL_LIBDIR}" isSystemDir) if("${isSystemDir}" STREQUAL "-1") - set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/lib") + set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/${CMAKE_INSTALL_LIBDIR}") endif() endif() @@ -332,7 +333,7 @@ endif (ENABLE_COMPRESSION) set_target_properties(rsync PROPERTIES VERSION ${LIBRSYNC_VERSION} SOVERSION ${LIBRSYNC_MAJOR_VERSION}) -install(TARGETS rsync ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION lib) +install(TARGETS rsync ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION ${CMAKE_INSTALL_LIBDIR}) ########### next target ############### @@ -349,7 +350,7 @@ if (BUILD_RDIFF) message (WARNING "Popt library is required for rdiff target") endif (POPT_FOUND) - install(TARGETS rdiff ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION bin) + install(TARGETS rdiff ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION ${CMAKE_INSTALL_BINDIR}) endif (BUILD_RDIFF) @@ -357,7 +358,7 @@ endif (BUILD_RDIFF) install(FILES src/librsync.h - DESTINATION include) + DESTINATION ${CMAKE_INSTALL_INCLUDEDIR}) message (STATUS "CMAKE_C_FLAGS = ${CMAKE_C_FLAGS}") ```
non_priority
please use gnuinstalldirs please use the gnuinstalldirs cmake module instead of writing install dir names explicitly this helps with portability and especially with correct libdir names on various linux platforms here is a patch which is used in debian a cmakelists txt b cmakelists txt project librsync c cmake minimum required version include cmakedependentoption include gnuinstalldirs set librsync major version set librsync minor version if apple set cmake macosx rpath on set cmake skip build rpath false set cmake build with install rpath false set cmake install rpath cmake install prefix lib set cmake install rpath cmake install prefix cmake install libdir set cmake install rpath use link path true list find cmake platform implicit link directories cmake install prefix lib issystemdir list find cmake platform implicit link directories cmake install prefix cmake install libdir issystemdir if issystemdir strequal set cmake install rpath cmake install prefix lib set cmake install rpath cmake install prefix cmake install libdir endif endif endif enable compression set target properties rsync properties version librsync version soversion librsync major version install targets rsync install targets default args destination lib install targets rsync install targets default args destination cmake install libdir next target if build rdiff message warning popt library is required for rdiff target endif popt found install targets rdiff install targets default args destination bin install targets rdiff install targets default args destination cmake install bindir endif build rdiff endif build rdiff install files src librsync h destination include destination cmake install includedir message status cmake c flags cmake c flags
0
20,107
5,987,771,098
IssuesEvent
2017-06-02 01:11:35
fire-eggs/FamilyLines
https://api.github.com/repos/fire-eggs/FamilyLines
opened
Invalid date error shows wrong format
CodePlex
<b>notonyournelly[CodePlex]</b> <br />[Reported by hemashiv] The message/tooltip which is shown may contain the wrong date format. See Person.cs, quotthis[string columnName]quot method. The resource string quotInvalidDatequot is shown if an invalid date is entered (BirthDate, DeathDate, etc). The problem is the InvalidDate message shows a hard-coded date format (e.g. quotDD/MM/YYYYquot). When the code was originally localized, a reasonable assumption was made but it might not be correct. The user may have selected a Date format in the Windows control panel which does not match the message. Need to investigate how to show the correct format based on the Windows control panel settings. Need to confirm the displayed format is correct for the default settings in each translated language. [Keep this issue in mind when reworking the Date entry system.]
1.0
Invalid date error shows wrong format - <b>notonyournelly[CodePlex]</b> <br />[Reported by hemashiv] The message/tooltip which is shown may contain the wrong date format. See Person.cs, quotthis[string columnName]quot method. The resource string quotInvalidDatequot is shown if an invalid date is entered (BirthDate, DeathDate, etc). The problem is the InvalidDate message shows a hard-coded date format (e.g. quotDD/MM/YYYYquot). When the code was originally localized, a reasonable assumption was made but it might not be correct. The user may have selected a Date format in the Windows control panel which does not match the message. Need to investigate how to show the correct format based on the Windows control panel settings. Need to confirm the displayed format is correct for the default settings in each translated language. [Keep this issue in mind when reworking the Date entry system.]
non_priority
invalid date error shows wrong format notonyournelly the message tooltip which is shown may contain the wrong date format see person cs quotthis quot method the resource string quotinvaliddatequot is shown if an invalid date is entered birthdate deathdate etc the problem is the invaliddate message shows a hard coded date format e g quotdd mm yyyyquot when the code was originally localized a reasonable assumption was made but it might not be correct the user may have selected a date format in the windows control panel which does not match the message need to investigate how to show the correct format based on the windows control panel settings need to confirm the displayed format is correct for the default settings in each translated language
0
147,410
19,522,790,503
IssuesEvent
2021-12-29 22:21:38
swagger-api/swagger-codegen
https://api.github.com/repos/swagger-api/swagger-codegen
opened
CVE-2019-12086 (High) detected in multiple libraries
security vulnerability
## CVE-2019-12086 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.7.8.jar</b>, <b>jackson-databind-2.4.5.jar</b>, <b>jackson-databind-2.6.4.jar</b>, <b>jackson-databind-2.8.9.jar</b>, <b>jackson-databind-2.8.8.jar</b></p></summary> <p> <details><summary><b>jackson-databind-2.7.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.7.8.jar</p> <p> Dependency Hierarchy: - lagom-scaladsl-api_2.11-1.3.8.jar (Root Library) - lagom-api_2.11-1.3.8.jar - play_2.11-2.5.13.jar - :x: **jackson-databind-2.7.8.jar** (Vulnerable Library) </details> <details><summary><b>jackson-databind-2.4.5.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /samples/client/petstore/scala/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar</p> <p> Dependency Hierarchy: - swagger-core-1.5.8.jar (Root Library) - :x: **jackson-databind-2.4.5.jar** (Vulnerable Library) </details> <details><summary><b>jackson-databind-2.6.4.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /samples/client/petstore/java/jersey1/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar,/aches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.6.4.jar** (Vulnerable Library) </details> <details><summary><b>jackson-databind-2.8.9.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.8.9.jar</p> <p> Dependency Hierarchy: - play-guice_2.12-2.6.3.jar (Root Library) - play_2.12-2.6.3.jar - :x: **jackson-databind-2.8.9.jar** (Vulnerable Library) </details> <details><summary><b>jackson-databind-2.8.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.8.8.jar</p> <p> Dependency Hierarchy: - finch-circe_2.11-0.15.1.jar (Root Library) - circe-jackson28_2.11-0.8.0.jar - :x: **jackson-databind-2.8.8.jar** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/swagger-api/swagger-codegen/commit/4b7a8d7d7384aa6a27d6309c35ade0916edae7ed">4b7a8d7d7384aa6a27d6309c35ade0916edae7ed</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation. <p>Publish Date: 2019-05-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12086>CVE-2019-12086</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086</a></p> <p>Release Date: 2019-05-17</p> <p>Fix Resolution: 2.9.9</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.7.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.lightbend.lagom:lagom-scaladsl-api_2.11:1.3.8;com.lightbend.lagom:lagom-api_2.11:1.3.8;com.typesafe.play:play_2.11:2.5.13;com.fasterxml.jackson.core:jackson-databind:2.7.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.4.5","packageFilePaths":["/samples/client/petstore/scala/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"io.swagger:swagger-core:1.5.8;com.fasterxml.jackson.core:jackson-databind:2.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.6.4","packageFilePaths":["/samples/client/petstore/java/jersey1/build.gradle"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.6.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.9","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.typesafe.play:play-guice_2.12:2.6.3;com.typesafe.play:play_2.12:2.6.3;com.fasterxml.jackson.core:jackson-databind:2.8.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.github.finagle:finch-circe_2.11:0.15.1;io.circe:circe-jackson28_2.11:0.8.0;com.fasterxml.jackson.core:jackson-databind:2.8.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-12086","vulnerabilityDetails":"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12086","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-12086 (High) detected in multiple libraries - ## CVE-2019-12086 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.7.8.jar</b>, <b>jackson-databind-2.4.5.jar</b>, <b>jackson-databind-2.6.4.jar</b>, <b>jackson-databind-2.8.9.jar</b>, <b>jackson-databind-2.8.8.jar</b></p></summary> <p> <details><summary><b>jackson-databind-2.7.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.7.8.jar</p> <p> Dependency Hierarchy: - lagom-scaladsl-api_2.11-1.3.8.jar (Root Library) - lagom-api_2.11-1.3.8.jar - play_2.11-2.5.13.jar - :x: **jackson-databind-2.7.8.jar** (Vulnerable Library) </details> <details><summary><b>jackson-databind-2.4.5.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /samples/client/petstore/scala/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar</p> <p> Dependency Hierarchy: - swagger-core-1.5.8.jar (Root Library) - :x: **jackson-databind-2.4.5.jar** (Vulnerable Library) </details> <details><summary><b>jackson-databind-2.6.4.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /samples/client/petstore/java/jersey1/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar,/aches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.6.4.jar** (Vulnerable Library) </details> <details><summary><b>jackson-databind-2.8.9.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.8.9.jar</p> <p> Dependency Hierarchy: - play-guice_2.12-2.6.3.jar (Root Library) - play_2.12-2.6.3.jar - :x: **jackson-databind-2.8.9.jar** (Vulnerable Library) </details> <details><summary><b>jackson-databind-2.8.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.8.8.jar</p> <p> Dependency Hierarchy: - finch-circe_2.11-0.15.1.jar (Root Library) - circe-jackson28_2.11-0.8.0.jar - :x: **jackson-databind-2.8.8.jar** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/swagger-api/swagger-codegen/commit/4b7a8d7d7384aa6a27d6309c35ade0916edae7ed">4b7a8d7d7384aa6a27d6309c35ade0916edae7ed</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation. <p>Publish Date: 2019-05-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12086>CVE-2019-12086</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086</a></p> <p>Release Date: 2019-05-17</p> <p>Fix Resolution: 2.9.9</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.7.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.lightbend.lagom:lagom-scaladsl-api_2.11:1.3.8;com.lightbend.lagom:lagom-api_2.11:1.3.8;com.typesafe.play:play_2.11:2.5.13;com.fasterxml.jackson.core:jackson-databind:2.7.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.4.5","packageFilePaths":["/samples/client/petstore/scala/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"io.swagger:swagger-core:1.5.8;com.fasterxml.jackson.core:jackson-databind:2.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.6.4","packageFilePaths":["/samples/client/petstore/java/jersey1/build.gradle"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.6.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.9","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.typesafe.play:play-guice_2.12:2.6.3;com.typesafe.play:play_2.12:2.6.3;com.fasterxml.jackson.core:jackson-databind:2.8.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.github.finagle:finch-circe_2.11:0.15.1;io.circe:circe-jackson28_2.11:0.8.0;com.fasterxml.jackson.core:jackson-databind:2.8.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-12086","vulnerabilityDetails":"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12086","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries jackson databind jar jackson databind jar jackson databind jar jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library home wss scanner cache com fasterxml jackson core jackson databind bundles jackson databind jar dependency hierarchy lagom scaladsl api jar root library lagom api jar play jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file samples client petstore scala build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy swagger core jar root library x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file samples client petstore java build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar aches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library home wss scanner cache com fasterxml jackson core jackson databind bundles jackson databind jar dependency hierarchy play guice jar root library play jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library home wss scanner cache com fasterxml jackson core jackson databind bundles jackson databind jar dependency hierarchy finch circe jar root library circe jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind x before when default typing is enabled either globally or for a specific property for an externally exposed json endpoint the service has the mysql connector java jar or earlier in the classpath and an attacker can host a crafted mysql server reachable by the victim an attacker can send a crafted json message that allows them to read arbitrary local files on the server this occurs because of missing com mysql cj jdbc admin miniadmin validation publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com lightbend lagom lagom scaladsl api com lightbend lagom lagom api com typesafe play play com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion isbinary false packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency true dependencytree io swagger swagger core com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion isbinary false packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion isbinary false packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency true dependencytree com typesafe play play guice com typesafe play play com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion isbinary false packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency true dependencytree com github finagle finch circe io circe circe com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails a polymorphic typing issue was discovered in fasterxml jackson databind x before when default typing is enabled either globally or for a specific property for an externally exposed json endpoint the service has the mysql connector java jar or earlier in the classpath and an attacker can host a crafted mysql server reachable by the victim an attacker can send a crafted json message that allows them to read arbitrary local files on the server this occurs because of missing com mysql cj jdbc admin miniadmin validation vulnerabilityurl
0
9,535
11,591,928,297
IssuesEvent
2020-02-24 10:25:32
widelands/widelands
https://api.github.com/repos/widelands/widelands
closed
Building does not complete
economy regression saveloading & compatibility
Playing Elven forests I forgot to build a Lime Kiln. Some time later I ran out of Grout so I built a kiln. It quickly reached 85% built and then stopped. Destroying the building and rebuilding does not work (sticks at 85%) but another Lime Kiln built nearby completes normally. There are sufficient wares in the headquarters to complete the building and wares are being delivered to other buildings along the road. Savegame attached ------------------------------------ Imported from Launchpad using lp2gh. * date created: 2019-05-21T10:59:55Z * owner: leightonman * the launchpad url was https://bugs.launchpad.net/bugs/1829848
True
Building does not complete - Playing Elven forests I forgot to build a Lime Kiln. Some time later I ran out of Grout so I built a kiln. It quickly reached 85% built and then stopped. Destroying the building and rebuilding does not work (sticks at 85%) but another Lime Kiln built nearby completes normally. There are sufficient wares in the headquarters to complete the building and wares are being delivered to other buildings along the road. Savegame attached ------------------------------------ Imported from Launchpad using lp2gh. * date created: 2019-05-21T10:59:55Z * owner: leightonman * the launchpad url was https://bugs.launchpad.net/bugs/1829848
non_priority
building does not complete playing elven forests i forgot to build a lime kiln some time later i ran out of grout so i built a kiln it quickly reached built and then stopped destroying the building and rebuilding does not work sticks at but another lime kiln built nearby completes normally there are sufficient wares in the headquarters to complete the building and wares are being delivered to other buildings along the road savegame attached imported from launchpad using date created owner leightonman the launchpad url was
0
343,182
24,764,228,290
IssuesEvent
2022-10-22 09:48:02
softwarehistorysociety/x
https://api.github.com/repos/softwarehistorysociety/x
opened
Original Specification
documentation
# x-callback-url 1.0 DRAFT Spec The x-callback-url specification is intended to standardize the use of URLs and registered URL schemes for inter-app communication and messaging on Apple’s iOS platforms. ## Revisions R3: Added “Security Concerns” section. R2: Added optional “x-cancel” parameter. When supported, this parameter would include a URL to open when the user indicated they want to cancel the action. The action did not succeed, nor generate an error, but the user just wishes to return to the source app. R1: Removed the “version” from the URL path. The current recommendation if versioning of an x-callback-url API is required would be to register separate URL schemes for each version. This method allows the calling app to determine which versions are available via calls to “canOpenURL”. ## Discussion iOS runs apps in sandboxes which providing limited means of communication between apps directly on the device. Shared files, messaging systems and other similar solutions used on desktop and server operating systems are not present in iOS. iOS does provide the ability for apps to [register URL schemes](http://developer.apple.com/library/ios/#documentation/iPhone/Conceptual/iPhoneOSProgrammingGuide/StandardBehaviors/StandardBehaviors.html%23//apple*ref/doc/uid/TP40007072-Ch3-SW26). Many apps already use the feature to launch other apps and pass basic data in the URL parameters, but there is no standard for structure of these URLs and no current standard for allowing callbacks to be pass in the URL if the originating app wishes to receive some result based on the action. The goal of the x-callback-url specification is to provide a standardized means for iOS developers to expose and document the methods they make available to other apps. Using x-callback-url’s source apps can launch other apps passing data and context information, and also provide parameters instructing the target app to return data and control back to the source app after executing an action. Specific supported actions will be dependent on the individual apps and will not be discussed in the specification. Apps using x-callback-url should provide support for receiving action URLs in the format described below. Details on implementation and sample code will also be available on the x-callback-url website. Note that starting with iOS 8, Apple has introduced [App Extensions](https://developer.apple.com/library/ios/documentation/General/Conceptual/ExtensibilityPG/index.html#//apple*ref/doc/uid/TP40014214) which address some of the requirements for inter-app communication in a vendor supported way. There are still areas where URL schemes make more sense, but we recommend using the extension opportunities first. ## URL Structure ``` [scheme]://[host]/[action]?[x-callback parameters]&[action parameters] ``` ### scheme The scheme should be a unique string identifier the target app. URL schemes are registered with iOS via an app’s Info.plist file. To support receiving x-callback-url message, an app must register a protocol with iOS. If your app uses x-callback-url, it is recommend you register a url scheme specifically for x-callback-url support, so that a source app can test for the registration of the scheme and ensure support is present. ### host URLs will be identified by the use of “x-callback-url” as the host portion of the URL. ### action The remaining portion of the URL path after the version make up the name of the action to be executed in the target app. These actions will vary by app and should be documented by the developer of the app supporting x-callback-url. ### x-callback Parameters x-callback-url defines several parameters with specific purposes, all of which are optional. These parameters should be passed as query args in the URL, in the format “key1=value1&key2=value2”. All values should be URL encoded strings. - **x-source :**- The friendly name of the source app calling the action. If the action in the target app requires user interface elements, it may be necessary to identify to the user the app requesting the action. - **x-success :**- If the action in the target method is intended to return a result to the source app, the x-callback parameter should be included and provide a URL to open to return to the source app. On completion of the action, the target app will open this URL, possibly with additional parameters tacked on to return a result to the source app. If x-success is not provided, it is assumed that the user will stay in the target app on successful completion of the action. - **x-error :**- URL to open if the requested action generates an error in the target app. This URL will be open with at least the parameters “errorCode=code&errorMessage=message”. If x-error is not present, and a error occurs, it is assumed the target app will report the failure to the user and remain in the target app. - **x-cancel :**- URL to open if the requested action is cancelled by the user. In the case where the target app offer the user the option to “cancel” the requested action, without a success or error result, this the the URL that should be opened to return the user to the source app. ### Action Parameters In addition to any of the optional parameters defined by x-callback-url, the query arguments can contain action parameters specific to target app’s supported actions. These parameters will be defined by the developer of the app supporting x-callback-url. The “x-” prefix should not be used on action parameters, but be reserved for additional parameters that may be defined by the x-callback-url specification. ### Security Concerns Because URL schemes open pathways to the data stored in your app, it is recommended that you carefully consider security when implementing URL schemes–whether they conform to the x-callback-url specification or not. How to implement security is not covered by the specification, as the requirements vary greatly for different app, but, in general, URL schemes actions which perform destructive operations, post to services outside the app, or similar “dangerous” actions should require user-confirmation in-app to be sure the user has not unintentionally tapped on a malicious URL. Other mechanisms such as password keys, or similar may make sense for specific use cases. ### Learn More To learn more, check out the [Examples](http://x-callback-url.com/examples) and [Implementation](http://x-callback-url.com/implementation) pages.
1.0
Original Specification - # x-callback-url 1.0 DRAFT Spec The x-callback-url specification is intended to standardize the use of URLs and registered URL schemes for inter-app communication and messaging on Apple’s iOS platforms. ## Revisions R3: Added “Security Concerns” section. R2: Added optional “x-cancel” parameter. When supported, this parameter would include a URL to open when the user indicated they want to cancel the action. The action did not succeed, nor generate an error, but the user just wishes to return to the source app. R1: Removed the “version” from the URL path. The current recommendation if versioning of an x-callback-url API is required would be to register separate URL schemes for each version. This method allows the calling app to determine which versions are available via calls to “canOpenURL”. ## Discussion iOS runs apps in sandboxes which providing limited means of communication between apps directly on the device. Shared files, messaging systems and other similar solutions used on desktop and server operating systems are not present in iOS. iOS does provide the ability for apps to [register URL schemes](http://developer.apple.com/library/ios/#documentation/iPhone/Conceptual/iPhoneOSProgrammingGuide/StandardBehaviors/StandardBehaviors.html%23//apple*ref/doc/uid/TP40007072-Ch3-SW26). Many apps already use the feature to launch other apps and pass basic data in the URL parameters, but there is no standard for structure of these URLs and no current standard for allowing callbacks to be pass in the URL if the originating app wishes to receive some result based on the action. The goal of the x-callback-url specification is to provide a standardized means for iOS developers to expose and document the methods they make available to other apps. Using x-callback-url’s source apps can launch other apps passing data and context information, and also provide parameters instructing the target app to return data and control back to the source app after executing an action. Specific supported actions will be dependent on the individual apps and will not be discussed in the specification. Apps using x-callback-url should provide support for receiving action URLs in the format described below. Details on implementation and sample code will also be available on the x-callback-url website. Note that starting with iOS 8, Apple has introduced [App Extensions](https://developer.apple.com/library/ios/documentation/General/Conceptual/ExtensibilityPG/index.html#//apple*ref/doc/uid/TP40014214) which address some of the requirements for inter-app communication in a vendor supported way. There are still areas where URL schemes make more sense, but we recommend using the extension opportunities first. ## URL Structure ``` [scheme]://[host]/[action]?[x-callback parameters]&[action parameters] ``` ### scheme The scheme should be a unique string identifier the target app. URL schemes are registered with iOS via an app’s Info.plist file. To support receiving x-callback-url message, an app must register a protocol with iOS. If your app uses x-callback-url, it is recommend you register a url scheme specifically for x-callback-url support, so that a source app can test for the registration of the scheme and ensure support is present. ### host URLs will be identified by the use of “x-callback-url” as the host portion of the URL. ### action The remaining portion of the URL path after the version make up the name of the action to be executed in the target app. These actions will vary by app and should be documented by the developer of the app supporting x-callback-url. ### x-callback Parameters x-callback-url defines several parameters with specific purposes, all of which are optional. These parameters should be passed as query args in the URL, in the format “key1=value1&key2=value2”. All values should be URL encoded strings. - **x-source :**- The friendly name of the source app calling the action. If the action in the target app requires user interface elements, it may be necessary to identify to the user the app requesting the action. - **x-success :**- If the action in the target method is intended to return a result to the source app, the x-callback parameter should be included and provide a URL to open to return to the source app. On completion of the action, the target app will open this URL, possibly with additional parameters tacked on to return a result to the source app. If x-success is not provided, it is assumed that the user will stay in the target app on successful completion of the action. - **x-error :**- URL to open if the requested action generates an error in the target app. This URL will be open with at least the parameters “errorCode=code&errorMessage=message”. If x-error is not present, and a error occurs, it is assumed the target app will report the failure to the user and remain in the target app. - **x-cancel :**- URL to open if the requested action is cancelled by the user. In the case where the target app offer the user the option to “cancel” the requested action, without a success or error result, this the the URL that should be opened to return the user to the source app. ### Action Parameters In addition to any of the optional parameters defined by x-callback-url, the query arguments can contain action parameters specific to target app’s supported actions. These parameters will be defined by the developer of the app supporting x-callback-url. The “x-” prefix should not be used on action parameters, but be reserved for additional parameters that may be defined by the x-callback-url specification. ### Security Concerns Because URL schemes open pathways to the data stored in your app, it is recommended that you carefully consider security when implementing URL schemes–whether they conform to the x-callback-url specification or not. How to implement security is not covered by the specification, as the requirements vary greatly for different app, but, in general, URL schemes actions which perform destructive operations, post to services outside the app, or similar “dangerous” actions should require user-confirmation in-app to be sure the user has not unintentionally tapped on a malicious URL. Other mechanisms such as password keys, or similar may make sense for specific use cases. ### Learn More To learn more, check out the [Examples](http://x-callback-url.com/examples) and [Implementation](http://x-callback-url.com/implementation) pages.
