Unnamed: 0
int64 0
832k
| id
float64 2.49B
32.1B
| type
stringclasses 1
value | created_at
stringlengths 19
19
| repo
stringlengths 5
112
| repo_url
stringlengths 34
141
| action
stringclasses 3
values | title
stringlengths 1
957
| labels
stringlengths 4
795
| body
stringlengths 1
259k
| index
stringclasses 12
values | text_combine
stringlengths 96
259k
| label
stringclasses 2
values | text
stringlengths 96
252k
| binary_label
int64 0
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
40,503 | 16,488,471,878 | IssuesEvent | 2021-05-24 21:58:04 | MicrosoftDocs/azure-docs | https://api.github.com/repos/MicrosoftDocs/azure-docs | closed | Improvement upon responsibility calrification | Pri2 assigned-to-author container-service/svc doc-bug triaged |
There needs to be more clarity for situations where agent nodes exhibit events like failed dns, time sync or kubelet events and node auto repair doesn't fix the issue. Since these impact applications running on these nodes, what are the recommendations for cx to avoid such events , for example if node time sync is in failed state and pods running application get into significant time drift. Where does the responsibility for managing critical system services lie and how are they supposed to be alerted on and mitigated.
https://docs.microsoft.com/en-us/azure/aks/support-policies#managed-features-in-aks
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: 36ecef62-68f2-9e81-f4b6-da2b49d1a653
* Version Independent ID: a6c2c35a-8a12-a9de-0a4e-669cf8506892
* Content: [Support policies for Azure Kubernetes Service (AKS) - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/support-policies)
* Content Source: [articles/aks/support-policies.md](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/aks/support-policies.md)
* Service: **container-service**
* GitHub Login: @mlearned
* Microsoft Alias: **mlearned** | 1.0 | Improvement upon responsibility calrification -
There needs to be more clarity for situations where agent nodes exhibit events like failed dns, time sync or kubelet events and node auto repair doesn't fix the issue. Since these impact applications running on these nodes, what are the recommendations for cx to avoid such events , for example if node time sync is in failed state and pods running application get into significant time drift. Where does the responsibility for managing critical system services lie and how are they supposed to be alerted on and mitigated.
https://docs.microsoft.com/en-us/azure/aks/support-policies#managed-features-in-aks
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: 36ecef62-68f2-9e81-f4b6-da2b49d1a653
* Version Independent ID: a6c2c35a-8a12-a9de-0a4e-669cf8506892
* Content: [Support policies for Azure Kubernetes Service (AKS) - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/support-policies)
* Content Source: [articles/aks/support-policies.md](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/aks/support-policies.md)
* Service: **container-service**
* GitHub Login: @mlearned
* Microsoft Alias: **mlearned** | non_priority | improvement upon responsibility calrification there needs to be more clarity for situations where agent nodes exhibit events like failed dns time sync or kubelet events and node auto repair doesn t fix the issue since these impact applications running on these nodes what are the recommendations for cx to avoid such events for example if node time sync is in failed state and pods running application get into significant time drift where does the responsibility for managing critical system services lie and how are they supposed to be alerted on and mitigated document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service container service github login mlearned microsoft alias mlearned | 0 |
37,909 | 12,507,208,695 | IssuesEvent | 2020-06-02 13:47:55 | ghosind/visual-algo | https://api.github.com/repos/ghosind/visual-algo | opened | WS-2020-0070 (High) detected in lodash-4.17.15.tgz | security vulnerability | ## WS-2020-0070 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.15.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/visual-algo/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/visual-algo/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- jest-dom-4.2.4.tgz (Root Library)
- :x: **lodash-4.17.15.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ghosind/visual-algo/commit/3bb1933241744c7ab4b67553a2122e1ba6c2026c">3bb1933241744c7ab4b67553a2122e1ba6c2026c</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
a prototype pollution vulnerability in lodash. It allows an attacker to inject properties on Object.prototype
<p>Publish Date: 2020-04-28
<p>URL: <a href=https://hackerone.com/reports/712065>WS-2020-0070</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2020-0070 (High) detected in lodash-4.17.15.tgz - ## WS-2020-0070 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.15.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/visual-algo/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/visual-algo/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- jest-dom-4.2.4.tgz (Root Library)
- :x: **lodash-4.17.15.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ghosind/visual-algo/commit/3bb1933241744c7ab4b67553a2122e1ba6c2026c">3bb1933241744c7ab4b67553a2122e1ba6c2026c</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
a prototype pollution vulnerability in lodash. It allows an attacker to inject properties on Object.prototype
<p>Publish Date: 2020-04-28
<p>URL: <a href=https://hackerone.com/reports/712065>WS-2020-0070</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws high detected in lodash tgz ws high severity vulnerability vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file tmp ws scm visual algo package json path to vulnerable library tmp ws scm visual algo node modules lodash package json dependency hierarchy jest dom tgz root library x lodash tgz vulnerable library found in head commit a href vulnerability details a prototype pollution vulnerability in lodash it allows an attacker to inject properties on object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with whitesource | 0 |
349,602 | 31,814,990,137 | IssuesEvent | 2023-09-13 19:44:21 | NVIDIA/spark-rapids | https://api.github.com/repos/NVIDIA/spark-rapids | closed | [BUG] test_parquet_testing_error_files - Failed: DID NOT RAISE <class 'Exception'> in databricks runtime 12.2 | bug ? - Needs Triage test | **Describe the bug**
found the test failures in recent nightly build, like rapids_databricks_nightly-dev-github build ID: 830
and premerge CI w/ databricks test, like rapids-databricks_premerge-github ID:216
Currently databricks runtimes (10.4,11.4) passed the same cases well, but 12.2 runtime (spark332db) would fail
`fixed_length_byte_array.parquet-Exception: Failed: DID NOT RAISE <class 'Exception'>`
```
[2023-09-13T07:56:37.609Z] FAILED ../../src/main/python/parquet_testing_test.py::test_parquet_testing_error_files[confs1-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception] - Failed: DID NOT RAISE <class 'Exception'>
[2023-09-13T07:56:37.609Z] FAILED ../../src/main/python/parquet_testing_test.py::test_parquet_testing_error_files[confs0-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception][INJECT_OOM] - Failed: DID NOT RAISE <class 'Exception'>
```
```[2023-09-13T05:58:45.805Z] _ test_parquet_testing_error_files[confs0-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception] _
[2023-09-13T05:58:45.805Z] [gw3] linux -- Python 3.8.10 /usr/bin/python
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] path = '/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet'
[2023-09-13T05:58:45.805Z] errobj = 'Exception'
[2023-09-13T05:58:45.805Z] confs = {'spark.rapids.sql.format.parquet.reader.footer.type': 'NATIVE', 'spark.sql.legacy.parquet.datetimeRebaseModeInRead': 'CORRECTED', 'spark.sql.legacy.parquet.int96RebaseModeInRead': 'CORRECTED'}
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] @pytest.mark.parametrize(("path", "errobj"), gen_testing_params_for_errors())
[2023-09-13T05:58:45.805Z] @pytest.mark.parametrize("confs", [_native_reader_confs, _java_reader_confs])
[2023-09-13T05:58:45.805Z] def test_parquet_testing_error_files(path, errobj, confs):
[2023-09-13T05:58:45.805Z] error_msg = errobj
[2023-09-13T05:58:45.805Z] print("error_msg:", error_msg)
[2023-09-13T05:58:45.805Z] if type(error_msg) != str:
[2023-09-13T05:58:45.805Z] error_msg, xfail_reason = errobj
[2023-09-13T05:58:45.805Z] pytest.xfail(xfail_reason)
[2023-09-13T05:58:45.805Z] > assert_gpu_and_cpu_error(
[2023-09-13T05:58:45.805Z] lambda spark: spark.read.parquet(path).collect(),
[2023-09-13T05:58:45.805Z] conf=confs,
[2023-09-13T05:58:45.805Z] error_message=error_msg)
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] ../../src/main/python/parquet_testing_test.py:137:
[2023-09-13T05:58:45.805Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
[2023-09-13T05:58:45.805Z] ../../src/main/python/asserts.py:632: in assert_gpu_and_cpu_error
[2023-09-13T05:58:45.805Z] assert_spark_exception(lambda: with_gpu_session(df_fun, conf), error_message)
[2023-09-13T05:58:45.805Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] func = <function assert_gpu_and_cpu_error.<locals>.<lambda> at 0x7f6010480b80>
[2023-09-13T05:58:45.805Z] error_message = 'Exception'
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] def assert_spark_exception(func, error_message):
[2023-09-13T05:58:45.805Z] """
[2023-09-13T05:58:45.805Z] Assert that a specific Java exception is thrown
[2023-09-13T05:58:45.805Z] :param func: a function to be verified
[2023-09-13T05:58:45.805Z] :param error_message: a string such as the one produce by java.lang.Exception.toString
[2023-09-13T05:58:45.805Z] :return: Assertion failure if no exception matching error_message has occurred.
[2023-09-13T05:58:45.805Z] """
[2023-09-13T05:58:45.805Z] with pytest.raises(Exception) as excinfo:
[2023-09-13T05:58:45.805Z] > func()
[2023-09-13T05:58:45.805Z] E Failed: DID NOT RAISE <class 'Exception'>
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] ../../src/main/python/asserts.py:618: Failed
[2023-09-13T05:58:45.805Z] ----------------------------- Captured stdout call -----------------------------
[2023-09-13T05:58:45.805Z] error_msg: Exception
[2023-09-13T05:58:45.805Z] _ test_parquet_testing_error_files[confs1-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception] _
[2023-09-13T05:58:45.805Z] [gw3] linux -- Python 3.8.10 /usr/bin/python
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] path = '/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet'
[2023-09-13T05:58:45.805Z] errobj = 'Exception'
[2023-09-13T05:58:45.805Z] confs = {'spark.rapids.sql.format.parquet.reader.footer.type': 'JAVA', 'spark.sql.legacy.parquet.datetimeRebaseModeInRead': 'CORRECTED', 'spark.sql.legacy.parquet.int96RebaseModeInRead': 'CORRECTED'}
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] @pytest.mark.parametrize(("path", "errobj"), gen_testing_params_for_errors())
[2023-09-13T05:58:45.805Z] @pytest.mark.parametrize("confs", [_native_reader_confs, _java_reader_confs])
[2023-09-13T05:58:45.805Z] def test_parquet_testing_error_files(path, errobj, confs):
[2023-09-13T05:58:45.805Z] error_msg = errobj
[2023-09-13T05:58:45.805Z] print("error_msg:", error_msg)
[2023-09-13T05:58:45.805Z] if type(error_msg) != str:
[2023-09-13T05:58:45.805Z] error_msg, xfail_reason = errobj
[2023-09-13T05:58:45.805Z] pytest.xfail(xfail_reason)
[2023-09-13T05:58:45.805Z] > assert_gpu_and_cpu_error(
[2023-09-13T05:58:45.806Z] lambda spark: spark.read.parquet(path).collect(),
[2023-09-13T05:58:45.806Z] conf=confs,
[2023-09-13T05:58:45.806Z] error_message=error_msg)
[2023-09-13T05:58:45.806Z]
[2023-09-13T05:58:45.806Z] ../../src/main/python/parquet_testing_test.py:137:
[2023-09-13T05:58:45.806Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
[2023-09-13T05:58:45.806Z] ../../src/main/python/asserts.py:632: in assert_gpu_and_cpu_error
[2023-09-13T05:58:45.806Z] assert_spark_exception(lambda: with_gpu_session(df_fun, conf), error_message)
[2023-09-13T05:58:45.806Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
[2023-09-13T05:58:45.806Z]
[2023-09-13T05:58:45.806Z] func = <function assert_gpu_and_cpu_error.<locals>.<lambda> at 0x7f60022bd310>
[2023-09-13T05:58:45.806Z] error_message = 'Exception'
[2023-09-13T05:58:45.806Z]
[2023-09-13T05:58:45.806Z] def assert_spark_exception(func, error_message):
[2023-09-13T05:58:45.806Z] """
[2023-09-13T05:58:45.806Z] Assert that a specific Java exception is thrown
[2023-09-13T05:58:45.806Z] :param func: a function to be verified
[2023-09-13T05:58:45.806Z] :param error_message: a string such as the one produce by java.lang.Exception.toString
[2023-09-13T05:58:45.806Z] :return: Assertion failure if no exception matching error_message has occurred.
[2023-09-13T05:58:45.806Z] """
[2023-09-13T05:58:45.806Z] with pytest.raises(Exception) as excinfo:
[2023-09-13T05:58:45.806Z] > func()
[2023-09-13T05:58:45.806Z] E Failed: DID NOT RAISE <class 'Exception'>
```
**Steps/Code to reproduce bug**
run integration case in databricks 12.2 runtime
**Expected behavior**
Pass the test
**Environment details (please complete the following information)**
- Environment location: [Standalone, YARN, Kubernetes, Cloud(specify cloud provider)]
- Spark configuration settings related to the issue
**Additional context**
Add any other context about the problem here.
| 1.0 | [BUG] test_parquet_testing_error_files - Failed: DID NOT RAISE <class 'Exception'> in databricks runtime 12.2 - **Describe the bug**
found the test failures in recent nightly build, like rapids_databricks_nightly-dev-github build ID: 830
and premerge CI w/ databricks test, like rapids-databricks_premerge-github ID:216
Currently databricks runtimes (10.4,11.4) passed the same cases well, but 12.2 runtime (spark332db) would fail
`fixed_length_byte_array.parquet-Exception: Failed: DID NOT RAISE <class 'Exception'>`
```
[2023-09-13T07:56:37.609Z] FAILED ../../src/main/python/parquet_testing_test.py::test_parquet_testing_error_files[confs1-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception] - Failed: DID NOT RAISE <class 'Exception'>
[2023-09-13T07:56:37.609Z] FAILED ../../src/main/python/parquet_testing_test.py::test_parquet_testing_error_files[confs0-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception][INJECT_OOM] - Failed: DID NOT RAISE <class 'Exception'>
```
```[2023-09-13T05:58:45.805Z] _ test_parquet_testing_error_files[confs0-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception] _
[2023-09-13T05:58:45.805Z] [gw3] linux -- Python 3.8.10 /usr/bin/python
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] path = '/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet'
[2023-09-13T05:58:45.805Z] errobj = 'Exception'
[2023-09-13T05:58:45.805Z] confs = {'spark.rapids.sql.format.parquet.reader.footer.type': 'NATIVE', 'spark.sql.legacy.parquet.datetimeRebaseModeInRead': 'CORRECTED', 'spark.sql.legacy.parquet.int96RebaseModeInRead': 'CORRECTED'}
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] @pytest.mark.parametrize(("path", "errobj"), gen_testing_params_for_errors())
[2023-09-13T05:58:45.805Z] @pytest.mark.parametrize("confs", [_native_reader_confs, _java_reader_confs])
[2023-09-13T05:58:45.805Z] def test_parquet_testing_error_files(path, errobj, confs):
[2023-09-13T05:58:45.805Z] error_msg = errobj
[2023-09-13T05:58:45.805Z] print("error_msg:", error_msg)
[2023-09-13T05:58:45.805Z] if type(error_msg) != str:
[2023-09-13T05:58:45.805Z] error_msg, xfail_reason = errobj
[2023-09-13T05:58:45.805Z] pytest.xfail(xfail_reason)
[2023-09-13T05:58:45.805Z] > assert_gpu_and_cpu_error(
[2023-09-13T05:58:45.805Z] lambda spark: spark.read.parquet(path).collect(),
[2023-09-13T05:58:45.805Z] conf=confs,
[2023-09-13T05:58:45.805Z] error_message=error_msg)
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] ../../src/main/python/parquet_testing_test.py:137:
[2023-09-13T05:58:45.805Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
[2023-09-13T05:58:45.805Z] ../../src/main/python/asserts.py:632: in assert_gpu_and_cpu_error
[2023-09-13T05:58:45.805Z] assert_spark_exception(lambda: with_gpu_session(df_fun, conf), error_message)
[2023-09-13T05:58:45.805Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] func = <function assert_gpu_and_cpu_error.<locals>.<lambda> at 0x7f6010480b80>
[2023-09-13T05:58:45.805Z] error_message = 'Exception'
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] def assert_spark_exception(func, error_message):
[2023-09-13T05:58:45.805Z] """
[2023-09-13T05:58:45.805Z] Assert that a specific Java exception is thrown
[2023-09-13T05:58:45.805Z] :param func: a function to be verified
[2023-09-13T05:58:45.805Z] :param error_message: a string such as the one produce by java.lang.Exception.toString
[2023-09-13T05:58:45.805Z] :return: Assertion failure if no exception matching error_message has occurred.
[2023-09-13T05:58:45.805Z] """
[2023-09-13T05:58:45.805Z] with pytest.raises(Exception) as excinfo:
[2023-09-13T05:58:45.805Z] > func()
[2023-09-13T05:58:45.805Z] E Failed: DID NOT RAISE <class 'Exception'>
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] ../../src/main/python/asserts.py:618: Failed
[2023-09-13T05:58:45.805Z] ----------------------------- Captured stdout call -----------------------------
[2023-09-13T05:58:45.805Z] error_msg: Exception
[2023-09-13T05:58:45.805Z] _ test_parquet_testing_error_files[confs1-/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet-Exception] _
[2023-09-13T05:58:45.805Z] [gw3] linux -- Python 3.8.10 /usr/bin/python
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] path = '/home/ubuntu/spark-rapids/thirdparty/parquet-testing/data/fixed_length_byte_array.parquet'
[2023-09-13T05:58:45.805Z] errobj = 'Exception'
[2023-09-13T05:58:45.805Z] confs = {'spark.rapids.sql.format.parquet.reader.footer.type': 'JAVA', 'spark.sql.legacy.parquet.datetimeRebaseModeInRead': 'CORRECTED', 'spark.sql.legacy.parquet.int96RebaseModeInRead': 'CORRECTED'}
[2023-09-13T05:58:45.805Z]
[2023-09-13T05:58:45.805Z] @pytest.mark.parametrize(("path", "errobj"), gen_testing_params_for_errors())
[2023-09-13T05:58:45.805Z] @pytest.mark.parametrize("confs", [_native_reader_confs, _java_reader_confs])
[2023-09-13T05:58:45.805Z] def test_parquet_testing_error_files(path, errobj, confs):
[2023-09-13T05:58:45.805Z] error_msg = errobj
[2023-09-13T05:58:45.805Z] print("error_msg:", error_msg)
[2023-09-13T05:58:45.805Z] if type(error_msg) != str:
[2023-09-13T05:58:45.805Z] error_msg, xfail_reason = errobj
[2023-09-13T05:58:45.805Z] pytest.xfail(xfail_reason)
[2023-09-13T05:58:45.805Z] > assert_gpu_and_cpu_error(
[2023-09-13T05:58:45.806Z] lambda spark: spark.read.parquet(path).collect(),
[2023-09-13T05:58:45.806Z] conf=confs,
[2023-09-13T05:58:45.806Z] error_message=error_msg)
[2023-09-13T05:58:45.806Z]
[2023-09-13T05:58:45.806Z] ../../src/main/python/parquet_testing_test.py:137:
[2023-09-13T05:58:45.806Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
[2023-09-13T05:58:45.806Z] ../../src/main/python/asserts.py:632: in assert_gpu_and_cpu_error
[2023-09-13T05:58:45.806Z] assert_spark_exception(lambda: with_gpu_session(df_fun, conf), error_message)
[2023-09-13T05:58:45.806Z] _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
[2023-09-13T05:58:45.806Z]
[2023-09-13T05:58:45.806Z] func = <function assert_gpu_and_cpu_error.<locals>.<lambda> at 0x7f60022bd310>
[2023-09-13T05:58:45.806Z] error_message = 'Exception'
[2023-09-13T05:58:45.806Z]
[2023-09-13T05:58:45.806Z] def assert_spark_exception(func, error_message):
[2023-09-13T05:58:45.806Z] """
[2023-09-13T05:58:45.806Z] Assert that a specific Java exception is thrown
[2023-09-13T05:58:45.806Z] :param func: a function to be verified
[2023-09-13T05:58:45.806Z] :param error_message: a string such as the one produce by java.lang.Exception.toString
[2023-09-13T05:58:45.806Z] :return: Assertion failure if no exception matching error_message has occurred.
[2023-09-13T05:58:45.806Z] """
[2023-09-13T05:58:45.806Z] with pytest.raises(Exception) as excinfo:
[2023-09-13T05:58:45.806Z] > func()
[2023-09-13T05:58:45.806Z] E Failed: DID NOT RAISE <class 'Exception'>
```
**Steps/Code to reproduce bug**
run integration case in databricks 12.2 runtime
**Expected behavior**
Pass the test
**Environment details (please complete the following information)**
- Environment location: [Standalone, YARN, Kubernetes, Cloud(specify cloud provider)]
- Spark configuration settings related to the issue
**Additional context**
Add any other context about the problem here.
| non_priority | test parquet testing error files failed did not raise in databricks runtime describe the bug found the test failures in recent nightly build like rapids databricks nightly dev github build id and premerge ci w databricks test like rapids databricks premerge github id currently databricks runtimes passed the same cases well but runtime would fail fixed length byte array parquet exception failed did not raise failed src main python parquet testing test py test parquet testing error files failed did not raise failed src main python parquet testing test py test parquet testing error files failed did not raise test parquet testing error files linux python usr bin python path home ubuntu spark rapids thirdparty parquet testing data fixed length byte array parquet errobj exception confs spark rapids sql format parquet reader footer type native spark sql legacy parquet datetimerebasemodeinread corrected spark sql legacy parquet corrected pytest mark parametrize path errobj gen testing params for errors pytest mark parametrize confs def test parquet testing error files path errobj confs error msg errobj print error msg error msg if type error msg str error msg xfail reason errobj pytest xfail xfail reason assert gpu and cpu error lambda spark spark read parquet path collect conf confs error message error msg src main python parquet testing test py src main python asserts py in assert gpu and cpu error assert spark exception lambda with gpu session df fun conf error message func at error message exception def assert spark exception func error message assert that a specific java exception is thrown param func a function to be verified param error message a string such as the one produce by java lang exception tostring return assertion failure if no exception matching error message has occurred with pytest raises exception as excinfo func e failed did not raise src main python asserts py failed captured stdout call error msg exception test parquet testing error files linux python usr bin python path home ubuntu spark rapids thirdparty parquet testing data fixed length byte array parquet errobj exception confs spark rapids sql format parquet reader footer type java spark sql legacy parquet datetimerebasemodeinread corrected spark sql legacy parquet corrected pytest mark parametrize path errobj gen testing params for errors pytest mark parametrize confs def test parquet testing error files path errobj confs error msg errobj print error msg error msg if type error msg str error msg xfail reason errobj pytest xfail xfail reason assert gpu and cpu error lambda spark spark read parquet path collect conf confs error message error msg src main python parquet testing test py src main python asserts py in assert gpu and cpu error assert spark exception lambda with gpu session df fun conf error message func at error message exception def assert spark exception func error message assert that a specific java exception is thrown param func a function to be verified param error message a string such as the one produce by java lang exception tostring return assertion failure if no exception matching error message has occurred with pytest raises exception as excinfo func e failed did not raise steps code to reproduce bug run integration case in databricks runtime expected behavior pass the test environment details please complete the following information environment location spark configuration settings related to the issue additional context add any other context about the problem here | 0 |
70,116 | 15,051,903,620 | IssuesEvent | 2021-02-03 14:37:58 | fuzzdbunit/fuzzdbunit | https://api.github.com/repos/fuzzdbunit/fuzzdbunit | closed | CVE-2020-25649 (High) detected in jackson-databind-2.9.8.jar | security vulnerability | ## CVE-2020-25649 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: fuzzdbunit/samples/sample-selenium-test/build.gradle</p>
<p>Path to vulnerable library: /tmp/ws-ua_20210130101853_TOITPP/downloadResource_JFIXEQ/20210130102045/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- selenium-jupiter-3.3.5.jar (Root Library)
- docker-client-8.16.0.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/fuzzdbunit/fuzzdbunit/commit/7399449c10bf63469f249dcebe17f5cd629379fa">7399449c10bf63469f249dcebe17f5cd629379fa</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.
<p>Publish Date: 2020-12-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25649>CVE-2020-25649</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2589">https://github.com/FasterXML/jackson-databind/issues/2589</a></p>
<p>Release Date: 2020-12-03</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.6.7.4,2.9.10.7,2.10.5.1,2.11.0.rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-25649 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2020-25649 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: fuzzdbunit/samples/sample-selenium-test/build.gradle</p>
<p>Path to vulnerable library: /tmp/ws-ua_20210130101853_TOITPP/downloadResource_JFIXEQ/20210130102045/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- selenium-jupiter-3.3.5.jar (Root Library)
- docker-client-8.16.0.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/fuzzdbunit/fuzzdbunit/commit/7399449c10bf63469f249dcebe17f5cd629379fa">7399449c10bf63469f249dcebe17f5cd629379fa</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.
<p>Publish Date: 2020-12-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25649>CVE-2020-25649</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2589">https://github.com/FasterXML/jackson-databind/issues/2589</a></p>
<p>Release Date: 2020-12-03</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.6.7.4,2.9.10.7,2.10.5.1,2.11.0.rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file fuzzdbunit samples sample selenium test build gradle path to vulnerable library tmp ws ua toitpp downloadresource jfixeq jackson databind jar dependency hierarchy selenium jupiter jar root library docker client jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a flaw was found in fasterxml jackson databind where it did not have entity expansion secured properly this flaw allows vulnerability to xml external entity xxe attacks the highest threat from this vulnerability is data integrity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource | 0 |
468 | 6,818,039,421 | IssuesEvent | 2017-11-07 02:46:05 | librsync/librsync | https://api.github.com/repos/librsync/librsync | closed | Please use GNUInstallDirs | portability | Please use the GNUInstallDirs CMake module instead of writing install dir names explicitly. This helps with portability and especially with correct libdir names on various Linux platforms. Here is a patch which is used in Debian:
```
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -20,6 +20,7 @@ project(librsync C)
cmake_minimum_required(VERSION 2.6)
INCLUDE(CMakeDependentOption)
+include(GNUInstallDirs)
set(LIBRSYNC_MAJOR_VERSION 2)
set(LIBRSYNC_MINOR_VERSION 0)
@@ -124,11 +125,11 @@ if(APPLE)
set(CMAKE_MACOSX_RPATH ON)
set(CMAKE_SKIP_BUILD_RPATH FALSE)
set(CMAKE_BUILD_WITH_INSTALL_RPATH FALSE)
- set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/lib")
+ set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/${CMAKE_INSTALL_LIBDIR}")
set(CMAKE_INSTALL_RPATH_USE_LINK_PATH TRUE)
- list(FIND CMAKE_PLATFORM_IMPLICIT_LINK_DIRECTORIES "${CMAKE_INSTALL_PREFIX}/lib" isSystemDir)
+ list(FIND CMAKE_PLATFORM_IMPLICIT_LINK_DIRECTORIES "${CMAKE_INSTALL_PREFIX}/${CMAKE_INSTALL_LIBDIR}" isSystemDir)
if("${isSystemDir}" STREQUAL "-1")
- set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/lib")
+ set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/${CMAKE_INSTALL_LIBDIR}")
endif()
endif()
@@ -332,7 +333,7 @@ endif (ENABLE_COMPRESSION)
set_target_properties(rsync PROPERTIES VERSION ${LIBRSYNC_VERSION}
SOVERSION ${LIBRSYNC_MAJOR_VERSION})
-install(TARGETS rsync ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION lib)
+install(TARGETS rsync ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION ${CMAKE_INSTALL_LIBDIR})
########### next target ###############
@@ -349,7 +350,7 @@ if (BUILD_RDIFF)
message (WARNING "Popt library is required for rdiff target")
endif (POPT_FOUND)
- install(TARGETS rdiff ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION bin)
+ install(TARGETS rdiff ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION ${CMAKE_INSTALL_BINDIR})
endif (BUILD_RDIFF)
@@ -357,7 +358,7 @@ endif (BUILD_RDIFF)
install(FILES
src/librsync.h
- DESTINATION include)
+ DESTINATION ${CMAKE_INSTALL_INCLUDEDIR})
message (STATUS "CMAKE_C_FLAGS = ${CMAKE_C_FLAGS}")
``` | True | Please use GNUInstallDirs - Please use the GNUInstallDirs CMake module instead of writing install dir names explicitly. This helps with portability and especially with correct libdir names on various Linux platforms. Here is a patch which is used in Debian:
```
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -20,6 +20,7 @@ project(librsync C)
cmake_minimum_required(VERSION 2.6)
INCLUDE(CMakeDependentOption)
+include(GNUInstallDirs)
set(LIBRSYNC_MAJOR_VERSION 2)
set(LIBRSYNC_MINOR_VERSION 0)
@@ -124,11 +125,11 @@ if(APPLE)
set(CMAKE_MACOSX_RPATH ON)
set(CMAKE_SKIP_BUILD_RPATH FALSE)
set(CMAKE_BUILD_WITH_INSTALL_RPATH FALSE)
- set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/lib")
+ set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/${CMAKE_INSTALL_LIBDIR}")
set(CMAKE_INSTALL_RPATH_USE_LINK_PATH TRUE)
- list(FIND CMAKE_PLATFORM_IMPLICIT_LINK_DIRECTORIES "${CMAKE_INSTALL_PREFIX}/lib" isSystemDir)
+ list(FIND CMAKE_PLATFORM_IMPLICIT_LINK_DIRECTORIES "${CMAKE_INSTALL_PREFIX}/${CMAKE_INSTALL_LIBDIR}" isSystemDir)
if("${isSystemDir}" STREQUAL "-1")
- set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/lib")
+ set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/${CMAKE_INSTALL_LIBDIR}")
endif()
endif()
@@ -332,7 +333,7 @@ endif (ENABLE_COMPRESSION)
set_target_properties(rsync PROPERTIES VERSION ${LIBRSYNC_VERSION}
SOVERSION ${LIBRSYNC_MAJOR_VERSION})
-install(TARGETS rsync ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION lib)
+install(TARGETS rsync ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION ${CMAKE_INSTALL_LIBDIR})
########### next target ###############
@@ -349,7 +350,7 @@ if (BUILD_RDIFF)
message (WARNING "Popt library is required for rdiff target")
endif (POPT_FOUND)
- install(TARGETS rdiff ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION bin)
+ install(TARGETS rdiff ${INSTALL_TARGETS_DEFAULT_ARGS} DESTINATION ${CMAKE_INSTALL_BINDIR})
endif (BUILD_RDIFF)
@@ -357,7 +358,7 @@ endif (BUILD_RDIFF)
install(FILES
src/librsync.h
- DESTINATION include)
+ DESTINATION ${CMAKE_INSTALL_INCLUDEDIR})
message (STATUS "CMAKE_C_FLAGS = ${CMAKE_C_FLAGS}")
``` | non_priority | please use gnuinstalldirs please use the gnuinstalldirs cmake module instead of writing install dir names explicitly this helps with portability and especially with correct libdir names on various linux platforms here is a patch which is used in debian a cmakelists txt b cmakelists txt project librsync c cmake minimum required version include cmakedependentoption include gnuinstalldirs set librsync major version set librsync minor version if apple set cmake macosx rpath on set cmake skip build rpath false set cmake build with install rpath false set cmake install rpath cmake install prefix lib set cmake install rpath cmake install prefix cmake install libdir set cmake install rpath use link path true list find cmake platform implicit link directories cmake install prefix lib issystemdir list find cmake platform implicit link directories cmake install prefix cmake install libdir issystemdir if issystemdir strequal set cmake install rpath cmake install prefix lib set cmake install rpath cmake install prefix cmake install libdir endif endif endif enable compression set target properties rsync properties version librsync version soversion librsync major version install targets rsync install targets default args destination lib install targets rsync install targets default args destination cmake install libdir next target if build rdiff message warning popt library is required for rdiff target endif popt found install targets rdiff install targets default args destination bin install targets rdiff install targets default args destination cmake install bindir endif build rdiff endif build rdiff install files src librsync h destination include destination cmake install includedir message status cmake c flags cmake c flags | 0 |
20,107 | 5,987,771,098 | IssuesEvent | 2017-06-02 01:11:35 | fire-eggs/FamilyLines | https://api.github.com/repos/fire-eggs/FamilyLines | opened | Invalid date error shows wrong format | CodePlex | <b>notonyournelly[CodePlex]</b> <br />[Reported by hemashiv]
The message/tooltip which is shown may contain the wrong date format.
See Person.cs, quotthis[string columnName]quot method. The resource string quotInvalidDatequot is shown if an invalid date is entered (BirthDate, DeathDate, etc).
The problem is the InvalidDate message shows a hard-coded date format (e.g. quotDD/MM/YYYYquot). When the code was originally localized, a reasonable assumption was made but it might not be correct. The user may have selected a Date format in the Windows
control panel which does not match the message.
Need to investigate how to show the correct format based on the Windows control panel settings.
Need to confirm the displayed format is correct for the default settings in each translated language.
[Keep this issue in mind when reworking the Date entry system.]
| 1.0 | Invalid date error shows wrong format - <b>notonyournelly[CodePlex]</b> <br />[Reported by hemashiv]
The message/tooltip which is shown may contain the wrong date format.
See Person.cs, quotthis[string columnName]quot method. The resource string quotInvalidDatequot is shown if an invalid date is entered (BirthDate, DeathDate, etc).
The problem is the InvalidDate message shows a hard-coded date format (e.g. quotDD/MM/YYYYquot). When the code was originally localized, a reasonable assumption was made but it might not be correct. The user may have selected a Date format in the Windows
control panel which does not match the message.
Need to investigate how to show the correct format based on the Windows control panel settings.
Need to confirm the displayed format is correct for the default settings in each translated language.
[Keep this issue in mind when reworking the Date entry system.]
| non_priority | invalid date error shows wrong format notonyournelly the message tooltip which is shown may contain the wrong date format see person cs quotthis quot method the resource string quotinvaliddatequot is shown if an invalid date is entered birthdate deathdate etc the problem is the invaliddate message shows a hard coded date format e g quotdd mm yyyyquot when the code was originally localized a reasonable assumption was made but it might not be correct the user may have selected a date format in the windows control panel which does not match the message need to investigate how to show the correct format based on the windows control panel settings need to confirm the displayed format is correct for the default settings in each translated language | 0 |
147,410 | 19,522,790,503 | IssuesEvent | 2021-12-29 22:21:38 | swagger-api/swagger-codegen | https://api.github.com/repos/swagger-api/swagger-codegen | opened | CVE-2019-12086 (High) detected in multiple libraries | security vulnerability | ## CVE-2019-12086 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.7.8.jar</b>, <b>jackson-databind-2.4.5.jar</b>, <b>jackson-databind-2.6.4.jar</b>, <b>jackson-databind-2.8.9.jar</b>, <b>jackson-databind-2.8.8.jar</b></p></summary>
<p>
<details><summary><b>jackson-databind-2.7.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.7.8.jar</p>
<p>
Dependency Hierarchy:
- lagom-scaladsl-api_2.11-1.3.8.jar (Root Library)
- lagom-api_2.11-1.3.8.jar
- play_2.11-2.5.13.jar
- :x: **jackson-databind-2.7.8.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.4.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /samples/client/petstore/scala/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar</p>
<p>
Dependency Hierarchy:
- swagger-core-1.5.8.jar (Root Library)
- :x: **jackson-databind-2.4.5.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.6.4.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /samples/client/petstore/java/jersey1/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar,/aches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.6.4.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.8.9.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.8.9.jar</p>
<p>
Dependency Hierarchy:
- play-guice_2.12-2.6.3.jar (Root Library)
- play_2.12-2.6.3.jar
- :x: **jackson-databind-2.8.9.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.8.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.8.8.jar</p>
<p>
Dependency Hierarchy:
- finch-circe_2.11-0.15.1.jar (Root Library)
- circe-jackson28_2.11-0.8.0.jar
- :x: **jackson-databind-2.8.8.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/swagger-api/swagger-codegen/commit/4b7a8d7d7384aa6a27d6309c35ade0916edae7ed">4b7a8d7d7384aa6a27d6309c35ade0916edae7ed</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.
<p>Publish Date: 2019-05-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12086>CVE-2019-12086</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086</a></p>
<p>Release Date: 2019-05-17</p>
<p>Fix Resolution: 2.9.9</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.7.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.lightbend.lagom:lagom-scaladsl-api_2.11:1.3.8;com.lightbend.lagom:lagom-api_2.11:1.3.8;com.typesafe.play:play_2.11:2.5.13;com.fasterxml.jackson.core:jackson-databind:2.7.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.4.5","packageFilePaths":["/samples/client/petstore/scala/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"io.swagger:swagger-core:1.5.8;com.fasterxml.jackson.core:jackson-databind:2.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.6.4","packageFilePaths":["/samples/client/petstore/java/jersey1/build.gradle"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.6.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.9","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.typesafe.play:play-guice_2.12:2.6.3;com.typesafe.play:play_2.12:2.6.3;com.fasterxml.jackson.core:jackson-databind:2.8.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.github.finagle:finch-circe_2.11:0.15.1;io.circe:circe-jackson28_2.11:0.8.0;com.fasterxml.jackson.core:jackson-databind:2.8.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-12086","vulnerabilityDetails":"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12086","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2019-12086 (High) detected in multiple libraries - ## CVE-2019-12086 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.7.8.jar</b>, <b>jackson-databind-2.4.5.jar</b>, <b>jackson-databind-2.6.4.jar</b>, <b>jackson-databind-2.8.9.jar</b>, <b>jackson-databind-2.8.8.jar</b></p></summary>
<p>
<details><summary><b>jackson-databind-2.7.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.7.8.jar</p>
<p>
Dependency Hierarchy:
- lagom-scaladsl-api_2.11-1.3.8.jar (Root Library)
- lagom-api_2.11-1.3.8.jar
- play_2.11-2.5.13.jar
- :x: **jackson-databind-2.7.8.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.4.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /samples/client/petstore/scala/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.4.5/c69c0cb613128c69d84a6a0304ddb9fce82e8242/jackson-databind-2.4.5.jar</p>
<p>
Dependency Hierarchy:
- swagger-core-1.5.8.jar (Root Library)
- :x: **jackson-databind-2.4.5.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.6.4.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /samples/client/petstore/java/jersey1/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar,/aches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.6.4/f2abadd10891512268b16a1a1a6f81890f3e2976/jackson-databind-2.6.4.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.6.4.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.8.9.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.8.9.jar</p>
<p>
Dependency Hierarchy:
- play-guice_2.12-2.6.3.jar (Root Library)
- play_2.12-2.6.3.jar
- :x: **jackson-databind-2.8.9.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.8.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.8.8.jar</p>
<p>
Dependency Hierarchy:
- finch-circe_2.11-0.15.1.jar (Root Library)
- circe-jackson28_2.11-0.8.0.jar
- :x: **jackson-databind-2.8.8.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/swagger-api/swagger-codegen/commit/4b7a8d7d7384aa6a27d6309c35ade0916edae7ed">4b7a8d7d7384aa6a27d6309c35ade0916edae7ed</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.
<p>Publish Date: 2019-05-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12086>CVE-2019-12086</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086</a></p>
<p>Release Date: 2019-05-17</p>
<p>Fix Resolution: 2.9.9</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.7.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.lightbend.lagom:lagom-scaladsl-api_2.11:1.3.8;com.lightbend.lagom:lagom-api_2.11:1.3.8;com.typesafe.play:play_2.11:2.5.13;com.fasterxml.jackson.core:jackson-databind:2.7.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.4.5","packageFilePaths":["/samples/client/petstore/scala/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"io.swagger:swagger-core:1.5.8;com.fasterxml.jackson.core:jackson-databind:2.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.6.4","packageFilePaths":["/samples/client/petstore/java/jersey1/build.gradle"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.6.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.9","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.typesafe.play:play-guice_2.12:2.6.3;com.typesafe.play:play_2.12:2.6.3;com.fasterxml.jackson.core:jackson-databind:2.8.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.8","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"com.github.finagle:finch-circe_2.11:0.15.1;io.circe:circe-jackson28_2.11:0.8.0;com.fasterxml.jackson.core:jackson-databind:2.8.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.9.9","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-12086","vulnerabilityDetails":"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12086","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries jackson databind jar jackson databind jar jackson databind jar jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library home wss scanner cache com fasterxml jackson core jackson databind bundles jackson databind jar dependency hierarchy lagom scaladsl api jar root library lagom api jar play jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file samples client petstore scala build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy swagger core jar root library x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file samples client petstore java build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar aches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library home wss scanner cache com fasterxml jackson core jackson databind bundles jackson databind jar dependency hierarchy play guice jar root library play jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library home wss scanner cache com fasterxml jackson core jackson databind bundles jackson databind jar dependency hierarchy finch circe jar root library circe jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind x before when default typing is enabled either globally or for a specific property for an externally exposed json endpoint the service has the mysql connector java jar or earlier in the classpath and an attacker can host a crafted mysql server reachable by the victim an attacker can send a crafted json message that allows them to read arbitrary local files on the server this occurs because of missing com mysql cj jdbc admin miniadmin validation publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com lightbend lagom lagom scaladsl api com lightbend lagom lagom api com typesafe play play com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion isbinary false packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency true dependencytree io swagger swagger core com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion isbinary false packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion isbinary false packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency true dependencytree com typesafe play play guice com typesafe play play com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion isbinary false packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency true dependencytree com github finagle finch circe io circe circe com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails a polymorphic typing issue was discovered in fasterxml jackson databind x before when default typing is enabled either globally or for a specific property for an externally exposed json endpoint the service has the mysql connector java jar or earlier in the classpath and an attacker can host a crafted mysql server reachable by the victim an attacker can send a crafted json message that allows them to read arbitrary local files on the server this occurs because of missing com mysql cj jdbc admin miniadmin validation vulnerabilityurl | 0 |
9,535 | 11,591,928,297 | IssuesEvent | 2020-02-24 10:25:32 | widelands/widelands | https://api.github.com/repos/widelands/widelands | closed | Building does not complete | economy regression saveloading & compatibility | Playing Elven forests I forgot to build a Lime Kiln. Some time later I ran out of Grout so I built a kiln. It quickly reached 85% built and then stopped. Destroying the building and rebuilding does not work (sticks at 85%) but another Lime Kiln built nearby completes normally.
There are sufficient wares in the headquarters to complete the building and wares are being delivered to other buildings along the road.
Savegame attached
------------------------------------
Imported from Launchpad using lp2gh.
* date created: 2019-05-21T10:59:55Z
* owner: leightonman
* the launchpad url was https://bugs.launchpad.net/bugs/1829848
| True | Building does not complete - Playing Elven forests I forgot to build a Lime Kiln. Some time later I ran out of Grout so I built a kiln. It quickly reached 85% built and then stopped. Destroying the building and rebuilding does not work (sticks at 85%) but another Lime Kiln built nearby completes normally.
There are sufficient wares in the headquarters to complete the building and wares are being delivered to other buildings along the road.
Savegame attached
------------------------------------
Imported from Launchpad using lp2gh.