non_priority
original specification x callback url draft spec the x callback url specification is intended to standardize the use of urls and registered url schemes for inter app communication and messaging on apple’s ios platforms revisions added “security concerns” section added optional “x cancel” parameter when supported this parameter would include a url to open when the user indicated they want to cancel the action the action did not succeed nor generate an error but the user just wishes to return to the source app removed the “version” from the url path the current recommendation if versioning of an x callback url api is required would be to register separate url schemes for each version this method allows the calling app to determine which versions are available via calls to “canopenurl” discussion ios runs apps in sandboxes which providing limited means of communication between apps directly on the device shared files messaging systems and other similar solutions used on desktop and server operating systems are not present in ios ios does provide the ability for apps to many apps already use the feature to launch other apps and pass basic data in the url parameters but there is no standard for structure of these urls and no current standard for allowing callbacks to be pass in the url if the originating app wishes to receive some result based on the action the goal of the x callback url specification is to provide a standardized means for ios developers to expose and document the methods they make available to other apps using x callback url’s source apps can launch other apps passing data and context information and also provide parameters instructing the target app to return data and control back to the source app after executing an action specific supported actions will be dependent on the individual apps and will not be discussed in the specification apps using x callback url should provide support for receiving action urls in the format described below details on implementation and sample code will also be available on the x callback url website note that starting with ios apple has introduced which address some of the requirements for inter app communication in a vendor supported way there are still areas where url schemes make more sense but we recommend using the extension opportunities first url structure scheme the scheme should be a unique string identifier the target app url schemes are registered with ios via an app’s info plist file to support receiving x callback url message an app must register a protocol with ios if your app uses x callback url it is recommend you register a url scheme specifically for x callback url support so that a source app can test for the registration of the scheme and ensure support is present host urls will be identified by the use of “x callback url” as the host portion of the url action the remaining portion of the url path after the version make up the name of the action to be executed in the target app these actions will vary by app and should be documented by the developer of the app supporting x callback url x callback parameters x callback url defines several parameters with specific purposes all of which are optional these parameters should be passed as query args in the url in the format “ ” all values should be url encoded strings x source the friendly name of the source app calling the action if the action in the target app requires user interface elements it may be necessary to identify to the user the app requesting the action x success if the action in the target method is intended to return a result to the source app the x callback parameter should be included and provide a url to open to return to the source app on completion of the action the target app will open this url possibly with additional parameters tacked on to return a result to the source app if x success is not provided it is assumed that the user will stay in the target app on successful completion of the action x error url to open if the requested action generates an error in the target app this url will be open with at least the parameters “errorcode code errormessage message” if x error is not present and a error occurs it is assumed the target app will report the failure to the user and remain in the target app x cancel url to open if the requested action is cancelled by the user in the case where the target app offer the user the option to “cancel” the requested action without a success or error result this the the url that should be opened to return the user to the source app action parameters in addition to any of the optional parameters defined by x callback url the query arguments can contain action parameters specific to target app’s supported actions these parameters will be defined by the developer of the app supporting x callback url the “x ” prefix should not be used on action parameters but be reserved for additional parameters that may be defined by the x callback url specification security concerns because url schemes open pathways to the data stored in your app it is recommended that you carefully consider security when implementing url schemes–whether they conform to the x callback url specification or not how to implement security is not covered by the specification as the requirements vary greatly for different app but in general url schemes actions which perform destructive operations post to services outside the app or similar “dangerous” actions should require user confirmation in app to be sure the user has not unintentionally tapped on a malicious url other mechanisms such as password keys or similar may make sense for specific use cases learn more to learn more check out the and pages
0
275,407
30,237,289,803
IssuesEvent
2023-07-06 11:08:46
Sabreen-Parveen/vulnerable-node
https://api.github.com/repos/Sabreen-Parveen/vulnerable-node
closed
CVE-2019-5413 (Critical) detected in morgan-1.6.1.tgz
Mend: dependency security vulnerability
## CVE-2019-5413 - Critical Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>morgan-1.6.1.tgz</b></p></summary> <p>HTTP request logger middleware for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/morgan/-/morgan-1.6.1.tgz">https://registry.npmjs.org/morgan/-/morgan-1.6.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/morgan/package.json</p> <p> Dependency Hierarchy: - :x: **morgan-1.6.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Sabreen-Parveen/vulnerable-node/commit/16b56737b355f8bf4f9a46633cba1f172138369a">16b56737b355f8bf4f9a46633cba1f172138369a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1. <p>Publish Date: 2019-03-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-5413>CVE-2019-5413</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://hackerone.com/reports/390881">https://hackerone.com/reports/390881</a></p> <p>Release Date: 2019-03-21</p> <p>Fix Resolution: 1.9.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-5413 (Critical) detected in morgan-1.6.1.tgz - ## CVE-2019-5413 - Critical Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>morgan-1.6.1.tgz</b></p></summary> <p>HTTP request logger middleware for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/morgan/-/morgan-1.6.1.tgz">https://registry.npmjs.org/morgan/-/morgan-1.6.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/morgan/package.json</p> <p> Dependency Hierarchy: - :x: **morgan-1.6.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Sabreen-Parveen/vulnerable-node/commit/16b56737b355f8bf4f9a46633cba1f172138369a">16b56737b355f8bf4f9a46633cba1f172138369a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1. <p>Publish Date: 2019-03-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-5413>CVE-2019-5413</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://hackerone.com/reports/390881">https://hackerone.com/reports/390881</a></p> <p>Release Date: 2019-03-21</p> <p>Fix Resolution: 1.9.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve critical detected in morgan tgz cve critical severity vulnerability vulnerable library morgan tgz http request logger middleware for node js library home page a href path to dependency file package json path to vulnerable library node modules morgan package json dependency hierarchy x morgan tgz vulnerable library found in head commit a href found in base branch master vulnerability details an attacker can use the format parameter to inject arbitrary commands in the npm package morgan publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
115,631
14,858,116,718
IssuesEvent
2021-01-18 16:20:31
WordPress/gutenberg
https://api.github.com/repos/WordPress/gutenberg
closed
Controlling design tools visibility
Global Styles [Feature] Design Tools [Feature] Themes
This issue is to discuss and streamline the behavior of design tools in terms of the visibility of the UI controls for users. This topic is growing complex, so I want us to agree on a terminology: - `contexts`: each block that can have styles/settings assigned. Note that some blocks (core/heading) expose many contexts (core/heading/h1, ..., core/heading/h6) and there's also the "global" context that doesn't match any block. - `block UI`: the block sidebar available in all editors. - `global UI`: the global styles sidebar available in the site editor. ## Use cases Some examples of what we want theme authors to be able to do: - Disable custom gradients in all contexts, so they aren't visible in the block and global UIs. - Enable color presets in every context, and make them visible in the block and global UIs. - Enable font family and its presets only for the global context (this context is only visible in the global UI). - Enable line height for all contexts, but make it visible only visible in the global UI. Some examples that we aim to streamline for users: - User is able to modify the values of the colors (theme presets) for all contexts at once. - User is able to modify the values of the font size (theme presets) for the paragraph context. ## Coda A related use case but that merits its own discussion is extensibility by 3rd parties. Things like disabling the typography panel entirely and provide their own, or provide a different mechanism to set font families.
1.0
Controlling design tools visibility - This issue is to discuss and streamline the behavior of design tools in terms of the visibility of the UI controls for users. This topic is growing complex, so I want us to agree on a terminology: - `contexts`: each block that can have styles/settings assigned. Note that some blocks (core/heading) expose many contexts (core/heading/h1, ..., core/heading/h6) and there's also the "global" context that doesn't match any block. - `block UI`: the block sidebar available in all editors. - `global UI`: the global styles sidebar available in the site editor. ## Use cases Some examples of what we want theme authors to be able to do: - Disable custom gradients in all contexts, so they aren't visible in the block and global UIs. - Enable color presets in every context, and make them visible in the block and global UIs. - Enable font family and its presets only for the global context (this context is only visible in the global UI). - Enable line height for all contexts, but make it visible only visible in the global UI. Some examples that we aim to streamline for users: - User is able to modify the values of the colors (theme presets) for all contexts at once. - User is able to modify the values of the font size (theme presets) for the paragraph context. ## Coda A related use case but that merits its own discussion is extensibility by 3rd parties. Things like disabling the typography panel entirely and provide their own, or provide a different mechanism to set font families.
non_priority
controlling design tools visibility this issue is to discuss and streamline the behavior of design tools in terms of the visibility of the ui controls for users this topic is growing complex so i want us to agree on a terminology contexts each block that can have styles settings assigned note that some blocks core heading expose many contexts core heading core heading and there s also the global context that doesn t match any block block ui the block sidebar available in all editors global ui the global styles sidebar available in the site editor use cases some examples of what we want theme authors to be able to do disable custom gradients in all contexts so they aren t visible in the block and global uis enable color presets in every context and make them visible in the block and global uis enable font family and its presets only for the global context this context is only visible in the global ui enable line height for all contexts but make it visible only visible in the global ui some examples that we aim to streamline for users user is able to modify the values of the colors theme presets for all contexts at once user is able to modify the values of the font size theme presets for the paragraph context coda a related use case but that merits its own discussion is extensibility by parties things like disabling the typography panel entirely and provide their own or provide a different mechanism to set font families
0
113,161
17,116,140,019
IssuesEvent
2021-07-11 11:49:59
theHinneh/ridge-condos-admin
https://api.github.com/repos/theHinneh/ridge-condos-admin
closed
CVE-2020-28481 (Medium) detected in socket.io-2.1.1.tgz
security vulnerability
## CVE-2020-28481 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>socket.io-2.1.1.tgz</b></p></summary> <p>node.js realtime framework server</p> <p>Library home page: <a href="https://registry.npmjs.org/socket.io/-/socket.io-2.1.1.tgz">https://registry.npmjs.org/socket.io/-/socket.io-2.1.1.tgz</a></p> <p>Path to dependency file: ridge-condos-admin/package.json</p> <p>Path to vulnerable library: ridge-condos-admin/node_modules/socket.io/package.json</p> <p> Dependency Hierarchy: - karma-4.3.0.tgz (Root Library) - :x: **socket.io-2.1.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/theHinneh/ridge-condos-admin/commit/9abeb09f5e1b25cba831e784f85f5f7de0112f00">9abeb09f5e1b25cba831e784f85f5f7de0112f00</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package socket.io before 2.4.0 are vulnerable to Insecure Defaults due to CORS Misconfiguration. All domains are whitelisted by default. <p>Publish Date: 2021-01-19 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28481>CVE-2020-28481</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28481">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28481</a></p> <p>Release Date: 2021-01-19</p> <p>Fix Resolution: 2.4.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-28481 (Medium) detected in socket.io-2.1.1.tgz - ## CVE-2020-28481 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>socket.io-2.1.1.tgz</b></p></summary> <p>node.js realtime framework server</p> <p>Library home page: <a href="https://registry.npmjs.org/socket.io/-/socket.io-2.1.1.tgz">https://registry.npmjs.org/socket.io/-/socket.io-2.1.1.tgz</a></p> <p>Path to dependency file: ridge-condos-admin/package.json</p> <p>Path to vulnerable library: ridge-condos-admin/node_modules/socket.io/package.json</p> <p> Dependency Hierarchy: - karma-4.3.0.tgz (Root Library) - :x: **socket.io-2.1.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/theHinneh/ridge-condos-admin/commit/9abeb09f5e1b25cba831e784f85f5f7de0112f00">9abeb09f5e1b25cba831e784f85f5f7de0112f00</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package socket.io before 2.4.0 are vulnerable to Insecure Defaults due to CORS Misconfiguration. All domains are whitelisted by default. <p>Publish Date: 2021-01-19 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28481>CVE-2020-28481</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28481">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28481</a></p> <p>Release Date: 2021-01-19</p> <p>Fix Resolution: 2.4.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in socket io tgz cve medium severity vulnerability vulnerable library socket io tgz node js realtime framework server library home page a href path to dependency file ridge condos admin package json path to vulnerable library ridge condos admin node modules socket io package json dependency hierarchy karma tgz root library x socket io tgz vulnerable library found in head commit a href found in base branch master vulnerability details the package socket io before are vulnerable to insecure defaults due to cors misconfiguration all domains are whitelisted by default publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
107,052
16,749,668,217
IssuesEvent
2021-06-11 20:44:18
talmax1124/creativeduoshopping-master
https://api.github.com/repos/talmax1124/creativeduoshopping-master
closed
CVE-2020-28469 (Medium) detected in glob-parent-2.0.0.tgz, glob-parent-3.1.0.tgz
security vulnerability
## CVE-2020-28469 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-3.1.0.tgz</b></p></summary> <p> <details><summary><b>glob-parent-2.0.0.tgz</b></p></summary> <p>Strips glob magic from a string to provide the parent path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p> <p>Path to dependency file: creativeduoshopping-master/frontend/package.json</p> <p>Path to vulnerable library: creativeduoshopping-master/frontend/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/glob-base/node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - react-scripts-2.1.8.tgz (Root Library) - jest-23.6.0.tgz - jest-cli-23.6.0.tgz - micromatch-2.3.11.tgz - parse-glob-3.0.4.tgz - glob-base-0.3.0.tgz - :x: **glob-parent-2.0.0.tgz** (Vulnerable Library) </details> <details><summary><b>glob-parent-3.1.0.tgz</b></p></summary> <p>Strips glob magic from a string to provide the parent directory path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz</a></p> <p>Path to dependency file: creativeduoshopping-master/package.json</p> <p>Path to vulnerable library: creativeduoshopping-master/node_modules/webpack-dev-server/node_modules/glob-parent/package.json,creativeduoshopping-master/frontend/node_modules/chokidar/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/fast-glob/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/fork-ts-checker-webpack-plugin/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/watchpack-chokidar2/node_modules/glob-parent/package.json,creativeduoshopping-master/frontend/node_modules/fast-glob/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/@parcel/watcher/node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - react-scripts-2.1.8.tgz (Root Library) - webpack-dev-server-3.1.14.tgz - chokidar-2.1.8.tgz - :x: **glob-parent-3.1.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/talmax1124/creativeduoshopping-master/commit/87c2e6e4b48a48e76ec6d8c0ad9a2aeb07b9df48">87c2e6e4b48a48e76ec6d8c0ad9a2aeb07b9df48</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator. <p>Publish Date: 2021-06-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28469>CVE-2020-28469</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469</a></p> <p>Release Date: 2021-06-03</p> <p>Fix Resolution: glob-parent - 5.1.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-28469 (Medium) detected in glob-parent-2.0.0.tgz, glob-parent-3.1.0.tgz - ## CVE-2020-28469 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-3.1.0.tgz</b></p></summary> <p> <details><summary><b>glob-parent-2.0.0.tgz</b></p></summary> <p>Strips glob magic from a string to provide the parent path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p> <p>Path to dependency file: creativeduoshopping-master/frontend/package.json</p> <p>Path to vulnerable library: creativeduoshopping-master/frontend/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/glob-base/node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - react-scripts-2.1.8.tgz (Root Library) - jest-23.6.0.tgz - jest-cli-23.6.0.tgz - micromatch-2.3.11.tgz - parse-glob-3.0.4.tgz - glob-base-0.3.0.tgz - :x: **glob-parent-2.0.0.tgz** (Vulnerable Library) </details> <details><summary><b>glob-parent-3.1.0.tgz</b></p></summary> <p>Strips glob magic from a string to provide the parent directory path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz</a></p> <p>Path to dependency file: creativeduoshopping-master/package.json</p> <p>Path to vulnerable library: creativeduoshopping-master/node_modules/webpack-dev-server/node_modules/glob-parent/package.json,creativeduoshopping-master/frontend/node_modules/chokidar/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/fast-glob/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/fork-ts-checker-webpack-plugin/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/watchpack-chokidar2/node_modules/glob-parent/package.json,creativeduoshopping-master/frontend/node_modules/fast-glob/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/@parcel/watcher/node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - react-scripts-2.1.8.tgz (Root Library) - webpack-dev-server-3.1.14.tgz - chokidar-2.1.8.tgz - :x: **glob-parent-3.1.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/talmax1124/creativeduoshopping-master/commit/87c2e6e4b48a48e76ec6d8c0ad9a2aeb07b9df48">87c2e6e4b48a48e76ec6d8c0ad9a2aeb07b9df48</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator. <p>Publish Date: 2021-06-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28469>CVE-2020-28469</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469</a></p> <p>Release Date: 2021-06-03</p> <p>Fix Resolution: glob-parent - 5.1.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in glob parent tgz glob parent tgz cve medium severity vulnerability vulnerable libraries glob parent tgz glob parent tgz glob parent tgz strips glob magic from a string to provide the parent path library home page a href path to dependency file creativeduoshopping master frontend package json path to vulnerable library creativeduoshopping master frontend node modules glob parent package json creativeduoshopping master node modules glob base node modules glob parent package json dependency hierarchy react scripts tgz root library jest tgz jest cli tgz micromatch tgz parse glob tgz glob base tgz x glob parent tgz vulnerable library glob parent tgz strips glob magic from a string to provide the parent directory path library home page a href path to dependency file creativeduoshopping master package json path to vulnerable library creativeduoshopping master node modules webpack dev server node modules glob parent package json creativeduoshopping master frontend node modules chokidar node modules glob parent package json creativeduoshopping master node modules fast glob node modules glob parent package json creativeduoshopping master node modules fork ts checker webpack plugin node modules glob parent package json creativeduoshopping master node modules watchpack node modules glob parent package json creativeduoshopping master frontend node modules fast glob node modules glob parent package json creativeduoshopping master node modules parcel watcher node modules glob parent package json dependency hierarchy react scripts tgz root library webpack dev server tgz chokidar tgz x glob parent tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package glob parent before the enclosure regex used to check for strings ending in enclosure containing path separator publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent step up your open source security game with whitesource
0
1,018
4,833,918,093
IssuesEvent
2016-11-08 12:43:40
graphhopper/graphhopper
https://api.github.com/repos/graphhopper/graphhopper
closed
mvn test & verify fails for web with strange error
architecture bug
Everytime I run this `mvn clean install test failsafe:integration-test verify` another class was not found: ``` [ERROR] Failed to execute goal org.apache.maven.plugins:maven-assembly-plugin:2.4.1:single (make-assembly) on project graphhopper-web: Failed to create assembly: Error creating assembly archive with-dep: Problem creating jar: jar:file:/path/graphhopper/web/target/graphhopper-web-0.9-SNAPSHOT.jar!/com/graphhopper/http/HeadFilter.class: JAR entry com/graphhopper/http/HeadFilter.class not found in /path/graphhopper/web/target/graphhopper-web-0.9-SNAPSHOT.jar -> [Help 1] ```
1.0
mvn test & verify fails for web with strange error - Everytime I run this `mvn clean install test failsafe:integration-test verify` another class was not found: ``` [ERROR] Failed to execute goal org.apache.maven.plugins:maven-assembly-plugin:2.4.1:single (make-assembly) on project graphhopper-web: Failed to create assembly: Error creating assembly archive with-dep: Problem creating jar: jar:file:/path/graphhopper/web/target/graphhopper-web-0.9-SNAPSHOT.jar!/com/graphhopper/http/HeadFilter.class: JAR entry com/graphhopper/http/HeadFilter.class not found in /path/graphhopper/web/target/graphhopper-web-0.9-SNAPSHOT.jar -> [Help 1] ```
non_priority
mvn test verify fails for web with strange error everytime i run this mvn clean install test failsafe integration test verify another class was not found failed to execute goal org apache maven plugins maven assembly plugin single make assembly on project graphhopper web failed to create assembly error creating assembly archive with dep problem creating jar jar file path graphhopper web target graphhopper web snapshot jar com graphhopper http headfilter class jar entry com graphhopper http headfilter class not found in path graphhopper web target graphhopper web snapshot jar
0
26,586
13,060,737,274
IssuesEvent
2020-07-30 12:54:56
haskell-unordered-containers/unordered-containers
https://api.github.com/repos/haskell-unordered-containers/unordered-containers
opened
Optimization idea for subsetArray
performance
https://github.com/haskell-unordered-containers/unordered-containers/blob/352591a4cc171d71c828f659288fb6e3440c28a7/Data/HashMap/Internal.hs#L2197-L2202 Once we've identified an element of `ary2` to correspond to an element of `ary1`, it would be nice if we wouldn't check the same element again against the subsequent elements of `ary1`. @treeowl had a neat idea for that in https://github.com/haskell-unordered-containers/unordered-containers/pull/282#discussion_r456021554: > I wouldn't record indices. But we could `thaw` one of the arrays and play mutation games. Say we have > > ``` > 1 2 3 4 > ``` > > and we search for `3`. Then we can mutate the array to > > ``` > undefined 2 1 4 > ``` > > That is, swap the `3` to the front and replace it with `undefined`. Then start the next scan in the second slot.
True
Optimization idea for subsetArray - https://github.com/haskell-unordered-containers/unordered-containers/blob/352591a4cc171d71c828f659288fb6e3440c28a7/Data/HashMap/Internal.hs#L2197-L2202 Once we've identified an element of `ary2` to correspond to an element of `ary1`, it would be nice if we wouldn't check the same element again against the subsequent elements of `ary1`. @treeowl had a neat idea for that in https://github.com/haskell-unordered-containers/unordered-containers/pull/282#discussion_r456021554: > I wouldn't record indices. But we could `thaw` one of the arrays and play mutation games. Say we have > > ``` > 1 2 3 4 > ``` > > and we search for `3`. Then we can mutate the array to > > ``` > undefined 2 1 4 > ``` > > That is, swap the `3` to the front and replace it with `undefined`. Then start the next scan in the second slot.
non_priority
optimization idea for subsetarray once we ve identified an element of to correspond to an element of it would be nice if we wouldn t check the same element again against the subsequent elements of treeowl had a neat idea for that in i wouldn t record indices but we could thaw one of the arrays and play mutation games say we have and we search for then we can mutate the array to undefined that is swap the to the front and replace it with undefined then start the next scan in the second slot
0
105,478
13,187,362,213
IssuesEvent
2020-08-13 03:10:22
ISCLuisRamirez/WebAdekua
https://api.github.com/repos/ISCLuisRamirez/WebAdekua
opened
Cambiar imagenes de seccion
design
Cambiar imágenes de sección por unas acorde a remodelación de interiores
1.0
Cambiar imagenes de seccion - Cambiar imágenes de sección por unas acorde a remodelación de interiores
non_priority
cambiar imagenes de seccion cambiar imágenes de sección por unas acorde a remodelación de interiores
0
120,913
17,644,405,273
IssuesEvent
2021-08-20 02:23:45
AlexRogalskiy/screenshots
https://api.github.com/repos/AlexRogalskiy/screenshots
opened
CVE-2020-8203 (High) detected in lodash-2.4.2.tgz
security vulnerability
## CVE-2020-8203 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-2.4.2.tgz</b></p></summary> <p>A utility library delivering consistency, customization, performance, & extras.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz">https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz</a></p> <p>Path to dependency file: screenshots/package.json</p> <p>Path to vulnerable library: screenshots/node_modules/dockerfile_lint/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - dockerfile_lint-0.3.4.tgz (Root Library) - :x: **lodash-2.4.2.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20. <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203>CVE-2020-8203</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1523">https://www.npmjs.com/advisories/1523</a></p> <p>Release Date: 2020-10-21</p> <p>Fix Resolution: lodash - 4.17.19</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-8203 (High) detected in lodash-2.4.2.tgz - ## CVE-2020-8203 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-2.4.2.tgz</b></p></summary> <p>A utility library delivering consistency, customization, performance, & extras.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz">https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz</a></p> <p>Path to dependency file: screenshots/package.json</p> <p>Path to vulnerable library: screenshots/node_modules/dockerfile_lint/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - dockerfile_lint-0.3.4.tgz (Root Library) - :x: **lodash-2.4.2.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20. <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203>CVE-2020-8203</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1523">https://www.npmjs.com/advisories/1523</a></p> <p>Release Date: 2020-10-21</p> <p>Fix Resolution: lodash - 4.17.19</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in lodash tgz cve high severity vulnerability vulnerable library lodash tgz a utility library delivering consistency customization performance extras library home page a href path to dependency file screenshots package json path to vulnerable library screenshots node modules dockerfile lint node modules lodash package json dependency hierarchy dockerfile lint tgz root library x lodash tgz vulnerable library found in base branch master vulnerability details prototype pollution attack when using zipobjectdeep in lodash before publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution lodash step up your open source security game with whitesource
0
41,597
12,832,396,614
IssuesEvent
2020-07-07 07:35:51
rvvergara/battleship
https://api.github.com/repos/rvvergara/battleship
closed
CVE-2020-7660 (High) detected in serialize-javascript-1.6.1.tgz
security vulnerability
## CVE-2020-7660 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>serialize-javascript-1.6.1.tgz</b></p></summary> <p>Serialize JavaScript to a superset of JSON that includes regular expressions and functions.</p> <p>Library home page: <a href="https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-1.6.1.tgz">https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-1.6.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/battleship/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/battleship/node_modules/serialize-javascript/package.json</p> <p> Dependency Hierarchy: - webpack-4.29.6.tgz (Root Library) - terser-webpack-plugin-1.2.3.tgz - :x: **serialize-javascript-1.6.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/rvvergara/battleship/commit/992b41aaf2e491c0af8810536e3f27f800b8e8de">992b41aaf2e491c0af8810536e3f27f800b8e8de</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js". <p>Publish Date: 2020-06-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7660>CVE-2020-7660</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7660">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7660</a></p> <p>Release Date: 2020-06-01</p> <p>Fix Resolution: serialize-javascript - 3.1.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-7660 (High) detected in serialize-javascript-1.6.1.tgz - ## CVE-2020-7660 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>serialize-javascript-1.6.1.tgz</b></p></summary> <p>Serialize JavaScript to a superset of JSON that includes regular expressions and functions.</p> <p>Library home page: <a href="https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-1.6.1.tgz">https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-1.6.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/battleship/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/battleship/node_modules/serialize-javascript/package.json</p> <p> Dependency Hierarchy: - webpack-4.29.6.tgz (Root Library) - terser-webpack-plugin-1.2.3.tgz - :x: **serialize-javascript-1.6.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/rvvergara/battleship/commit/992b41aaf2e491c0af8810536e3f27f800b8e8de">992b41aaf2e491c0af8810536e3f27f800b8e8de</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js". <p>Publish Date: 2020-06-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7660>CVE-2020-7660</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7660">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7660</a></p> <p>Release Date: 2020-06-01</p> <p>Fix Resolution: serialize-javascript - 3.1.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in serialize javascript tgz cve high severity vulnerability vulnerable library serialize javascript tgz serialize javascript to a superset of json that includes regular expressions and functions library home page a href path to dependency file tmp ws scm battleship package json path to vulnerable library tmp ws scm battleship node modules serialize javascript package json dependency hierarchy webpack tgz root library terser webpack plugin tgz x serialize javascript tgz vulnerable library found in head commit a href vulnerability details serialize javascript prior to allows remote attackers to inject arbitrary code via the function deletefunctions within index js publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution serialize javascript step up your open source security game with whitesource
0
48,858
20,322,664,365
IssuesEvent
2022-02-18 01:00:07
Ryujinx/Ryujinx
https://api.github.com/repos/Ryujinx/Ryujinx
closed
hid IHidServer: 84 (EnableSixAxisSensorUnalteredPassthrough) is not implemented
not-implemented needs-re service:hid
hid IHidServer: 84 (EnableSixAxisSensorUnalteredPassthrough) is not implemented [13.0.0+] [Switchbrew](https://switchbrew.org/wiki/HID_services#hid) ### Service description ``` n/a ``` ### Required by: Nintendo Switch Sports Online Play Test [SwitchSportsOnlineTest.log](https://github.com/Ryujinx/Ryujinx/files/8076452/SwitchSportsOnlineTest.log)
1.0
hid IHidServer: 84 (EnableSixAxisSensorUnalteredPassthrough) is not implemented - hid IHidServer: 84 (EnableSixAxisSensorUnalteredPassthrough) is not implemented [13.0.0+] [Switchbrew](https://switchbrew.org/wiki/HID_services#hid) ### Service description ``` n/a ``` ### Required by: Nintendo Switch Sports Online Play Test [SwitchSportsOnlineTest.log](https://github.com/Ryujinx/Ryujinx/files/8076452/SwitchSportsOnlineTest.log)
non_priority
hid ihidserver enablesixaxissensorunalteredpassthrough is not implemented hid ihidserver enablesixaxissensorunalteredpassthrough is not implemented service description n a required by nintendo switch sports online play test
0
170,857
27,022,746,203
IssuesEvent
2023-02-11 07:26:29
zetkin/app.zetkin.org
https://api.github.com/repos/zetkin/app.zetkin.org
opened
Survey overview empty state
🎨 needs-design
## Description After a new survey is created, the user should be guided towards filling it with content (questions etc). ## Relevant Job Stories * When I’m preparing to survey my members, I want to be able to design a custom survey, so that I can get the information that I need ## Prerequisites None ## Requirements - [ ] When there are no elements in the survey, display an empty state - [ ] The empty state should have an icon, a short caption and a call to action button - [ ] Clicking the button should navigate to the questions tab ## Possible implementations None ## Design specifications TBD ## Open questions * What should the icon and text be?
1.0
Survey overview empty state - ## Description After a new survey is created, the user should be guided towards filling it with content (questions etc). ## Relevant Job Stories * When I’m preparing to survey my members, I want to be able to design a custom survey, so that I can get the information that I need ## Prerequisites None ## Requirements - [ ] When there are no elements in the survey, display an empty state - [ ] The empty state should have an icon, a short caption and a call to action button - [ ] Clicking the button should navigate to the questions tab ## Possible implementations None ## Design specifications TBD ## Open questions * What should the icon and text be?
non_priority
survey overview empty state description after a new survey is created the user should be guided towards filling it with content questions etc relevant job stories when i’m preparing to survey my members i want to be able to design a custom survey so that i can get the information that i need prerequisites none requirements when there are no elements in the survey display an empty state the empty state should have an icon a short caption and a call to action button clicking the button should navigate to the questions tab possible implementations none design specifications tbd open questions what should the icon and text be
0
4,072
2,964,636,591
IssuesEvent
2015-07-10 17:49:24
go-gorp/gorp
https://api.github.com/repos/go-gorp/gorp
closed
Split codebase into separate files
code-cleanup
Most of the code is currently in one single file. This makes it hard to maintain. The code should be separated into multiple files.
1.0
Split codebase into separate files - Most of the code is currently in one single file. This makes it hard to maintain. The code should be separated into multiple files.
non_priority
split codebase into separate files most of the code is currently in one single file this makes it hard to maintain the code should be separated into multiple files
0
95,249
11,963,302,953
IssuesEvent
2020-04-05 15:26:17
nextcloud/polls
https://api.github.com/repos/nextcloud/polls
closed
Button position when adding new poll (Safari)
design investigate
### What is going wrong? **Describe the bug** Buttons overlay the options Poll schedule/text based **To Reproduce** Steps to reproduce the behavior: 1. Open polls (Safari) 2. Click "Add new poll" <img width="294" alt="image" src="https://user-images.githubusercontent.com/19712668/72968794-886dc100-3dc4-11ea-8c0b-b8c84276eb30.png">
1.0
Button position when adding new poll (Safari) - ### What is going wrong? **Describe the bug** Buttons overlay the options Poll schedule/text based **To Reproduce** Steps to reproduce the behavior: 1. Open polls (Safari) 2. Click "Add new poll" <img width="294" alt="image" src="https://user-images.githubusercontent.com/19712668/72968794-886dc100-3dc4-11ea-8c0b-b8c84276eb30.png">
non_priority
button position when adding new poll safari what is going wrong describe the bug buttons overlay the options poll schedule text based to reproduce steps to reproduce the behavior open polls safari click add new poll img width alt image src
0
24,454
4,082,522,001
IssuesEvent
2016-05-31 13:12:12
italia-it/designer.italia.it
https://api.github.com/repos/italia-it/designer.italia.it
closed
Considerare un paragrafo con indicazioni per siti tematici
ambito:testi linee guida priorita:normale
una PA centrale che abbia necessità di un minisito esterno al portale (magari per un evento particolare o per lanciare un servizio speciale) deve usare i colori istituzionali nell'header oppure no (non considerandolo quindi un sito della PA centrale) ?
1.0
Considerare un paragrafo con indicazioni per siti tematici - una PA centrale che abbia necessità di un minisito esterno al portale (magari per un evento particolare o per lanciare un servizio speciale) deve usare i colori istituzionali nell'header oppure no (non considerandolo quindi un sito della PA centrale) ?
non_priority
considerare un paragrafo con indicazioni per siti tematici una pa centrale che abbia necessità di un minisito esterno al portale magari per un evento particolare o per lanciare un servizio speciale deve usare i colori istituzionali nell header oppure no non considerandolo quindi un sito della pa centrale
0
152,435
19,683,728,124
IssuesEvent
2022-01-11 19:31:19
timf-app-sandbox/ng2
https://api.github.com/repos/timf-app-sandbox/ng2
opened
CVE-2017-16137 (Medium) detected in debug-2.2.0.tgz
security vulnerability
## CVE-2017-16137 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>debug-2.2.0.tgz</b></p></summary> <p>small debugging utility</p> <p>Library home page: <a href="https://registry.npmjs.org/debug/-/debug-2.2.0.tgz">https://registry.npmjs.org/debug/-/debug-2.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/debug/package.json,/node_modules/npm/node_modules/node-gyp/node_modules/path-array/node_modules/array-index/node_modules/debug/package.json,/node_modules/connect/node_modules/debug/package.json,/node_modules/mocha/node_modules/debug/package.json</p> <p> Dependency Hierarchy: - mocha-2.5.3.tgz (Root Library) - :x: **debug-2.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/timf-app-sandbox/ng2/commit/955104db568b8666b62b7e8b758dcfa65f0dc586">955104db568b8666b62b7e8b758dcfa65f0dc586</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16137>CVE-2017-16137</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137">https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137</a></p> <p>Release Date: 2018-06-07</p> <p>Fix Resolution (debug): 2.6.9</p> <p>Direct dependency fix Resolution (mocha): 4.0.0</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"mocha","packageVersion":"2.5.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"mocha:2.5.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.0.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-16137","vulnerabilityDetails":"The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16137","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2017-16137 (Medium) detected in debug-2.2.0.tgz - ## CVE-2017-16137 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>debug-2.2.0.tgz</b></p></summary> <p>small debugging utility</p> <p>Library home page: <a href="https://registry.npmjs.org/debug/-/debug-2.2.0.tgz">https://registry.npmjs.org/debug/-/debug-2.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/debug/package.json,/node_modules/npm/node_modules/node-gyp/node_modules/path-array/node_modules/array-index/node_modules/debug/package.json,/node_modules/connect/node_modules/debug/package.json,/node_modules/mocha/node_modules/debug/package.json</p> <p> Dependency Hierarchy: - mocha-2.5.3.tgz (Root Library) - :x: **debug-2.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/timf-app-sandbox/ng2/commit/955104db568b8666b62b7e8b758dcfa65f0dc586">955104db568b8666b62b7e8b758dcfa65f0dc586</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16137>CVE-2017-16137</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137">https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137</a></p> <p>Release Date: 2018-06-07</p> <p>Fix Resolution (debug): 2.6.9</p> <p>Direct dependency fix Resolution (mocha): 4.0.0</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"mocha","packageVersion":"2.5.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"mocha:2.5.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.0.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-16137","vulnerabilityDetails":"The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16137","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in debug tgz cve medium severity vulnerability vulnerable library debug tgz small debugging utility library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules debug package json node modules npm node modules node gyp node modules path array node modules array index node modules debug package json node modules connect node modules debug package json node modules mocha node modules debug package json dependency hierarchy mocha tgz root library x debug tgz vulnerable library found in head commit a href found in base branch master vulnerability details the debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter it takes around characters to block for seconds making this a low severity issue publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution debug direct dependency fix resolution mocha rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree mocha isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter it takes around characters to block for seconds making this a low severity issue vulnerabilityurl
0
140,194
31,855,049,337
IssuesEvent
2023-09-15 06:44:33
kkrt-labs/kakarot-ssj
https://api.github.com/repos/kkrt-labs/kakarot-ssj
closed
feat: implement 0x56 - JUMP Opcode
enhancement opcode
# Feature Request | Since | Group | | --- | --- | | Frontier| Stack Memory Storage and Flow Operations | *Index 1 is top of the stack. See [PUSH](https://www.evm.codes/#60).* ## Notes The program counter (PC) is a byte offset in the deployed [code](https://www.evm.codes/about). It indicates which instruction will be executed next. When an [ADD](https://www.evm.codes/#01) is executed, for example, the PC is incremented by 1, since the instruction is 1 byte. The [PUSH](https://www.evm.codes/#60) instructions are bigger than one byte, and so will increment the counter accordingly. The **JUMP** instruction alters the program counter, thus breaking the linear path of the execution to another point in the deployed [code](https://www.evm.codes/about). It is used to implement functionalities like functions. ## Stack input 1. `counter`: byte offset in the deployed [code](https://www.evm.codes/about) where execution will continue from. Must be a [JUMPDEST](https://www.evm.codes/#5B) instruction. ## Example [See in playground](https://www.evm.codes/playground?unit=Wei&codeType=Mnemonic&code='wWZjump%20overqinvalid%20and%20jusXgoYoqpushk4x0_%20%20%20x2%20%7Bprevious%20instruction%20occupies%202%20bytes%7DzINVALIDx3_DEST~4k1x5'~%20wOffseXz%5Cnx%20~w%2F%2F%20qYhZkzPUSH1%20_zJUMPZe%20Y%20tXt%20%01XYZ_kqwxz~_). ## Error cases The state changes done by the current context are [reverted](https://www.evm.codes#FD) in those cases: - Not enough gas. - Not enough values on the stack. - `Counter` offset is not a [JUMPDEST](https://www.evm.codes/#5B). The error is generated even if the JUMP would not have been done. ```[tasklist] ### Tasks - [ ] https://github.com/kkrt-labs/kakarot-ssj/issues/251 - [ ] After #251 is implemented, go and implement the business logic of JUMP ```
1.0
feat: implement 0x56 - JUMP Opcode - # Feature Request | Since | Group | | --- | --- | | Frontier| Stack Memory Storage and Flow Operations | *Index 1 is top of the stack. See [PUSH](https://www.evm.codes/#60).* ## Notes The program counter (PC) is a byte offset in the deployed [code](https://www.evm.codes/about). It indicates which instruction will be executed next. When an [ADD](https://www.evm.codes/#01) is executed, for example, the PC is incremented by 1, since the instruction is 1 byte. The [PUSH](https://www.evm.codes/#60) instructions are bigger than one byte, and so will increment the counter accordingly. The **JUMP** instruction alters the program counter, thus breaking the linear path of the execution to another point in the deployed [code](https://www.evm.codes/about). It is used to implement functionalities like functions. ## Stack input 1. `counter`: byte offset in the deployed [code](https://www.evm.codes/about) where execution will continue from. Must be a [JUMPDEST](https://www.evm.codes/#5B) instruction. ## Example [See in playground](https://www.evm.codes/playground?unit=Wei&codeType=Mnemonic&code='wWZjump%20overqinvalid%20and%20jusXgoYoqpushk4x0_%20%20%20x2%20%7Bprevious%20instruction%20occupies%202%20bytes%7DzINVALIDx3_DEST~4k1x5'~%20wOffseXz%5Cnx%20~w%2F%2F%20qYhZkzPUSH1%20_zJUMPZe%20Y%20tXt%20%01XYZ_kqwxz~_). ## Error cases The state changes done by the current context are [reverted](https://www.evm.codes#FD) in those cases: - Not enough gas. - Not enough values on the stack. - `Counter` offset is not a [JUMPDEST](https://www.evm.codes/#5B). The error is generated even if the JUMP would not have been done. ```[tasklist] ### Tasks - [ ] https://github.com/kkrt-labs/kakarot-ssj/issues/251 - [ ] After #251 is implemented, go and implement the business logic of JUMP ```
non_priority
feat implement jump opcode feature request since group frontier stack memory storage and flow operations index is top of the stack see notes the program counter pc is a byte offset in the deployed it indicates which instruction will be executed next when an is executed for example the pc is incremented by since the instruction is byte the instructions are bigger than one byte and so will increment the counter accordingly the jump instruction alters the program counter thus breaking the linear path of the execution to another point in the deployed it is used to implement functionalities like functions stack input counter byte offset in the deployed where execution will continue from must be a instruction example error cases the state changes done by the current context are in those cases not enough gas not enough values on the stack counter offset is not a the error is generated even if the jump would not have been done tasks after is implemented go and implement the business logic of jump
0
13,211
4,652,530,868
IssuesEvent
2016-10-03 14:17:55
dotnet/coreclr
https://api.github.com/repos/dotnet/coreclr
opened
Automatically flag when key JIT data structures get bigger
CodeGen JitThroughput
It's easy to add new data members (or modify the existing ones) to key JIT struct's and classes without realizing the potential impact on memory consumption (and, indirectly, compile times). There is some logic in the compiler to dump out info about the layout of some struct's but this code is #if'd out for default builds so it's tedious to use and it bit rots easily. The best long term solution seems to be to add a utility to read the debug info from the JIT binary and dump the layout; the latest result would be part of the repo and either the utility itself or the driver invoking would compare the current layout to the "last known" and squawk if anything is seen that could have potentially negative impact on resource consumption (specifically, memory and indirectly time) of the compiler. This should be made a standard step in (almost?) every build. If convenient it might be nice to make the layout dumps friendly to human readers so that folks could also see what's going on easily. This process should probably cover a hand-picked subset of the compiler's structures at first to minimize clutter; the obvious candidates are the GenTree* family, RA data structures, etc.
1.0
Automatically flag when key JIT data structures get bigger - It's easy to add new data members (or modify the existing ones) to key JIT struct's and classes without realizing the potential impact on memory consumption (and, indirectly, compile times). There is some logic in the compiler to dump out info about the layout of some struct's but this code is #if'd out for default builds so it's tedious to use and it bit rots easily. The best long term solution seems to be to add a utility to read the debug info from the JIT binary and dump the layout; the latest result would be part of the repo and either the utility itself or the driver invoking would compare the current layout to the "last known" and squawk if anything is seen that could have potentially negative impact on resource consumption (specifically, memory and indirectly time) of the compiler. This should be made a standard step in (almost?) every build. If convenient it might be nice to make the layout dumps friendly to human readers so that folks could also see what's going on easily. This process should probably cover a hand-picked subset of the compiler's structures at first to minimize clutter; the obvious candidates are the GenTree* family, RA data structures, etc.
non_priority
automatically flag when key jit data structures get bigger it s easy to add new data members or modify the existing ones to key jit struct s and classes without realizing the potential impact on memory consumption and indirectly compile times there is some logic in the compiler to dump out info about the layout of some struct s but this code is if d out for default builds so it s tedious to use and it bit rots easily the best long term solution seems to be to add a utility to read the debug info from the jit binary and dump the layout the latest result would be part of the repo and either the utility itself or the driver invoking would compare the current layout to the last known and squawk if anything is seen that could have potentially negative impact on resource consumption specifically memory and indirectly time of the compiler this should be made a standard step in almost every build if convenient it might be nice to make the layout dumps friendly to human readers so that folks could also see what s going on easily this process should probably cover a hand picked subset of the compiler s structures at first to minimize clutter the obvious candidates are the gentree family ra data structures etc
0
78,267
7,624,743,325
IssuesEvent
2018-05-03 19:01:41
dotnet/corefx
https://api.github.com/repos/dotnet/corefx
closed
Brotli_External_DecompressesResponse_Success is consistently failing because httpbin.org is down
area-System.Net.Http test bug
This test has been failing in local runs for me all day. Apparently httpbin.org has been down all day (or at least every time I run tests). If httpbin.org is this unreliable, then I don't think we should be depending on it in functional tests.
1.0
Brotli_External_DecompressesResponse_Success is consistently failing because httpbin.org is down - This test has been failing in local runs for me all day. Apparently httpbin.org has been down all day (or at least every time I run tests). If httpbin.org is this unreliable, then I don't think we should be depending on it in functional tests.
non_priority
brotli external decompressesresponse success is consistently failing because httpbin org is down this test has been failing in local runs for me all day apparently httpbin org has been down all day or at least every time i run tests if httpbin org is this unreliable then i don t think we should be depending on it in functional tests
0
70,065
7,176,396,893
IssuesEvent
2018-01-31 09:54:27
boutproject/BOUT-dev
https://api.github.com/repos/boutproject/BOUT-dev
opened
Staggered grids meta-issue
possible bug tests
There are currently a few problems with using staggered grids (e.g. #64, #259, #411, #741, #810). It's not clear (to me, at least) if these are related issues and staggered grids are completely broken, or if they just need a bit of polish and tightening up. We're also missing decent tests for them. There is `examples/staggered_grid`, but it doesn't really tell us if staggered grids are working correctly or not. First task, then, should be to get some test coverage that highlights any current problems and ensures that they don't creep back in. Once we know what's a bug and what's a design issue, we can work on fixing everything.