* date created: 2019-05-21T10:59:55Z
* owner: leightonman
* the launchpad url was https://bugs.launchpad.net/bugs/1829848
| non_priority | building does not complete playing elven forests i forgot to build a lime kiln some time later i ran out of grout so i built a kiln it quickly reached built and then stopped destroying the building and rebuilding does not work sticks at but another lime kiln built nearby completes normally there are sufficient wares in the headquarters to complete the building and wares are being delivered to other buildings along the road savegame attached imported from launchpad using date created owner leightonman the launchpad url was | 0 |
343,182 | 24,764,228,290 | IssuesEvent | 2022-10-22 09:48:02 | softwarehistorysociety/x | https://api.github.com/repos/softwarehistorysociety/x | opened | Original Specification | documentation | # x-callback-url 1.0 DRAFT Spec
The x-callback-url specification is intended to standardize the use of URLs and registered URL schemes for inter-app communication and messaging on Apple’s iOS platforms.
## Revisions
R3: Added “Security Concerns” section.
R2: Added optional “x-cancel” parameter. When supported, this parameter would include a URL to open when the user indicated they want to cancel the action. The action did not succeed, nor generate an error, but the user just wishes to return to the source app.
R1: Removed the “version” from the URL path. The current recommendation if versioning of an x-callback-url API is required would be to register separate URL schemes for each version. This method allows the calling app to determine which versions are available via calls to “canOpenURL”.
## Discussion
iOS runs apps in sandboxes which providing limited means of communication between apps directly on the device. Shared files, messaging systems and other similar solutions used on desktop and server operating systems are not present in iOS.
iOS does provide the ability for apps to [register URL schemes](http://developer.apple.com/library/ios/#documentation/iPhone/Conceptual/iPhoneOSProgrammingGuide/StandardBehaviors/StandardBehaviors.html%23//apple*ref/doc/uid/TP40007072-Ch3-SW26). Many apps already use the feature to launch other apps and pass basic data in the URL parameters, but there is no standard for structure of these URLs and no current standard for allowing callbacks to be pass in the URL if the originating app wishes to receive some result based on the action.
The goal of the x-callback-url specification is to provide a standardized means for iOS developers to expose and document the methods they make available to other apps. Using x-callback-url’s source apps can launch other apps passing data and context information, and also provide parameters instructing the target app to return data and control back to the source app after executing an action. Specific supported actions will be dependent on the individual apps and will not be discussed in the specification.
Apps using x-callback-url should provide support for receiving action URLs in the format described below. Details on implementation and sample code will also be available on the x-callback-url website.
Note that starting with iOS 8, Apple has introduced [App Extensions](https://developer.apple.com/library/ios/documentation/General/Conceptual/ExtensibilityPG/index.html#//apple*ref/doc/uid/TP40014214) which address some of the requirements for inter-app communication in a vendor supported way. There are still areas where URL schemes make more sense, but we recommend using the extension opportunities first.
## URL Structure
```
[scheme]://[host]/[action]?[x-callback parameters]&[action parameters]
```
### scheme
The scheme should be a unique string identifier the target app. URL schemes are registered with iOS via an app’s Info.plist file. To support receiving x-callback-url message, an app must register a protocol with iOS. If your app uses x-callback-url, it is recommend you register a url scheme specifically for x-callback-url support, so that a source app can test for the registration of the scheme and ensure support is present.
### host
URLs will be identified by the use of “x-callback-url” as the host portion of the URL.
### action
The remaining portion of the URL path after the version make up the name of the action to be executed in the target app. These actions will vary by app and should be documented by the developer of the app supporting x-callback-url.
### x-callback Parameters
x-callback-url defines several parameters with specific purposes, all of which are optional. These parameters should be passed as query args in the URL, in the format “key1=value1&key2=value2”. All values should be URL encoded strings.
- **x-source :**- The friendly name of the source app calling the action. If the action in the target app requires user interface elements, it may be necessary to identify to the user the app requesting the action.
- **x-success :**- If the action in the target method is intended to return a result to the source app, the x-callback parameter should be included and provide a URL to open to return to the source app. On completion of the action, the target app will open this URL, possibly with additional parameters tacked on to return a result to the source app. If x-success is not provided, it is assumed that the user will stay in the target app on successful completion of the action.
- **x-error :**- URL to open if the requested action generates an error in the target app. This URL will be open with at least the parameters “errorCode=code&errorMessage=message”. If x-error is not present, and a error occurs, it is assumed the target app will report the failure to the user and remain in the target app.
- **x-cancel :**- URL to open if the requested action is cancelled by the user. In the case where the target app offer the user the option to “cancel” the requested action, without a success or error result, this the the URL that should be opened to return the user to the source app.
### Action Parameters
In addition to any of the optional parameters defined by x-callback-url, the query arguments can contain action parameters specific to target app’s supported actions. These parameters will be defined by the developer of the app supporting x-callback-url. The “x-” prefix should not be used on action parameters, but be reserved for additional parameters that may be defined by the x-callback-url specification.
### Security Concerns
Because URL schemes open pathways to the data stored in your app, it is recommended that you carefully consider security when implementing URL schemes–whether they conform to the x-callback-url specification or not.
How to implement security is not covered by the specification, as the requirements vary greatly for different app, but, in general, URL schemes actions which perform destructive operations, post to services outside the app, or similar “dangerous” actions should require user-confirmation in-app to be sure the user has not unintentionally tapped on a malicious URL. Other mechanisms such as password keys, or similar may make sense for specific use cases.
### Learn More
To learn more, check out the [Examples](http://x-callback-url.com/examples) and [Implementation](http://x-callback-url.com/implementation) pages. | 1.0 | Original Specification - # x-callback-url 1.0 DRAFT Spec
The x-callback-url specification is intended to standardize the use of URLs and registered URL schemes for inter-app communication and messaging on Apple’s iOS platforms.
## Revisions
R3: Added “Security Concerns” section.
R2: Added optional “x-cancel” parameter. When supported, this parameter would include a URL to open when the user indicated they want to cancel the action. The action did not succeed, nor generate an error, but the user just wishes to return to the source app.
R1: Removed the “version” from the URL path. The current recommendation if versioning of an x-callback-url API is required would be to register separate URL schemes for each version. This method allows the calling app to determine which versions are available via calls to “canOpenURL”.
## Discussion
iOS runs apps in sandboxes which providing limited means of communication between apps directly on the device. Shared files, messaging systems and other similar solutions used on desktop and server operating systems are not present in iOS.
iOS does provide the ability for apps to [register URL schemes](http://developer.apple.com/library/ios/#documentation/iPhone/Conceptual/iPhoneOSProgrammingGuide/StandardBehaviors/StandardBehaviors.html%23//apple*ref/doc/uid/TP40007072-Ch3-SW26). Many apps already use the feature to launch other apps and pass basic data in the URL parameters, but there is no standard for structure of these URLs and no current standard for allowing callbacks to be pass in the URL if the originating app wishes to receive some result based on the action.
The goal of the x-callback-url specification is to provide a standardized means for iOS developers to expose and document the methods they make available to other apps. Using x-callback-url’s source apps can launch other apps passing data and context information, and also provide parameters instructing the target app to return data and control back to the source app after executing an action. Specific supported actions will be dependent on the individual apps and will not be discussed in the specification.
Apps using x-callback-url should provide support for receiving action URLs in the format described below. Details on implementation and sample code will also be available on the x-callback-url website.
Note that starting with iOS 8, Apple has introduced [App Extensions](https://developer.apple.com/library/ios/documentation/General/Conceptual/ExtensibilityPG/index.html#//apple*ref/doc/uid/TP40014214) which address some of the requirements for inter-app communication in a vendor supported way. There are still areas where URL schemes make more sense, but we recommend using the extension opportunities first.
## URL Structure
```
[scheme]://[host]/[action]?[x-callback parameters]&[action parameters]
```
### scheme
The scheme should be a unique string identifier the target app. URL schemes are registered with iOS via an app’s Info.plist file. To support receiving x-callback-url message, an app must register a protocol with iOS. If your app uses x-callback-url, it is recommend you register a url scheme specifically for x-callback-url support, so that a source app can test for the registration of the scheme and ensure support is present.
### host
URLs will be identified by the use of “x-callback-url” as the host portion of the URL.
### action
The remaining portion of the URL path after the version make up the name of the action to be executed in the target app. These actions will vary by app and should be documented by the developer of the app supporting x-callback-url.
### x-callback Parameters
x-callback-url defines several parameters with specific purposes, all of which are optional. These parameters should be passed as query args in the URL, in the format “key1=value1&key2=value2”. All values should be URL encoded strings.
- **x-source :**- The friendly name of the source app calling the action. If the action in the target app requires user interface elements, it may be necessary to identify to the user the app requesting the action.
- **x-success :**- If the action in the target method is intended to return a result to the source app, the x-callback parameter should be included and provide a URL to open to return to the source app. On completion of the action, the target app will open this URL, possibly with additional parameters tacked on to return a result to the source app. If x-success is not provided, it is assumed that the user will stay in the target app on successful completion of the action.
- **x-error :**- URL to open if the requested action generates an error in the target app. This URL will be open with at least the parameters “errorCode=code&errorMessage=message”. If x-error is not present, and a error occurs, it is assumed the target app will report the failure to the user and remain in the target app.
- **x-cancel :**- URL to open if the requested action is cancelled by the user. In the case where the target app offer the user the option to “cancel” the requested action, without a success or error result, this the the URL that should be opened to return the user to the source app.
### Action Parameters
In addition to any of the optional parameters defined by x-callback-url, the query arguments can contain action parameters specific to target app’s supported actions. These parameters will be defined by the developer of the app supporting x-callback-url. The “x-” prefix should not be used on action parameters, but be reserved for additional parameters that may be defined by the x-callback-url specification.
### Security Concerns
Because URL schemes open pathways to the data stored in your app, it is recommended that you carefully consider security when implementing URL schemes–whether they conform to the x-callback-url specification or not.
How to implement security is not covered by the specification, as the requirements vary greatly for different app, but, in general, URL schemes actions which perform destructive operations, post to services outside the app, or similar “dangerous” actions should require user-confirmation in-app to be sure the user has not unintentionally tapped on a malicious URL. Other mechanisms such as password keys, or similar may make sense for specific use cases.
### Learn More
To learn more, check out the [Examples](http://x-callback-url.com/examples) and [Implementation](http://x-callback-url.com/implementation) pages. | non_priority | original specification x callback url draft spec the x callback url specification is intended to standardize the use of urls and registered url schemes for inter app communication and messaging on apple’s ios platforms revisions added “security concerns” section added optional “x cancel” parameter when supported this parameter would include a url to open when the user indicated they want to cancel the action the action did not succeed nor generate an error but the user just wishes to return to the source app removed the “version” from the url path the current recommendation if versioning of an x callback url api is required would be to register separate url schemes for each version this method allows the calling app to determine which versions are available via calls to “canopenurl” discussion ios runs apps in sandboxes which providing limited means of communication between apps directly on the device shared files messaging systems and other similar solutions used on desktop and server operating systems are not present in ios ios does provide the ability for apps to many apps already use the feature to launch other apps and pass basic data in the url parameters but there is no standard for structure of these urls and no current standard for allowing callbacks to be pass in the url if the originating app wishes to receive some result based on the action the goal of the x callback url specification is to provide a standardized means for ios developers to expose and document the methods they make available to other apps using x callback url’s source apps can launch other apps passing data and context information and also provide parameters instructing the target app to return data and control back to the source app after executing an action specific supported actions will be dependent on the individual apps and will not be discussed in the specification apps using x callback url should provide support for receiving action urls in the format described below details on implementation and sample code will also be available on the x callback url website note that starting with ios apple has introduced which address some of the requirements for inter app communication in a vendor supported way there are still areas where url schemes make more sense but we recommend using the extension opportunities first url structure scheme the scheme should be a unique string identifier the target app url schemes are registered with ios via an app’s info plist file to support receiving x callback url message an app must register a protocol with ios if your app uses x callback url it is recommend you register a url scheme specifically for x callback url support so that a source app can test for the registration of the scheme and ensure support is present host urls will be identified by the use of “x callback url” as the host portion of the url action the remaining portion of the url path after the version make up the name of the action to be executed in the target app these actions will vary by app and should be documented by the developer of the app supporting x callback url x callback parameters x callback url defines several parameters with specific purposes all of which are optional these parameters should be passed as query args in the url in the format “ ” all values should be url encoded strings x source the friendly name of the source app calling the action if the action in the target app requires user interface elements it may be necessary to identify to the user the app requesting the action x success if the action in the target method is intended to return a result to the source app the x callback parameter should be included and provide a url to open to return to the source app on completion of the action the target app will open this url possibly with additional parameters tacked on to return a result to the source app if x success is not provided it is assumed that the user will stay in the target app on successful completion of the action x error url to open if the requested action generates an error in the target app this url will be open with at least the parameters “errorcode code errormessage message” if x error is not present and a error occurs it is assumed the target app will report the failure to the user and remain in the target app x cancel url to open if the requested action is cancelled by the user in the case where the target app offer the user the option to “cancel” the requested action without a success or error result this the the url that should be opened to return the user to the source app action parameters in addition to any of the optional parameters defined by x callback url the query arguments can contain action parameters specific to target app’s supported actions these parameters will be defined by the developer of the app supporting x callback url the “x ” prefix should not be used on action parameters but be reserved for additional parameters that may be defined by the x callback url specification security concerns because url schemes open pathways to the data stored in your app it is recommended that you carefully consider security when implementing url schemes–whether they conform to the x callback url specification or not how to implement security is not covered by the specification as the requirements vary greatly for different app but in general url schemes actions which perform destructive operations post to services outside the app or similar “dangerous” actions should require user confirmation in app to be sure the user has not unintentionally tapped on a malicious url other mechanisms such as password keys or similar may make sense for specific use cases learn more to learn more check out the and pages | 0 |
275,407 | 30,237,289,803 | IssuesEvent | 2023-07-06 11:08:46 | Sabreen-Parveen/vulnerable-node | https://api.github.com/repos/Sabreen-Parveen/vulnerable-node | closed | CVE-2019-5413 (Critical) detected in morgan-1.6.1.tgz | Mend: dependency security vulnerability | ## CVE-2019-5413 - Critical Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>morgan-1.6.1.tgz</b></p></summary>
<p>HTTP request logger middleware for node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/morgan/-/morgan-1.6.1.tgz">https://registry.npmjs.org/morgan/-/morgan-1.6.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/morgan/package.json</p>
<p>
Dependency Hierarchy:
- :x: **morgan-1.6.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Sabreen-Parveen/vulnerable-node/commit/16b56737b355f8bf4f9a46633cba1f172138369a">16b56737b355f8bf4f9a46633cba1f172138369a</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1.
<p>Publish Date: 2019-03-21
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-5413>CVE-2019-5413</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://hackerone.com/reports/390881">https://hackerone.com/reports/390881</a></p>
<p>Release Date: 2019-03-21</p>
<p>Fix Resolution: 1.9.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-5413 (Critical) detected in morgan-1.6.1.tgz - ## CVE-2019-5413 - Critical Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>morgan-1.6.1.tgz</b></p></summary>
<p>HTTP request logger middleware for node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/morgan/-/morgan-1.6.1.tgz">https://registry.npmjs.org/morgan/-/morgan-1.6.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/morgan/package.json</p>
<p>
Dependency Hierarchy:
- :x: **morgan-1.6.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Sabreen-Parveen/vulnerable-node/commit/16b56737b355f8bf4f9a46633cba1f172138369a">16b56737b355f8bf4f9a46633cba1f172138369a</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1.
<p>Publish Date: 2019-03-21
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-5413>CVE-2019-5413</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://hackerone.com/reports/390881">https://hackerone.com/reports/390881</a></p>
<p>Release Date: 2019-03-21</p>
<p>Fix Resolution: 1.9.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve critical detected in morgan tgz cve critical severity vulnerability vulnerable library morgan tgz http request logger middleware for node js library home page a href path to dependency file package json path to vulnerable library node modules morgan package json dependency hierarchy x morgan tgz vulnerable library found in head commit a href found in base branch master vulnerability details an attacker can use the format parameter to inject arbitrary commands in the npm package morgan publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
115,631 | 14,858,116,718 | IssuesEvent | 2021-01-18 16:20:31 | WordPress/gutenberg | https://api.github.com/repos/WordPress/gutenberg | closed | Controlling design tools visibility | Global Styles [Feature] Design Tools [Feature] Themes | This issue is to discuss and streamline the behavior of design tools in terms of the visibility of the UI controls for users.
This topic is growing complex, so I want us to agree on a terminology:
- `contexts`: each block that can have styles/settings assigned. Note that some blocks (core/heading) expose many contexts (core/heading/h1, ..., core/heading/h6) and there's also the "global" context that doesn't match any block.
- `block UI`: the block sidebar available in all editors.
- `global UI`: the global styles sidebar available in the site editor.
## Use cases
Some examples of what we want theme authors to be able to do:
- Disable custom gradients in all contexts, so they aren't visible in the block and global UIs.
- Enable color presets in every context, and make them visible in the block and global UIs.
- Enable font family and its presets only for the global context (this context is only visible in the global UI).
- Enable line height for all contexts, but make it visible only visible in the global UI.
Some examples that we aim to streamline for users:
- User is able to modify the values of the colors (theme presets) for all contexts at once.
- User is able to modify the values of the font size (theme presets) for the paragraph context.
## Coda
A related use case but that merits its own discussion is extensibility by 3rd parties. Things like disabling the typography panel entirely and provide their own, or provide a different mechanism to set font families. | 1.0 | Controlling design tools visibility - This issue is to discuss and streamline the behavior of design tools in terms of the visibility of the UI controls for users.
This topic is growing complex, so I want us to agree on a terminology:
- `contexts`: each block that can have styles/settings assigned. Note that some blocks (core/heading) expose many contexts (core/heading/h1, ..., core/heading/h6) and there's also the "global" context that doesn't match any block.
- `block UI`: the block sidebar available in all editors.
- `global UI`: the global styles sidebar available in the site editor.
## Use cases
Some examples of what we want theme authors to be able to do:
- Disable custom gradients in all contexts, so they aren't visible in the block and global UIs.
- Enable color presets in every context, and make them visible in the block and global UIs.
- Enable font family and its presets only for the global context (this context is only visible in the global UI).
- Enable line height for all contexts, but make it visible only visible in the global UI.
Some examples that we aim to streamline for users:
- User is able to modify the values of the colors (theme presets) for all contexts at once.
- User is able to modify the values of the font size (theme presets) for the paragraph context.
## Coda
A related use case but that merits its own discussion is extensibility by 3rd parties. Things like disabling the typography panel entirely and provide their own, or provide a different mechanism to set font families. | non_priority | controlling design tools visibility this issue is to discuss and streamline the behavior of design tools in terms of the visibility of the ui controls for users this topic is growing complex so i want us to agree on a terminology contexts each block that can have styles settings assigned note that some blocks core heading expose many contexts core heading core heading and there s also the global context that doesn t match any block block ui the block sidebar available in all editors global ui the global styles sidebar available in the site editor use cases some examples of what we want theme authors to be able to do disable custom gradients in all contexts so they aren t visible in the block and global uis enable color presets in every context and make them visible in the block and global uis enable font family and its presets only for the global context this context is only visible in the global ui enable line height for all contexts but make it visible only visible in the global ui some examples that we aim to streamline for users user is able to modify the values of the colors theme presets for all contexts at once user is able to modify the values of the font size theme presets for the paragraph context coda a related use case but that merits its own discussion is extensibility by parties things like disabling the typography panel entirely and provide their own or provide a different mechanism to set font families | 0 |
113,161 | 17,116,140,019 | IssuesEvent | 2021-07-11 11:49:59 | theHinneh/ridge-condos-admin | https://api.github.com/repos/theHinneh/ridge-condos-admin | closed | CVE-2020-28481 (Medium) detected in socket.io-2.1.1.tgz | security vulnerability | ## CVE-2020-28481 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>socket.io-2.1.1.tgz</b></p></summary>
<p>node.js realtime framework server</p>
<p>Library home page: <a href="https://registry.npmjs.org/socket.io/-/socket.io-2.1.1.tgz">https://registry.npmjs.org/socket.io/-/socket.io-2.1.1.tgz</a></p>
<p>Path to dependency file: ridge-condos-admin/package.json</p>
<p>Path to vulnerable library: ridge-condos-admin/node_modules/socket.io/package.json</p>
<p>
Dependency Hierarchy:
- karma-4.3.0.tgz (Root Library)
- :x: **socket.io-2.1.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/theHinneh/ridge-condos-admin/commit/9abeb09f5e1b25cba831e784f85f5f7de0112f00">9abeb09f5e1b25cba831e784f85f5f7de0112f00</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package socket.io before 2.4.0 are vulnerable to Insecure Defaults due to CORS Misconfiguration. All domains are whitelisted by default.
<p>Publish Date: 2021-01-19
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28481>CVE-2020-28481</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28481">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28481</a></p>
<p>Release Date: 2021-01-19</p>
<p>Fix Resolution: 2.4.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-28481 (Medium) detected in socket.io-2.1.1.tgz - ## CVE-2020-28481 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>socket.io-2.1.1.tgz</b></p></summary>
<p>node.js realtime framework server</p>
<p>Library home page: <a href="https://registry.npmjs.org/socket.io/-/socket.io-2.1.1.tgz">https://registry.npmjs.org/socket.io/-/socket.io-2.1.1.tgz</a></p>
<p>Path to dependency file: ridge-condos-admin/package.json</p>
<p>Path to vulnerable library: ridge-condos-admin/node_modules/socket.io/package.json</p>
<p>
Dependency Hierarchy:
- karma-4.3.0.tgz (Root Library)
- :x: **socket.io-2.1.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/theHinneh/ridge-condos-admin/commit/9abeb09f5e1b25cba831e784f85f5f7de0112f00">9abeb09f5e1b25cba831e784f85f5f7de0112f00</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package socket.io before 2.4.0 are vulnerable to Insecure Defaults due to CORS Misconfiguration. All domains are whitelisted by default.
<p>Publish Date: 2021-01-19
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28481>CVE-2020-28481</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28481">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28481</a></p>
<p>Release Date: 2021-01-19</p>
<p>Fix Resolution: 2.4.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in socket io tgz cve medium severity vulnerability vulnerable library socket io tgz node js realtime framework server library home page a href path to dependency file ridge condos admin package json path to vulnerable library ridge condos admin node modules socket io package json dependency hierarchy karma tgz root library x socket io tgz vulnerable library found in head commit a href found in base branch master vulnerability details the package socket io before are vulnerable to insecure defaults due to cors misconfiguration all domains are whitelisted by default publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
107,052 | 16,749,668,217 | IssuesEvent | 2021-06-11 20:44:18 | talmax1124/creativeduoshopping-master | https://api.github.com/repos/talmax1124/creativeduoshopping-master | closed | CVE-2020-28469 (Medium) detected in glob-parent-2.0.0.tgz, glob-parent-3.1.0.tgz | security vulnerability | ## CVE-2020-28469 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-3.1.0.tgz</b></p></summary>
<p>
<details><summary><b>glob-parent-2.0.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p>
<p>Path to dependency file: creativeduoshopping-master/frontend/package.json</p>
<p>Path to vulnerable library: creativeduoshopping-master/frontend/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/glob-base/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-2.1.8.tgz (Root Library)
- jest-23.6.0.tgz
- jest-cli-23.6.0.tgz
- micromatch-2.3.11.tgz
- parse-glob-3.0.4.tgz
- glob-base-0.3.0.tgz
- :x: **glob-parent-2.0.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-3.1.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent directory path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz</a></p>
<p>Path to dependency file: creativeduoshopping-master/package.json</p>
<p>Path to vulnerable library: creativeduoshopping-master/node_modules/webpack-dev-server/node_modules/glob-parent/package.json,creativeduoshopping-master/frontend/node_modules/chokidar/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/fast-glob/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/fork-ts-checker-webpack-plugin/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/watchpack-chokidar2/node_modules/glob-parent/package.json,creativeduoshopping-master/frontend/node_modules/fast-glob/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/@parcel/watcher/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-2.1.8.tgz (Root Library)
- webpack-dev-server-3.1.14.tgz
- chokidar-2.1.8.tgz
- :x: **glob-parent-3.1.0.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/talmax1124/creativeduoshopping-master/commit/87c2e6e4b48a48e76ec6d8c0ad9a2aeb07b9df48">87c2e6e4b48a48e76ec6d8c0ad9a2aeb07b9df48</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
<p>Publish Date: 2021-06-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28469>CVE-2020-28469</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469</a></p>
<p>Release Date: 2021-06-03</p>
<p>Fix Resolution: glob-parent - 5.1.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-28469 (Medium) detected in glob-parent-2.0.0.tgz, glob-parent-3.1.0.tgz - ## CVE-2020-28469 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-3.1.0.tgz</b></p></summary>
<p>
<details><summary><b>glob-parent-2.0.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p>
<p>Path to dependency file: creativeduoshopping-master/frontend/package.json</p>
<p>Path to vulnerable library: creativeduoshopping-master/frontend/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/glob-base/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-2.1.8.tgz (Root Library)
- jest-23.6.0.tgz
- jest-cli-23.6.0.tgz
- micromatch-2.3.11.tgz
- parse-glob-3.0.4.tgz
- glob-base-0.3.0.tgz
- :x: **glob-parent-2.0.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-3.1.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent directory path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz</a></p>
<p>Path to dependency file: creativeduoshopping-master/package.json</p>
<p>Path to vulnerable library: creativeduoshopping-master/node_modules/webpack-dev-server/node_modules/glob-parent/package.json,creativeduoshopping-master/frontend/node_modules/chokidar/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/fast-glob/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/fork-ts-checker-webpack-plugin/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/watchpack-chokidar2/node_modules/glob-parent/package.json,creativeduoshopping-master/frontend/node_modules/fast-glob/node_modules/glob-parent/package.json,creativeduoshopping-master/node_modules/@parcel/watcher/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-2.1.8.tgz (Root Library)
- webpack-dev-server-3.1.14.tgz
- chokidar-2.1.8.tgz
- :x: **glob-parent-3.1.0.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/talmax1124/creativeduoshopping-master/commit/87c2e6e4b48a48e76ec6d8c0ad9a2aeb07b9df48">87c2e6e4b48a48e76ec6d8c0ad9a2aeb07b9df48</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
<p>Publish Date: 2021-06-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28469>CVE-2020-28469</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469</a></p>
<p>Release Date: 2021-06-03</p>
<p>Fix Resolution: glob-parent - 5.1.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in glob parent tgz glob parent tgz cve medium severity vulnerability vulnerable libraries glob parent tgz glob parent tgz glob parent tgz strips glob magic from a string to provide the parent path library home page a href path to dependency file creativeduoshopping master frontend package json path to vulnerable library creativeduoshopping master frontend node modules glob parent package json creativeduoshopping master node modules glob base node modules glob parent package json dependency hierarchy react scripts tgz root library jest tgz jest cli tgz micromatch tgz parse glob tgz glob base tgz x glob parent tgz vulnerable library glob parent tgz strips glob magic from a string to provide the parent directory path library home page a href path to dependency file creativeduoshopping master package json path to vulnerable library creativeduoshopping master node modules webpack dev server node modules glob parent package json creativeduoshopping master frontend node modules chokidar node modules glob parent package json creativeduoshopping master node modules fast glob node modules glob parent package json creativeduoshopping master node modules fork ts checker webpack plugin node modules glob parent package json creativeduoshopping master node modules watchpack node modules glob parent package json creativeduoshopping master frontend node modules fast glob node modules glob parent package json creativeduoshopping master node modules parcel watcher node modules glob parent package json dependency hierarchy react scripts tgz root library webpack dev server tgz chokidar tgz x glob parent tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package glob parent before the enclosure regex used to check for strings ending in enclosure containing path separator publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent step up your open source security game with whitesource | 0 |
1,018 | 4,833,918,093 | IssuesEvent | 2016-11-08 12:43:40 | graphhopper/graphhopper | https://api.github.com/repos/graphhopper/graphhopper | closed | mvn test & verify fails for web with strange error | architecture bug | Everytime I run this
`mvn clean install test failsafe:integration-test verify`
another class was not found:
```
[ERROR] Failed to execute goal org.apache.maven.plugins:maven-assembly-plugin:2.4.1:single (make-assembly) on project graphhopper-web: Failed to create assembly: Error creating assembly archive with-dep: Problem creating jar: jar:file:/path/graphhopper/web/target/graphhopper-web-0.9-SNAPSHOT.jar!/com/graphhopper/http/HeadFilter.class: JAR entry com/graphhopper/http/HeadFilter.class not found in /path/graphhopper/web/target/graphhopper-web-0.9-SNAPSHOT.jar -> [Help 1]
``` | 1.0 | mvn test & verify fails for web with strange error - Everytime I run this
`mvn clean install test failsafe:integration-test verify`
another class was not found:
```
[ERROR] Failed to execute goal org.apache.maven.plugins:maven-assembly-plugin:2.4.1:single (make-assembly) on project graphhopper-web: Failed to create assembly: Error creating assembly archive with-dep: Problem creating jar: jar:file:/path/graphhopper/web/target/graphhopper-web-0.9-SNAPSHOT.jar!/com/graphhopper/http/HeadFilter.class: JAR entry com/graphhopper/http/HeadFilter.class not found in /path/graphhopper/web/target/graphhopper-web-0.9-SNAPSHOT.jar -> [Help 1]
``` | non_priority | mvn test verify fails for web with strange error everytime i run this mvn clean install test failsafe integration test verify another class was not found failed to execute goal org apache maven plugins maven assembly plugin single make assembly on project graphhopper web failed to create assembly error creating assembly archive with dep problem creating jar jar file path graphhopper web target graphhopper web snapshot jar com graphhopper http headfilter class jar entry com graphhopper http headfilter class not found in path graphhopper web target graphhopper web snapshot jar | 0 |
26,586 | 13,060,737,274 | IssuesEvent | 2020-07-30 12:54:56 | haskell-unordered-containers/unordered-containers | https://api.github.com/repos/haskell-unordered-containers/unordered-containers | opened | Optimization idea for subsetArray | performance | https://github.com/haskell-unordered-containers/unordered-containers/blob/352591a4cc171d71c828f659288fb6e3440c28a7/Data/HashMap/Internal.hs#L2197-L2202
Once we've identified an element of `ary2` to correspond to an element of `ary1`, it would be nice if we wouldn't check the same element again against the subsequent elements of `ary1`.
@treeowl had a neat idea for that in https://github.com/haskell-unordered-containers/unordered-containers/pull/282#discussion_r456021554:
> I wouldn't record indices. But we could `thaw` one of the arrays and play mutation games. Say we have
>
> ```
> 1 2 3 4
> ```
>
> and we search for `3`. Then we can mutate the array to
>
> ```
> undefined 2 1 4
> ```
>
> That is, swap the `3` to the front and replace it with `undefined`. Then start the next scan in the second slot. | True | Optimization idea for subsetArray - https://github.com/haskell-unordered-containers/unordered-containers/blob/352591a4cc171d71c828f659288fb6e3440c28a7/Data/HashMap/Internal.hs#L2197-L2202
Once we've identified an element of `ary2` to correspond to an element of `ary1`, it would be nice if we wouldn't check the same element again against the subsequent elements of `ary1`.
@treeowl had a neat idea for that in https://github.com/haskell-unordered-containers/unordered-containers/pull/282#discussion_r456021554:
> I wouldn't record indices. But we could `thaw` one of the arrays and play mutation games. Say we have
>
> ```
> 1 2 3 4
> ```
>
> and we search for `3`. Then we can mutate the array to
>
> ```
> undefined 2 1 4
> ```
>
> That is, swap the `3` to the front and replace it with `undefined`. Then start the next scan in the second slot. | non_priority | optimization idea for subsetarray once we ve identified an element of to correspond to an element of it would be nice if we wouldn t check the same element again against the subsequent elements of treeowl had a neat idea for that in i wouldn t record indices but we could thaw one of the arrays and play mutation games say we have and we search for then we can mutate the array to undefined that is swap the to the front and replace it with undefined then start the next scan in the second slot | 0 |
105,478 | 13,187,362,213 | IssuesEvent | 2020-08-13 03:10:22 | ISCLuisRamirez/WebAdekua | https://api.github.com/repos/ISCLuisRamirez/WebAdekua | opened | Cambiar imagenes de seccion | design | Cambiar imágenes de sección por unas acorde a remodelación de interiores | 1.0 | Cambiar imagenes de seccion - Cambiar imágenes de sección por unas acorde a remodelación de interiores | non_priority | cambiar imagenes de seccion cambiar imágenes de sección por unas acorde a remodelación de interiores | 0 |
120,913 | 17,644,405,273 | IssuesEvent | 2021-08-20 02:23:45 | AlexRogalskiy/screenshots | https://api.github.com/repos/AlexRogalskiy/screenshots | opened | CVE-2020-8203 (High) detected in lodash-2.4.2.tgz | security vulnerability | ## CVE-2020-8203 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-2.4.2.tgz</b></p></summary>
<p>A utility library delivering consistency, customization, performance, & extras.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz">https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz</a></p>
<p>Path to dependency file: screenshots/package.json</p>
<p>Path to vulnerable library: screenshots/node_modules/dockerfile_lint/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- dockerfile_lint-0.3.4.tgz (Root Library)
- :x: **lodash-2.4.2.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.
<p>Publish Date: 2020-07-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203>CVE-2020-8203</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1523">https://www.npmjs.com/advisories/1523</a></p>
<p>Release Date: 2020-10-21</p>
<p>Fix Resolution: lodash - 4.17.19</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-8203 (High) detected in lodash-2.4.2.tgz - ## CVE-2020-8203 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-2.4.2.tgz</b></p></summary>
<p>A utility library delivering consistency, customization, performance, & extras.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz">https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz</a></p>
<p>Path to dependency file: screenshots/package.json</p>
<p>Path to vulnerable library: screenshots/node_modules/dockerfile_lint/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- dockerfile_lint-0.3.4.tgz (Root Library)
- :x: **lodash-2.4.2.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.
<p>Publish Date: 2020-07-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203>CVE-2020-8203</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1523">https://www.npmjs.com/advisories/1523</a></p>
<p>Release Date: 2020-10-21</p>
<p>Fix Resolution: lodash - 4.17.19</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in lodash tgz cve high severity vulnerability vulnerable library lodash tgz a utility library delivering consistency customization performance extras library home page a href path to dependency file screenshots package json path to vulnerable library screenshots node modules dockerfile lint node modules lodash package json dependency hierarchy dockerfile lint tgz root library x lodash tgz vulnerable library found in base branch master vulnerability details prototype pollution attack when using zipobjectdeep in lodash before publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution lodash step up your open source security game with whitesource | 0 |
41,597 | 12,832,396,614 | IssuesEvent | 2020-07-07 07:35:51 | rvvergara/battleship | https://api.github.com/repos/rvvergara/battleship | closed | CVE-2020-7660 (High) detected in serialize-javascript-1.6.1.tgz | security vulnerability | ## CVE-2020-7660 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>serialize-javascript-1.6.1.tgz</b></p></summary>
<p>Serialize JavaScript to a superset of JSON that includes regular expressions and functions.</p>
<p>Library home page: <a href="https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-1.6.1.tgz">https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-1.6.1.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/battleship/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/battleship/node_modules/serialize-javascript/package.json</p>
<p>
Dependency Hierarchy:
- webpack-4.29.6.tgz (Root Library)
- terser-webpack-plugin-1.2.3.tgz
- :x: **serialize-javascript-1.6.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/rvvergara/battleship/commit/992b41aaf2e491c0af8810536e3f27f800b8e8de">992b41aaf2e491c0af8810536e3f27f800b8e8de</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js".
<p>Publish Date: 2020-06-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7660>CVE-2020-7660</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7660">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7660</a></p>
<p>Release Date: 2020-06-01</p>
<p>Fix Resolution: serialize-javascript - 3.1.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-7660 (High) detected in serialize-javascript-1.6.1.tgz - ## CVE-2020-7660 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>serialize-javascript-1.6.1.tgz</b></p></summary>
<p>Serialize JavaScript to a superset of JSON that includes regular expressions and functions.</p>
<p>Library home page: <a href="https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-1.6.1.tgz">https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-1.6.1.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/battleship/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/battleship/node_modules/serialize-javascript/package.json</p>
<p>
Dependency Hierarchy:
- webpack-4.29.6.tgz (Root Library)
- terser-webpack-plugin-1.2.3.tgz
- :x: **serialize-javascript-1.6.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/rvvergara/battleship/commit/992b41aaf2e491c0af8810536e3f27f800b8e8de">992b41aaf2e491c0af8810536e3f27f800b8e8de</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js".
<p>Publish Date: 2020-06-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7660>CVE-2020-7660</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7660">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7660</a></p>
<p>Release Date: 2020-06-01</p>
<p>Fix Resolution: serialize-javascript - 3.1.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in serialize javascript tgz cve high severity vulnerability vulnerable library serialize javascript tgz serialize javascript to a superset of json that includes regular expressions and functions library home page a href path to dependency file tmp ws scm battleship package json path to vulnerable library tmp ws scm battleship node modules serialize javascript package json dependency hierarchy webpack tgz root library terser webpack plugin tgz x serialize javascript tgz vulnerable library found in head commit a href vulnerability details serialize javascript prior to allows remote attackers to inject arbitrary code via the function deletefunctions within index js publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution serialize javascript step up your open source security game with whitesource | 0 |
48,858 | 20,322,664,365 | IssuesEvent | 2022-02-18 01:00:07 | Ryujinx/Ryujinx | https://api.github.com/repos/Ryujinx/Ryujinx | closed | hid IHidServer: 84 (EnableSixAxisSensorUnalteredPassthrough) is not implemented | not-implemented needs-re service:hid | hid IHidServer: 84 (EnableSixAxisSensorUnalteredPassthrough) is not implemented [13.0.0+]
[Switchbrew](https://switchbrew.org/wiki/HID_services#hid)
### Service description
```
n/a
```
### Required by:
Nintendo Switch Sports Online Play Test
[SwitchSportsOnlineTest.log](https://github.com/Ryujinx/Ryujinx/files/8076452/SwitchSportsOnlineTest.log)
| 1.0 | hid IHidServer: 84 (EnableSixAxisSensorUnalteredPassthrough) is not implemented - hid IHidServer: 84 (EnableSixAxisSensorUnalteredPassthrough) is not implemented [13.0.0+]
[Switchbrew](https://switchbrew.org/wiki/HID_services#hid)
### Service description
```
n/a
```
### Required by:
Nintendo Switch Sports Online Play Test
[SwitchSportsOnlineTest.log](https://github.com/Ryujinx/Ryujinx/files/8076452/SwitchSportsOnlineTest.log)
| non_priority | hid ihidserver enablesixaxissensorunalteredpassthrough is not implemented hid ihidserver enablesixaxissensorunalteredpassthrough is not implemented service description n a required by nintendo switch sports online play test | 0 |
170,857 | 27,022,746,203 | IssuesEvent | 2023-02-11 07:26:29 | zetkin/app.zetkin.org | https://api.github.com/repos/zetkin/app.zetkin.org | opened | Survey overview empty state | 🎨 needs-design | ## Description
After a new survey is created, the user should be guided towards filling it with content (questions etc).
## Relevant Job Stories
* When I’m preparing to survey my members, I want to be able to design a custom survey, so that I can get the information that I need
## Prerequisites
None
## Requirements
- [ ] When there are no elements in the survey, display an empty state
- [ ] The empty state should have an icon, a short caption and a call to action button
- [ ] Clicking the button should navigate to the questions tab
## Possible implementations
None
## Design specifications
TBD
## Open questions
* What should the icon and text be? | 1.0 | Survey overview empty state - ## Description
After a new survey is created, the user should be guided towards filling it with content (questions etc).
## Relevant Job Stories
* When I’m preparing to survey my members, I want to be able to design a custom survey, so that I can get the information that I need
## Prerequisites
None
## Requirements
- [ ] When there are no elements in the survey, display an empty state
- [ ] The empty state should have an icon, a short caption and a call to action button
- [ ] Clicking the button should navigate to the questions tab
## Possible implementations
None
## Design specifications
TBD
## Open questions
* What should the icon and text be? | non_priority | survey overview empty state description after a new survey is created the user should be guided towards filling it with content questions etc relevant job stories when i’m preparing to survey my members i want to be able to design a custom survey so that i can get the information that i need prerequisites none requirements when there are no elements in the survey display an empty state the empty state should have an icon a short caption and a call to action button clicking the button should navigate to the questions tab possible implementations none design specifications tbd open questions what should the icon and text be | 0 |
4,072 | 2,964,636,591 | IssuesEvent | 2015-07-10 17:49:24 | go-gorp/gorp | https://api.github.com/repos/go-gorp/gorp | closed | Split codebase into separate files | code-cleanup | Most of the code is currently in one single file. This makes it hard to maintain. The code should be separated into multiple files. | 1.0 | Split codebase into separate files - Most of the code is currently in one single file. This makes it hard to maintain. The code should be separated into multiple files. | non_priority | split codebase into separate files most of the code is currently in one single file this makes it hard to maintain the code should be separated into multiple files | 0 |
95,249 | 11,963,302,953 | IssuesEvent | 2020-04-05 15:26:17 | nextcloud/polls | https://api.github.com/repos/nextcloud/polls | closed | Button position when adding new poll (Safari) | design investigate | ### What is going wrong?
**Describe the bug**
Buttons overlay the options Poll schedule/text based
**To Reproduce**
Steps to reproduce the behavior:
1. Open polls (Safari)
2. Click "Add new poll"
<img width="294" alt="image" src="https://user-images.githubusercontent.com/19712668/72968794-886dc100-3dc4-11ea-8c0b-b8c84276eb30.png">
| 1.0 | Button position when adding new poll (Safari) - ### What is going wrong?
**Describe the bug**
Buttons overlay the options Poll schedule/text based
**To Reproduce**
Steps to reproduce the behavior:
1. Open polls (Safari)
2. Click "Add new poll"
<img width="294" alt="image" src="https://user-images.githubusercontent.com/19712668/72968794-886dc100-3dc4-11ea-8c0b-b8c84276eb30.png">
| non_priority | button position when adding new poll safari what is going wrong describe the bug buttons overlay the options poll schedule text based to reproduce steps to reproduce the behavior open polls safari click add new poll img width alt image src | 0 |
24,454 | 4,082,522,001 | IssuesEvent | 2016-05-31 13:12:12 | italia-it/designer.italia.it | https://api.github.com/repos/italia-it/designer.italia.it | closed | Considerare un paragrafo con indicazioni per siti tematici | ambito:testi linee guida priorita:normale | una PA centrale che abbia necessità di un minisito esterno al portale (magari per un evento particolare o per lanciare un servizio speciale) deve usare i colori istituzionali nell'header oppure no (non considerandolo quindi un sito della PA centrale) ? | 1.0 | Considerare un paragrafo con indicazioni per siti tematici - una PA centrale che abbia necessità di un minisito esterno al portale (magari per un evento particolare o per lanciare un servizio speciale) deve usare i colori istituzionali nell'header oppure no (non considerandolo quindi un sito della PA centrale) ? | non_priority | considerare un paragrafo con indicazioni per siti tematici una pa centrale che abbia necessità di un minisito esterno al portale magari per un evento particolare o per lanciare un servizio speciale deve usare i colori istituzionali nell header oppure no non considerandolo quindi un sito della pa centrale | 0 |
152,435 | 19,683,728,124 | IssuesEvent | 2022-01-11 19:31:19 | timf-app-sandbox/ng2 | https://api.github.com/repos/timf-app-sandbox/ng2 | opened | CVE-2017-16137 (Medium) detected in debug-2.2.0.tgz | security vulnerability | ## CVE-2017-16137 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>debug-2.2.0.tgz</b></p></summary>
<p>small debugging utility</p>
<p>Library home page: <a href="https://registry.npmjs.org/debug/-/debug-2.2.0.tgz">https://registry.npmjs.org/debug/-/debug-2.2.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/debug/package.json,/node_modules/npm/node_modules/node-gyp/node_modules/path-array/node_modules/array-index/node_modules/debug/package.json,/node_modules/connect/node_modules/debug/package.json,/node_modules/mocha/node_modules/debug/package.json</p>
<p>
Dependency Hierarchy:
- mocha-2.5.3.tgz (Root Library)
- :x: **debug-2.2.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/timf-app-sandbox/ng2/commit/955104db568b8666b62b7e8b758dcfa65f0dc586">955104db568b8666b62b7e8b758dcfa65f0dc586</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.