1.0
Staggered grids meta-issue - There are currently a few problems with using staggered grids (e.g. #64, #259, #411, #741, #810). It's not clear (to me, at least) if these are related issues and staggered grids are completely broken, or if they just need a bit of polish and tightening up. We're also missing decent tests for them. There is `examples/staggered_grid`, but it doesn't really tell us if staggered grids are working correctly or not. First task, then, should be to get some test coverage that highlights any current problems and ensures that they don't creep back in. Once we know what's a bug and what's a design issue, we can work on fixing everything.
non_priority
staggered grids meta issue there are currently a few problems with using staggered grids e g it s not clear to me at least if these are related issues and staggered grids are completely broken or if they just need a bit of polish and tightening up we re also missing decent tests for them there is examples staggered grid but it doesn t really tell us if staggered grids are working correctly or not first task then should be to get some test coverage that highlights any current problems and ensures that they don t creep back in once we know what s a bug and what s a design issue we can work on fixing everything
0
271,270
29,368,847,877
IssuesEvent
2023-05-29 01:08:05
LalithK90/bagShop
https://api.github.com/repos/LalithK90/bagShop
opened
CVE-2021-30640 (Medium) detected in tomcat-embed-core-9.0.30.jar
Mend: dependency security vulnerability
## CVE-2021-30640 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tomcat-embed-core-9.0.30.jar</b></p></summary> <p>Core Tomcat implementation</p> <p>Library home page: <a href="https://tomcat.apache.org/">https://tomcat.apache.org/</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.30/ad32909314fe2ba02cec036434c0addd19bcc580/tomcat-embed-core-9.0.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.2.4.RELEASE.jar (Root Library) - spring-boot-starter-tomcat-2.2.4.RELEASE.jar - :x: **tomcat-embed-core-9.0.30.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65. <p>Publish Date: 2021-07-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-30640>CVE-2021-30640</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://lists.apache.org/thread/3qcmnprbtft3phn3vyk06hpycm7p4sgx">https://lists.apache.org/thread/3qcmnprbtft3phn3vyk06hpycm7p4sgx</a></p> <p>Release Date: 2021-07-12</p> <p>Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 9.0.46</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.3.11.RELEASE</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-30640 (Medium) detected in tomcat-embed-core-9.0.30.jar - ## CVE-2021-30640 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tomcat-embed-core-9.0.30.jar</b></p></summary> <p>Core Tomcat implementation</p> <p>Library home page: <a href="https://tomcat.apache.org/">https://tomcat.apache.org/</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.30/ad32909314fe2ba02cec036434c0addd19bcc580/tomcat-embed-core-9.0.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.2.4.RELEASE.jar (Root Library) - spring-boot-starter-tomcat-2.2.4.RELEASE.jar - :x: **tomcat-embed-core-9.0.30.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65. <p>Publish Date: 2021-07-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-30640>CVE-2021-30640</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://lists.apache.org/thread/3qcmnprbtft3phn3vyk06hpycm7p4sgx">https://lists.apache.org/thread/3qcmnprbtft3phn3vyk06hpycm7p4sgx</a></p> <p>Release Date: 2021-07-12</p> <p>Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 9.0.46</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.3.11.RELEASE</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in tomcat embed core jar cve medium severity vulnerability vulnerable library tomcat embed core jar core tomcat implementation library home page a href path to dependency file build gradle path to vulnerable library home wss scanner gradle caches modules files org apache tomcat embed tomcat embed core tomcat embed core jar dependency hierarchy spring boot starter web release jar root library spring boot starter tomcat release jar x tomcat embed core jar vulnerable library found in base branch master vulnerability details a vulnerability in the jndi realm of apache tomcat allows an attacker to authenticate using variations of a valid user name and or to bypass some of the protection provided by the lockout realm this issue affects apache tomcat to to to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache tomcat embed tomcat embed core direct dependency fix resolution org springframework boot spring boot starter web release step up your open source security game with mend
0
68,910
13,196,678,471
IssuesEvent
2020-08-13 21:09:34
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
Vector128<byte>:get_Zero() doesn't inline (or intrinsicify) at crossgen
area-CodeGen-coreclr
Nor does `Vector128<byte>.Count()` or ``Vector128:AsByte(Vector128`1):Vector128`1`` `ASCIIUtility.WidenAsciiToUtf16_Sse2` calls `Vector128<byte>.Zero` https://github.com/dotnet/runtime/blob/fd181c0210c263e40ce8b908bdd521d8f3cc284e/src/libraries/System.Private.CoreLib/src/System/Text/ASCIIUtility.cs#L1633-L1637 Which ends up reserving stack, making call and reading the stack back to zero a `xmm` register: ```asm G_M55642_IG05: lea rcx, [rsp+20H] call [Vector128`1:get_Zero():Vector128`1] movaps xmm0, xmmword ptr [rsp+20H] movaps xmm1, xmm6 punpcklbw xmm1, xmm0 movdqu xmmword ptr [rsi], xmm1 mov rax, rsi shr rax, 1 and rax, 7 mov edx, 8 sub rdx, rax mov rax, rdx sub rbx, 16 ``` Which is quite inefficient /cc @tannergooding @GrabYourPitchforks category:cq theme:intrinsics skill-level:expert cost:medium
1.0
Vector128<byte>:get_Zero() doesn't inline (or intrinsicify) at crossgen - Nor does `Vector128<byte>.Count()` or ``Vector128:AsByte(Vector128`1):Vector128`1`` `ASCIIUtility.WidenAsciiToUtf16_Sse2` calls `Vector128<byte>.Zero` https://github.com/dotnet/runtime/blob/fd181c0210c263e40ce8b908bdd521d8f3cc284e/src/libraries/System.Private.CoreLib/src/System/Text/ASCIIUtility.cs#L1633-L1637 Which ends up reserving stack, making call and reading the stack back to zero a `xmm` register: ```asm G_M55642_IG05: lea rcx, [rsp+20H] call [Vector128`1:get_Zero():Vector128`1] movaps xmm0, xmmword ptr [rsp+20H] movaps xmm1, xmm6 punpcklbw xmm1, xmm0 movdqu xmmword ptr [rsi], xmm1 mov rax, rsi shr rax, 1 and rax, 7 mov edx, 8 sub rdx, rax mov rax, rdx sub rbx, 16 ``` Which is quite inefficient /cc @tannergooding @GrabYourPitchforks category:cq theme:intrinsics skill-level:expert cost:medium
non_priority
get zero doesn t inline or intrinsicify at crossgen nor does count or asbyte asciiutility calls zero which ends up reserving stack making call and reading the stack back to zero a xmm register asm g lea rcx call movaps xmmword ptr movaps punpcklbw movdqu xmmword ptr mov rax rsi shr rax and rax mov edx sub rdx rax mov rax rdx sub rbx which is quite inefficient cc tannergooding grabyourpitchforks category cq theme intrinsics skill level expert cost medium
0
50,942
21,484,548,174
IssuesEvent
2022-04-26 21:26:04
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
Nginx ingress controller pods do not respond to health probes on "/" and we need custom path annotation to send probe on"/healthz"
container-service/svc triaged assigned-to-author doc-bug Pri1
Starting on AKS clusters running K8s version 1.22, the default health probe path went from "/healthz" to "/". This default probe path is documented here: https://kubernetes-sigs.github.io/cloud-provider-azure/topics/loadbalancer/#custom-load-balancer-health-probe The PR that changed the default probe path: https://github.com/kubernetes-sigs/cloud-provider-azure/pull/1384 The issue is that the nginx ingress deployment that is installed via the helm commands in this article will not fully work, because the nginx ingress controller pods will respond with a 404 when they receive a health probe request on "/". If an ingress object is setup to route traffic on "/", then it will work, but if not then the 404 will cause the Azure Load balancer to think that the backend targets are all unhealthy. To get this to work in that case, you need to have an additional annotation set on the k8s svc: service.beta.kubernetes.io/azure-load-balancer-health-probe-request-path: /healthz I think our documentation needs to reflect this annotation. By setting that annotation on the k8s svc for the nginx ingress, the Azure LB is setup to have the health probe path as "healthz", and the nginx ingress controller pods then respond successfully to that with a 200 response. If that annotation is not set, and there is no ingress objects to route traffic destined for "/", then a 404 is sent back to LB and all nodes will look unhealthy. This can be reproduced in lab easily. Just run the following commands and you will notice that you cannot access the public IP. Then add the annotation and the PIP will be accessible. # Use Helm to deploy an NGINX ingress controller helm install nginx-ingress ingress-nginx/ingress-nginx \ --version 4.0.13 \ --namespace ingress-basic --create-namespace \ --set controller.replicaCount=2 \ --set controller.nodeSelector."kubernetes\.io/os"=linux \ --set controller.admissionWebhooks.patch.nodeSelector."kubernetes\.io/os"=linux \ --set defaultBackend.nodeSelector."kubernetes\.io/os"=linux \ --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: fd0e7d5a-37e9-07dc-f395-9cb5bb580e45 * Version Independent ID: 7e4faf70-9724-7e7b-832b-1cd99a974920 * Content: [Create an ingress controller - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/ingress-basic?tabs=azure-cli) * Content Source: [articles/aks/ingress-basic.md](https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/aks/ingress-basic.md) * Service: **container-service** * GitHub Login: @zr-msft * Microsoft Alias: **zarhoads**
1.0
Nginx ingress controller pods do not respond to health probes on "/" and we need custom path annotation to send probe on"/healthz" - Starting on AKS clusters running K8s version 1.22, the default health probe path went from "/healthz" to "/". This default probe path is documented here: https://kubernetes-sigs.github.io/cloud-provider-azure/topics/loadbalancer/#custom-load-balancer-health-probe The PR that changed the default probe path: https://github.com/kubernetes-sigs/cloud-provider-azure/pull/1384 The issue is that the nginx ingress deployment that is installed via the helm commands in this article will not fully work, because the nginx ingress controller pods will respond with a 404 when they receive a health probe request on "/". If an ingress object is setup to route traffic on "/", then it will work, but if not then the 404 will cause the Azure Load balancer to think that the backend targets are all unhealthy. To get this to work in that case, you need to have an additional annotation set on the k8s svc: service.beta.kubernetes.io/azure-load-balancer-health-probe-request-path: /healthz I think our documentation needs to reflect this annotation. By setting that annotation on the k8s svc for the nginx ingress, the Azure LB is setup to have the health probe path as "healthz", and the nginx ingress controller pods then respond successfully to that with a 200 response. If that annotation is not set, and there is no ingress objects to route traffic destined for "/", then a 404 is sent back to LB and all nodes will look unhealthy. This can be reproduced in lab easily. Just run the following commands and you will notice that you cannot access the public IP. Then add the annotation and the PIP will be accessible. # Use Helm to deploy an NGINX ingress controller helm install nginx-ingress ingress-nginx/ingress-nginx \ --version 4.0.13 \ --namespace ingress-basic --create-namespace \ --set controller.replicaCount=2 \ --set controller.nodeSelector."kubernetes\.io/os"=linux \ --set controller.admissionWebhooks.patch.nodeSelector."kubernetes\.io/os"=linux \ --set defaultBackend.nodeSelector."kubernetes\.io/os"=linux \ --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: fd0e7d5a-37e9-07dc-f395-9cb5bb580e45 * Version Independent ID: 7e4faf70-9724-7e7b-832b-1cd99a974920 * Content: [Create an ingress controller - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/ingress-basic?tabs=azure-cli) * Content Source: [articles/aks/ingress-basic.md](https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/aks/ingress-basic.md) * Service: **container-service** * GitHub Login: @zr-msft * Microsoft Alias: **zarhoads**
non_priority
nginx ingress controller pods do not respond to health probes on and we need custom path annotation to send probe on healthz starting on aks clusters running version the default health probe path went from healthz to this default probe path is documented here the pr that changed the default probe path the issue is that the nginx ingress deployment that is installed via the helm commands in this article will not fully work because the nginx ingress controller pods will respond with a when they receive a health probe request on if an ingress object is setup to route traffic on then it will work but if not then the will cause the azure load balancer to think that the backend targets are all unhealthy to get this to work in that case you need to have an additional annotation set on the svc service beta kubernetes io azure load balancer health probe request path healthz i think our documentation needs to reflect this annotation by setting that annotation on the svc for the nginx ingress the azure lb is setup to have the health probe path as healthz and the nginx ingress controller pods then respond successfully to that with a response if that annotation is not set and there is no ingress objects to route traffic destined for then a is sent back to lb and all nodes will look unhealthy this can be reproduced in lab easily just run the following commands and you will notice that you cannot access the public ip then add the annotation and the pip will be accessible use helm to deploy an nginx ingress controller helm install nginx ingress ingress nginx ingress nginx version namespace ingress basic create namespace set controller replicacount set controller nodeselector kubernetes io os linux set controller admissionwebhooks patch nodeselector kubernetes io os linux set defaultbackend nodeselector kubernetes io os linux document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service container service github login zr msft microsoft alias zarhoads
0
124,910
12,242,883,697
IssuesEvent
2020-05-05 08:11:13
HeRAMS-WHO/herams-backend
https://api.github.com/repos/HeRAMS-WHO/herams-backend
closed
Redirect for old login link
env:prod env:staging flow:test on staging subject:documentation urgency:low
It seems that with the change in sign-up, the login url also changed. The old link https://herams.org/user/login is no longer working and seems to be replaced with /session/create. As we reference the old link in all our documents and users have it bookmarked like that, would it be possible to do a redirect to the new /session/create page? We will gradually change in all documents, but this will take a while and we have users already reporting this as an error.
1.0
Redirect for old login link - It seems that with the change in sign-up, the login url also changed. The old link https://herams.org/user/login is no longer working and seems to be replaced with /session/create. As we reference the old link in all our documents and users have it bookmarked like that, would it be possible to do a redirect to the new /session/create page? We will gradually change in all documents, but this will take a while and we have users already reporting this as an error.
non_priority
redirect for old login link it seems that with the change in sign up the login url also changed the old link is no longer working and seems to be replaced with session create as we reference the old link in all our documents and users have it bookmarked like that would it be possible to do a redirect to the new session create page we will gradually change in all documents but this will take a while and we have users already reporting this as an error
0
9,131
12,200,457,074
IssuesEvent
2020-04-30 04:47:06
nkumar115/Data-Science
https://api.github.com/repos/nkumar115/Data-Science
opened
Different Types of Joins in Python - Pandas
Data - PreProcessing
**TL;DR** Different Types of Joins in Python - Pandas **Link** https://www.analyticsvidhya.com/blog/2020/02/joins-in-pandas-master-the-different-types-of-joins-in-python/ **Author** Analytics Vidhya **Outcomes** 1. Inner Join in Pandas 2. Full Join in Pandas 3. Left Join in Pandas 4. Right Join in Pandas
1.0
Different Types of Joins in Python - Pandas - **TL;DR** Different Types of Joins in Python - Pandas **Link** https://www.analyticsvidhya.com/blog/2020/02/joins-in-pandas-master-the-different-types-of-joins-in-python/ **Author** Analytics Vidhya **Outcomes** 1. Inner Join in Pandas 2. Full Join in Pandas 3. Left Join in Pandas 4. Right Join in Pandas
non_priority
different types of joins in python pandas tl dr different types of joins in python pandas link author analytics vidhya outcomes inner join in pandas full join in pandas left join in pandas right join in pandas
0
212,904
16,503,877,384
IssuesEvent
2021-05-25 16:53:55
orekorekorek/procedure
https://api.github.com/repos/orekorekorek/procedure
closed
Задание 3-3
documentation enhancement good first issue
Протабулировать заданную функцию и сумму функционального ряда разложения этой функции на интервале [a,b] и с шагом h (шаг и интервал задается в константах). Функциональнй ряд вычисляется по соответствующей рекуррентной формуле с заданной точностью ɛ. В результате показать три столбца: значение аргумента, значение функции в данной точке и значение суммы ряда, вычисленное с заданной точностью в данной точке. Два последних столбца должны иметь близкие результаты. ⅇ^2x 𝑆=1+2𝑥/1!+⋯+(2𝑥)^𝑛/𝑛!+⋯ 0.1≤𝑥≤1 20^(-4)
1.0
Задание 3-3 - Протабулировать заданную функцию и сумму функционального ряда разложения этой функции на интервале [a,b] и с шагом h (шаг и интервал задается в константах). Функциональнй ряд вычисляется по соответствующей рекуррентной формуле с заданной точностью ɛ. В результате показать три столбца: значение аргумента, значение функции в данной точке и значение суммы ряда, вычисленное с заданной точностью в данной точке. Два последних столбца должны иметь близкие результаты. ⅇ^2x 𝑆=1+2𝑥/1!+⋯+(2𝑥)^𝑛/𝑛!+⋯ 0.1≤𝑥≤1 20^(-4)
non_priority
задание протабулировать заданную функцию и сумму функционального ряда разложения этой функции на интервале и с шагом h шаг и интервал задается в константах функциональнй ряд вычисляется по соответствующей рекуррентной формуле с заданной точностью ɛ в результате показать три столбца значение аргумента значение функции в данной точке и значение суммы ряда вычисленное с заданной точностью в данной точке два последних столбца должны иметь близкие результаты ⅇ 𝑆 ⋯ 𝑛 𝑛 ⋯ ≤𝑥≤
0
1,723
4,380,975,994
IssuesEvent
2016-08-06 00:36:27
bpython/bpython
https://api.github.com/repos/bpython/bpython
closed
bpython run greenlet bug
requires-separate-process
``` from greenlet import getcurrent getcurrent() getcurrent() getcurrent() ``` run the code above, even I call `getcurrent` for 3(or more) times, it will get the same obj in `python` shell and `ipython` shell, but it failed in `bpython`, it'll give more than one different greenlet, so it'll cause bugs like [flask context error](https://github.com/smurfix/flask-script/issues/155)
1.0
bpython run greenlet bug - ``` from greenlet import getcurrent getcurrent() getcurrent() getcurrent() ``` run the code above, even I call `getcurrent` for 3(or more) times, it will get the same obj in `python` shell and `ipython` shell, but it failed in `bpython`, it'll give more than one different greenlet, so it'll cause bugs like [flask context error](https://github.com/smurfix/flask-script/issues/155)
non_priority
bpython run greenlet bug from greenlet import getcurrent getcurrent getcurrent getcurrent run the code above even i call getcurrent for or more times it will get the same obj in python shell and ipython shell but it failed in bpython it ll give more than one different greenlet so it ll cause bugs like
0
61,791
25,730,163,042
IssuesEvent
2022-12-07 19:38:36
microsoft/vscode-cpptools
https://api.github.com/repos/microsoft/vscode-cpptools
closed
Switch Windows/Linux builds from Azure "classic" pipelines to YAML pipelines
Language Service fixed (release pending) internal
Seems low priority for now. The YAML pipeline seems to have get around some PAT issue with the classic pipelines.
1.0
Switch Windows/Linux builds from Azure "classic" pipelines to YAML pipelines - Seems low priority for now. The YAML pipeline seems to have get around some PAT issue with the classic pipelines.
non_priority
switch windows linux builds from azure classic pipelines to yaml pipelines seems low priority for now the yaml pipeline seems to have get around some pat issue with the classic pipelines
0
187,761
22,045,893,261
IssuesEvent
2022-05-30 01:37:34
Nivaskumark/kernel_v4.1.15
https://api.github.com/repos/Nivaskumark/kernel_v4.1.15
closed
CVE-2020-24394 (High) detected in linuxlinux-4.6 - autoclosed
security vulnerability
## CVE-2020-24394 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.6</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/kernel_v4.1.15/commit/00db4e8795bcbec692fb60b19160bdd763ad42e3">00db4e8795bcbec692fb60b19160bdd763ad42e3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/vfs.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/vfs.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered. <p>Publish Date: 2020-08-19 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24394>CVE-2020-24394</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2020-24394">https://www.linuxkernelcves.com/cves/CVE-2020-24394</a></p> <p>Release Date: 2020-08-19</p> <p>Fix Resolution: v5.8-rc4,v4.14.188,v4.19.132,v5.4.51,v5.7.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-24394 (High) detected in linuxlinux-4.6 - autoclosed - ## CVE-2020-24394 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.6</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/kernel_v4.1.15/commit/00db4e8795bcbec692fb60b19160bdd763ad42e3">00db4e8795bcbec692fb60b19160bdd763ad42e3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/vfs.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/vfs.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered. <p>Publish Date: 2020-08-19 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24394>CVE-2020-24394</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2020-24394">https://www.linuxkernelcves.com/cves/CVE-2020-24394</a></p> <p>Release Date: 2020-08-19</p> <p>Fix Resolution: v5.8-rc4,v4.14.188,v4.19.132,v5.4.51,v5.7.8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linuxlinux autoclosed cve high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in head commit a href found in base branch master vulnerable source files fs nfsd vfs c fs nfsd vfs c vulnerability details in the linux kernel before fs nfsd vfs c in the nfs server can set incorrect permissions on new filesystem objects when the filesystem lacks acl support aka cid this occurs because the current umask is not considered publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
1,144
3,390,788,482
IssuesEvent
2015-11-30 12:36:50
SockDrawer/SockRPG
https://api.github.com/repos/SockDrawer/SockRPG
closed
How do we handle deletion?
question Requirements clarification
Do we want soft-deletes? Hard deletes? Sometimes one and sometimes the other? Is the answer the same for all entities? What about self-deletes vs admin deletes? Things I can think of that might be able to be deleted: - Threads/scenes - Games/boards - Users
1.0
How do we handle deletion? - Do we want soft-deletes? Hard deletes? Sometimes one and sometimes the other? Is the answer the same for all entities? What about self-deletes vs admin deletes? Things I can think of that might be able to be deleted: - Threads/scenes - Games/boards - Users
non_priority
how do we handle deletion do we want soft deletes hard deletes sometimes one and sometimes the other is the answer the same for all entities what about self deletes vs admin deletes things i can think of that might be able to be deleted threads scenes games boards users
0
112,222
9,558,023,692
IssuesEvent
2019-05-03 13:16:49
ValveSoftware/steam-for-linux
https://api.github.com/repos/ValveSoftware/steam-for-linux
closed
64bit games won't start on Debian unstable
Need Retest reviewed
When I start a 64 bit game in on Debian unstable I get invalid pointer errors since the last update. However, some games seem to run, when started from the terminal (eg Shovel Knight and Transistor). **For example:** Cities Skylines: `*** Error in `/home/ichi/.steam/SteamApps/common/Cities_Skylines/Cities.x64': free(): invalid pointer: 0x00000000028e6d78 ***` Shovel Knight: `*** Error in `/home/ichi/.steam/SteamApps/common/Shovel Knight/64/ShovelKnight': free(): invalid pointer: 0x0000000001ed57a0 ***` Transistor: `*** Error in `./Transistor.bin.x86_64': free(): invalid pointer: 0x00007f7234000078 ***` **My System:** ``` System: Host: localhorst Kernel: 4.3.0-1-amd64 x86_64 (64 bit) Desktop: i3 4.11 Distro: Debian GNU/Linux stretch/sid Machine: System: ASUS product: All Series Mobo: ASUSTeK model: Z87-K v: Rev X.0x Bios: American Megatrends v: 1402 date: 11/05/2014 CPU: Quad core Intel Core i5-4570 (-MCP-) cache: 6144 KB clock speeds: max: 3600 MHz 1: 3206 MHz 2: 3283 MHz 3: 3243 MHz 4: 3230 MHz Graphics: Card: NVIDIA GM204 [GeForce GTX 980] Display Server: X.Org 1.18.0 driver: nvidia Resolution: [email protected] GLX Renderer: GeForce GTX 980/PCIe/SSE2 GLX Version: 4.5.0 NVIDIA 358.16 Audio: Card-1 Intel 8 Series/C220 Series High Definition Audio Controller driver: snd_hda_intel Card-2 NVIDIA GM204 High Definition Audio Controller driver: snd_hda_intel Sound: Advanced Linux Sound Architecture v: k4.3.0-1-amd64 Network: Card: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller driver: r8169 IF: eth0 state: up speed: 1000 Mbps duplex: full mac: ac:22:0b:82:2e:67 Drives: HDD Total Size: 13292.2GB (56.3% used) ID-1: /dev/sda model: M4 size: 512.1GB ID-2: /dev/sdd model: WDC_WD40EFRX size: 4000.8GB ID-3: /dev/sdc model: WDC_WD40EFRX size: 4000.8GB ID-4: /dev/sdb model: Samsung_SSD_840 size: 250.1GB ID-5: /dev/sdf model: WDC_WD40EFRX size: 4000.8GB ID-6: /dev/sde model: M4 size: 512.1GB ID-7: USB /dev/sdg model: Rainbow_Line size: 15.5GB Partition: ID-1: / size: 460G used: 283G (65%) fs: ext4 dev: /dev/sda1 ID-2: swap-1 size: 10.74GB used: 0.00GB (0%) fs: swap dev: /dev/sda2 RAID: Device-1: /dev/md0 - active raid: 5 components: online: 3/3 - sdc1 sdd1 sdf1 Sensors: System Temperatures: cpu: 29.8C mobo: 27.8C gpu: 30C Fan Speeds (in rpm): cpu: 0 Info: Processes: 242 Uptime: 6:27 Memory: 2536.4/15991.3MB Client: Shell (zsh) inxi: 2.2.28 ``` **Packages that where in the upgrade that broke 64 bit games:** ``` Start-Date: 2016-02-15 11:17:46 Commandline: apt upgrade Requested-By: ichi (1000) Install: liblept5:amd64 (1.73-1+b1 automatic), libsnappy1v5:i386 (1.1.3-2 automatic), libsuitesparseconfig4.4.6:amd64 (4.4.6-1 automatic), php-phpseclib:amd64 (2.0.1-1 automatic), dbconfig-mysql:amd64 (2.0.2 automatic), libx265-79:i386 (1.9-dmo1 automatic), libilmbase12:amd64 (2.2.0-8 automatic), libopenexr22:amd64 (2.2.0-9 automatic) Upgrade: libkvazaar3:amd64 (0.8.3-dmo1, 0.8.3-dmo2), libkvazaar3:i386 (0.8.3-dmo1, 0.8.3-dmo2), lib32ubsan0:amd64 (5.3.1-7, 5.3.1-8), manpages:amd64 (4.04-0.1, 4.04-1), perl-base:amd64 (5.22.1-4, 5.22.1-7), libquadmath0-dbg:amd64 (5.3.1-7, 5.3.1-8), libmpx0:amd64 (5.3.1-7, 5.3.1-8), libgcj16:amd64 (5.3.1-7, 5.3.1-8), libdc1394-22:amd64 (2.2.3-1, 2.2.4-1), libdevmapper1.02.1:amd64 (1.02.115-1, 1.02.115-2), libltdl-dev:amd64 (2.4.2-1.11, 2.4.6-0.1), iso-codes:amd64 (3.64-1, 3.65-1), acpid:amd64 (2.0.25-1, 2.0.26-1), dmsetup:amd64 (1.02.115-1, 1.02.115-2), libnl-route-3-200:amd64 (3.2.26-1, 3.2.27-1), libavformat56:amd64 (2.8.5-dmo2, 2.8.6-dmo2), lib32mpx0:amd64 (5.3.1-7, 5.3.1-8), libgcc-5-dev:amd64 (5.3.1-7, 5.3.1-8), libisofs6:amd64 (1.4.2-1, 1.4.2-2), python-psutil:amd64 (3.4.1-1, 3.4.2-1), libaspectj-java:amd64 (1.8.5-1, 1.8.8-1), libavfilter5:amd64 (2.8.5-dmo2, 2.8.6-dmo2), libpackagekit-glib2-18:amd64 (1.0.11-1, 1.0.11-2), python-xapian:amd64 (1.2.22-1, 1.2.22-2), libvte-2.91-0:amd64 (0.42.1-2+b1, 0.42.3-1), handbrake:amd64 (0.10.3-dmo2, 0.10.3-dmo3), libchromaprint0:amd64 (1.2-dmo3, 1.3-dmo1), libgroupsock8:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1), publicsuffix:amd64 (20160115-1, 20160130-1), netpbm:amd64 (10.0-15.2, 10.0-15.3), gir1.2-gtk-3.0:amd64 (3.18.6-1, 3.18.7-1), libx32itm1:amd64 (5.3.1-7, 5.3.1-8), ffmpeg:amd64 (2.8.5-dmo2, 2.8.6-dmo2), os-prober:amd64 (1.70, 1.71), linux-libc-dev:amd64 (4.3.3-7, 4.3.5-1), linux-libc-dev:i386 (4.3.3-7, 4.3.5-1), libatomic1-dbg:amd64 (5.3.1-7, 5.3.1-8), libapt-inst2.0:amd64 (1.2.1, 1.2.3), appstream:amd64 (0.9.0-3, 0.9.1-1), lib32stdc++-5-dev:amd64 (5.3.1-7, 5.3.1-8), libtool-bin:amd64 (2.4.2-1.11, 2.4.6-0.1), libgegl-0.3-0:amd64 (0.3.4-dmo1, 0.3.4-dmo2), imagemagick:amd64 (6.8.9.9-7, 6.8.9.9-7+b1), libgnutls-openssl27:amd64 (3.4.8-2, 3.4.9-2), lib32stdc++6:amd64 (5.3.1-7, 5.3.1-8), libswresample1:amd64 (2.8.5-dmo2, 2.8.6-dmo2), libswresample1:i386 (2.8.5-dmo2, 2.8.6-dmo2), g++-5-multilib:amd64 (5.3.1-7, 5.3.1-8), libopencv-imgproc2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), libnl-genl-3-200:amd64 (3.2.26-1, 3.2.27-1), libopencv-objdetect2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), p7zip:amd64 (9.20.1~dfsg.1-4.2, 9.20.1~dfsg.1-5), libsystemd0:amd64 (228-4+b1, 228-6), libsystemd0:i386 (228-4+b1, 228-6), libgtk-3-common:amd64 (3.18.6-1, 3.18.7-1), acl:amd64 (2.2.52-2, 2.2.52-3), libx32quadmath0:amd64 (5.3.1-7, 5.3.1-8), grub-common:amd64 (2.02~beta2-35, 2.02~beta2-36), transfig:amd64 (3.2.5.e-4, 3.2.5.e-5), aspectj:amd64 (1.8.5-1, 1.8.8-1), apt:amd64 (1.2.1, 1.2.3), libgtk-3-0:amd64 (3.18.6-1, 3.18.7-1), libacl1:amd64 (2.2.52-2, 2.2.52-3), python-cssutils:amd64 (1.0-4, 1.0-4.1), libjcommander-java:amd64 (1.35-1, 1.48-1), libobjc4:amd64 (5.3.1-7, 5.3.1-8), cpp-5:amd64 (5.3.1-7, 5.3.1-8), libcglib-java:amd64 (2.2.2+dfsg2-2, 3.2.0-2), libasound2-data:amd64 (1.0.29-1, 1.1.0-1), libgcc1-dbg:amd64 (5.3.1-7, 5.3.1-8), libtsan0-dbg:amd64 (5.3.1-7, 5.3.1-8), binutils:amd64 (2.26-2, 2.26-3), libmagickwand-6.q16-2:amd64 (6.8.9.9-7, 6.8.9.9-7+b1), libopencv-video2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), libumfpack5.7.1:amd64 (4.4.5-2, 4.4.6-1), handbrake-cli:amd64 (0.10.3-dmo2, 0.10.3-dmo3), libitm1:amd64 (5.3.1-7, 5.3.1-8), libcamd2.4.1:amd64 (4.4.5-2, 4.4.6-1), libccolamd2.9.1:amd64 (4.4.5-2, 4.4.6-1), vlc-nox:amd64 (2.2.1-dmo14, 2.2.2-dmo1), perl-modules-5.22:amd64 (5.22.1-4, 5.22.1-7), lib32itm1:amd64 (5.3.1-7, 5.3.1-8), lib32asan2:amd64 (5.3.1-7, 5.3.1-8), nodejs:amd64 (4.2.6~dfsg-1, 4.3.0~dfsg-2), console-setup-linux:amd64 (1.134, 1.136), fop:amd64 (2.0+dfsg-5, 2.1-1), libx32gcc1:amd64 (5.3.1-7, 5.3.1-8), insserv:amd64 (1.14.0-5.1, 1.14.0-5.2), lib32gcc1-dbg:amd64 (5.3.1-7, 5.3.1-8), libthai-data:amd64 (0.1.24-1, 0.1.24-2), vlc-plugin-notify:amd64 (2.2.1-dmo14, 2.2.2-dmo1), libvlc5:amd64 (2.2.1-dmo14, 2.2.2-dmo1), grub2-common:amd64 (2.02~beta2-35, 2.02~beta2-36), gnutls-bin:amd64 (3.4.8-2, 3.4.9-2), udev:amd64 (228-4+b1, 228-6), libcilkrts5:amd64 (5.3.1-7, 5.3.1-8), console-setup:amd64 (1.134, 1.136), handbrake-gtk:amd64 (0.10.3-dmo2, 0.10.3-dmo3), rhythmbox-plugins:amd64 (3.2.1-1+b1, 3.3-1), alsa-utils:amd64 (1.0.29-1+b1, 1.1.0-2), libasan2:amd64 (5.3.1-7, 5.3.1-8), lib32gcc-5-dev:amd64 (5.3.1-7, 5.3.1-8), libquadmath0:amd64 (5.3.1-7, 5.3.1-8), libxmlgraphics-commons-java:amd64 (2.0.1-2, 2.1-1), libapt-pkg5.0:amd64 (1.2.1, 1.2.3), packagekit-tools:amd64 (1.0.11-1, 1.0.11-2), libpq5:amd64 (9.5.0-2, 9.5.0-3), libpq5:i386 (9.5.0-2, 9.5.0-3), ruby-unf-ext:amd64 (0.0.7.1-1+b3, 0.0.7.2-1), libx32gcc1-dbg:amd64 (5.3.1-7, 5.3.1-8), grub-pc:amd64 (2.02~beta2-35, 2.02~beta2-36), libcilkrts5-dbg:amd64 (5.3.1-7, 5.3.1-8), linux-headers-4.3.0-1-amd64:amd64 (4.3.3-7, 4.3.5-1), libpostproc53:amd64 (2.8.5-dmo2, 2.8.6-dmo2), libvlccore8:amd64 (2.2.1-dmo14, 2.2.2-dmo1), libudev1:amd64 (228-4+b1, 228-6), libudev1:i386 (228-4+b1, 228-6), libgomp1-dbg:amd64 (5.3.1-7, 5.3.1-8), libopencv-flann2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), python-distutils-extra:amd64 (2.38-1, 2.39-1), libopencv-contrib2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), phpmyadmin:amd64 (4.5.3.1-1, 4.5.4.1-2), lib32cilkrts5:amd64 (5.3.1-7, 5.3.1-8), libio-socket-ssl-perl:amd64 (2.022-1, 2.024-1), libltdl7:amd64 (2.4.2-1.11, 2.4.6-0.1), libltdl7:i386 (2.4.2-1.11, 2.4.6-0.1), installation-report:amd64 (2.61, 2.62), gcc-5-multilib:amd64 (5.3.1-7, 5.3.1-8), libopencv-highgui2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), libcolamd2.9.1:amd64 (4.4.5-2, 4.4.6-1), libgcc1:amd64 (5.3.1-7, 5.3.1-8), libgcc1:i386 (5.3.1-7, 5.3.1-8), kodi:amd64 (15.2-dmo7, 15.2-dmo8), gir1.2-rb-3.0:amd64 (3.2.1-1+b1, 3.3-1), libperl5.22:amd64 (5.22.1-4, 5.22.1-7), python-cryptography:amd64 (1.2.1-1, 1.2.2-2), grub-pc-bin:amd64 (2.02~beta2-35, 2.02~beta2-36), gcc-5-base:amd64 (5.3.1-7, 5.3.1-8), gcc-5-base:i386 (5.3.1-7, 5.3.1-8), rhythmbox-data:amd64 (3.2.1-1, 3.3-1), lib32gcc1:amd64 (5.3.1-7, 5.3.1-8), gcj-5-jre-lib:amd64 (5.3.1-7, 5.3.1-8), libappstream-glib8:amd64 (0.5.5-1, 0.5.8-1), gnome-calculator:amd64 (3.18.2-1, 3.18.3-1), imagemagick-6.q16:amd64 (6.8.9.9-7, 6.8.9.9-7+b1), libnfs8:amd64 (1.9.8-dmo1, 1.10.0-dmo1), libstdc++-5-dev:amd64 (5.3.1-7, 5.3.1-8), libx32cilkrts5:amd64 (5.3.1-7, 5.3.1-8), nautilus:amd64 (3.18.4-1, 3.18.5-1), libnautilus-extension1a:amd64 (3.18.4-1, 3.18.5-1), libtsan0:amd64 (5.3.1-7, 5.3.1-8), libmagickcore-6.q16-2-extra:amd64 (6.8.9.9-7, 6.8.9.9-7+b1), gir1.2-wnck-3.0:amd64 (3.14.0-2, 3.14.1-1), kodi-skin-confluence:amd64 (15.2-dmo7, 15.2-dmo8), libgtk-3-bin:amd64 (3.18.6-1, 3.18.7-1), libnss-mdns:amd64 (0.10-6, 0.10-7), p7zip-full:amd64 (9.20.1~dfsg.1-4.2, 9.20.1~dfsg.1-5), libubsan0:amd64 (5.3.1-7, 5.3.1-8), libdatetime-timezone-perl:amd64 (1.94-1+2015g, 1.95-1+2016a), iceweasel:amd64 (43.0.4-1, 44.0-1), g++-5:amd64 (5.3.1-7, 5.3.1-8), gir1.2-vte-2.91:amd64 (0.42.1-2+b1, 0.42.3-1), steam:i386 (1.0.0.50-6, 1.0.0.51-1), libx32asan2:amd64 (5.3.1-7, 5.3.1-8), libnss-myhostname:amd64 (228-4+b1, 228-6), libgfortran3:amd64 (5.3.1-7, 5.3.1-8), libneon27-gnutls:amd64 (0.30.1-2+b2, 0.30.1-3), pinentry-gtk2:amd64 (0.9.7-1, 0.9.7-3), systemd-sysv:amd64 (228-4+b1, 228-6), lib32gomp1:amd64 (5.3.1-7, 5.3.1-8), libamd2.4.1:amd64 (4.4.5-2, 4.4.6-1), libnl-3-200:amd64 (3.2.26-1, 3.2.27-1), gcc-5:amd64 (5.3.1-7, 5.3.1-8), libbasicusageenvironment1:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1), libavcodec56:amd64 (2.8.5-dmo2, 2.8.6-dmo2), libavcodec56:i386 (2.8.5-dmo2, 2.8.6-dmo2), tesseract-ocr:amd64 (3.04.00-5+b1, 3.04.00-5+b2), libprotobuf-c1:amd64 (1.1.1-1, 1.2.1-1), libburn4:amd64 (1.4.2-1, 1.4.2.pl01-1), libsdl2-image-2.0-0:amd64 (2.0.0+dfsg-3+b4, 2.0.1+dfsg-2), libsdl2-image-2.0-0:i386 (2.0.0+dfsg-3+b4, 2.0.1+dfsg-2), python-nose:amd64 (1.3.6-1, 1.3.7-1), vlc:amd64 (2.2.1-dmo14, 2.2.2-dmo1), libpam-systemd:amd64 (228-4+b1, 228-6), libgail-3-0:amd64 (3.18.6-1, 3.18.7-1), libavutil54:amd64 (2.8.5-dmo2, 2.8.6-dmo2), libavutil54:i386 (2.8.5-dmo2, 2.8.6-dmo2), vlc-data:amd64 (2.2.1-dmo14, 2.2.2-dmo1), libtheora0:amd64 (1.1.1+dfsg.1-7.1, 1.1.1+dfsg.1-8), libtheora0:i386 (1.1.1+dfsg.1-7.1, 1.1.1+dfsg.1-8), libopencv-calib3d2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), packagekit:amd64 (1.0.11-1, 1.0.11-2), liblsan0:amd64 (5.3.1-7, 5.3.1-8), systemd:amd64 (228-4+b1, 228-6), libgomp1:amd64 (5.3.1-7, 5.3.1-8), libgomp1:i386 (5.3.1-7, 5.3.1-8), libavdevice56:amd64 (2.8.5-dmo2, 2.8.6-dmo2), xca:amd64 (1.0.0-2.1, 1.3.2-1), libopencv-legacy2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), lib32quadmath0:amd64 (5.3.1-7, 5.3.1-8), gimp-gmic:amd64 (1.6.8-3, 1.6.8-3+b1), wine32:i386 (1.8-6, 1.8.1-1), libthai0:amd64 (0.1.24-1, 0.1.24-2), libthai0:i386 (0.1.24-1, 0.1.24-2), wine64:amd64 (1.8-6, 1.8.1-1), libhogweed4:amd64 (3.1.1-4, 3.2-1), libhogweed4:i386 (3.1.1-4, 3.2-1), libwnck-3-0:amd64 (3.14.0-2, 3.14.1-1), libubsan0-dbg:amd64 (5.3.1-7, 5.3.1-8), apt-utils:amd64 (1.2.1, 1.2.3), libswscale3:amd64 (2.8.5-dmo2, 2.8.6-dmo2), smartmontools:amd64 (6.4+svn4109-1, 6.4+svn4214-1), libmagickcore-6.q16-2:amd64 (6.8.9.9-7, 6.8.9.9-7+b1), manpages-dev:amd64 (4.04-0.1, 4.04-1), libx32ubsan0:amd64 (5.3.1-7, 5.3.1-8), keyboard-configuration:amd64 (1.134, 1.136), gnome-shell-extensions:amd64 (3.18.3-1, 3.18.3-2), libasound2:amd64 (1.0.29-1, 1.1.0-1), libasound2:i386 (1.0.29-1, 1.1.0-1), libasound2-dev:i386 (1.0.29-1, 1.1.0-1), libasound2-plugins:amd64 (1.0.29-dmo1, 1.1.0-dmo1), libasound2-plugins:i386 (1.0.29-dmo1, 1.1.0-dmo1), libx32stdc++-5-dev:amd64 (5.3.1-7, 5.3.1-8), fonts-wine:amd64 (1.8-6, 1.8.1-1), nodejs-dev:amd64 (4.2.6~dfsg-1, 4.3.0~dfsg-2), libnettle6:amd64 (3.1.1-4, 3.2-1), libnettle6:i386 (3.1.1-4, 3.2-1), libopencv-core2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), busybox:amd64 (1.22.0-17, 1.22.0-18), findutils:amd64 (4.6.0-2, 4.6.0+git+20160126-2), libvte-2.91-common:amd64 (0.42.1-2, 0.42.3-1), gir1.2-packagekitglib-1.0:amd64 (1.0.11-1, 1.0.11-2), liblsan0-dbg:amd64 (5.3.1-7, 5.3.1-8), libgnutls30:amd64 (3.4.8-2, 3.4.9-2), libgnutls30:i386 (3.4.8-2, 3.4.9-2), libsoftware-license-perl:amd64 (0.103011-1, 0.103011-2), libwnck-3-common:amd64 (3.14.0-2, 3.14.1-1), debtags:amd64 (2.0.1, 2.0.2), perl:amd64 (5.22.1-4, 5.22.1-7), liblivemedia50:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1), libmagick++-6.q16-5v5:amd64 (6.8.9.9-7, 6.8.9.9-7+b1), libbs2b0:amd64 (3.1.0+dfsg-2.1, 3.1.0+dfsg-2.2), nautilus-data:amd64 (3.18.4-1, 3.18.5-1), libopencv-ml2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), apt-transport-https:amd64 (1.2.1, 1.2.3), libappstream3:amd64 (0.9.0-3, 0.9.1-1), libitm1-dbg:amd64 (5.3.1-7, 5.3.1-8), gparted:amd64 (0.19.0-3+b2, 0.25.0-1), libnetpbm10:amd64 (10.0-15.2, 10.0-15.3), libatomic1:amd64 (5.3.1-7, 5.3.1-8), linux-image-4.3.0-1-amd64:amd64 (4.3.3-7, 4.3.5-1), libcc1-0:amd64 (5.3.1-7, 5.3.1-8), libx32gcc-5-dev:amd64 (5.3.1-7, 5.3.1-8), wine:amd64 (1.8-6, 1.8.1-1), libx32gomp1:amd64 (5.3.1-7, 5.3.1-8), kodi-bin:amd64 (15.2-dmo7, 15.2-dmo8), linux-headers-4.3.0-1-common:amd64 (4.3.3-7, 4.3.5-1), libopencv-features2d2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), kodi-data:amd64 (15.2-dmo7, 15.2-dmo8), linux-compiler-gcc-5-x86:amd64 (4.3.3-7, 4.3.5-1), pinentry-gnome3:amd64 (0.9.7-1, 0.9.7-3), libtesseract3:amd64 (3.04.00-5+b1, 3.04.00-5+b2), libstdc++6:amd64 (5.3.1-7, 5.3.1-8), libstdc++6:i386 (5.3.1-7, 5.3.1-8), lib32atomic1:amd64 (5.3.1-7, 5.3.1-8), libsdl2-ttf-2.0-0:amd64 (2.0.12+dfsg1-2, 2.0.14+dfsg1-1), libjpeg62-turbo:amd64 (1.4.1-2, 1.4.2-2), libjpeg62-turbo:i386 (1.4.1-2, 1.4.2-2), libx32atomic1:amd64 (5.3.1-7, 5.3.1-8), libfop-java:amd64 (2.0+dfsg-5, 2.1-1), libavresample2:amd64 (2.8.5-dmo2, 2.8.6-dmo2), libavresample2:i386 (2.8.5-dmo2, 2.8.6-dmo2), libusageenvironment3:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1), libdebconfclient0:amd64 (0.201, 0.204), libjcommander-java-doc:amd64 (1.35-1, 1.48-1), libtool:amd64 (2.4.2-1.11, 2.4.6-0.1), libtokyocabinet9:amd64 (1.4.48-3, 1.4.48-7), rhythmbox:amd64 (3.2.1-1+b1, 3.3-1), diffstat:amd64 (1.60-1, 1.61-1), libwine:amd64 (1.8-6, 1.8.1-1), libwine:i386 (1.8-6, 1.8.1-1), libmodule-build-perl:amd64 (0.421400-3, 0.421600-1), rhythmbox-plugin-cdrecorder:amd64 (3.2.1-1+b1, 3.3-1), libdatrie1:amd64 (0.2.10-1, 0.2.10-2), libdatrie1:i386 (0.2.10-1, 0.2.10-2), libneon27:amd64 (0.30.1-2+b2, 0.30.1-3), librhythmbox-core9:amd64 (3.2.1-1+b1, 3.3-1), libx32stdc++6:amd64 (5.3.1-7, 5.3.1-8), libcholmod3.0.6:amd64 (4.4.5-2, 4.4.6-1) End-Date: 2016-02-15 11:24:41 ```
1.0