<p>Publish Date: 2018-06-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16137>CVE-2017-16137</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137">https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137</a></p>
<p>Release Date: 2018-06-07</p>
<p>Fix Resolution (debug): 2.6.9</p>
<p>Direct dependency fix Resolution (mocha): 4.0.0</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"mocha","packageVersion":"2.5.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"mocha:2.5.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.0.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-16137","vulnerabilityDetails":"The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16137","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2017-16137 (Medium) detected in debug-2.2.0.tgz - ## CVE-2017-16137 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>debug-2.2.0.tgz</b></p></summary>
<p>small debugging utility</p>
<p>Library home page: <a href="https://registry.npmjs.org/debug/-/debug-2.2.0.tgz">https://registry.npmjs.org/debug/-/debug-2.2.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/debug/package.json,/node_modules/npm/node_modules/node-gyp/node_modules/path-array/node_modules/array-index/node_modules/debug/package.json,/node_modules/connect/node_modules/debug/package.json,/node_modules/mocha/node_modules/debug/package.json</p>
<p>
Dependency Hierarchy:
- mocha-2.5.3.tgz (Root Library)
- :x: **debug-2.2.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/timf-app-sandbox/ng2/commit/955104db568b8666b62b7e8b758dcfa65f0dc586">955104db568b8666b62b7e8b758dcfa65f0dc586</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.
<p>Publish Date: 2018-06-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16137>CVE-2017-16137</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137">https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137</a></p>
<p>Release Date: 2018-06-07</p>
<p>Fix Resolution (debug): 2.6.9</p>
<p>Direct dependency fix Resolution (mocha): 4.0.0</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"mocha","packageVersion":"2.5.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"mocha:2.5.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"4.0.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-16137","vulnerabilityDetails":"The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16137","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in debug tgz cve medium severity vulnerability vulnerable library debug tgz small debugging utility library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules debug package json node modules npm node modules node gyp node modules path array node modules array index node modules debug package json node modules connect node modules debug package json node modules mocha node modules debug package json dependency hierarchy mocha tgz root library x debug tgz vulnerable library found in head commit a href found in base branch master vulnerability details the debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter it takes around characters to block for seconds making this a low severity issue publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution debug direct dependency fix resolution mocha rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree mocha isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter it takes around characters to block for seconds making this a low severity issue vulnerabilityurl | 0 |
140,194 | 31,855,049,337 | IssuesEvent | 2023-09-15 06:44:33 | kkrt-labs/kakarot-ssj | https://api.github.com/repos/kkrt-labs/kakarot-ssj | closed | feat: implement 0x56 - JUMP Opcode | enhancement opcode | # Feature Request
| Since | Group |
| --- | --- |
| Frontier| Stack Memory Storage and Flow Operations |
*Index 1 is top of the stack. See [PUSH](https://www.evm.codes/#60).*
## Notes
The program counter (PC) is a byte offset in the deployed [code](https://www.evm.codes/about). It indicates which instruction will be executed next. When an [ADD](https://www.evm.codes/#01) is executed, for example, the PC is incremented by 1, since the instruction is 1 byte. The [PUSH](https://www.evm.codes/#60) instructions are bigger than one byte, and so will increment the counter accordingly.
The **JUMP** instruction alters the program counter, thus breaking the linear path of the execution to another point in the deployed [code](https://www.evm.codes/about). It is used to implement functionalities like functions.
## Stack input
1. `counter`: byte offset in the deployed [code](https://www.evm.codes/about) where execution will continue from. Must be a [JUMPDEST](https://www.evm.codes/#5B) instruction.
## Example
[See in playground](https://www.evm.codes/playground?unit=Wei&codeType=Mnemonic&code='wWZjump%20overqinvalid%20and%20jusXgoYoqpushk4x0_%20%20%20x2%20%7Bprevious%20instruction%20occupies%202%20bytes%7DzINVALIDx3_DEST~4k1x5'~%20wOffseXz%5Cnx%20~w%2F%2F%20qYhZkzPUSH1%20_zJUMPZe%20Y%20tXt%20%01XYZ_kqwxz~_).
## Error cases
The state changes done by the current context are [reverted](https://www.evm.codes#FD) in those cases:
- Not enough gas.
- Not enough values on the stack.
- `Counter` offset is not a [JUMPDEST](https://www.evm.codes/#5B). The error is generated even if the JUMP would not have been done.
```[tasklist]
### Tasks
- [ ] https://github.com/kkrt-labs/kakarot-ssj/issues/251
- [ ] After #251 is implemented, go and implement the business logic of JUMP
```
| 1.0 | feat: implement 0x56 - JUMP Opcode - # Feature Request
| Since | Group |
| --- | --- |
| Frontier| Stack Memory Storage and Flow Operations |
*Index 1 is top of the stack. See [PUSH](https://www.evm.codes/#60).*
## Notes
The program counter (PC) is a byte offset in the deployed [code](https://www.evm.codes/about). It indicates which instruction will be executed next. When an [ADD](https://www.evm.codes/#01) is executed, for example, the PC is incremented by 1, since the instruction is 1 byte. The [PUSH](https://www.evm.codes/#60) instructions are bigger than one byte, and so will increment the counter accordingly.
The **JUMP** instruction alters the program counter, thus breaking the linear path of the execution to another point in the deployed [code](https://www.evm.codes/about). It is used to implement functionalities like functions.
## Stack input
1. `counter`: byte offset in the deployed [code](https://www.evm.codes/about) where execution will continue from. Must be a [JUMPDEST](https://www.evm.codes/#5B) instruction.
## Example
[See in playground](https://www.evm.codes/playground?unit=Wei&codeType=Mnemonic&code='wWZjump%20overqinvalid%20and%20jusXgoYoqpushk4x0_%20%20%20x2%20%7Bprevious%20instruction%20occupies%202%20bytes%7DzINVALIDx3_DEST~4k1x5'~%20wOffseXz%5Cnx%20~w%2F%2F%20qYhZkzPUSH1%20_zJUMPZe%20Y%20tXt%20%01XYZ_kqwxz~_).
## Error cases
The state changes done by the current context are [reverted](https://www.evm.codes#FD) in those cases:
- Not enough gas.
- Not enough values on the stack.
- `Counter` offset is not a [JUMPDEST](https://www.evm.codes/#5B). The error is generated even if the JUMP would not have been done.
```[tasklist]
### Tasks
- [ ] https://github.com/kkrt-labs/kakarot-ssj/issues/251
- [ ] After #251 is implemented, go and implement the business logic of JUMP
```
| non_priority | feat implement jump opcode feature request since group frontier stack memory storage and flow operations index is top of the stack see notes the program counter pc is a byte offset in the deployed it indicates which instruction will be executed next when an is executed for example the pc is incremented by since the instruction is byte the instructions are bigger than one byte and so will increment the counter accordingly the jump instruction alters the program counter thus breaking the linear path of the execution to another point in the deployed it is used to implement functionalities like functions stack input counter byte offset in the deployed where execution will continue from must be a instruction example error cases the state changes done by the current context are in those cases not enough gas not enough values on the stack counter offset is not a the error is generated even if the jump would not have been done tasks after is implemented go and implement the business logic of jump | 0 |
13,211 | 4,652,530,868 | IssuesEvent | 2016-10-03 14:17:55 | dotnet/coreclr | https://api.github.com/repos/dotnet/coreclr | opened | Automatically flag when key JIT data structures get bigger | CodeGen JitThroughput | It's easy to add new data members (or modify the existing ones) to key JIT struct's and classes without realizing the potential impact on memory consumption (and, indirectly, compile times). There is some logic in the compiler to dump out info about the layout of some struct's but this code is #if'd out for default builds so it's tedious to use and it bit rots easily. The best long term solution seems to be to add a utility to read the debug info from the JIT binary and dump the layout; the latest result would be part of the repo and either the utility itself or the driver invoking would compare the current layout to the "last known" and squawk if anything is seen that could have potentially negative impact on resource consumption (specifically, memory and indirectly time) of the compiler. This should be made a standard step in (almost?) every build. If convenient it might be nice to make the layout dumps friendly to human readers so that folks could also see what's going on easily. This process should probably cover a hand-picked subset of the compiler's structures at first to minimize clutter; the obvious candidates are the GenTree* family, RA data structures, etc. | 1.0 | Automatically flag when key JIT data structures get bigger - It's easy to add new data members (or modify the existing ones) to key JIT struct's and classes without realizing the potential impact on memory consumption (and, indirectly, compile times). There is some logic in the compiler to dump out info about the layout of some struct's but this code is #if'd out for default builds so it's tedious to use and it bit rots easily. The best long term solution seems to be to add a utility to read the debug info from the JIT binary and dump the layout; the latest result would be part of the repo and either the utility itself or the driver invoking would compare the current layout to the "last known" and squawk if anything is seen that could have potentially negative impact on resource consumption (specifically, memory and indirectly time) of the compiler. This should be made a standard step in (almost?) every build. If convenient it might be nice to make the layout dumps friendly to human readers so that folks could also see what's going on easily. This process should probably cover a hand-picked subset of the compiler's structures at first to minimize clutter; the obvious candidates are the GenTree* family, RA data structures, etc. | non_priority | automatically flag when key jit data structures get bigger it s easy to add new data members or modify the existing ones to key jit struct s and classes without realizing the potential impact on memory consumption and indirectly compile times there is some logic in the compiler to dump out info about the layout of some struct s but this code is if d out for default builds so it s tedious to use and it bit rots easily the best long term solution seems to be to add a utility to read the debug info from the jit binary and dump the layout the latest result would be part of the repo and either the utility itself or the driver invoking would compare the current layout to the last known and squawk if anything is seen that could have potentially negative impact on resource consumption specifically memory and indirectly time of the compiler this should be made a standard step in almost every build if convenient it might be nice to make the layout dumps friendly to human readers so that folks could also see what s going on easily this process should probably cover a hand picked subset of the compiler s structures at first to minimize clutter the obvious candidates are the gentree family ra data structures etc | 0 |
78,267 | 7,624,743,325 | IssuesEvent | 2018-05-03 19:01:41 | dotnet/corefx | https://api.github.com/repos/dotnet/corefx | closed | Brotli_External_DecompressesResponse_Success is consistently failing because httpbin.org is down | area-System.Net.Http test bug | This test has been failing in local runs for me all day. Apparently httpbin.org has been down all day (or at least every time I run tests).
If httpbin.org is this unreliable, then I don't think we should be depending on it in functional tests.
| 1.0 | Brotli_External_DecompressesResponse_Success is consistently failing because httpbin.org is down - This test has been failing in local runs for me all day. Apparently httpbin.org has been down all day (or at least every time I run tests).
If httpbin.org is this unreliable, then I don't think we should be depending on it in functional tests.
| non_priority | brotli external decompressesresponse success is consistently failing because httpbin org is down this test has been failing in local runs for me all day apparently httpbin org has been down all day or at least every time i run tests if httpbin org is this unreliable then i don t think we should be depending on it in functional tests | 0 |
70,065 | 7,176,396,893 | IssuesEvent | 2018-01-31 09:54:27 | boutproject/BOUT-dev | https://api.github.com/repos/boutproject/BOUT-dev | opened | Staggered grids meta-issue | possible bug tests | There are currently a few problems with using staggered grids (e.g. #64, #259, #411, #741, #810). It's not clear (to me, at least) if these are related issues and staggered grids are completely broken, or if they just need a bit of polish and tightening up.
We're also missing decent tests for them. There is `examples/staggered_grid`, but it doesn't really tell us if staggered grids are working correctly or not. First task, then, should be to get some test coverage that highlights any current problems and ensures that they don't creep back in.
Once we know what's a bug and what's a design issue, we can work on fixing everything. | 1.0 | Staggered grids meta-issue - There are currently a few problems with using staggered grids (e.g. #64, #259, #411, #741, #810). It's not clear (to me, at least) if these are related issues and staggered grids are completely broken, or if they just need a bit of polish and tightening up.
We're also missing decent tests for them. There is `examples/staggered_grid`, but it doesn't really tell us if staggered grids are working correctly or not. First task, then, should be to get some test coverage that highlights any current problems and ensures that they don't creep back in.
Once we know what's a bug and what's a design issue, we can work on fixing everything. | non_priority | staggered grids meta issue there are currently a few problems with using staggered grids e g it s not clear to me at least if these are related issues and staggered grids are completely broken or if they just need a bit of polish and tightening up we re also missing decent tests for them there is examples staggered grid but it doesn t really tell us if staggered grids are working correctly or not first task then should be to get some test coverage that highlights any current problems and ensures that they don t creep back in once we know what s a bug and what s a design issue we can work on fixing everything | 0 |
271,270 | 29,368,847,877 | IssuesEvent | 2023-05-29 01:08:05 | LalithK90/bagShop | https://api.github.com/repos/LalithK90/bagShop | opened | CVE-2021-30640 (Medium) detected in tomcat-embed-core-9.0.30.jar | Mend: dependency security vulnerability | ## CVE-2021-30640 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tomcat-embed-core-9.0.30.jar</b></p></summary>
<p>Core Tomcat implementation</p>
<p>Library home page: <a href="https://tomcat.apache.org/">https://tomcat.apache.org/</a></p>
<p>Path to dependency file: /build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.30/ad32909314fe2ba02cec036434c0addd19bcc580/tomcat-embed-core-9.0.30.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.2.4.RELEASE.jar (Root Library)
- spring-boot-starter-tomcat-2.2.4.RELEASE.jar
- :x: **tomcat-embed-core-9.0.30.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
<p>Publish Date: 2021-07-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-30640>CVE-2021-30640</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread/3qcmnprbtft3phn3vyk06hpycm7p4sgx">https://lists.apache.org/thread/3qcmnprbtft3phn3vyk06hpycm7p4sgx</a></p>
<p>Release Date: 2021-07-12</p>
<p>Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 9.0.46</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.3.11.RELEASE</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-30640 (Medium) detected in tomcat-embed-core-9.0.30.jar - ## CVE-2021-30640 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tomcat-embed-core-9.0.30.jar</b></p></summary>
<p>Core Tomcat implementation</p>
<p>Library home page: <a href="https://tomcat.apache.org/">https://tomcat.apache.org/</a></p>
<p>Path to dependency file: /build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.30/ad32909314fe2ba02cec036434c0addd19bcc580/tomcat-embed-core-9.0.30.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.2.4.RELEASE.jar (Root Library)
- spring-boot-starter-tomcat-2.2.4.RELEASE.jar
- :x: **tomcat-embed-core-9.0.30.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
<p>Publish Date: 2021-07-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-30640>CVE-2021-30640</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread/3qcmnprbtft3phn3vyk06hpycm7p4sgx">https://lists.apache.org/thread/3qcmnprbtft3phn3vyk06hpycm7p4sgx</a></p>
<p>Release Date: 2021-07-12</p>
<p>Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 9.0.46</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.3.11.RELEASE</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in tomcat embed core jar cve medium severity vulnerability vulnerable library tomcat embed core jar core tomcat implementation library home page a href path to dependency file build gradle path to vulnerable library home wss scanner gradle caches modules files org apache tomcat embed tomcat embed core tomcat embed core jar dependency hierarchy spring boot starter web release jar root library spring boot starter tomcat release jar x tomcat embed core jar vulnerable library found in base branch master vulnerability details a vulnerability in the jndi realm of apache tomcat allows an attacker to authenticate using variations of a valid user name and or to bypass some of the protection provided by the lockout realm this issue affects apache tomcat to to to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache tomcat embed tomcat embed core direct dependency fix resolution org springframework boot spring boot starter web release step up your open source security game with mend | 0 |
68,910 | 13,196,678,471 | IssuesEvent | 2020-08-13 21:09:34 | dotnet/runtime | https://api.github.com/repos/dotnet/runtime | closed | Vector128<byte>:get_Zero() doesn't inline (or intrinsicify) at crossgen | area-CodeGen-coreclr | Nor does `Vector128<byte>.Count()` or ``Vector128:AsByte(Vector128`1):Vector128`1``
`ASCIIUtility.WidenAsciiToUtf16_Sse2` calls `Vector128<byte>.Zero`
https://github.com/dotnet/runtime/blob/fd181c0210c263e40ce8b908bdd521d8f3cc284e/src/libraries/System.Private.CoreLib/src/System/Text/ASCIIUtility.cs#L1633-L1637
Which ends up reserving stack, making call and reading the stack back to zero a `xmm` register:
```asm
G_M55642_IG05:
lea rcx, [rsp+20H]
call [Vector128`1:get_Zero():Vector128`1]
movaps xmm0, xmmword ptr [rsp+20H]
movaps xmm1, xmm6
punpcklbw xmm1, xmm0
movdqu xmmword ptr [rsi], xmm1
mov rax, rsi
shr rax, 1
and rax, 7
mov edx, 8
sub rdx, rax
mov rax, rdx
sub rbx, 16
```
Which is quite inefficient
/cc @tannergooding @GrabYourPitchforks
category:cq
theme:intrinsics
skill-level:expert
cost:medium | 1.0 | Vector128<byte>:get_Zero() doesn't inline (or intrinsicify) at crossgen - Nor does `Vector128<byte>.Count()` or ``Vector128:AsByte(Vector128`1):Vector128`1``
`ASCIIUtility.WidenAsciiToUtf16_Sse2` calls `Vector128<byte>.Zero`
https://github.com/dotnet/runtime/blob/fd181c0210c263e40ce8b908bdd521d8f3cc284e/src/libraries/System.Private.CoreLib/src/System/Text/ASCIIUtility.cs#L1633-L1637
Which ends up reserving stack, making call and reading the stack back to zero a `xmm` register:
```asm
G_M55642_IG05:
lea rcx, [rsp+20H]
call [Vector128`1:get_Zero():Vector128`1]
movaps xmm0, xmmword ptr [rsp+20H]
movaps xmm1, xmm6
punpcklbw xmm1, xmm0
movdqu xmmword ptr [rsi], xmm1
mov rax, rsi
shr rax, 1
and rax, 7
mov edx, 8
sub rdx, rax
mov rax, rdx
sub rbx, 16
```
Which is quite inefficient
/cc @tannergooding @GrabYourPitchforks
category:cq
theme:intrinsics
skill-level:expert
cost:medium | non_priority | get zero doesn t inline or intrinsicify at crossgen nor does count or asbyte asciiutility calls zero which ends up reserving stack making call and reading the stack back to zero a xmm register asm g lea rcx call movaps xmmword ptr movaps punpcklbw movdqu xmmword ptr mov rax rsi shr rax and rax mov edx sub rdx rax mov rax rdx sub rbx which is quite inefficient cc tannergooding grabyourpitchforks category cq theme intrinsics skill level expert cost medium | 0 |
50,942 | 21,484,548,174 | IssuesEvent | 2022-04-26 21:26:04 | MicrosoftDocs/azure-docs | https://api.github.com/repos/MicrosoftDocs/azure-docs | closed | Nginx ingress controller pods do not respond to health probes on "/" and we need custom path annotation to send probe on"/healthz" | container-service/svc triaged assigned-to-author doc-bug Pri1 |
Starting on AKS clusters running K8s version 1.22, the default health probe path went from "/healthz" to "/". This default probe path is documented here: https://kubernetes-sigs.github.io/cloud-provider-azure/topics/loadbalancer/#custom-load-balancer-health-probe
The PR that changed the default probe path: https://github.com/kubernetes-sigs/cloud-provider-azure/pull/1384
The issue is that the nginx ingress deployment that is installed via the helm commands in this article will not fully work, because the nginx ingress controller pods will respond with a 404 when they receive a health probe request on "/". If an ingress object is setup to route traffic on "/", then it will work, but if not then the 404 will cause the Azure Load balancer to think that the backend targets are all unhealthy.
To get this to work in that case, you need to have an additional annotation set on the k8s svc:
service.beta.kubernetes.io/azure-load-balancer-health-probe-request-path: /healthz
I think our documentation needs to reflect this annotation.
By setting that annotation on the k8s svc for the nginx ingress, the Azure LB is setup to have the health probe path as "healthz", and the nginx ingress controller pods then respond successfully to that with a 200 response. If that annotation is not set, and there is no ingress objects to route traffic destined for "/", then a 404 is sent back to LB and all nodes will look unhealthy. This can be reproduced in lab easily. Just run the following commands and you will notice that you cannot access the public IP. Then add the annotation and the PIP will be accessible.
# Use Helm to deploy an NGINX ingress controller
helm install nginx-ingress ingress-nginx/ingress-nginx \
--version 4.0.13 \
--namespace ingress-basic --create-namespace \
--set controller.replicaCount=2 \
--set controller.nodeSelector."kubernetes\.io/os"=linux \
--set controller.admissionWebhooks.patch.nodeSelector."kubernetes\.io/os"=linux \
--set defaultBackend.nodeSelector."kubernetes\.io/os"=linux \
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: fd0e7d5a-37e9-07dc-f395-9cb5bb580e45
* Version Independent ID: 7e4faf70-9724-7e7b-832b-1cd99a974920
* Content: [Create an ingress controller - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/ingress-basic?tabs=azure-cli)
* Content Source: [articles/aks/ingress-basic.md](https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/aks/ingress-basic.md)
* Service: **container-service**
* GitHub Login: @zr-msft
* Microsoft Alias: **zarhoads** | 1.0 | Nginx ingress controller pods do not respond to health probes on "/" and we need custom path annotation to send probe on"/healthz" -
Starting on AKS clusters running K8s version 1.22, the default health probe path went from "/healthz" to "/". This default probe path is documented here: https://kubernetes-sigs.github.io/cloud-provider-azure/topics/loadbalancer/#custom-load-balancer-health-probe
The PR that changed the default probe path: https://github.com/kubernetes-sigs/cloud-provider-azure/pull/1384
The issue is that the nginx ingress deployment that is installed via the helm commands in this article will not fully work, because the nginx ingress controller pods will respond with a 404 when they receive a health probe request on "/". If an ingress object is setup to route traffic on "/", then it will work, but if not then the 404 will cause the Azure Load balancer to think that the backend targets are all unhealthy.
To get this to work in that case, you need to have an additional annotation set on the k8s svc:
service.beta.kubernetes.io/azure-load-balancer-health-probe-request-path: /healthz
I think our documentation needs to reflect this annotation.
By setting that annotation on the k8s svc for the nginx ingress, the Azure LB is setup to have the health probe path as "healthz", and the nginx ingress controller pods then respond successfully to that with a 200 response. If that annotation is not set, and there is no ingress objects to route traffic destined for "/", then a 404 is sent back to LB and all nodes will look unhealthy. This can be reproduced in lab easily. Just run the following commands and you will notice that you cannot access the public IP. Then add the annotation and the PIP will be accessible.
# Use Helm to deploy an NGINX ingress controller
helm install nginx-ingress ingress-nginx/ingress-nginx \
--version 4.0.13 \
--namespace ingress-basic --create-namespace \
--set controller.replicaCount=2 \
--set controller.nodeSelector."kubernetes\.io/os"=linux \
--set controller.admissionWebhooks.patch.nodeSelector."kubernetes\.io/os"=linux \
--set defaultBackend.nodeSelector."kubernetes\.io/os"=linux \
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: fd0e7d5a-37e9-07dc-f395-9cb5bb580e45
* Version Independent ID: 7e4faf70-9724-7e7b-832b-1cd99a974920
* Content: [Create an ingress controller - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/ingress-basic?tabs=azure-cli)
* Content Source: [articles/aks/ingress-basic.md](https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/aks/ingress-basic.md)
* Service: **container-service**
* GitHub Login: @zr-msft
* Microsoft Alias: **zarhoads** | non_priority | nginx ingress controller pods do not respond to health probes on and we need custom path annotation to send probe on healthz starting on aks clusters running version the default health probe path went from healthz to this default probe path is documented here the pr that changed the default probe path the issue is that the nginx ingress deployment that is installed via the helm commands in this article will not fully work because the nginx ingress controller pods will respond with a when they receive a health probe request on if an ingress object is setup to route traffic on then it will work but if not then the will cause the azure load balancer to think that the backend targets are all unhealthy to get this to work in that case you need to have an additional annotation set on the svc service beta kubernetes io azure load balancer health probe request path healthz i think our documentation needs to reflect this annotation by setting that annotation on the svc for the nginx ingress the azure lb is setup to have the health probe path as healthz and the nginx ingress controller pods then respond successfully to that with a response if that annotation is not set and there is no ingress objects to route traffic destined for then a is sent back to lb and all nodes will look unhealthy this can be reproduced in lab easily just run the following commands and you will notice that you cannot access the public ip then add the annotation and the pip will be accessible use helm to deploy an nginx ingress controller helm install nginx ingress ingress nginx ingress nginx version namespace ingress basic create namespace set controller replicacount set controller nodeselector kubernetes io os linux set controller admissionwebhooks patch nodeselector kubernetes io os linux set defaultbackend nodeselector kubernetes io os linux document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service container service github login zr msft microsoft alias zarhoads | 0 |
124,910 | 12,242,883,697 | IssuesEvent | 2020-05-05 08:11:13 | HeRAMS-WHO/herams-backend | https://api.github.com/repos/HeRAMS-WHO/herams-backend | closed | Redirect for old login link | env:prod env:staging flow:test on staging subject:documentation urgency:low | It seems that with the change in sign-up, the login url also changed. The old link https://herams.org/user/login is no longer working and seems to be replaced with /session/create. As we reference the old link in all our documents and users have it bookmarked like that, would it be possible to do a redirect to the new /session/create page? We will gradually change in all documents, but this will take a while and we have users already reporting this as an error.
| 1.0 | Redirect for old login link - It seems that with the change in sign-up, the login url also changed. The old link https://herams.org/user/login is no longer working and seems to be replaced with /session/create. As we reference the old link in all our documents and users have it bookmarked like that, would it be possible to do a redirect to the new /session/create page? We will gradually change in all documents, but this will take a while and we have users already reporting this as an error.
| non_priority | redirect for old login link it seems that with the change in sign up the login url also changed the old link is no longer working and seems to be replaced with session create as we reference the old link in all our documents and users have it bookmarked like that would it be possible to do a redirect to the new session create page we will gradually change in all documents but this will take a while and we have users already reporting this as an error | 0 |
9,131 | 12,200,457,074 | IssuesEvent | 2020-04-30 04:47:06 | nkumar115/Data-Science | https://api.github.com/repos/nkumar115/Data-Science | opened | Different Types of Joins in Python - Pandas | Data - PreProcessing | **TL;DR**
Different Types of Joins in Python - Pandas
**Link**
https://www.analyticsvidhya.com/blog/2020/02/joins-in-pandas-master-the-different-types-of-joins-in-python/
**Author**
Analytics Vidhya
**Outcomes**
1. Inner Join in Pandas
2. Full Join in Pandas
3. Left Join in Pandas
4. Right Join in Pandas | 1.0 | Different Types of Joins in Python - Pandas - **TL;DR**
Different Types of Joins in Python - Pandas
**Link**
https://www.analyticsvidhya.com/blog/2020/02/joins-in-pandas-master-the-different-types-of-joins-in-python/
**Author**
Analytics Vidhya
**Outcomes**
1. Inner Join in Pandas
2. Full Join in Pandas
3. Left Join in Pandas
4. Right Join in Pandas | non_priority | different types of joins in python pandas tl dr different types of joins in python pandas link author analytics vidhya outcomes inner join in pandas full join in pandas left join in pandas right join in pandas | 0 |
212,904 | 16,503,877,384 | IssuesEvent | 2021-05-25 16:53:55 | orekorekorek/procedure | https://api.github.com/repos/orekorekorek/procedure | closed | Задание 3-3 | documentation enhancement good first issue | Протабулировать заданную функцию и сумму функционального ряда разложения этой функции на интервале [a,b] и с шагом h (шаг и интервал задается в константах). Функциональнй ряд вычисляется по соответствующей рекуррентной формуле с заданной точностью ɛ. В результате показать три столбца: значение аргумента, значение функции в данной точке и значение суммы ряда, вычисленное с заданной точностью в данной точке. Два последних столбца должны иметь близкие результаты.
ⅇ^2x
𝑆=1+2𝑥/1!+⋯+(2𝑥)^𝑛/𝑛!+⋯
0.1≤𝑥≤1
20^(-4) | 1.0 | Задание 3-3 - Протабулировать заданную функцию и сумму функционального ряда разложения этой функции на интервале [a,b] и с шагом h (шаг и интервал задается в константах). Функциональнй ряд вычисляется по соответствующей рекуррентной формуле с заданной точностью ɛ. В результате показать три столбца: значение аргумента, значение функции в данной точке и значение суммы ряда, вычисленное с заданной точностью в данной точке. Два последних столбца должны иметь близкие результаты.
ⅇ^2x
𝑆=1+2𝑥/1!+⋯+(2𝑥)^𝑛/𝑛!+⋯
0.1≤𝑥≤1
20^(-4) | non_priority | задание протабулировать заданную функцию и сумму функционального ряда разложения этой функции на интервале и с шагом h шаг и интервал задается в константах функциональнй ряд вычисляется по соответствующей рекуррентной формуле с заданной точностью ɛ в результате показать три столбца значение аргумента значение функции в данной точке и значение суммы ряда вычисленное с заданной точностью в данной точке два последних столбца должны иметь близкие результаты ⅇ 𝑆 ⋯ 𝑛 𝑛 ⋯ ≤𝑥≤ | 0 |
1,723 | 4,380,975,994 | IssuesEvent | 2016-08-06 00:36:27 | bpython/bpython | https://api.github.com/repos/bpython/bpython | closed | bpython run greenlet bug | requires-separate-process | ```
from greenlet import getcurrent
getcurrent()
getcurrent()
getcurrent()
```
run the code above, even I call `getcurrent` for 3(or more) times, it will get the same obj in `python` shell and `ipython` shell, but it failed in `bpython`, it'll give more than one different greenlet, so it'll cause bugs like [flask context error](https://github.com/smurfix/flask-script/issues/155) | 1.0 | bpython run greenlet bug - ```
from greenlet import getcurrent
getcurrent()
getcurrent()
getcurrent()
```
run the code above, even I call `getcurrent` for 3(or more) times, it will get the same obj in `python` shell and `ipython` shell, but it failed in `bpython`, it'll give more than one different greenlet, so it'll cause bugs like [flask context error](https://github.com/smurfix/flask-script/issues/155) | non_priority | bpython run greenlet bug from greenlet import getcurrent getcurrent getcurrent getcurrent run the code above even i call getcurrent for or more times it will get the same obj in python shell and ipython shell but it failed in bpython it ll give more than one different greenlet so it ll cause bugs like | 0 |
61,791 | 25,730,163,042 | IssuesEvent | 2022-12-07 19:38:36 | microsoft/vscode-cpptools | https://api.github.com/repos/microsoft/vscode-cpptools | closed | Switch Windows/Linux builds from Azure "classic" pipelines to YAML pipelines | Language Service fixed (release pending) internal | Seems low priority for now. The YAML pipeline seems to have get around some PAT issue with the classic pipelines.
| 1.0 | Switch Windows/Linux builds from Azure "classic" pipelines to YAML pipelines - Seems low priority for now. The YAML pipeline seems to have get around some PAT issue with the classic pipelines.
| non_priority | switch windows linux builds from azure classic pipelines to yaml pipelines seems low priority for now the yaml pipeline seems to have get around some pat issue with the classic pipelines | 0 |
187,761 | 22,045,893,261 | IssuesEvent | 2022-05-30 01:37:34 | Nivaskumark/kernel_v4.1.15 | https://api.github.com/repos/Nivaskumark/kernel_v4.1.15 | closed | CVE-2020-24394 (High) detected in linuxlinux-4.6 - autoclosed | security vulnerability | ## CVE-2020-24394 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.6</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/kernel_v4.1.15/commit/00db4e8795bcbec692fb60b19160bdd763ad42e3">00db4e8795bcbec692fb60b19160bdd763ad42e3</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/vfs.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/vfs.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.
<p>Publish Date: 2020-08-19
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24394>CVE-2020-24394</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2020-24394">https://www.linuxkernelcves.com/cves/CVE-2020-24394</a></p>
<p>Release Date: 2020-08-19</p>
<p>Fix Resolution: v5.8-rc4,v4.14.188,v4.19.132,v5.4.51,v5.7.8</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-24394 (High) detected in linuxlinux-4.6 - autoclosed - ## CVE-2020-24394 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.6</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/kernel_v4.1.15/commit/00db4e8795bcbec692fb60b19160bdd763ad42e3">00db4e8795bcbec692fb60b19160bdd763ad42e3</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/vfs.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/nfsd/vfs.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.
<p>Publish Date: 2020-08-19
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24394>CVE-2020-24394</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2020-24394">https://www.linuxkernelcves.com/cves/CVE-2020-24394</a></p>
<p>Release Date: 2020-08-19</p>
<p>Fix Resolution: v5.8-rc4,v4.14.188,v4.19.132,v5.4.51,v5.7.8</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in linuxlinux autoclosed cve high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in head commit a href found in base branch master vulnerable source files fs nfsd vfs c fs nfsd vfs c vulnerability details in the linux kernel before fs nfsd vfs c in the nfs server can set incorrect permissions on new filesystem objects when the filesystem lacks acl support aka cid this occurs because the current umask is not considered publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
1,144 | 3,390,788,482 | IssuesEvent | 2015-11-30 12:36:50 | SockDrawer/SockRPG | https://api.github.com/repos/SockDrawer/SockRPG | closed | How do we handle deletion? | question Requirements clarification | Do we want soft-deletes? Hard deletes? Sometimes one and sometimes the other? Is the answer the same for all entities? What about self-deletes vs admin deletes?
Things I can think of that might be able to be deleted:
- Threads/scenes
- Games/boards
- Users | 1.0 | How do we handle deletion? - Do we want soft-deletes? Hard deletes? Sometimes one and sometimes the other? Is the answer the same for all entities? What about self-deletes vs admin deletes?
Things I can think of that might be able to be deleted:
- Threads/scenes
- Games/boards
- Users | non_priority | how do we handle deletion do we want soft deletes hard deletes sometimes one and sometimes the other is the answer the same for all entities what about self deletes vs admin deletes things i can think of that might be able to be deleted threads scenes games boards users | 0 |