64bit games won't start on Debian unstable - When I start a 64 bit game in on Debian unstable I get invalid pointer errors since the last update. However, some games seem to run, when started from the terminal (eg Shovel Knight and Transistor). **For example:** Cities Skylines: `*** Error in `/home/ichi/.steam/SteamApps/common/Cities_Skylines/Cities.x64': free(): invalid pointer: 0x00000000028e6d78 ***` Shovel Knight: `*** Error in `/home/ichi/.steam/SteamApps/common/Shovel Knight/64/ShovelKnight': free(): invalid pointer: 0x0000000001ed57a0 ***` Transistor: `*** Error in `./Transistor.bin.x86_64': free(): invalid pointer: 0x00007f7234000078 ***` **My System:** ``` System: Host: localhorst Kernel: 4.3.0-1-amd64 x86_64 (64 bit) Desktop: i3 4.11 Distro: Debian GNU/Linux stretch/sid Machine: System: ASUS product: All Series Mobo: ASUSTeK model: Z87-K v: Rev X.0x Bios: American Megatrends v: 1402 date: 11/05/2014 CPU: Quad core Intel Core i5-4570 (-MCP-) cache: 6144 KB clock speeds: max: 3600 MHz 1: 3206 MHz 2: 3283 MHz 3: 3243 MHz 4: 3230 MHz Graphics: Card: NVIDIA GM204 [GeForce GTX 980] Display Server: X.Org 1.18.0 driver: nvidia Resolution: [email protected] GLX Renderer: GeForce GTX 980/PCIe/SSE2 GLX Version: 4.5.0 NVIDIA 358.16 Audio: Card-1 Intel 8 Series/C220 Series High Definition Audio Controller driver: snd_hda_intel Card-2 NVIDIA GM204 High Definition Audio Controller driver: snd_hda_intel Sound: Advanced Linux Sound Architecture v: k4.3.0-1-amd64 Network: Card: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller driver: r8169 IF: eth0 state: up speed: 1000 Mbps duplex: full mac: ac:22:0b:82:2e:67 Drives: HDD Total Size: 13292.2GB (56.3% used) ID-1: /dev/sda model: M4 size: 512.1GB ID-2: /dev/sdd model: WDC_WD40EFRX size: 4000.8GB ID-3: /dev/sdc model: WDC_WD40EFRX size: 4000.8GB ID-4: /dev/sdb model: Samsung_SSD_840 size: 250.1GB ID-5: /dev/sdf model: WDC_WD40EFRX size: 4000.8GB ID-6: /dev/sde model: M4 size: 512.1GB ID-7: USB /dev/sdg model: Rainbow_Line size: 15.5GB Partition: ID-1: / size: 460G used: 283G (65%) fs: ext4 dev: /dev/sda1 ID-2: swap-1 size: 10.74GB used: 0.00GB (0%) fs: swap dev: /dev/sda2 RAID: Device-1: /dev/md0 - active raid: 5 components: online: 3/3 - sdc1 sdd1 sdf1 Sensors: System Temperatures: cpu: 29.8C mobo: 27.8C gpu: 30C Fan Speeds (in rpm): cpu: 0 Info: Processes: 242 Uptime: 6:27 Memory: 2536.4/15991.3MB Client: Shell (zsh) inxi: 2.2.28 ``` **Packages that where in the upgrade that broke 64 bit games:** ``` Start-Date: 2016-02-15 11:17:46 Commandline: apt upgrade Requested-By: ichi (1000) Install: liblept5:amd64 (1.73-1+b1 automatic), libsnappy1v5:i386 (1.1.3-2 automatic), libsuitesparseconfig4.4.6:amd64 (4.4.6-1 automatic), php-phpseclib:amd64 (2.0.1-1 automatic), dbconfig-mysql:amd64 (2.0.2 automatic), libx265-79:i386 (1.9-dmo1 automatic), libilmbase12:amd64 (2.2.0-8 automatic), libopenexr22:amd64 (2.2.0-9 automatic) Upgrade: libkvazaar3:amd64 (0.8.3-dmo1, 0.8.3-dmo2), libkvazaar3:i386 (0.8.3-dmo1, 0.8.3-dmo2), lib32ubsan0:amd64 (5.3.1-7, 5.3.1-8), manpages:amd64 (4.04-0.1, 4.04-1), perl-base:amd64 (5.22.1-4, 5.22.1-7), libquadmath0-dbg:amd64 (5.3.1-7, 5.3.1-8), libmpx0:amd64 (5.3.1-7, 5.3.1-8), libgcj16:amd64 (5.3.1-7, 5.3.1-8), libdc1394-22:amd64 (2.2.3-1, 2.2.4-1), libdevmapper1.02.1:amd64 (1.02.115-1, 1.02.115-2), libltdl-dev:amd64 (2.4.2-1.11, 2.4.6-0.1), iso-codes:amd64 (3.64-1, 3.65-1), acpid:amd64 (2.0.25-1, 2.0.26-1), dmsetup:amd64 (1.02.115-1, 1.02.115-2), libnl-route-3-200:amd64 (3.2.26-1, 3.2.27-1), libavformat56:amd64 (2.8.5-dmo2, 2.8.6-dmo2), lib32mpx0:amd64 (5.3.1-7, 5.3.1-8), libgcc-5-dev:amd64 (5.3.1-7, 5.3.1-8), libisofs6:amd64 (1.4.2-1, 1.4.2-2), python-psutil:amd64 (3.4.1-1, 3.4.2-1), libaspectj-java:amd64 (1.8.5-1, 1.8.8-1), libavfilter5:amd64 (2.8.5-dmo2, 2.8.6-dmo2), libpackagekit-glib2-18:amd64 (1.0.11-1, 1.0.11-2), python-xapian:amd64 (1.2.22-1, 1.2.22-2), libvte-2.91-0:amd64 (0.42.1-2+b1, 0.42.3-1), handbrake:amd64 (0.10.3-dmo2, 0.10.3-dmo3), libchromaprint0:amd64 (1.2-dmo3, 1.3-dmo1), libgroupsock8:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1), publicsuffix:amd64 (20160115-1, 20160130-1), netpbm:amd64 (10.0-15.2, 10.0-15.3), gir1.2-gtk-3.0:amd64 (3.18.6-1, 3.18.7-1), libx32itm1:amd64 (5.3.1-7, 5.3.1-8), ffmpeg:amd64 (2.8.5-dmo2, 2.8.6-dmo2), os-prober:amd64 (1.70, 1.71), linux-libc-dev:amd64 (4.3.3-7, 4.3.5-1), linux-libc-dev:i386 (4.3.3-7, 4.3.5-1), libatomic1-dbg:amd64 (5.3.1-7, 5.3.1-8), libapt-inst2.0:amd64 (1.2.1, 1.2.3), appstream:amd64 (0.9.0-3, 0.9.1-1), lib32stdc++-5-dev:amd64 (5.3.1-7, 5.3.1-8), libtool-bin:amd64 (2.4.2-1.11, 2.4.6-0.1), libgegl-0.3-0:amd64 (0.3.4-dmo1, 0.3.4-dmo2), imagemagick:amd64 (6.8.9.9-7, 6.8.9.9-7+b1), libgnutls-openssl27:amd64 (3.4.8-2, 3.4.9-2), lib32stdc++6:amd64 (5.3.1-7, 5.3.1-8), libswresample1:amd64 (2.8.5-dmo2, 2.8.6-dmo2), libswresample1:i386 (2.8.5-dmo2, 2.8.6-dmo2), g++-5-multilib:amd64 (5.3.1-7, 5.3.1-8), libopencv-imgproc2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), libnl-genl-3-200:amd64 (3.2.26-1, 3.2.27-1), libopencv-objdetect2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), p7zip:amd64 (9.20.1~dfsg.1-4.2, 9.20.1~dfsg.1-5), libsystemd0:amd64 (228-4+b1, 228-6), libsystemd0:i386 (228-4+b1, 228-6), libgtk-3-common:amd64 (3.18.6-1, 3.18.7-1), acl:amd64 (2.2.52-2, 2.2.52-3), libx32quadmath0:amd64 (5.3.1-7, 5.3.1-8), grub-common:amd64 (2.02~beta2-35, 2.02~beta2-36), transfig:amd64 (3.2.5.e-4, 3.2.5.e-5), aspectj:amd64 (1.8.5-1, 1.8.8-1), apt:amd64 (1.2.1, 1.2.3), libgtk-3-0:amd64 (3.18.6-1, 3.18.7-1), libacl1:amd64 (2.2.52-2, 2.2.52-3), python-cssutils:amd64 (1.0-4, 1.0-4.1), libjcommander-java:amd64 (1.35-1, 1.48-1), libobjc4:amd64 (5.3.1-7, 5.3.1-8), cpp-5:amd64 (5.3.1-7, 5.3.1-8), libcglib-java:amd64 (2.2.2+dfsg2-2, 3.2.0-2), libasound2-data:amd64 (1.0.29-1, 1.1.0-1), libgcc1-dbg:amd64 (5.3.1-7, 5.3.1-8), libtsan0-dbg:amd64 (5.3.1-7, 5.3.1-8), binutils:amd64 (2.26-2, 2.26-3), libmagickwand-6.q16-2:amd64 (6.8.9.9-7, 6.8.9.9-7+b1), libopencv-video2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), libumfpack5.7.1:amd64 (4.4.5-2, 4.4.6-1), handbrake-cli:amd64 (0.10.3-dmo2, 0.10.3-dmo3), libitm1:amd64 (5.3.1-7, 5.3.1-8), libcamd2.4.1:amd64 (4.4.5-2, 4.4.6-1), libccolamd2.9.1:amd64 (4.4.5-2, 4.4.6-1), vlc-nox:amd64 (2.2.1-dmo14, 2.2.2-dmo1), perl-modules-5.22:amd64 (5.22.1-4, 5.22.1-7), lib32itm1:amd64 (5.3.1-7, 5.3.1-8), lib32asan2:amd64 (5.3.1-7, 5.3.1-8), nodejs:amd64 (4.2.6~dfsg-1, 4.3.0~dfsg-2), console-setup-linux:amd64 (1.134, 1.136), fop:amd64 (2.0+dfsg-5, 2.1-1), libx32gcc1:amd64 (5.3.1-7, 5.3.1-8), insserv:amd64 (1.14.0-5.1, 1.14.0-5.2), lib32gcc1-dbg:amd64 (5.3.1-7, 5.3.1-8), libthai-data:amd64 (0.1.24-1, 0.1.24-2), vlc-plugin-notify:amd64 (2.2.1-dmo14, 2.2.2-dmo1), libvlc5:amd64 (2.2.1-dmo14, 2.2.2-dmo1), grub2-common:amd64 (2.02~beta2-35, 2.02~beta2-36), gnutls-bin:amd64 (3.4.8-2, 3.4.9-2), udev:amd64 (228-4+b1, 228-6), libcilkrts5:amd64 (5.3.1-7, 5.3.1-8), console-setup:amd64 (1.134, 1.136), handbrake-gtk:amd64 (0.10.3-dmo2, 0.10.3-dmo3), rhythmbox-plugins:amd64 (3.2.1-1+b1, 3.3-1), alsa-utils:amd64 (1.0.29-1+b1, 1.1.0-2), libasan2:amd64 (5.3.1-7, 5.3.1-8), lib32gcc-5-dev:amd64 (5.3.1-7, 5.3.1-8), libquadmath0:amd64 (5.3.1-7, 5.3.1-8), libxmlgraphics-commons-java:amd64 (2.0.1-2, 2.1-1), libapt-pkg5.0:amd64 (1.2.1, 1.2.3), packagekit-tools:amd64 (1.0.11-1, 1.0.11-2), libpq5:amd64 (9.5.0-2, 9.5.0-3), libpq5:i386 (9.5.0-2, 9.5.0-3), ruby-unf-ext:amd64 (0.0.7.1-1+b3, 0.0.7.2-1), libx32gcc1-dbg:amd64 (5.3.1-7, 5.3.1-8), grub-pc:amd64 (2.02~beta2-35, 2.02~beta2-36), libcilkrts5-dbg:amd64 (5.3.1-7, 5.3.1-8), linux-headers-4.3.0-1-amd64:amd64 (4.3.3-7, 4.3.5-1), libpostproc53:amd64 (2.8.5-dmo2, 2.8.6-dmo2), libvlccore8:amd64 (2.2.1-dmo14, 2.2.2-dmo1), libudev1:amd64 (228-4+b1, 228-6), libudev1:i386 (228-4+b1, 228-6), libgomp1-dbg:amd64 (5.3.1-7, 5.3.1-8), libopencv-flann2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), python-distutils-extra:amd64 (2.38-1, 2.39-1), libopencv-contrib2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), phpmyadmin:amd64 (4.5.3.1-1, 4.5.4.1-2), lib32cilkrts5:amd64 (5.3.1-7, 5.3.1-8), libio-socket-ssl-perl:amd64 (2.022-1, 2.024-1), libltdl7:amd64 (2.4.2-1.11, 2.4.6-0.1), libltdl7:i386 (2.4.2-1.11, 2.4.6-0.1), installation-report:amd64 (2.61, 2.62), gcc-5-multilib:amd64 (5.3.1-7, 5.3.1-8), libopencv-highgui2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), libcolamd2.9.1:amd64 (4.4.5-2, 4.4.6-1), libgcc1:amd64 (5.3.1-7, 5.3.1-8), libgcc1:i386 (5.3.1-7, 5.3.1-8), kodi:amd64 (15.2-dmo7, 15.2-dmo8), gir1.2-rb-3.0:amd64 (3.2.1-1+b1, 3.3-1), libperl5.22:amd64 (5.22.1-4, 5.22.1-7), python-cryptography:amd64 (1.2.1-1, 1.2.2-2), grub-pc-bin:amd64 (2.02~beta2-35, 2.02~beta2-36), gcc-5-base:amd64 (5.3.1-7, 5.3.1-8), gcc-5-base:i386 (5.3.1-7, 5.3.1-8), rhythmbox-data:amd64 (3.2.1-1, 3.3-1), lib32gcc1:amd64 (5.3.1-7, 5.3.1-8), gcj-5-jre-lib:amd64 (5.3.1-7, 5.3.1-8), libappstream-glib8:amd64 (0.5.5-1, 0.5.8-1), gnome-calculator:amd64 (3.18.2-1, 3.18.3-1), imagemagick-6.q16:amd64 (6.8.9.9-7, 6.8.9.9-7+b1), libnfs8:amd64 (1.9.8-dmo1, 1.10.0-dmo1), libstdc++-5-dev:amd64 (5.3.1-7, 5.3.1-8), libx32cilkrts5:amd64 (5.3.1-7, 5.3.1-8), nautilus:amd64 (3.18.4-1, 3.18.5-1), libnautilus-extension1a:amd64 (3.18.4-1, 3.18.5-1), libtsan0:amd64 (5.3.1-7, 5.3.1-8), libmagickcore-6.q16-2-extra:amd64 (6.8.9.9-7, 6.8.9.9-7+b1), gir1.2-wnck-3.0:amd64 (3.14.0-2, 3.14.1-1), kodi-skin-confluence:amd64 (15.2-dmo7, 15.2-dmo8), libgtk-3-bin:amd64 (3.18.6-1, 3.18.7-1), libnss-mdns:amd64 (0.10-6, 0.10-7), p7zip-full:amd64 (9.20.1~dfsg.1-4.2, 9.20.1~dfsg.1-5), libubsan0:amd64 (5.3.1-7, 5.3.1-8), libdatetime-timezone-perl:amd64 (1.94-1+2015g, 1.95-1+2016a), iceweasel:amd64 (43.0.4-1, 44.0-1), g++-5:amd64 (5.3.1-7, 5.3.1-8), gir1.2-vte-2.91:amd64 (0.42.1-2+b1, 0.42.3-1), steam:i386 (1.0.0.50-6, 1.0.0.51-1), libx32asan2:amd64 (5.3.1-7, 5.3.1-8), libnss-myhostname:amd64 (228-4+b1, 228-6), libgfortran3:amd64 (5.3.1-7, 5.3.1-8), libneon27-gnutls:amd64 (0.30.1-2+b2, 0.30.1-3), pinentry-gtk2:amd64 (0.9.7-1, 0.9.7-3), systemd-sysv:amd64 (228-4+b1, 228-6), lib32gomp1:amd64 (5.3.1-7, 5.3.1-8), libamd2.4.1:amd64 (4.4.5-2, 4.4.6-1), libnl-3-200:amd64 (3.2.26-1, 3.2.27-1), gcc-5:amd64 (5.3.1-7, 5.3.1-8), libbasicusageenvironment1:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1), libavcodec56:amd64 (2.8.5-dmo2, 2.8.6-dmo2), libavcodec56:i386 (2.8.5-dmo2, 2.8.6-dmo2), tesseract-ocr:amd64 (3.04.00-5+b1, 3.04.00-5+b2), libprotobuf-c1:amd64 (1.1.1-1, 1.2.1-1), libburn4:amd64 (1.4.2-1, 1.4.2.pl01-1), libsdl2-image-2.0-0:amd64 (2.0.0+dfsg-3+b4, 2.0.1+dfsg-2), libsdl2-image-2.0-0:i386 (2.0.0+dfsg-3+b4, 2.0.1+dfsg-2), python-nose:amd64 (1.3.6-1, 1.3.7-1), vlc:amd64 (2.2.1-dmo14, 2.2.2-dmo1), libpam-systemd:amd64 (228-4+b1, 228-6), libgail-3-0:amd64 (3.18.6-1, 3.18.7-1), libavutil54:amd64 (2.8.5-dmo2, 2.8.6-dmo2), libavutil54:i386 (2.8.5-dmo2, 2.8.6-dmo2), vlc-data:amd64 (2.2.1-dmo14, 2.2.2-dmo1), libtheora0:amd64 (1.1.1+dfsg.1-7.1, 1.1.1+dfsg.1-8), libtheora0:i386 (1.1.1+dfsg.1-7.1, 1.1.1+dfsg.1-8), libopencv-calib3d2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), packagekit:amd64 (1.0.11-1, 1.0.11-2), liblsan0:amd64 (5.3.1-7, 5.3.1-8), systemd:amd64 (228-4+b1, 228-6), libgomp1:amd64 (5.3.1-7, 5.3.1-8), libgomp1:i386 (5.3.1-7, 5.3.1-8), libavdevice56:amd64 (2.8.5-dmo2, 2.8.6-dmo2), xca:amd64 (1.0.0-2.1, 1.3.2-1), libopencv-legacy2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), lib32quadmath0:amd64 (5.3.1-7, 5.3.1-8), gimp-gmic:amd64 (1.6.8-3, 1.6.8-3+b1), wine32:i386 (1.8-6, 1.8.1-1), libthai0:amd64 (0.1.24-1, 0.1.24-2), libthai0:i386 (0.1.24-1, 0.1.24-2), wine64:amd64 (1.8-6, 1.8.1-1), libhogweed4:amd64 (3.1.1-4, 3.2-1), libhogweed4:i386 (3.1.1-4, 3.2-1), libwnck-3-0:amd64 (3.14.0-2, 3.14.1-1), libubsan0-dbg:amd64 (5.3.1-7, 5.3.1-8), apt-utils:amd64 (1.2.1, 1.2.3), libswscale3:amd64 (2.8.5-dmo2, 2.8.6-dmo2), smartmontools:amd64 (6.4+svn4109-1, 6.4+svn4214-1), libmagickcore-6.q16-2:amd64 (6.8.9.9-7, 6.8.9.9-7+b1), manpages-dev:amd64 (4.04-0.1, 4.04-1), libx32ubsan0:amd64 (5.3.1-7, 5.3.1-8), keyboard-configuration:amd64 (1.134, 1.136), gnome-shell-extensions:amd64 (3.18.3-1, 3.18.3-2), libasound2:amd64 (1.0.29-1, 1.1.0-1), libasound2:i386 (1.0.29-1, 1.1.0-1), libasound2-dev:i386 (1.0.29-1, 1.1.0-1), libasound2-plugins:amd64 (1.0.29-dmo1, 1.1.0-dmo1), libasound2-plugins:i386 (1.0.29-dmo1, 1.1.0-dmo1), libx32stdc++-5-dev:amd64 (5.3.1-7, 5.3.1-8), fonts-wine:amd64 (1.8-6, 1.8.1-1), nodejs-dev:amd64 (4.2.6~dfsg-1, 4.3.0~dfsg-2), libnettle6:amd64 (3.1.1-4, 3.2-1), libnettle6:i386 (3.1.1-4, 3.2-1), libopencv-core2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), busybox:amd64 (1.22.0-17, 1.22.0-18), findutils:amd64 (4.6.0-2, 4.6.0+git+20160126-2), libvte-2.91-common:amd64 (0.42.1-2, 0.42.3-1), gir1.2-packagekitglib-1.0:amd64 (1.0.11-1, 1.0.11-2), liblsan0-dbg:amd64 (5.3.1-7, 5.3.1-8), libgnutls30:amd64 (3.4.8-2, 3.4.9-2), libgnutls30:i386 (3.4.8-2, 3.4.9-2), libsoftware-license-perl:amd64 (0.103011-1, 0.103011-2), libwnck-3-common:amd64 (3.14.0-2, 3.14.1-1), debtags:amd64 (2.0.1, 2.0.2), perl:amd64 (5.22.1-4, 5.22.1-7), liblivemedia50:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1), libmagick++-6.q16-5v5:amd64 (6.8.9.9-7, 6.8.9.9-7+b1), libbs2b0:amd64 (3.1.0+dfsg-2.1, 3.1.0+dfsg-2.2), nautilus-data:amd64 (3.18.4-1, 3.18.5-1), libopencv-ml2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), apt-transport-https:amd64 (1.2.1, 1.2.3), libappstream3:amd64 (0.9.0-3, 0.9.1-1), libitm1-dbg:amd64 (5.3.1-7, 5.3.1-8), gparted:amd64 (0.19.0-3+b2, 0.25.0-1), libnetpbm10:amd64 (10.0-15.2, 10.0-15.3), libatomic1:amd64 (5.3.1-7, 5.3.1-8), linux-image-4.3.0-1-amd64:amd64 (4.3.3-7, 4.3.5-1), libcc1-0:amd64 (5.3.1-7, 5.3.1-8), libx32gcc-5-dev:amd64 (5.3.1-7, 5.3.1-8), wine:amd64 (1.8-6, 1.8.1-1), libx32gomp1:amd64 (5.3.1-7, 5.3.1-8), kodi-bin:amd64 (15.2-dmo7, 15.2-dmo8), linux-headers-4.3.0-1-common:amd64 (4.3.3-7, 4.3.5-1), libopencv-features2d2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3), kodi-data:amd64 (15.2-dmo7, 15.2-dmo8), linux-compiler-gcc-5-x86:amd64 (4.3.3-7, 4.3.5-1), pinentry-gnome3:amd64 (0.9.7-1, 0.9.7-3), libtesseract3:amd64 (3.04.00-5+b1, 3.04.00-5+b2), libstdc++6:amd64 (5.3.1-7, 5.3.1-8), libstdc++6:i386 (5.3.1-7, 5.3.1-8), lib32atomic1:amd64 (5.3.1-7, 5.3.1-8), libsdl2-ttf-2.0-0:amd64 (2.0.12+dfsg1-2, 2.0.14+dfsg1-1), libjpeg62-turbo:amd64 (1.4.1-2, 1.4.2-2), libjpeg62-turbo:i386 (1.4.1-2, 1.4.2-2), libx32atomic1:amd64 (5.3.1-7, 5.3.1-8), libfop-java:amd64 (2.0+dfsg-5, 2.1-1), libavresample2:amd64 (2.8.5-dmo2, 2.8.6-dmo2), libavresample2:i386 (2.8.5-dmo2, 2.8.6-dmo2), libusageenvironment3:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1), libdebconfclient0:amd64 (0.201, 0.204), libjcommander-java-doc:amd64 (1.35-1, 1.48-1), libtool:amd64 (2.4.2-1.11, 2.4.6-0.1), libtokyocabinet9:amd64 (1.4.48-3, 1.4.48-7), rhythmbox:amd64 (3.2.1-1+b1, 3.3-1), diffstat:amd64 (1.60-1, 1.61-1), libwine:amd64 (1.8-6, 1.8.1-1), libwine:i386 (1.8-6, 1.8.1-1), libmodule-build-perl:amd64 (0.421400-3, 0.421600-1), rhythmbox-plugin-cdrecorder:amd64 (3.2.1-1+b1, 3.3-1), libdatrie1:amd64 (0.2.10-1, 0.2.10-2), libdatrie1:i386 (0.2.10-1, 0.2.10-2), libneon27:amd64 (0.30.1-2+b2, 0.30.1-3), librhythmbox-core9:amd64 (3.2.1-1+b1, 3.3-1), libx32stdc++6:amd64 (5.3.1-7, 5.3.1-8), libcholmod3.0.6:amd64 (4.4.5-2, 4.4.6-1) End-Date: 2016-02-15 11:24:41 ```
non_priority
games won t start on debian unstable when i start a bit game in on debian unstable i get invalid pointer errors since the last update however some games seem to run when started from the terminal eg shovel knight and transistor for example cities skylines error in home ichi steam steamapps common cities skylines cities free invalid pointer shovel knight error in home ichi steam steamapps common shovel knight shovelknight free invalid pointer transistor error in transistor bin free invalid pointer my system system host localhorst kernel bit desktop distro debian gnu linux stretch sid machine system asus product all series mobo asustek model k v rev x bios american megatrends v date cpu quad core intel core mcp cache kb clock speeds max mhz mhz mhz mhz mhz graphics card nvidia display server x org driver nvidia resolution glx renderer geforce gtx pcie glx version nvidia audio card intel series series high definition audio controller driver snd hda intel card nvidia high definition audio controller driver snd hda intel sound advanced linux sound architecture v network card realtek pci express gigabit ethernet controller driver if state up speed mbps duplex full mac ac drives hdd total size used id dev sda model size id dev sdd model wdc size id dev sdc model wdc size id dev sdb model samsung ssd size id dev sdf model wdc size id dev sde model size id usb dev sdg model rainbow line size partition id size used fs dev dev id swap size used fs swap dev dev raid device dev active raid components online sensors system temperatures cpu mobo gpu fan speeds in rpm cpu info processes uptime memory client shell zsh inxi packages that where in the upgrade that broke bit games start date commandline apt upgrade requested by ichi install automatic automatic automatic php phpseclib automatic dbconfig mysql automatic automatic automatic automatic upgrade manpages perl base dbg libltdl dev iso codes acpid dmsetup libnl route libgcc dev python psutil libaspectj java libpackagekit python xapian libvte handbrake publicsuffix netpbm gtk ffmpeg os prober linux libc dev linux libc dev dbg libapt appstream dev libtool bin libgegl imagemagick libgnutls g multilib libopencv dfsg dfsg libnl genl libopencv dfsg dfsg dfsg dfsg libgtk common acl grub common transfig e e aspectj apt libgtk python cssutils libjcommander java cpp libcglib java data dbg dbg binutils libmagickwand libopencv dfsg dfsg handbrake cli vlc nox perl modules nodejs dfsg dfsg console setup linux fop dfsg insserv dbg libthai data vlc plugin notify common gnutls bin udev console setup handbrake gtk rhythmbox plugins alsa utils dev libxmlgraphics commons java libapt packagekit tools ruby unf ext dbg grub pc dbg linux headers dbg libopencv dfsg dfsg python distutils extra libopencv dfsg dfsg phpmyadmin libio socket ssl perl installation report gcc multilib libopencv dfsg dfsg kodi rb python cryptography grub pc bin gcc base gcc base rhythmbox data gcj jre lib libappstream gnome calculator imagemagick libstdc dev nautilus libnautilus libmagickcore extra wnck kodi skin confluence libgtk bin libnss mdns full dfsg dfsg libdatetime timezone perl iceweasel g vte steam libnss myhostname gnutls pinentry systemd sysv libnl gcc tesseract ocr libprotobuf image dfsg dfsg image dfsg dfsg python nose vlc libpam systemd libgail vlc data dfsg dfsg dfsg dfsg libopencv dfsg dfsg packagekit systemd xca libopencv dfsg dfsg gimp gmic libwnck dbg apt utils smartmontools libmagickcore manpages dev keyboard configuration gnome shell extensions dev plugins plugins dev fonts wine nodejs dev dfsg dfsg libopencv dfsg dfsg busybox findutils git libvte common packagekitglib dbg libsoftware license perl libwnck common debtags perl libmagick dfsg dfsg nautilus data libopencv dfsg dfsg apt transport https dbg gparted linux image dev wine kodi bin linux headers common libopencv dfsg dfsg kodi data linux compiler gcc pinentry libstdc libstdc ttf turbo turbo libfop java dfsg libjcommander java doc libtool rhythmbox diffstat libwine libwine libmodule build perl rhythmbox plugin cdrecorder librhythmbox end date
0
285,698
24,689,793,256
IssuesEvent
2022-10-19 07:41:02
Shard-Labs/starknet-devnet
https://api.github.com/repos/Shard-Labs/starknet-devnet
opened
Improve naming in get_events test
Type: refactor Type: test Techno: python Context: coupled Duration: under a day
E.g. for the case of `event_address_1`: Instead of adding numeric suffixes, we would find out what the address represents and have it reflected in the variable name.