112,222 | 9,558,023,692 | IssuesEvent | 2019-05-03 13:16:49 | ValveSoftware/steam-for-linux | https://api.github.com/repos/ValveSoftware/steam-for-linux | closed | 64bit games won't start on Debian unstable | Need Retest reviewed | When I start a 64 bit game in on Debian unstable I get invalid pointer errors since the last update. However, some games seem to run, when started from the terminal (eg Shovel Knight and Transistor).
**For example:**
Cities Skylines:
`*** Error in `/home/ichi/.steam/SteamApps/common/Cities_Skylines/Cities.x64': free(): invalid pointer: 0x00000000028e6d78 ***`
Shovel Knight:
`*** Error in `/home/ichi/.steam/SteamApps/common/Shovel Knight/64/ShovelKnight': free(): invalid pointer: 0x0000000001ed57a0 ***`
Transistor:
`*** Error in `./Transistor.bin.x86_64': free(): invalid pointer: 0x00007f7234000078 ***`
**My System:**
```
System: Host: localhorst Kernel: 4.3.0-1-amd64 x86_64 (64 bit) Desktop: i3 4.11
Distro: Debian GNU/Linux stretch/sid
Machine: System: ASUS product: All Series
Mobo: ASUSTeK model: Z87-K v: Rev X.0x Bios: American Megatrends v: 1402 date: 11/05/2014
CPU: Quad core Intel Core i5-4570 (-MCP-) cache: 6144 KB
clock speeds: max: 3600 MHz 1: 3206 MHz 2: 3283 MHz 3: 3243 MHz 4: 3230 MHz
Graphics: Card: NVIDIA GM204 [GeForce GTX 980]
Display Server: X.Org 1.18.0 driver: nvidia Resolution: 1920x1080@60.00hz
GLX Renderer: GeForce GTX 980/PCIe/SSE2 GLX Version: 4.5.0 NVIDIA 358.16
Audio: Card-1 Intel 8 Series/C220 Series High Definition Audio Controller driver: snd_hda_intel
Card-2 NVIDIA GM204 High Definition Audio Controller driver: snd_hda_intel
Sound: Advanced Linux Sound Architecture v: k4.3.0-1-amd64
Network: Card: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller driver: r8169
IF: eth0 state: up speed: 1000 Mbps duplex: full mac: ac:22:0b:82:2e:67
Drives: HDD Total Size: 13292.2GB (56.3% used) ID-1: /dev/sda model: M4 size: 512.1GB
ID-2: /dev/sdd model: WDC_WD40EFRX size: 4000.8GB ID-3: /dev/sdc model: WDC_WD40EFRX size: 4000.8GB
ID-4: /dev/sdb model: Samsung_SSD_840 size: 250.1GB ID-5: /dev/sdf model: WDC_WD40EFRX size: 4000.8GB
ID-6: /dev/sde model: M4 size: 512.1GB ID-7: USB /dev/sdg model: Rainbow_Line size: 15.5GB
Partition: ID-1: / size: 460G used: 283G (65%) fs: ext4 dev: /dev/sda1
ID-2: swap-1 size: 10.74GB used: 0.00GB (0%) fs: swap dev: /dev/sda2
RAID: Device-1: /dev/md0 - active raid: 5 components: online: 3/3 - sdc1 sdd1 sdf1
Sensors: System Temperatures: cpu: 29.8C mobo: 27.8C gpu: 30C
Fan Speeds (in rpm): cpu: 0
Info: Processes: 242 Uptime: 6:27 Memory: 2536.4/15991.3MB Client: Shell (zsh) inxi: 2.2.28
```
**Packages that where in the upgrade that broke 64 bit games:**
```
Start-Date: 2016-02-15 11:17:46
Commandline: apt upgrade
Requested-By: ichi (1000)
Install:
liblept5:amd64 (1.73-1+b1 automatic),
libsnappy1v5:i386 (1.1.3-2 automatic),
libsuitesparseconfig4.4.6:amd64 (4.4.6-1 automatic),
php-phpseclib:amd64 (2.0.1-1 automatic),
dbconfig-mysql:amd64 (2.0.2 automatic),
libx265-79:i386 (1.9-dmo1 automatic),
libilmbase12:amd64 (2.2.0-8 automatic),
libopenexr22:amd64 (2.2.0-9 automatic)
Upgrade:
libkvazaar3:amd64 (0.8.3-dmo1, 0.8.3-dmo2),
libkvazaar3:i386 (0.8.3-dmo1, 0.8.3-dmo2),
lib32ubsan0:amd64 (5.3.1-7, 5.3.1-8),
manpages:amd64 (4.04-0.1, 4.04-1),
perl-base:amd64 (5.22.1-4, 5.22.1-7),
libquadmath0-dbg:amd64 (5.3.1-7, 5.3.1-8),
libmpx0:amd64 (5.3.1-7, 5.3.1-8),
libgcj16:amd64 (5.3.1-7, 5.3.1-8),
libdc1394-22:amd64 (2.2.3-1, 2.2.4-1),
libdevmapper1.02.1:amd64 (1.02.115-1, 1.02.115-2),
libltdl-dev:amd64 (2.4.2-1.11, 2.4.6-0.1),
iso-codes:amd64 (3.64-1, 3.65-1),
acpid:amd64 (2.0.25-1, 2.0.26-1),
dmsetup:amd64 (1.02.115-1, 1.02.115-2),
libnl-route-3-200:amd64 (3.2.26-1, 3.2.27-1),
libavformat56:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
lib32mpx0:amd64 (5.3.1-7, 5.3.1-8),
libgcc-5-dev:amd64 (5.3.1-7, 5.3.1-8),
libisofs6:amd64 (1.4.2-1, 1.4.2-2),
python-psutil:amd64 (3.4.1-1, 3.4.2-1),
libaspectj-java:amd64 (1.8.5-1, 1.8.8-1),
libavfilter5:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
libpackagekit-glib2-18:amd64 (1.0.11-1, 1.0.11-2),
python-xapian:amd64 (1.2.22-1, 1.2.22-2),
libvte-2.91-0:amd64 (0.42.1-2+b1, 0.42.3-1),
handbrake:amd64 (0.10.3-dmo2, 0.10.3-dmo3),
libchromaprint0:amd64 (1.2-dmo3, 1.3-dmo1),
libgroupsock8:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1),
publicsuffix:amd64 (20160115-1, 20160130-1),
netpbm:amd64 (10.0-15.2, 10.0-15.3),
gir1.2-gtk-3.0:amd64 (3.18.6-1, 3.18.7-1),
libx32itm1:amd64 (5.3.1-7, 5.3.1-8),
ffmpeg:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
os-prober:amd64 (1.70, 1.71),
linux-libc-dev:amd64 (4.3.3-7, 4.3.5-1),
linux-libc-dev:i386 (4.3.3-7, 4.3.5-1),
libatomic1-dbg:amd64 (5.3.1-7, 5.3.1-8),
libapt-inst2.0:amd64 (1.2.1, 1.2.3),
appstream:amd64 (0.9.0-3, 0.9.1-1),
lib32stdc++-5-dev:amd64 (5.3.1-7, 5.3.1-8),
libtool-bin:amd64 (2.4.2-1.11, 2.4.6-0.1),
libgegl-0.3-0:amd64 (0.3.4-dmo1, 0.3.4-dmo2),
imagemagick:amd64 (6.8.9.9-7, 6.8.9.9-7+b1),
libgnutls-openssl27:amd64 (3.4.8-2, 3.4.9-2),
lib32stdc++6:amd64 (5.3.1-7, 5.3.1-8),
libswresample1:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
libswresample1:i386 (2.8.5-dmo2, 2.8.6-dmo2),
g++-5-multilib:amd64 (5.3.1-7, 5.3.1-8),
libopencv-imgproc2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
libnl-genl-3-200:amd64 (3.2.26-1, 3.2.27-1),
libopencv-objdetect2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
p7zip:amd64 (9.20.1~dfsg.1-4.2, 9.20.1~dfsg.1-5),
libsystemd0:amd64 (228-4+b1, 228-6),
libsystemd0:i386 (228-4+b1, 228-6),
libgtk-3-common:amd64 (3.18.6-1, 3.18.7-1),
acl:amd64 (2.2.52-2, 2.2.52-3),
libx32quadmath0:amd64 (5.3.1-7, 5.3.1-8),
grub-common:amd64 (2.02~beta2-35, 2.02~beta2-36),
transfig:amd64 (3.2.5.e-4, 3.2.5.e-5),
aspectj:amd64 (1.8.5-1, 1.8.8-1),
apt:amd64 (1.2.1, 1.2.3),
libgtk-3-0:amd64 (3.18.6-1, 3.18.7-1),
libacl1:amd64 (2.2.52-2, 2.2.52-3),
python-cssutils:amd64 (1.0-4, 1.0-4.1),
libjcommander-java:amd64 (1.35-1, 1.48-1),
libobjc4:amd64 (5.3.1-7, 5.3.1-8),
cpp-5:amd64 (5.3.1-7, 5.3.1-8),
libcglib-java:amd64 (2.2.2+dfsg2-2, 3.2.0-2),
libasound2-data:amd64 (1.0.29-1, 1.1.0-1),
libgcc1-dbg:amd64 (5.3.1-7, 5.3.1-8),
libtsan0-dbg:amd64 (5.3.1-7, 5.3.1-8),
binutils:amd64 (2.26-2, 2.26-3),
libmagickwand-6.q16-2:amd64 (6.8.9.9-7, 6.8.9.9-7+b1),
libopencv-video2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
libumfpack5.7.1:amd64 (4.4.5-2, 4.4.6-1),
handbrake-cli:amd64 (0.10.3-dmo2, 0.10.3-dmo3),
libitm1:amd64 (5.3.1-7, 5.3.1-8),
libcamd2.4.1:amd64 (4.4.5-2, 4.4.6-1),
libccolamd2.9.1:amd64 (4.4.5-2, 4.4.6-1),
vlc-nox:amd64 (2.2.1-dmo14, 2.2.2-dmo1),
perl-modules-5.22:amd64 (5.22.1-4, 5.22.1-7),
lib32itm1:amd64 (5.3.1-7, 5.3.1-8),
lib32asan2:amd64 (5.3.1-7, 5.3.1-8),
nodejs:amd64 (4.2.6~dfsg-1, 4.3.0~dfsg-2),
console-setup-linux:amd64 (1.134, 1.136),
fop:amd64 (2.0+dfsg-5, 2.1-1),
libx32gcc1:amd64 (5.3.1-7, 5.3.1-8),
insserv:amd64 (1.14.0-5.1, 1.14.0-5.2),
lib32gcc1-dbg:amd64 (5.3.1-7, 5.3.1-8),
libthai-data:amd64 (0.1.24-1, 0.1.24-2),
vlc-plugin-notify:amd64 (2.2.1-dmo14, 2.2.2-dmo1),
libvlc5:amd64 (2.2.1-dmo14, 2.2.2-dmo1),
grub2-common:amd64 (2.02~beta2-35, 2.02~beta2-36),
gnutls-bin:amd64 (3.4.8-2, 3.4.9-2),
udev:amd64 (228-4+b1, 228-6),
libcilkrts5:amd64 (5.3.1-7, 5.3.1-8),
console-setup:amd64 (1.134, 1.136),
handbrake-gtk:amd64 (0.10.3-dmo2, 0.10.3-dmo3),
rhythmbox-plugins:amd64 (3.2.1-1+b1, 3.3-1),
alsa-utils:amd64 (1.0.29-1+b1, 1.1.0-2),
libasan2:amd64 (5.3.1-7, 5.3.1-8),
lib32gcc-5-dev:amd64 (5.3.1-7, 5.3.1-8),
libquadmath0:amd64 (5.3.1-7, 5.3.1-8),
libxmlgraphics-commons-java:amd64 (2.0.1-2, 2.1-1),
libapt-pkg5.0:amd64 (1.2.1, 1.2.3),
packagekit-tools:amd64 (1.0.11-1, 1.0.11-2),
libpq5:amd64 (9.5.0-2, 9.5.0-3),
libpq5:i386 (9.5.0-2, 9.5.0-3),
ruby-unf-ext:amd64 (0.0.7.1-1+b3, 0.0.7.2-1),
libx32gcc1-dbg:amd64 (5.3.1-7, 5.3.1-8),
grub-pc:amd64 (2.02~beta2-35, 2.02~beta2-36),
libcilkrts5-dbg:amd64 (5.3.1-7, 5.3.1-8),
linux-headers-4.3.0-1-amd64:amd64 (4.3.3-7, 4.3.5-1),
libpostproc53:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
libvlccore8:amd64 (2.2.1-dmo14, 2.2.2-dmo1),
libudev1:amd64 (228-4+b1, 228-6),
libudev1:i386 (228-4+b1, 228-6),
libgomp1-dbg:amd64 (5.3.1-7, 5.3.1-8),
libopencv-flann2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
python-distutils-extra:amd64 (2.38-1, 2.39-1),
libopencv-contrib2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
phpmyadmin:amd64 (4.5.3.1-1, 4.5.4.1-2),
lib32cilkrts5:amd64 (5.3.1-7, 5.3.1-8),
libio-socket-ssl-perl:amd64 (2.022-1, 2.024-1),
libltdl7:amd64 (2.4.2-1.11, 2.4.6-0.1),
libltdl7:i386 (2.4.2-1.11, 2.4.6-0.1),
installation-report:amd64 (2.61, 2.62),
gcc-5-multilib:amd64 (5.3.1-7, 5.3.1-8),
libopencv-highgui2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
libcolamd2.9.1:amd64 (4.4.5-2, 4.4.6-1),
libgcc1:amd64 (5.3.1-7, 5.3.1-8),
libgcc1:i386 (5.3.1-7, 5.3.1-8),
kodi:amd64 (15.2-dmo7, 15.2-dmo8),
gir1.2-rb-3.0:amd64 (3.2.1-1+b1, 3.3-1),
libperl5.22:amd64 (5.22.1-4, 5.22.1-7),
python-cryptography:amd64 (1.2.1-1, 1.2.2-2),
grub-pc-bin:amd64 (2.02~beta2-35, 2.02~beta2-36),
gcc-5-base:amd64 (5.3.1-7, 5.3.1-8),
gcc-5-base:i386 (5.3.1-7, 5.3.1-8),
rhythmbox-data:amd64 (3.2.1-1, 3.3-1),
lib32gcc1:amd64 (5.3.1-7, 5.3.1-8),
gcj-5-jre-lib:amd64 (5.3.1-7, 5.3.1-8),
libappstream-glib8:amd64 (0.5.5-1, 0.5.8-1),
gnome-calculator:amd64 (3.18.2-1, 3.18.3-1),
imagemagick-6.q16:amd64 (6.8.9.9-7, 6.8.9.9-7+b1),
libnfs8:amd64 (1.9.8-dmo1, 1.10.0-dmo1),
libstdc++-5-dev:amd64 (5.3.1-7, 5.3.1-8),
libx32cilkrts5:amd64 (5.3.1-7, 5.3.1-8),
nautilus:amd64 (3.18.4-1, 3.18.5-1),
libnautilus-extension1a:amd64 (3.18.4-1, 3.18.5-1),
libtsan0:amd64 (5.3.1-7, 5.3.1-8),
libmagickcore-6.q16-2-extra:amd64 (6.8.9.9-7, 6.8.9.9-7+b1),
gir1.2-wnck-3.0:amd64 (3.14.0-2, 3.14.1-1),
kodi-skin-confluence:amd64 (15.2-dmo7, 15.2-dmo8),
libgtk-3-bin:amd64 (3.18.6-1, 3.18.7-1),
libnss-mdns:amd64 (0.10-6, 0.10-7),
p7zip-full:amd64 (9.20.1~dfsg.1-4.2, 9.20.1~dfsg.1-5),
libubsan0:amd64 (5.3.1-7, 5.3.1-8),
libdatetime-timezone-perl:amd64 (1.94-1+2015g, 1.95-1+2016a),
iceweasel:amd64 (43.0.4-1, 44.0-1),
g++-5:amd64 (5.3.1-7, 5.3.1-8),
gir1.2-vte-2.91:amd64 (0.42.1-2+b1, 0.42.3-1),
steam:i386 (1.0.0.50-6, 1.0.0.51-1),
libx32asan2:amd64 (5.3.1-7, 5.3.1-8),
libnss-myhostname:amd64 (228-4+b1, 228-6),
libgfortran3:amd64 (5.3.1-7, 5.3.1-8),
libneon27-gnutls:amd64 (0.30.1-2+b2, 0.30.1-3),
pinentry-gtk2:amd64 (0.9.7-1, 0.9.7-3),
systemd-sysv:amd64 (228-4+b1, 228-6),
lib32gomp1:amd64 (5.3.1-7, 5.3.1-8),
libamd2.4.1:amd64 (4.4.5-2, 4.4.6-1),
libnl-3-200:amd64 (3.2.26-1, 3.2.27-1),
gcc-5:amd64 (5.3.1-7, 5.3.1-8),
libbasicusageenvironment1:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1),
libavcodec56:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
libavcodec56:i386 (2.8.5-dmo2, 2.8.6-dmo2),
tesseract-ocr:amd64 (3.04.00-5+b1, 3.04.00-5+b2),
libprotobuf-c1:amd64 (1.1.1-1, 1.2.1-1),
libburn4:amd64 (1.4.2-1, 1.4.2.pl01-1),
libsdl2-image-2.0-0:amd64 (2.0.0+dfsg-3+b4, 2.0.1+dfsg-2),
libsdl2-image-2.0-0:i386 (2.0.0+dfsg-3+b4, 2.0.1+dfsg-2),
python-nose:amd64 (1.3.6-1, 1.3.7-1),
vlc:amd64 (2.2.1-dmo14, 2.2.2-dmo1),
libpam-systemd:amd64 (228-4+b1, 228-6),
libgail-3-0:amd64 (3.18.6-1, 3.18.7-1),
libavutil54:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
libavutil54:i386 (2.8.5-dmo2, 2.8.6-dmo2),
vlc-data:amd64 (2.2.1-dmo14, 2.2.2-dmo1),
libtheora0:amd64 (1.1.1+dfsg.1-7.1, 1.1.1+dfsg.1-8),
libtheora0:i386 (1.1.1+dfsg.1-7.1, 1.1.1+dfsg.1-8),
libopencv-calib3d2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
packagekit:amd64 (1.0.11-1, 1.0.11-2),
liblsan0:amd64 (5.3.1-7, 5.3.1-8),
systemd:amd64 (228-4+b1, 228-6),
libgomp1:amd64 (5.3.1-7, 5.3.1-8),
libgomp1:i386 (5.3.1-7, 5.3.1-8),
libavdevice56:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
xca:amd64 (1.0.0-2.1, 1.3.2-1),
libopencv-legacy2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
lib32quadmath0:amd64 (5.3.1-7, 5.3.1-8),
gimp-gmic:amd64 (1.6.8-3, 1.6.8-3+b1),
wine32:i386 (1.8-6, 1.8.1-1),
libthai0:amd64 (0.1.24-1, 0.1.24-2),
libthai0:i386 (0.1.24-1, 0.1.24-2),
wine64:amd64 (1.8-6, 1.8.1-1),
libhogweed4:amd64 (3.1.1-4, 3.2-1),
libhogweed4:i386 (3.1.1-4, 3.2-1),
libwnck-3-0:amd64 (3.14.0-2, 3.14.1-1),
libubsan0-dbg:amd64 (5.3.1-7, 5.3.1-8),
apt-utils:amd64 (1.2.1, 1.2.3),
libswscale3:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
smartmontools:amd64 (6.4+svn4109-1, 6.4+svn4214-1),
libmagickcore-6.q16-2:amd64 (6.8.9.9-7, 6.8.9.9-7+b1),
manpages-dev:amd64 (4.04-0.1, 4.04-1),
libx32ubsan0:amd64 (5.3.1-7, 5.3.1-8),
keyboard-configuration:amd64 (1.134, 1.136),
gnome-shell-extensions:amd64 (3.18.3-1, 3.18.3-2),
libasound2:amd64 (1.0.29-1, 1.1.0-1),
libasound2:i386 (1.0.29-1, 1.1.0-1),
libasound2-dev:i386 (1.0.29-1, 1.1.0-1),
libasound2-plugins:amd64 (1.0.29-dmo1, 1.1.0-dmo1),
libasound2-plugins:i386 (1.0.29-dmo1, 1.1.0-dmo1),
libx32stdc++-5-dev:amd64 (5.3.1-7, 5.3.1-8),
fonts-wine:amd64 (1.8-6, 1.8.1-1),
nodejs-dev:amd64 (4.2.6~dfsg-1, 4.3.0~dfsg-2),
libnettle6:amd64 (3.1.1-4, 3.2-1),
libnettle6:i386 (3.1.1-4, 3.2-1),
libopencv-core2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
busybox:amd64 (1.22.0-17, 1.22.0-18),
findutils:amd64 (4.6.0-2, 4.6.0+git+20160126-2),
libvte-2.91-common:amd64 (0.42.1-2, 0.42.3-1),
gir1.2-packagekitglib-1.0:amd64 (1.0.11-1, 1.0.11-2),
liblsan0-dbg:amd64 (5.3.1-7, 5.3.1-8),
libgnutls30:amd64 (3.4.8-2, 3.4.9-2),
libgnutls30:i386 (3.4.8-2, 3.4.9-2),
libsoftware-license-perl:amd64 (0.103011-1, 0.103011-2),
libwnck-3-common:amd64 (3.14.0-2, 3.14.1-1),
debtags:amd64 (2.0.1, 2.0.2),
perl:amd64 (5.22.1-4, 5.22.1-7),
liblivemedia50:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1),
libmagick++-6.q16-5v5:amd64 (6.8.9.9-7, 6.8.9.9-7+b1),
libbs2b0:amd64 (3.1.0+dfsg-2.1, 3.1.0+dfsg-2.2),
nautilus-data:amd64 (3.18.4-1, 3.18.5-1),
libopencv-ml2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
apt-transport-https:amd64 (1.2.1, 1.2.3),
libappstream3:amd64 (0.9.0-3, 0.9.1-1),
libitm1-dbg:amd64 (5.3.1-7, 5.3.1-8),
gparted:amd64 (0.19.0-3+b2, 0.25.0-1),
libnetpbm10:amd64 (10.0-15.2, 10.0-15.3),
libatomic1:amd64 (5.3.1-7, 5.3.1-8),
linux-image-4.3.0-1-amd64:amd64 (4.3.3-7, 4.3.5-1),
libcc1-0:amd64 (5.3.1-7, 5.3.1-8),
libx32gcc-5-dev:amd64 (5.3.1-7, 5.3.1-8),
wine:amd64 (1.8-6, 1.8.1-1),
libx32gomp1:amd64 (5.3.1-7, 5.3.1-8),
kodi-bin:amd64 (15.2-dmo7, 15.2-dmo8),
linux-headers-4.3.0-1-common:amd64 (4.3.3-7, 4.3.5-1),
libopencv-features2d2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
kodi-data:amd64 (15.2-dmo7, 15.2-dmo8),
linux-compiler-gcc-5-x86:amd64 (4.3.3-7, 4.3.5-1),
pinentry-gnome3:amd64 (0.9.7-1, 0.9.7-3),
libtesseract3:amd64 (3.04.00-5+b1, 3.04.00-5+b2),
libstdc++6:amd64 (5.3.1-7, 5.3.1-8),
libstdc++6:i386 (5.3.1-7, 5.3.1-8),
lib32atomic1:amd64 (5.3.1-7, 5.3.1-8),
libsdl2-ttf-2.0-0:amd64 (2.0.12+dfsg1-2, 2.0.14+dfsg1-1),
libjpeg62-turbo:amd64 (1.4.1-2, 1.4.2-2),
libjpeg62-turbo:i386 (1.4.1-2, 1.4.2-2),
libx32atomic1:amd64 (5.3.1-7, 5.3.1-8),
libfop-java:amd64 (2.0+dfsg-5, 2.1-1),
libavresample2:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
libavresample2:i386 (2.8.5-dmo2, 2.8.6-dmo2),
libusageenvironment3:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1),
libdebconfclient0:amd64 (0.201, 0.204),
libjcommander-java-doc:amd64 (1.35-1, 1.48-1),
libtool:amd64 (2.4.2-1.11, 2.4.6-0.1),
libtokyocabinet9:amd64 (1.4.48-3, 1.4.48-7),
rhythmbox:amd64 (3.2.1-1+b1, 3.3-1),
diffstat:amd64 (1.60-1, 1.61-1),
libwine:amd64 (1.8-6, 1.8.1-1),
libwine:i386 (1.8-6, 1.8.1-1),
libmodule-build-perl:amd64 (0.421400-3, 0.421600-1),
rhythmbox-plugin-cdrecorder:amd64 (3.2.1-1+b1, 3.3-1),
libdatrie1:amd64 (0.2.10-1, 0.2.10-2),
libdatrie1:i386 (0.2.10-1, 0.2.10-2),
libneon27:amd64 (0.30.1-2+b2, 0.30.1-3),
librhythmbox-core9:amd64 (3.2.1-1+b1, 3.3-1),
libx32stdc++6:amd64 (5.3.1-7, 5.3.1-8),
libcholmod3.0.6:amd64 (4.4.5-2, 4.4.6-1)
End-Date: 2016-02-15 11:24:41
```
| 1.0 | 64bit games won't start on Debian unstable - When I start a 64 bit game in on Debian unstable I get invalid pointer errors since the last update. However, some games seem to run, when started from the terminal (eg Shovel Knight and Transistor).