1.0
Improve naming in get_events test - E.g. for the case of `event_address_1`: Instead of adding numeric suffixes, we would find out what the address represents and have it reflected in the variable name.
non_priority
improve naming in get events test e g for the case of event address instead of adding numeric suffixes we would find out what the address represents and have it reflected in the variable name
0
305,072
26,359,625,111
IssuesEvent
2023-01-11 12:25:20
unifyai/ivy
https://api.github.com/repos/unifyai/ivy
reopened
Fix linalg.test_tensorflow_cholesky_solve
TensorFlow Frontend Sub Task Failing Test
| | | |---|---| |jax|<a href="https://github.com/unifyai/ivy/actions/runs/3679121551/jobs/6518230953" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a> <details> <summary>Not found</summary> Not found </details>
1.0
Fix linalg.test_tensorflow_cholesky_solve - | | | |---|---| |jax|<a href="https://github.com/unifyai/ivy/actions/runs/3679121551/jobs/6518230953" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a> <details> <summary>Not found</summary> Not found </details>
non_priority
fix linalg test tensorflow cholesky solve jax img src not found not found
0
276,296
23,983,071,870
IssuesEvent
2022-09-13 16:33:39
department-of-veterans-affairs/va.gov-team
https://api.github.com/repos/department-of-veterans-affairs/va.gov-team
closed
Flaky E2E Test Detected! session.reloads.on.refresh.cypress.spec.js
qa-standards e2e-flaky-test
Your test spec src/applications/check-in/day-of/tests/e2e/session/session.reloads.on.refresh.cypress.spec.js has been disallowed from running on vets-website due to flakiness. Please make corrections to the test spec and run it through CI to have it re-enabled. To see the details of the test failure, please visit: [Mochawesome Report](https://testing-tools-testing-reports.s3-us-gov-west-1.amazonaws.com/undefined/undefined.html). Thanks, The QA Standards Team
1.0
Flaky E2E Test Detected! session.reloads.on.refresh.cypress.spec.js - Your test spec src/applications/check-in/day-of/tests/e2e/session/session.reloads.on.refresh.cypress.spec.js has been disallowed from running on vets-website due to flakiness. Please make corrections to the test spec and run it through CI to have it re-enabled. To see the details of the test failure, please visit: [Mochawesome Report](https://testing-tools-testing-reports.s3-us-gov-west-1.amazonaws.com/undefined/undefined.html). Thanks, The QA Standards Team
non_priority
flaky test detected session reloads on refresh cypress spec js your test spec src applications check in day of tests session session reloads on refresh cypress spec js has been disallowed from running on vets website due to flakiness please make corrections to the test spec and run it through ci to have it re enabled to see the details of the test failure please visit thanks the qa standards team
0
157,785
19,984,267,097
IssuesEvent
2022-01-30 12:07:48
davidjj58/Home-assignment
https://api.github.com/repos/davidjj58/Home-assignment
opened
CVE-2017-15095 (High) detected in jackson-databind-2.8.7.jar
security vulnerability
## CVE-2017-15095 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.7.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /itory/com/fasterxml/jackson/core/jackson-databind/2.8.7/jackson-databind-2.8.7.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.7.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/davidjj58/Home-assignment/commit/77c895db92c590fab8e72e59e8be84d821d75fb6">77c895db92c590fab8e72e59e8be84d821d75fb6</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously. <p>Publish Date: 2018-02-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15095>CVE-2017-15095</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15095">https://nvd.nist.gov/vuln/detail/CVE-2017-15095</a></p> <p>Release Date: 2018-02-06</p> <p>Fix Resolution: 2.8.10,2.9.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2017-15095 (High) detected in jackson-databind-2.8.7.jar - ## CVE-2017-15095 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.7.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /itory/com/fasterxml/jackson/core/jackson-databind/2.8.7/jackson-databind-2.8.7.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.8.7.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/davidjj58/Home-assignment/commit/77c895db92c590fab8e72e59e8be84d821d75fb6">77c895db92c590fab8e72e59e8be84d821d75fb6</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously. <p>Publish Date: 2018-02-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15095>CVE-2017-15095</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15095">https://nvd.nist.gov/vuln/detail/CVE-2017-15095</a></p> <p>Release Date: 2018-02-06</p> <p>Fix Resolution: 2.8.10,2.9.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library itory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details a deserialization flaw was discovered in the jackson databind in versions before and which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readvalue method of the objectmapper this issue extends the previous flaw cve by blacklisting more classes that could be used maliciously publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
50,652
26,718,176,495
IssuesEvent
2023-01-28 20:02:12
dyn4j/dyn4j
https://api.github.com/repos/dyn4j/dyn4j
closed
Reduce the default solver iterations
performance
To improve the performance of the library a developer can configure the number of solver iterations are performed. The higher the number of iterations, the higher the quality, but lower performance. Reducing the number of iterations for both velocity solving and position solving had little effect - in fact, in some respects it made the simulation more stable. There was one JUnit test that needed to be updated, but all others were successful, likely because they are pretty simple though. Reduce the default velocity solver iterations from 10 to 6 and the default position solver iterations from 10 to 2.
True
Reduce the default solver iterations - To improve the performance of the library a developer can configure the number of solver iterations are performed. The higher the number of iterations, the higher the quality, but lower performance. Reducing the number of iterations for both velocity solving and position solving had little effect - in fact, in some respects it made the simulation more stable. There was one JUnit test that needed to be updated, but all others were successful, likely because they are pretty simple though. Reduce the default velocity solver iterations from 10 to 6 and the default position solver iterations from 10 to 2.
non_priority
reduce the default solver iterations to improve the performance of the library a developer can configure the number of solver iterations are performed the higher the number of iterations the higher the quality but lower performance reducing the number of iterations for both velocity solving and position solving had little effect in fact in some respects it made the simulation more stable there was one junit test that needed to be updated but all others were successful likely because they are pretty simple though reduce the default velocity solver iterations from to and the default position solver iterations from to
0
66,831
16,736,017,992
IssuesEvent
2021-06-11 01:33:33
luchete80/WeldForm
https://api.github.com/repos/luchete80/WeldForm
closed
Not constant expression ('type [n]' )
buildsystem
D:\Luciano\Numerico\WeldForm\External\../External/laexpr.h(364): error C2131: la expresión no se evaluó como una constante
1.0
Not constant expression ('type [n]' ) - D:\Luciano\Numerico\WeldForm\External\../External/laexpr.h(364): error C2131: la expresión no se evaluó como una constante
non_priority
not constant expression type d luciano numerico weldform external external laexpr h error la expresión no se evaluó como una constante
0
11,115
8,299,130,059
IssuesEvent
2018-09-21 01:00:07
whitesource-yossi/vexflow
https://api.github.com/repos/whitesource-yossi/vexflow
opened
CVE-2017-16138 high severity vulnerability detected by WhiteSource
security vulnerability
## CVE-2017-16138 - High Vulnerability <details><summary>:warning: Vulnerable Library - <b>mime-1.3.4.tgz</b></p></summary> <p>path: /vexflow/node_modules/mime/package.json</p> <p> Dependency Hierarchy: - :x: **mime-1.3.4.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary>:red_circle: Vulnerability Details</summary> <p> The mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138>CVE-2017-16138</a></p> </p> </details> <p></p> <details><summary>:dart: CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary>:white_check_mark: Suggested Fix</summary> <p> <p>Type: Change files</p> <p>Origin: <a href="https://github.com/broofa/node-mime/commit/1df903fdeb9ae7eaa048795b8d580ce2c98f40b0">https://github.com/broofa/node-mime/commit/1df903fdeb9ae7eaa048795b8d580ce2c98f40b0</a></p> <p>Release Date: 2017-09-25</p> <p>Fix Resolution: Replace or update the following file: Mime.js</p> </p> </details> <p></p> *** Want to learn more about the open source vulnerabilities in your products? Click [here](https://www.whitesourcesoftware.com)
True
CVE-2017-16138 high severity vulnerability detected by WhiteSource - ## CVE-2017-16138 - High Vulnerability <details><summary>:warning: Vulnerable Library - <b>mime-1.3.4.tgz</b></p></summary> <p>path: /vexflow/node_modules/mime/package.json</p> <p> Dependency Hierarchy: - :x: **mime-1.3.4.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary>:red_circle: Vulnerability Details</summary> <p> The mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138>CVE-2017-16138</a></p> </p> </details> <p></p> <details><summary>:dart: CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary>:white_check_mark: Suggested Fix</summary> <p> <p>Type: Change files</p> <p>Origin: <a href="https://github.com/broofa/node-mime/commit/1df903fdeb9ae7eaa048795b8d580ce2c98f40b0">https://github.com/broofa/node-mime/commit/1df903fdeb9ae7eaa048795b8d580ce2c98f40b0</a></p> <p>Release Date: 2017-09-25</p> <p>Fix Resolution: Replace or update the following file: Mime.js</p> </p> </details> <p></p> *** Want to learn more about the open source vulnerabilities in your products? Click [here](https://www.whitesourcesoftware.com)
non_priority
cve high severity vulnerability detected by whitesource cve high vulnerability warning vulnerable library mime tgz path vexflow node modules mime package json dependency hierarchy x mime tgz vulnerable library red circle vulnerability details the mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input publish date url a href dart cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href white check mark suggested fix type change files origin a href release date fix resolution replace or update the following file mime js want to learn more about the open source vulnerabilities in your products click
0
14,085
8,469,031,618
IssuesEvent
2018-10-23 21:29:15
JuliaLang/julia
https://api.github.com/repos/JuliaLang/julia
closed
Poor type inference/performance using CartesianRange
inference performance
Create a Cartesian iterator to sum elements in a fixed dimension. ``` julia> function foo(x::AbstractArray) acc = 0 R = CartesianRange(size(x)[2:end]) for I = R acc += x[1, I] end acc end foo (generic function with 1 method) ``` The function causes over a million allocations and is kind of slow. ``` julia> x = trunc(Int, rand(25, 25, 25, 25, 25) * 10); julia> foo(x) 1759015 julia> @time foo(x) 0.099376 seconds (1.56 M allocations: 71.524 MB, 5.76% gc time) 1759015 ``` Looking at the [`@code_warntype foo(x)`](https://gist.github.com/amckinlay/057484fa822edd007bffb6d40d6469b6#file-gistfile1-txt), inference cannot infer the type of `R`. Asserting the type leads to much better performance: ``` julia> function bar{T}(x::AbstractArray{T,5}) acc = 0 R::CartesianRange{CartesianIndex{4}} = CartesianRange(size(x)[2:end]) for I = R acc += x[1, I] end acc end bar (generic function with 1 method) julia> bar(x) 1759015 julia> @time bar(x) 0.006065 seconds (10 allocations: 512 bytes) 1759015 ``` [`@code_warntype bar(x)`](https://gist.github.com/amckinlay/057484fa822edd007bffb6d40d6469b6#file-gistfile2-txt) Incidentally, asserting the type for any array size does not seem to work: ``` julia> function buzz{T,N}(x::AbstractArray{T,N}) acc = 0 R::CartesianRange{CartesianIndex{N-1}} = CartesianRange(size(x)[2:end]) for I = R acc += x[1, I] end acc end buzz (generic function with 1 method) julia> buzz(x) 1759015 julia> @time buzz(x) 0.090423 seconds (1.56 M allocations: 71.524 MB, 5.75% gc time) 1759015 ``` [`@code_warntype buzz(x)`](https://gist.github.com/amckinlay/057484fa822edd007bffb6d40d6469b6#file-gistfile3-txt)
True
Poor type inference/performance using CartesianRange - Create a Cartesian iterator to sum elements in a fixed dimension. ``` julia> function foo(x::AbstractArray) acc = 0 R = CartesianRange(size(x)[2:end]) for I = R acc += x[1, I] end acc end foo (generic function with 1 method) ``` The function causes over a million allocations and is kind of slow. ``` julia> x = trunc(Int, rand(25, 25, 25, 25, 25) * 10); julia> foo(x) 1759015 julia> @time foo(x) 0.099376 seconds (1.56 M allocations: 71.524 MB, 5.76% gc time) 1759015 ``` Looking at the [`@code_warntype foo(x)`](https://gist.github.com/amckinlay/057484fa822edd007bffb6d40d6469b6#file-gistfile1-txt), inference cannot infer the type of `R`. Asserting the type leads to much better performance: ``` julia> function bar{T}(x::AbstractArray{T,5}) acc = 0 R::CartesianRange{CartesianIndex{4}} = CartesianRange(size(x)[2:end]) for I = R acc += x[1, I] end acc end bar (generic function with 1 method) julia> bar(x) 1759015 julia> @time bar(x) 0.006065 seconds (10 allocations: 512 bytes) 1759015 ``` [`@code_warntype bar(x)`](https://gist.github.com/amckinlay/057484fa822edd007bffb6d40d6469b6#file-gistfile2-txt) Incidentally, asserting the type for any array size does not seem to work: ``` julia> function buzz{T,N}(x::AbstractArray{T,N}) acc = 0 R::CartesianRange{CartesianIndex{N-1}} = CartesianRange(size(x)[2:end]) for I = R acc += x[1, I] end acc end buzz (generic function with 1 method) julia> buzz(x) 1759015 julia> @time buzz(x) 0.090423 seconds (1.56 M allocations: 71.524 MB, 5.75% gc time) 1759015 ``` [`@code_warntype buzz(x)`](https://gist.github.com/amckinlay/057484fa822edd007bffb6d40d6469b6#file-gistfile3-txt)
non_priority
poor type inference performance using cartesianrange create a cartesian iterator to sum elements in a fixed dimension julia function foo x abstractarray acc r cartesianrange size x for i r acc x end acc end foo generic function with method the function causes over a million allocations and is kind of slow julia x trunc int rand julia foo x julia time foo x seconds m allocations mb gc time looking at the inference cannot infer the type of r asserting the type leads to much better performance julia function bar t x abstractarray t acc r cartesianrange cartesianindex cartesianrange size x for i r acc x end acc end bar generic function with method julia bar x julia time bar x seconds allocations bytes incidentally asserting the type for any array size does not seem to work julia function buzz t n x abstractarray t n acc r cartesianrange cartesianindex n cartesianrange size x for i r acc x end acc end buzz generic function with method julia buzz x julia time buzz x seconds m allocations mb gc time
0
87,612
25,163,537,320
IssuesEvent
2022-11-10 18:43:19
spack/spack
https://api.github.com/repos/spack/spack
closed
Installation issue: postgresql and multiple build systems
build-error
### Steps to reproduce the issue ```console $ spack install postgresql ... ``` ### Error message <details><summary>Error message</summary><pre> ==> Error: AttributeError: type object 'AutotoolsPackage' has no attribute 'install' The 'postgresql' package cannot find an attribute while trying to build from sources. This might be due to a change in Spack's package format to support multiple build-systems for a single package. You can fix this by updating the build recipe, and you can also report the issue as a bug. More information at https://spack.readthedocs.io/en/latest/packaging_guide.html#installation-procedure /opt/packages/gpjohnsn/spack/var/spack/repos/builtin/packages/postgresql/package.py:103, in install: 100 with working_dir(os.path.join("src", subdir)): 101 make("install") 102 else: >> 103 AutotoolsPackage.install(self, spec, prefix) </pre></details> ### Information on your system * **Spack:** 0.19.0.dev0 * **Python:** 3.6.8 * **Platform:** linux-centos7-cascadelake * **Concretizer:** clingo ### Additional information @alalazo Here is another one that fails after the multi build system PR. ### General information - [X] I have run `spack debug report` and reported the version of Spack/Python/Platform - [X] I have run `spack maintainers <name-of-the-package>` and **@mentioned** any maintainers - [X] I have uploaded the build log and environment files - [X] I have searched the issues of this repo and believe this is not a duplicate
1.0
Installation issue: postgresql and multiple build systems - ### Steps to reproduce the issue ```console $ spack install postgresql ... ``` ### Error message <details><summary>Error message</summary><pre> ==> Error: AttributeError: type object 'AutotoolsPackage' has no attribute 'install' The 'postgresql' package cannot find an attribute while trying to build from sources. This might be due to a change in Spack's package format to support multiple build-systems for a single package. You can fix this by updating the build recipe, and you can also report the issue as a bug. More information at https://spack.readthedocs.io/en/latest/packaging_guide.html#installation-procedure /opt/packages/gpjohnsn/spack/var/spack/repos/builtin/packages/postgresql/package.py:103, in install: 100 with working_dir(os.path.join("src", subdir)): 101 make("install") 102 else: >> 103 AutotoolsPackage.install(self, spec, prefix) </pre></details> ### Information on your system * **Spack:** 0.19.0.dev0 * **Python:** 3.6.8 * **Platform:** linux-centos7-cascadelake * **Concretizer:** clingo ### Additional information @alalazo Here is another one that fails after the multi build system PR. ### General information - [X] I have run `spack debug report` and reported the version of Spack/Python/Platform - [X] I have run `spack maintainers <name-of-the-package>` and **@mentioned** any maintainers - [X] I have uploaded the build log and environment files - [X] I have searched the issues of this repo and believe this is not a duplicate
non_priority
installation issue postgresql and multiple build systems steps to reproduce the issue console spack install postgresql error message error message error attributeerror type object autotoolspackage has no attribute install the postgresql package cannot find an attribute while trying to build from sources this might be due to a change in spack s package format to support multiple build systems for a single package you can fix this by updating the build recipe and you can also report the issue as a bug more information at opt packages gpjohnsn spack var spack repos builtin packages postgresql package py in install with working dir os path join src subdir make install else autotoolspackage install self spec prefix information on your system spack python platform linux cascadelake concretizer clingo additional information alalazo here is another one that fails after the multi build system pr general information i have run spack debug report and reported the version of spack python platform i have run spack maintainers and mentioned any maintainers i have uploaded the build log and environment files i have searched the issues of this repo and believe this is not a duplicate
0
131,519
18,247,964,929
IssuesEvent
2021-10-01 21:23:33
turkdevops/grafana
https://api.github.com/repos/turkdevops/grafana
closed
CVE-2020-7774 (High) detected in y18n-3.2.1.tgz, y18n-4.0.0.tgz - autoclosed
security vulnerability
## CVE-2020-7774 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>y18n-3.2.1.tgz</b>, <b>y18n-4.0.0.tgz</b></p></summary> <p> <details><summary><b>y18n-3.2.1.tgz</b></p></summary> <p>the bare-bones internationalization library used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/y18n/-/y18n-3.2.1.tgz">https://registry.npmjs.org/y18n/-/y18n-3.2.1.tgz</a></p> <p>Path to dependency file: grafana/package.json</p> <p>Path to vulnerable library: grafana/node_modules/y18n</p> <p> Dependency Hierarchy: - @grafana/toolkit-6.7.0-pre.tgz (Root Library) - node-sass-4.12.0.tgz - sass-graph-2.2.4.tgz - yargs-7.1.0.tgz - :x: **y18n-3.2.1.tgz** (Vulnerable Library) </details> <details><summary><b>y18n-4.0.0.tgz</b></p></summary> <p>the bare-bones internationalization library used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/y18n/-/y18n-4.0.0.tgz">https://registry.npmjs.org/y18n/-/y18n-4.0.0.tgz</a></p> <p>Path to dependency file: grafana/package.json</p> <p>Path to vulnerable library: grafana/node_modules/y18n</p> <p> Dependency Hierarchy: - npm-6.14.6.tgz (Root Library) - cacache-12.0.3.tgz - :x: **y18n-4.0.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/turkdevops/grafana/commit/eaebfb49103a255dc2d75f384b343f6a7f708816">eaebfb49103a255dc2d75f384b343f6a7f708816</a></p> <p>Found in base branch: <b>datasource-meta</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require('y18n')(); y18n.setLocale('__proto__'); y18n.updateLocale({polluted: true}); console.log(polluted); // true <p>Publish Date: 2020-11-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7774>CVE-2020-7774</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1654">https://www.npmjs.com/advisories/1654</a></p> <p>Release Date: 2020-11-17</p> <p>Fix Resolution: 3.2.2, 4.0.1, 5.0.5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-7774 (High) detected in y18n-3.2.1.tgz, y18n-4.0.0.tgz - autoclosed - ## CVE-2020-7774 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>y18n-3.2.1.tgz</b>, <b>y18n-4.0.0.tgz</b></p></summary> <p> <details><summary><b>y18n-3.2.1.tgz</b></p></summary> <p>the bare-bones internationalization library used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/y18n/-/y18n-3.2.1.tgz">https://registry.npmjs.org/y18n/-/y18n-3.2.1.tgz</a></p> <p>Path to dependency file: grafana/package.json</p> <p>Path to vulnerable library: grafana/node_modules/y18n</p> <p> Dependency Hierarchy: - @grafana/toolkit-6.7.0-pre.tgz (Root Library) - node-sass-4.12.0.tgz - sass-graph-2.2.4.tgz - yargs-7.1.0.tgz - :x: **y18n-3.2.1.tgz** (Vulnerable Library) </details> <details><summary><b>y18n-4.0.0.tgz</b></p></summary> <p>the bare-bones internationalization library used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/y18n/-/y18n-4.0.0.tgz">https://registry.npmjs.org/y18n/-/y18n-4.0.0.tgz</a></p> <p>Path to dependency file: grafana/package.json</p> <p>Path to vulnerable library: grafana/node_modules/y18n</p> <p> Dependency Hierarchy: - npm-6.14.6.tgz (Root Library) - cacache-12.0.3.tgz - :x: **y18n-4.0.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/turkdevops/grafana/commit/eaebfb49103a255dc2d75f384b343f6a7f708816">eaebfb49103a255dc2d75f384b343f6a7f708816</a></p> <p>Found in base branch: <b>datasource-meta</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require('y18n')(); y18n.setLocale('__proto__'); y18n.updateLocale({polluted: true}); console.log(polluted); // true <p>Publish Date: 2020-11-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7774>CVE-2020-7774</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1654">https://www.npmjs.com/advisories/1654</a></p> <p>Release Date: 2020-11-17</p> <p>Fix Resolution: 3.2.2, 4.0.1, 5.0.5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in tgz tgz autoclosed cve high severity vulnerability vulnerable libraries tgz tgz tgz the bare bones internationalization library used by yargs library home page a href path to dependency file grafana package json path to vulnerable library grafana node modules dependency hierarchy grafana toolkit pre tgz root library node sass tgz sass graph tgz yargs tgz x tgz vulnerable library tgz the bare bones internationalization library used by yargs library home page a href path to dependency file grafana package json path to vulnerable library grafana node modules dependency hierarchy npm tgz root library cacache tgz x tgz vulnerable library found in head commit a href found in base branch datasource meta vulnerability details this affects the package before and poc by const require setlocale proto updatelocale polluted true console log polluted true publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
87,844
17,381,684,275
IssuesEvent
2021-07-31 21:08:13
maks-sh/scikit-uplift
https://api.github.com/repos/maks-sh/scikit-uplift
closed
Add tests for datasets module
ODS Summer of Code help wanted
## 💡 Feature request Implement test for `fetch_lenta` and `fetch_x5` in `tests/test_datasets.py`
1.0
Add tests for datasets module - ## 💡 Feature request Implement test for `fetch_lenta` and `fetch_x5` in `tests/test_datasets.py`
non_priority
add tests for datasets module 💡 feature request implement test for fetch lenta and fetch in tests test datasets py
0
45,095
5,688,139,542
IssuesEvent
2017-04-14 02:01:17
Robo3D/Octoprint-Filament
https://api.github.com/repos/Robo3D/Octoprint-Filament
closed
False Positives Reported
bug testing
# Issue We got reports that some of the reworked C2's still broadcasted false positives. # Solution and Reasoning We couldn't recreate the issue with any of the C2's in house so we had to comb through the code in search of potential pit falls. We found a point of vulnerability that looks promising. Fundamentally, the filament switch suffers from mechanical flaw that leads to a noisy signal. The switch's output can oscillate between 1 and 0, depending on the filament's position within the encasing. We added code to clean the signal in version 2.0. We used a fixed threshold value to determine the switch's true state. Specifically, the switch would have to output a 100,000 1s within 10 seconds for the code to trigger a pause print command. We have now replaced our confidence interval with relative threshold value. Now, we are using a percentage value to determine when to trigger a pause print command. Specifically, what percentage of the total signals does 1 represent within 10 seconds? Why do we think this fixes the issue? We ran some tests with the old code (v2.2) and found that in rare cases the code could read the switches's state up to 1,000,000 times within 10 seconds. In that case, 100K 1s could trigger a pause print command yet only signify 10% of the total signal content. A relative threshold value would account for a varying read count.
1.0
False Positives Reported - # Issue We got reports that some of the reworked C2's still broadcasted false positives. # Solution and Reasoning We couldn't recreate the issue with any of the C2's in house so we had to comb through the code in search of potential pit falls. We found a point of vulnerability that looks promising. Fundamentally, the filament switch suffers from mechanical flaw that leads to a noisy signal. The switch's output can oscillate between 1 and 0, depending on the filament's position within the encasing. We added code to clean the signal in version 2.0. We used a fixed threshold value to determine the switch's true state. Specifically, the switch would have to output a 100,000 1s within 10 seconds for the code to trigger a pause print command. We have now replaced our confidence interval with relative threshold value. Now, we are using a percentage value to determine when to trigger a pause print command. Specifically, what percentage of the total signals does 1 represent within 10 seconds? Why do we think this fixes the issue? We ran some tests with the old code (v2.2) and found that in rare cases the code could read the switches's state up to 1,000,000 times within 10 seconds. In that case, 100K 1s could trigger a pause print command yet only signify 10% of the total signal content. A relative threshold value would account for a varying read count.
non_priority
false positives reported issue we got reports that some of the reworked s still broadcasted false positives solution and reasoning we couldn t recreate the issue with any of the s in house so we had to comb through the code in search of potential pit falls we found a point of vulnerability that looks promising fundamentally the filament switch suffers from mechanical flaw that leads to a noisy signal the switch s output can oscillate between and depending on the filament s position within the encasing we added code to clean the signal in version we used a fixed threshold value to determine the switch s true state specifically the switch would have to output a within seconds for the code to trigger a pause print command we have now replaced our confidence interval with relative threshold value now we are using a percentage value to determine when to trigger a pause print command specifically what percentage of the total signals does represent within seconds why do we think this fixes the issue we ran some tests with the old code and found that in rare cases the code could read the switches s state up to times within seconds in that case could trigger a pause print command yet only signify of the total signal content a relative threshold value would account for a varying read count
0
160,084
13,780,826,059
IssuesEvent
2020-10-08 15:23:35
do-community/creatorlinks
https://api.github.com/repos/do-community/creatorlinks
opened
Set Up Initial Documentation
documentation
Set up documentation. Priorities: - About - Contributing.md file - **How to set up the development environment** - How to deploy to production on App Platform and other methods (less priority initially)
1.0
Set Up Initial Documentation - Set up documentation. Priorities: - About - Contributing.md file - **How to set up the development environment** - How to deploy to production on App Platform and other methods (less priority initially)
non_priority
set up initial documentation set up documentation priorities about contributing md file how to set up the development environment how to deploy to production on app platform and other methods less priority initially
0
133,146
18,837,539,253
IssuesEvent
2021-11-11 04:08:02
react-hook-form/react-hook-form
https://api.github.com/repos/react-hook-form/react-hook-form
reopened
issue: form state becomes incorrect if useFieldArray methods are called asynchronously
design limitation
### Version Number 7.19.1 ### Codesandbox/Expo snack https://codesandbox.io/s/delicate-sun-l482x ### Steps to reproduce 1. Go to https://codesandbox.io/s/delicate-sun-l482x 2. Click on the first 'duplicate' button 3. Then remove duplicated inputs, by clicking corresponding 'delete' button 4. Then click first 'delete' button 5. See that 'submit' button is inactive, because form is invalid, though the 'errors' object is empty ### Expected behaviour Form shouldn't become invalid ### What browsers are you seeing the problem on? _No response_ ### Relevant log output _No response_ ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
1.0
issue: form state becomes incorrect if useFieldArray methods are called asynchronously - ### Version Number 7.19.1 ### Codesandbox/Expo snack https://codesandbox.io/s/delicate-sun-l482x ### Steps to reproduce 1. Go to https://codesandbox.io/s/delicate-sun-l482x 2. Click on the first 'duplicate' button 3. Then remove duplicated inputs, by clicking corresponding 'delete' button 4. Then click first 'delete' button 5. See that 'submit' button is inactive, because form is invalid, though the 'errors' object is empty ### Expected behaviour Form shouldn't become invalid ### What browsers are you seeing the problem on? _No response_ ### Relevant log output _No response_ ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
non_priority
issue form state becomes incorrect if usefieldarray methods are called asynchronously version number codesandbox expo snack steps to reproduce go to click on the first duplicate button then remove duplicated inputs by clicking corresponding delete button then click first delete button see that submit button is inactive because form is invalid though the errors object is empty expected behaviour form shouldn t become invalid what browsers are you seeing the problem on no response relevant log output no response code of conduct i agree to follow this project s code of conduct
0
183,440
14,231,215,143
IssuesEvent
2020-11-18 09:15:43
mindsdb/mindsdb
https://api.github.com/repos/mindsdb/mindsdb
closed
Use a different dataset for every database
tests
Use a different dataset for the tests of every different database. E.g. use home_rentals for clickhouse, us_health_insurance for mysql, diamonds for postgres... etc
1.0
Use a different dataset for every database - Use a different dataset for the tests of every different database. E.g. use home_rentals for clickhouse, us_health_insurance for mysql, diamonds for postgres... etc
non_priority
use a different dataset for every database use a different dataset for the tests of every different database e g use home rentals for clickhouse us health insurance for mysql diamonds for postgres etc
0
12,111
5,146,502,748
IssuesEvent
2017-01-13 01:32:34
dotnet/cli
https://api.github.com/repos/dotnet/cli
closed
Can't reference Microsoft.TeamFoundation.Client in net461 app
msbuild-mitigated
## Steps to reproduce 1. Create a new .NET Core App 2. Change framework to net461 instead of netcoreapp1.0 3. Try to add a reference to framework assembly "Microsoft.TeamFoundation.Client" ## Expected behavior I expect that it would be added and can compile against ## Actual behavior It doesn't show up in the project.json intellisense, and when I try to add it via the reference dialog, I don't see it and get the following error when I browse to it: > .NET Core projects only support referencing .NET framework assemblies in this release. To reference other assemblies, they need to be included in a NuGet package and reference that package I can create a nuget package for it, but I consider it a regression from the previous console experience. In case someone is wondering why I'm using a the cli for this is because it references other libraries which are .NET Core projects. ## Environment data `dotnet --info` output: ``` .NET Command Line Tools (1.0.0-preview1-002702) Product Information: Version: 1.0.0-preview1-002702 Commit Sha: 6cde21225e Runtime Environment: OS Name: Windows OS Version: 10.0.10586 OS Platform: Windows RID: win10-x64 ```
1.0
Can't reference Microsoft.TeamFoundation.Client in net461 app - ## Steps to reproduce 1. Create a new .NET Core App 2. Change framework to net461 instead of netcoreapp1.0 3. Try to add a reference to framework assembly "Microsoft.TeamFoundation.Client" ## Expected behavior I expect that it would be added and can compile against ## Actual behavior It doesn't show up in the project.json intellisense, and when I try to add it via the reference dialog, I don't see it and get the following error when I browse to it: > .NET Core projects only support referencing .NET framework assemblies in this release. To reference other assemblies, they need to be included in a NuGet package and reference that package I can create a nuget package for it, but I consider it a regression from the previous console experience. In case someone is wondering why I'm using a the cli for this is because it references other libraries which are .NET Core projects. ## Environment data `dotnet --info` output: ``` .NET Command Line Tools (1.0.0-preview1-002702) Product Information: Version: 1.0.0-preview1-002702 Commit Sha: 6cde21225e Runtime Environment: OS Name: Windows OS Version: 10.0.10586 OS Platform: Windows RID: win10-x64 ```
non_priority
can t reference microsoft teamfoundation client in app steps to reproduce create a new net core app change framework to instead of try to add a reference to framework assembly microsoft teamfoundation client expected behavior i expect that it would be added and can compile against actual behavior it doesn t show up in the project json intellisense and when i try to add it via the reference dialog i don t see it and get the following error when i browse to it net core projects only support referencing net framework assemblies in this release to reference other assemblies they need to be included in a nuget package and reference that package i can create a nuget package for it but i consider it a regression from the previous console experience in case someone is wondering why i m using a the cli for this is because it references other libraries which are net core projects environment data dotnet info output net command line tools product information version commit sha runtime environment os name windows os version os platform windows rid
0
108,823
23,667,198,772
IssuesEvent
2022-08-26 22:54:13
joomla/joomla-cms
https://api.github.com/repos/joomla/joomla-cms
closed
Breadcrumbs Structured Data Contains Errors
No Code Attached Yet
### Steps to reproduce the issue Add a bread crumb to your website Test coding best practises on Google Structured Data testing tools https://search.google.com/structured-data/testing-tool Errors Appear ### Expected result No Errors ### Actual result Errors ### System information (as much as possible) Joomla 3.9.13 ### Additional comments SEO is important for websites and breadcrumbs add vital code that can set users apart in search results giving Joomla an edge on Wordpress and other CMS's.
1.0
Breadcrumbs Structured Data Contains Errors - ### Steps to reproduce the issue Add a bread crumb to your website Test coding best practises on Google Structured Data testing tools https://search.google.com/structured-data/testing-tool Errors Appear ### Expected result No Errors ### Actual result Errors ### System information (as much as possible) Joomla 3.9.13 ### Additional comments SEO is important for websites and breadcrumbs add vital code that can set users apart in search results giving Joomla an edge on Wordpress and other CMS's.
non_priority
breadcrumbs structured data contains errors steps to reproduce the issue add a bread crumb to your website test coding best practises on google structured data testing tools errors appear expected result no errors actual result errors system information as much as possible joomla additional comments seo is important for websites and breadcrumbs add vital code that can set users apart in search results giving joomla an edge on wordpress and other cms s
0
201,422
22,957,735,404
IssuesEvent
2022-07-19 13:04:02
elastic/integrations
https://api.github.com/repos/elastic/integrations
closed
[Netskope] Add support to handle null values in ip field and handle failure in uri_parts processor applied on url
enhancement Team:Security-External Integrations Integration:Netskope
**Problem statement:** Netskope events data is getting dropped when ip fields are having null values. When uri_parts processor is applied on url field and url field contains url without protocol in it, then data is getting dropped. **Describe the enhancement:** Data received from newer version of Netskope CLS, it is found that ip field are having null values because of which ip processor applied on that field is getting failed and so data is getting dropped. So there is a need to handle null values when received for the field source.ip, destination.ip and user.ip. There is a need to handle the failure in uri_parts processor when url field contains url without protocol in it.
True
[Netskope] Add support to handle null values in ip field and handle failure in uri_parts processor applied on url - **Problem statement:** Netskope events data is getting dropped when ip fields are having null values. When uri_parts processor is applied on url field and url field contains url without protocol in it, then data is getting dropped. **Describe the enhancement:** Data received from newer version of Netskope CLS, it is found that ip field are having null values because of which ip processor applied on that field is getting failed and so data is getting dropped. So there is a need to handle null values when received for the field source.ip, destination.ip and user.ip. There is a need to handle the failure in uri_parts processor when url field contains url without protocol in it.
non_priority
add support to handle null values in ip field and handle failure in uri parts processor applied on url problem statement netskope events data is getting dropped when ip fields are having null values when uri parts processor is applied on url field and url field contains url without protocol in it then data is getting dropped describe the enhancement data received from newer version of netskope cls it is found that ip field are having null values because of which ip processor applied on that field is getting failed and so data is getting dropped so there is a need to handle null values when received for the field source ip destination ip and user ip there is a need to handle the failure in uri parts processor when url field contains url without protocol in it
0
169,108
13,124,148,364
IssuesEvent
2020-08-06 02:51:02
DiscordSRV/DiscordSRV
https://api.github.com/repos/DiscordSRV/DiscordSRV
closed
Error on latest snapshot
bug needs testing
Hi! I get this on start up after update: https://pastebin.com/m1Zim7ia I use java 11 - papermc 1.16.1
1.0
Error on latest snapshot - Hi! I get this on start up after update: https://pastebin.com/m1Zim7ia I use java 11 - papermc 1.16.1
non_priority
error on latest snapshot hi i get this on start up after update i use java papermc
0
268,775
20,361,071,687
IssuesEvent
2022-02-20 17:43:31
countercept/chainsaw
https://api.github.com/repos/countercept/chainsaw
closed
--json output path not working for hunts
documentation
I'm trying to generate a json output file. Unfortuanttly it seems not to work because it's not allowed to add a path after --json like --json C:\TEMP\test.json **Expected behavior:** If I'm running the command: chainsaw.exe" hunt C:\Windows\System32\winevt\Logs --rules "C:\xyz\xyz\xyz\chainsaw\sigma_rules" --mapping "xyz\xyz\xyz\chainsaw\mapping_files\sigma-mapping.yml --json C:\xyz\xyz\xyz\chainsaw\output.json I would execpet in the folder C:\xyz\xyz\xyz\chainsaw\ the output.json. Actual behavior If I'm running the command: chainsaw.exe" hunt C:\Windows\System32\winevt\Logs --rules "C:\xyz\xyz\xyz\chainsaw\sigma_rules" --mapping "xyz\xyz\xyz\chainsaw\mapping_files\sigma-mapping.yml --json C:\xyz\xyz\xyz\chainsaw\output.json I get the following "error" dialog: error: Found argument 'C:\xyz\xyz\xyz\chainsaw\output.json' which wasn't expected, or isn't valid in this context If I'm running it without a path like: chainsaw.exe" hunt C:\Windows\System32\winevt\Logs --rules "C:\xyz\xyz\xyz\chainsaw\sigma_rules" --mapping "xyz\xyz\xyz\chainsaw\mapping_files\sigma-mapping.yml --json Its working but prints the json in the console which is not what I expect from this paramter. Could you maybe have a look on it? Thanks already and many greetings
1.0
--json output path not working for hunts - I'm trying to generate a json output file. Unfortuanttly it seems not to work because it's not allowed to add a path after --json like --json C:\TEMP\test.json **Expected behavior:** If I'm running the command: chainsaw.exe" hunt C:\Windows\System32\winevt\Logs --rules "C:\xyz\xyz\xyz\chainsaw\sigma_rules" --mapping "xyz\xyz\xyz\chainsaw\mapping_files\sigma-mapping.yml --json C:\xyz\xyz\xyz\chainsaw\output.json I would execpet in the folder C:\xyz\xyz\xyz\chainsaw\ the output.json. Actual behavior If I'm running the command: chainsaw.exe" hunt C:\Windows\System32\winevt\Logs --rules "C:\xyz\xyz\xyz\chainsaw\sigma_rules" --mapping "xyz\xyz\xyz\chainsaw\mapping_files\sigma-mapping.yml --json C:\xyz\xyz\xyz\chainsaw\output.json I get the following "error" dialog: error: Found argument 'C:\xyz\xyz\xyz\chainsaw\output.json' which wasn't expected, or isn't valid in this context If I'm running it without a path like: chainsaw.exe" hunt C:\Windows\System32\winevt\Logs --rules "C:\xyz\xyz\xyz\chainsaw\sigma_rules" --mapping "xyz\xyz\xyz\chainsaw\mapping_files\sigma-mapping.yml --json Its working but prints the json in the console which is not what I expect from this paramter. Could you maybe have a look on it? Thanks already and many greetings
non_priority
json output path not working for hunts i m trying to generate a json output file unfortuanttly it seems not to work because it s not allowed to add a path after json like json c temp test json expected behavior if i m running the command chainsaw exe hunt c windows winevt logs rules c xyz xyz xyz chainsaw sigma rules mapping xyz xyz xyz chainsaw mapping files sigma mapping yml json c xyz xyz xyz chainsaw output json i would execpet in the folder c xyz xyz xyz chainsaw the output json actual behavior if i m running the command chainsaw exe hunt c windows winevt logs rules c xyz xyz xyz chainsaw sigma rules mapping xyz xyz xyz chainsaw mapping files sigma mapping yml json c xyz xyz xyz chainsaw output json i get the following error dialog error found argument c xyz xyz xyz chainsaw output json which wasn t expected or isn t valid in this context if i m running it without a path like chainsaw exe hunt c windows winevt logs rules c xyz xyz xyz chainsaw sigma rules mapping xyz xyz xyz chainsaw mapping files sigma mapping yml json its working but prints the json in the console which is not what i expect from this paramter could you maybe have a look on it thanks already and many greetings
0
113,266
14,404,155,864
IssuesEvent
2020-12-03 16:55:58
wellcomecollection/wellcomecollection.org
https://api.github.com/repos/wellcomecollection/wellcomecollection.org
opened
Improving styling of document downloads
improvement ✨ needs:design
# What is it and who's it for? - All site users The styling on downloadable documents is a bit odd. When a document is linked from inside body text, it picks up the download icon and filesize, interrupting the reading flow <img width="871" alt="Screenshot 2020-12-03 at 16 52 41" src="https://user-images.githubusercontent.com/1446139/101061262-37079400-3588-11eb-8180-c44aafee17d9.png"> When a document title is long and wraps to next line, the hyperlink takes the full width of the line, rather than the text <img width="528" alt="Screenshot 2020-12-03 at 16 52 59" src="https://user-images.githubusercontent.com/1446139/101061335-4e468180-3588-11eb-9fed-67eeb8e1585d.png">
1.0
Improving styling of document downloads - # What is it and who's it for? - All site users The styling on downloadable documents is a bit odd. When a document is linked from inside body text, it picks up the download icon and filesize, interrupting the reading flow <img width="871" alt="Screenshot 2020-12-03 at 16 52 41" src="https://user-images.githubusercontent.com/1446139/101061262-37079400-3588-11eb-8180-c44aafee17d9.png"> When a document title is long and wraps to next line, the hyperlink takes the full width of the line, rather than the text <img width="528" alt="Screenshot 2020-12-03 at 16 52 59" src="https://user-images.githubusercontent.com/1446139/101061335-4e468180-3588-11eb-9fed-67eeb8e1585d.png">
non_priority
improving styling of document downloads what is it and who s it for all site users the styling on downloadable documents is a bit odd when a document is linked from inside body text it picks up the download icon and filesize interrupting the reading flow img width alt screenshot at src when a document title is long and wraps to next line the hyperlink takes the full width of the line rather than the text img width alt screenshot at src
0
169,325
26,780,727,763
IssuesEvent
2023-01-31 20:56:23
department-of-veterans-affairs/vets-design-system-documentation
https://api.github.com/repos/department-of-veterans-affairs/vets-design-system-documentation
closed
Conversion to USWDS v3 - Select box - Design
vsp-design-system-team va-select
## Description We need to incorporate the designs for the [USWDS Select component](https://designsystem.digital.gov/components/select/) into the VA Sketch library. ## Tasks - [ ] Audit differences between the USWDS version and ours and present to the DST - [ ] Incorporate designs for USWDS Select into our select box component in Sketch - [ ] Review designs with PO - [ ] Review designs with DST members (Carol can help schedule this) - [ ] Address any comments from reviews, if necessary - [ ] Comment on this ticket with a link to the designs and post in DST Slack channel ## Acceptance Criteria - [ ] Where necessary, USWDS Text input designs have been incorporated into our Sketch library - [ ] Designs have been presented to the DST
1.0
Conversion to USWDS v3 - Select box - Design - ## Description We need to incorporate the designs for the [USWDS Select component](https://designsystem.digital.gov/components/select/) into the VA Sketch library. ## Tasks - [ ] Audit differences between the USWDS version and ours and present to the DST - [ ] Incorporate designs for USWDS Select into our select box component in Sketch - [ ] Review designs with PO - [ ] Review designs with DST members (Carol can help schedule this) - [ ] Address any comments from reviews, if necessary - [ ] Comment on this ticket with a link to the designs and post in DST Slack channel ## Acceptance Criteria - [ ] Where necessary, USWDS Text input designs have been incorporated into our Sketch library - [ ] Designs have been presented to the DST
non_priority
conversion to uswds select box design description we need to incorporate the designs for the into the va sketch library tasks audit differences between the uswds version and ours and present to the dst incorporate designs for uswds select into our select box component in sketch review designs with po review designs with dst members carol can help schedule this address any comments from reviews if necessary comment on this ticket with a link to the designs and post in dst slack channel acceptance criteria where necessary uswds text input designs have been incorporated into our sketch library designs have been presented to the dst
0
17,611
5,447,803,827
IssuesEvent
2017-03-07 14:30:14
TheUnrealMattix/W
https://api.github.com/repos/TheUnrealMattix/W
opened
The option to restart the level or start the next level!
code graphics
When the player reaches/walks into the stump at the end of each level, a temporary UI will show up that will give the player the option to restart the level or go to the next level!
1.0
The option to restart the level or start the next level! - When the player reaches/walks into the stump at the end of each level, a temporary UI will show up that will give the player the option to restart the level or go to the next level!
non_priority
the option to restart the level or start the next level when the player reaches walks into the stump at the end of each level a temporary ui will show up that will give the player the option to restart the level or go to the next level
0
43,680
5,681,115,893
IssuesEvent
2017-04-13 04:45:21
Jerome-Joestar/milk-intake-calculator
https://api.github.com/repos/Jerome-Joestar/milk-intake-calculator
closed
Implement responsive design
design enhancement frontend won't fix
Need to implement the wireframes created for this project (mobile - large desktop)
1.0
Implement responsive design - Need to implement the wireframes created for this project (mobile - large desktop)
non_priority
implement responsive design need to implement the wireframes created for this project mobile large desktop
0
1,500
3,801,496,234
IssuesEvent
2016-03-23 23:13:18
chri55w/QuickBooks-Timer
https://api.github.com/repos/chri55w/QuickBooks-Timer
closed
Hide exported items
Requirement
It would be good to be able to hide exported items from the list of activities. In fact, this should probably be the default view.
1.0
Hide exported items - It would be good to be able to hide exported items from the list of activities. In fact, this should probably be the default view.
non_priority
hide exported items it would be good to be able to hide exported items from the list of activities in fact this should probably be the default view
0