**For example:**
Cities Skylines:
`*** Error in `/home/ichi/.steam/SteamApps/common/Cities_Skylines/Cities.x64': free(): invalid pointer: 0x00000000028e6d78 ***`
Shovel Knight:
`*** Error in `/home/ichi/.steam/SteamApps/common/Shovel Knight/64/ShovelKnight': free(): invalid pointer: 0x0000000001ed57a0 ***`
Transistor:
`*** Error in `./Transistor.bin.x86_64': free(): invalid pointer: 0x00007f7234000078 ***`
**My System:**
```
System: Host: localhorst Kernel: 4.3.0-1-amd64 x86_64 (64 bit) Desktop: i3 4.11
Distro: Debian GNU/Linux stretch/sid
Machine: System: ASUS product: All Series
Mobo: ASUSTeK model: Z87-K v: Rev X.0x Bios: American Megatrends v: 1402 date: 11/05/2014
CPU: Quad core Intel Core i5-4570 (-MCP-) cache: 6144 KB
clock speeds: max: 3600 MHz 1: 3206 MHz 2: 3283 MHz 3: 3243 MHz 4: 3230 MHz
Graphics: Card: NVIDIA GM204 [GeForce GTX 980]
Display Server: X.Org 1.18.0 driver: nvidia Resolution: 1920x1080@60.00hz
GLX Renderer: GeForce GTX 980/PCIe/SSE2 GLX Version: 4.5.0 NVIDIA 358.16
Audio: Card-1 Intel 8 Series/C220 Series High Definition Audio Controller driver: snd_hda_intel
Card-2 NVIDIA GM204 High Definition Audio Controller driver: snd_hda_intel
Sound: Advanced Linux Sound Architecture v: k4.3.0-1-amd64
Network: Card: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller driver: r8169
IF: eth0 state: up speed: 1000 Mbps duplex: full mac: ac:22:0b:82:2e:67
Drives: HDD Total Size: 13292.2GB (56.3% used) ID-1: /dev/sda model: M4 size: 512.1GB
ID-2: /dev/sdd model: WDC_WD40EFRX size: 4000.8GB ID-3: /dev/sdc model: WDC_WD40EFRX size: 4000.8GB
ID-4: /dev/sdb model: Samsung_SSD_840 size: 250.1GB ID-5: /dev/sdf model: WDC_WD40EFRX size: 4000.8GB
ID-6: /dev/sde model: M4 size: 512.1GB ID-7: USB /dev/sdg model: Rainbow_Line size: 15.5GB
Partition: ID-1: / size: 460G used: 283G (65%) fs: ext4 dev: /dev/sda1
ID-2: swap-1 size: 10.74GB used: 0.00GB (0%) fs: swap dev: /dev/sda2
RAID: Device-1: /dev/md0 - active raid: 5 components: online: 3/3 - sdc1 sdd1 sdf1
Sensors: System Temperatures: cpu: 29.8C mobo: 27.8C gpu: 30C
Fan Speeds (in rpm): cpu: 0
Info: Processes: 242 Uptime: 6:27 Memory: 2536.4/15991.3MB Client: Shell (zsh) inxi: 2.2.28
```
**Packages that where in the upgrade that broke 64 bit games:**
```
Start-Date: 2016-02-15 11:17:46
Commandline: apt upgrade
Requested-By: ichi (1000)
Install:
liblept5:amd64 (1.73-1+b1 automatic),
libsnappy1v5:i386 (1.1.3-2 automatic),
libsuitesparseconfig4.4.6:amd64 (4.4.6-1 automatic),
php-phpseclib:amd64 (2.0.1-1 automatic),
dbconfig-mysql:amd64 (2.0.2 automatic),
libx265-79:i386 (1.9-dmo1 automatic),
libilmbase12:amd64 (2.2.0-8 automatic),
libopenexr22:amd64 (2.2.0-9 automatic)
Upgrade:
libkvazaar3:amd64 (0.8.3-dmo1, 0.8.3-dmo2),
libkvazaar3:i386 (0.8.3-dmo1, 0.8.3-dmo2),
lib32ubsan0:amd64 (5.3.1-7, 5.3.1-8),
manpages:amd64 (4.04-0.1, 4.04-1),
perl-base:amd64 (5.22.1-4, 5.22.1-7),
libquadmath0-dbg:amd64 (5.3.1-7, 5.3.1-8),
libmpx0:amd64 (5.3.1-7, 5.3.1-8),
libgcj16:amd64 (5.3.1-7, 5.3.1-8),
libdc1394-22:amd64 (2.2.3-1, 2.2.4-1),
libdevmapper1.02.1:amd64 (1.02.115-1, 1.02.115-2),
libltdl-dev:amd64 (2.4.2-1.11, 2.4.6-0.1),
iso-codes:amd64 (3.64-1, 3.65-1),
acpid:amd64 (2.0.25-1, 2.0.26-1),
dmsetup:amd64 (1.02.115-1, 1.02.115-2),
libnl-route-3-200:amd64 (3.2.26-1, 3.2.27-1),
libavformat56:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
lib32mpx0:amd64 (5.3.1-7, 5.3.1-8),
libgcc-5-dev:amd64 (5.3.1-7, 5.3.1-8),
libisofs6:amd64 (1.4.2-1, 1.4.2-2),
python-psutil:amd64 (3.4.1-1, 3.4.2-1),
libaspectj-java:amd64 (1.8.5-1, 1.8.8-1),
libavfilter5:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
libpackagekit-glib2-18:amd64 (1.0.11-1, 1.0.11-2),
python-xapian:amd64 (1.2.22-1, 1.2.22-2),
libvte-2.91-0:amd64 (0.42.1-2+b1, 0.42.3-1),
handbrake:amd64 (0.10.3-dmo2, 0.10.3-dmo3),
libchromaprint0:amd64 (1.2-dmo3, 1.3-dmo1),
libgroupsock8:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1),
publicsuffix:amd64 (20160115-1, 20160130-1),
netpbm:amd64 (10.0-15.2, 10.0-15.3),
gir1.2-gtk-3.0:amd64 (3.18.6-1, 3.18.7-1),
libx32itm1:amd64 (5.3.1-7, 5.3.1-8),
ffmpeg:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
os-prober:amd64 (1.70, 1.71),
linux-libc-dev:amd64 (4.3.3-7, 4.3.5-1),
linux-libc-dev:i386 (4.3.3-7, 4.3.5-1),
libatomic1-dbg:amd64 (5.3.1-7, 5.3.1-8),
libapt-inst2.0:amd64 (1.2.1, 1.2.3),
appstream:amd64 (0.9.0-3, 0.9.1-1),
lib32stdc++-5-dev:amd64 (5.3.1-7, 5.3.1-8),
libtool-bin:amd64 (2.4.2-1.11, 2.4.6-0.1),
libgegl-0.3-0:amd64 (0.3.4-dmo1, 0.3.4-dmo2),
imagemagick:amd64 (6.8.9.9-7, 6.8.9.9-7+b1),
libgnutls-openssl27:amd64 (3.4.8-2, 3.4.9-2),
lib32stdc++6:amd64 (5.3.1-7, 5.3.1-8),
libswresample1:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
libswresample1:i386 (2.8.5-dmo2, 2.8.6-dmo2),
g++-5-multilib:amd64 (5.3.1-7, 5.3.1-8),
libopencv-imgproc2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
libnl-genl-3-200:amd64 (3.2.26-1, 3.2.27-1),
libopencv-objdetect2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
p7zip:amd64 (9.20.1~dfsg.1-4.2, 9.20.1~dfsg.1-5),
libsystemd0:amd64 (228-4+b1, 228-6),
libsystemd0:i386 (228-4+b1, 228-6),
libgtk-3-common:amd64 (3.18.6-1, 3.18.7-1),
acl:amd64 (2.2.52-2, 2.2.52-3),
libx32quadmath0:amd64 (5.3.1-7, 5.3.1-8),
grub-common:amd64 (2.02~beta2-35, 2.02~beta2-36),
transfig:amd64 (3.2.5.e-4, 3.2.5.e-5),
aspectj:amd64 (1.8.5-1, 1.8.8-1),
apt:amd64 (1.2.1, 1.2.3),
libgtk-3-0:amd64 (3.18.6-1, 3.18.7-1),
libacl1:amd64 (2.2.52-2, 2.2.52-3),
python-cssutils:amd64 (1.0-4, 1.0-4.1),
libjcommander-java:amd64 (1.35-1, 1.48-1),
libobjc4:amd64 (5.3.1-7, 5.3.1-8),
cpp-5:amd64 (5.3.1-7, 5.3.1-8),
libcglib-java:amd64 (2.2.2+dfsg2-2, 3.2.0-2),
libasound2-data:amd64 (1.0.29-1, 1.1.0-1),
libgcc1-dbg:amd64 (5.3.1-7, 5.3.1-8),
libtsan0-dbg:amd64 (5.3.1-7, 5.3.1-8),
binutils:amd64 (2.26-2, 2.26-3),
libmagickwand-6.q16-2:amd64 (6.8.9.9-7, 6.8.9.9-7+b1),
libopencv-video2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
libumfpack5.7.1:amd64 (4.4.5-2, 4.4.6-1),
handbrake-cli:amd64 (0.10.3-dmo2, 0.10.3-dmo3),
libitm1:amd64 (5.3.1-7, 5.3.1-8),
libcamd2.4.1:amd64 (4.4.5-2, 4.4.6-1),
libccolamd2.9.1:amd64 (4.4.5-2, 4.4.6-1),
vlc-nox:amd64 (2.2.1-dmo14, 2.2.2-dmo1),
perl-modules-5.22:amd64 (5.22.1-4, 5.22.1-7),
lib32itm1:amd64 (5.3.1-7, 5.3.1-8),
lib32asan2:amd64 (5.3.1-7, 5.3.1-8),
nodejs:amd64 (4.2.6~dfsg-1, 4.3.0~dfsg-2),
console-setup-linux:amd64 (1.134, 1.136),
fop:amd64 (2.0+dfsg-5, 2.1-1),
libx32gcc1:amd64 (5.3.1-7, 5.3.1-8),
insserv:amd64 (1.14.0-5.1, 1.14.0-5.2),
lib32gcc1-dbg:amd64 (5.3.1-7, 5.3.1-8),
libthai-data:amd64 (0.1.24-1, 0.1.24-2),
vlc-plugin-notify:amd64 (2.2.1-dmo14, 2.2.2-dmo1),
libvlc5:amd64 (2.2.1-dmo14, 2.2.2-dmo1),
grub2-common:amd64 (2.02~beta2-35, 2.02~beta2-36),
gnutls-bin:amd64 (3.4.8-2, 3.4.9-2),
udev:amd64 (228-4+b1, 228-6),
libcilkrts5:amd64 (5.3.1-7, 5.3.1-8),
console-setup:amd64 (1.134, 1.136),
handbrake-gtk:amd64 (0.10.3-dmo2, 0.10.3-dmo3),
rhythmbox-plugins:amd64 (3.2.1-1+b1, 3.3-1),
alsa-utils:amd64 (1.0.29-1+b1, 1.1.0-2),
libasan2:amd64 (5.3.1-7, 5.3.1-8),
lib32gcc-5-dev:amd64 (5.3.1-7, 5.3.1-8),
libquadmath0:amd64 (5.3.1-7, 5.3.1-8),
libxmlgraphics-commons-java:amd64 (2.0.1-2, 2.1-1),
libapt-pkg5.0:amd64 (1.2.1, 1.2.3),
packagekit-tools:amd64 (1.0.11-1, 1.0.11-2),
libpq5:amd64 (9.5.0-2, 9.5.0-3),
libpq5:i386 (9.5.0-2, 9.5.0-3),
ruby-unf-ext:amd64 (0.0.7.1-1+b3, 0.0.7.2-1),
libx32gcc1-dbg:amd64 (5.3.1-7, 5.3.1-8),
grub-pc:amd64 (2.02~beta2-35, 2.02~beta2-36),
libcilkrts5-dbg:amd64 (5.3.1-7, 5.3.1-8),
linux-headers-4.3.0-1-amd64:amd64 (4.3.3-7, 4.3.5-1),
libpostproc53:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
libvlccore8:amd64 (2.2.1-dmo14, 2.2.2-dmo1),
libudev1:amd64 (228-4+b1, 228-6),
libudev1:i386 (228-4+b1, 228-6),
libgomp1-dbg:amd64 (5.3.1-7, 5.3.1-8),
libopencv-flann2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
python-distutils-extra:amd64 (2.38-1, 2.39-1),
libopencv-contrib2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
phpmyadmin:amd64 (4.5.3.1-1, 4.5.4.1-2),
lib32cilkrts5:amd64 (5.3.1-7, 5.3.1-8),
libio-socket-ssl-perl:amd64 (2.022-1, 2.024-1),
libltdl7:amd64 (2.4.2-1.11, 2.4.6-0.1),
libltdl7:i386 (2.4.2-1.11, 2.4.6-0.1),
installation-report:amd64 (2.61, 2.62),
gcc-5-multilib:amd64 (5.3.1-7, 5.3.1-8),
libopencv-highgui2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
libcolamd2.9.1:amd64 (4.4.5-2, 4.4.6-1),
libgcc1:amd64 (5.3.1-7, 5.3.1-8),
libgcc1:i386 (5.3.1-7, 5.3.1-8),
kodi:amd64 (15.2-dmo7, 15.2-dmo8),
gir1.2-rb-3.0:amd64 (3.2.1-1+b1, 3.3-1),
libperl5.22:amd64 (5.22.1-4, 5.22.1-7),
python-cryptography:amd64 (1.2.1-1, 1.2.2-2),
grub-pc-bin:amd64 (2.02~beta2-35, 2.02~beta2-36),
gcc-5-base:amd64 (5.3.1-7, 5.3.1-8),
gcc-5-base:i386 (5.3.1-7, 5.3.1-8),
rhythmbox-data:amd64 (3.2.1-1, 3.3-1),
lib32gcc1:amd64 (5.3.1-7, 5.3.1-8),
gcj-5-jre-lib:amd64 (5.3.1-7, 5.3.1-8),
libappstream-glib8:amd64 (0.5.5-1, 0.5.8-1),
gnome-calculator:amd64 (3.18.2-1, 3.18.3-1),
imagemagick-6.q16:amd64 (6.8.9.9-7, 6.8.9.9-7+b1),
libnfs8:amd64 (1.9.8-dmo1, 1.10.0-dmo1),
libstdc++-5-dev:amd64 (5.3.1-7, 5.3.1-8),
libx32cilkrts5:amd64 (5.3.1-7, 5.3.1-8),
nautilus:amd64 (3.18.4-1, 3.18.5-1),
libnautilus-extension1a:amd64 (3.18.4-1, 3.18.5-1),
libtsan0:amd64 (5.3.1-7, 5.3.1-8),
libmagickcore-6.q16-2-extra:amd64 (6.8.9.9-7, 6.8.9.9-7+b1),
gir1.2-wnck-3.0:amd64 (3.14.0-2, 3.14.1-1),
kodi-skin-confluence:amd64 (15.2-dmo7, 15.2-dmo8),
libgtk-3-bin:amd64 (3.18.6-1, 3.18.7-1),
libnss-mdns:amd64 (0.10-6, 0.10-7),
p7zip-full:amd64 (9.20.1~dfsg.1-4.2, 9.20.1~dfsg.1-5),
libubsan0:amd64 (5.3.1-7, 5.3.1-8),
libdatetime-timezone-perl:amd64 (1.94-1+2015g, 1.95-1+2016a),
iceweasel:amd64 (43.0.4-1, 44.0-1),
g++-5:amd64 (5.3.1-7, 5.3.1-8),
gir1.2-vte-2.91:amd64 (0.42.1-2+b1, 0.42.3-1),
steam:i386 (1.0.0.50-6, 1.0.0.51-1),
libx32asan2:amd64 (5.3.1-7, 5.3.1-8),
libnss-myhostname:amd64 (228-4+b1, 228-6),
libgfortran3:amd64 (5.3.1-7, 5.3.1-8),
libneon27-gnutls:amd64 (0.30.1-2+b2, 0.30.1-3),
pinentry-gtk2:amd64 (0.9.7-1, 0.9.7-3),
systemd-sysv:amd64 (228-4+b1, 228-6),
lib32gomp1:amd64 (5.3.1-7, 5.3.1-8),
libamd2.4.1:amd64 (4.4.5-2, 4.4.6-1),
libnl-3-200:amd64 (3.2.26-1, 3.2.27-1),
gcc-5:amd64 (5.3.1-7, 5.3.1-8),
libbasicusageenvironment1:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1),
libavcodec56:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
libavcodec56:i386 (2.8.5-dmo2, 2.8.6-dmo2),
tesseract-ocr:amd64 (3.04.00-5+b1, 3.04.00-5+b2),
libprotobuf-c1:amd64 (1.1.1-1, 1.2.1-1),
libburn4:amd64 (1.4.2-1, 1.4.2.pl01-1),
libsdl2-image-2.0-0:amd64 (2.0.0+dfsg-3+b4, 2.0.1+dfsg-2),
libsdl2-image-2.0-0:i386 (2.0.0+dfsg-3+b4, 2.0.1+dfsg-2),
python-nose:amd64 (1.3.6-1, 1.3.7-1),
vlc:amd64 (2.2.1-dmo14, 2.2.2-dmo1),
libpam-systemd:amd64 (228-4+b1, 228-6),
libgail-3-0:amd64 (3.18.6-1, 3.18.7-1),
libavutil54:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
libavutil54:i386 (2.8.5-dmo2, 2.8.6-dmo2),
vlc-data:amd64 (2.2.1-dmo14, 2.2.2-dmo1),
libtheora0:amd64 (1.1.1+dfsg.1-7.1, 1.1.1+dfsg.1-8),
libtheora0:i386 (1.1.1+dfsg.1-7.1, 1.1.1+dfsg.1-8),
libopencv-calib3d2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
packagekit:amd64 (1.0.11-1, 1.0.11-2),
liblsan0:amd64 (5.3.1-7, 5.3.1-8),
systemd:amd64 (228-4+b1, 228-6),
libgomp1:amd64 (5.3.1-7, 5.3.1-8),
libgomp1:i386 (5.3.1-7, 5.3.1-8),
libavdevice56:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
xca:amd64 (1.0.0-2.1, 1.3.2-1),
libopencv-legacy2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
lib32quadmath0:amd64 (5.3.1-7, 5.3.1-8),
gimp-gmic:amd64 (1.6.8-3, 1.6.8-3+b1),
wine32:i386 (1.8-6, 1.8.1-1),
libthai0:amd64 (0.1.24-1, 0.1.24-2),
libthai0:i386 (0.1.24-1, 0.1.24-2),
wine64:amd64 (1.8-6, 1.8.1-1),
libhogweed4:amd64 (3.1.1-4, 3.2-1),
libhogweed4:i386 (3.1.1-4, 3.2-1),
libwnck-3-0:amd64 (3.14.0-2, 3.14.1-1),
libubsan0-dbg:amd64 (5.3.1-7, 5.3.1-8),
apt-utils:amd64 (1.2.1, 1.2.3),
libswscale3:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
smartmontools:amd64 (6.4+svn4109-1, 6.4+svn4214-1),
libmagickcore-6.q16-2:amd64 (6.8.9.9-7, 6.8.9.9-7+b1),
manpages-dev:amd64 (4.04-0.1, 4.04-1),
libx32ubsan0:amd64 (5.3.1-7, 5.3.1-8),
keyboard-configuration:amd64 (1.134, 1.136),
gnome-shell-extensions:amd64 (3.18.3-1, 3.18.3-2),
libasound2:amd64 (1.0.29-1, 1.1.0-1),
libasound2:i386 (1.0.29-1, 1.1.0-1),
libasound2-dev:i386 (1.0.29-1, 1.1.0-1),
libasound2-plugins:amd64 (1.0.29-dmo1, 1.1.0-dmo1),
libasound2-plugins:i386 (1.0.29-dmo1, 1.1.0-dmo1),
libx32stdc++-5-dev:amd64 (5.3.1-7, 5.3.1-8),
fonts-wine:amd64 (1.8-6, 1.8.1-1),
nodejs-dev:amd64 (4.2.6~dfsg-1, 4.3.0~dfsg-2),
libnettle6:amd64 (3.1.1-4, 3.2-1),
libnettle6:i386 (3.1.1-4, 3.2-1),
libopencv-core2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
busybox:amd64 (1.22.0-17, 1.22.0-18),
findutils:amd64 (4.6.0-2, 4.6.0+git+20160126-2),
libvte-2.91-common:amd64 (0.42.1-2, 0.42.3-1),
gir1.2-packagekitglib-1.0:amd64 (1.0.11-1, 1.0.11-2),
liblsan0-dbg:amd64 (5.3.1-7, 5.3.1-8),
libgnutls30:amd64 (3.4.8-2, 3.4.9-2),
libgnutls30:i386 (3.4.8-2, 3.4.9-2),
libsoftware-license-perl:amd64 (0.103011-1, 0.103011-2),
libwnck-3-common:amd64 (3.14.0-2, 3.14.1-1),
debtags:amd64 (2.0.1, 2.0.2),
perl:amd64 (5.22.1-4, 5.22.1-7),
liblivemedia50:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1),
libmagick++-6.q16-5v5:amd64 (6.8.9.9-7, 6.8.9.9-7+b1),
libbs2b0:amd64 (3.1.0+dfsg-2.1, 3.1.0+dfsg-2.2),
nautilus-data:amd64 (3.18.4-1, 3.18.5-1),
libopencv-ml2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
apt-transport-https:amd64 (1.2.1, 1.2.3),
libappstream3:amd64 (0.9.0-3, 0.9.1-1),
libitm1-dbg:amd64 (5.3.1-7, 5.3.1-8),
gparted:amd64 (0.19.0-3+b2, 0.25.0-1),
libnetpbm10:amd64 (10.0-15.2, 10.0-15.3),
libatomic1:amd64 (5.3.1-7, 5.3.1-8),
linux-image-4.3.0-1-amd64:amd64 (4.3.3-7, 4.3.5-1),
libcc1-0:amd64 (5.3.1-7, 5.3.1-8),
libx32gcc-5-dev:amd64 (5.3.1-7, 5.3.1-8),
wine:amd64 (1.8-6, 1.8.1-1),
libx32gomp1:amd64 (5.3.1-7, 5.3.1-8),
kodi-bin:amd64 (15.2-dmo7, 15.2-dmo8),
linux-headers-4.3.0-1-common:amd64 (4.3.3-7, 4.3.5-1),
libopencv-features2d2.4v5:amd64 (2.4.9.1+dfsg-1.2, 2.4.9.1+dfsg-1.3),
kodi-data:amd64 (15.2-dmo7, 15.2-dmo8),
linux-compiler-gcc-5-x86:amd64 (4.3.3-7, 4.3.5-1),
pinentry-gnome3:amd64 (0.9.7-1, 0.9.7-3),
libtesseract3:amd64 (3.04.00-5+b1, 3.04.00-5+b2),
libstdc++6:amd64 (5.3.1-7, 5.3.1-8),
libstdc++6:i386 (5.3.1-7, 5.3.1-8),
lib32atomic1:amd64 (5.3.1-7, 5.3.1-8),
libsdl2-ttf-2.0-0:amd64 (2.0.12+dfsg1-2, 2.0.14+dfsg1-1),
libjpeg62-turbo:amd64 (1.4.1-2, 1.4.2-2),
libjpeg62-turbo:i386 (1.4.1-2, 1.4.2-2),
libx32atomic1:amd64 (5.3.1-7, 5.3.1-8),
libfop-java:amd64 (2.0+dfsg-5, 2.1-1),
libavresample2:amd64 (2.8.5-dmo2, 2.8.6-dmo2),
libavresample2:i386 (2.8.5-dmo2, 2.8.6-dmo2),
libusageenvironment3:amd64 (2016.01.20-dmo1, 2016.01.29-dmo1),
libdebconfclient0:amd64 (0.201, 0.204),
libjcommander-java-doc:amd64 (1.35-1, 1.48-1),
libtool:amd64 (2.4.2-1.11, 2.4.6-0.1),
libtokyocabinet9:amd64 (1.4.48-3, 1.4.48-7),
rhythmbox:amd64 (3.2.1-1+b1, 3.3-1),
diffstat:amd64 (1.60-1, 1.61-1),
libwine:amd64 (1.8-6, 1.8.1-1),
libwine:i386 (1.8-6, 1.8.1-1),
libmodule-build-perl:amd64 (0.421400-3, 0.421600-1),
rhythmbox-plugin-cdrecorder:amd64 (3.2.1-1+b1, 3.3-1),
libdatrie1:amd64 (0.2.10-1, 0.2.10-2),
libdatrie1:i386 (0.2.10-1, 0.2.10-2),
libneon27:amd64 (0.30.1-2+b2, 0.30.1-3),
librhythmbox-core9:amd64 (3.2.1-1+b1, 3.3-1),
libx32stdc++6:amd64 (5.3.1-7, 5.3.1-8),
libcholmod3.0.6:amd64 (4.4.5-2, 4.4.6-1)
End-Date: 2016-02-15 11:24:41
```
| non_priority | games won t start on debian unstable when i start a bit game in on debian unstable i get invalid pointer errors since the last update however some games seem to run when started from the terminal eg shovel knight and transistor for example cities skylines error in home ichi steam steamapps common cities skylines cities free invalid pointer shovel knight error in home ichi steam steamapps common shovel knight shovelknight free invalid pointer transistor error in transistor bin free invalid pointer my system system host localhorst kernel bit desktop distro debian gnu linux stretch sid machine system asus product all series mobo asustek model k v rev x bios american megatrends v date cpu quad core intel core mcp cache kb clock speeds max mhz mhz mhz mhz mhz graphics card nvidia display server x org driver nvidia resolution glx renderer geforce gtx pcie glx version nvidia audio card intel series series high definition audio controller driver snd hda intel card nvidia high definition audio controller driver snd hda intel sound advanced linux sound architecture v network card realtek pci express gigabit ethernet controller driver if state up speed mbps duplex full mac ac drives hdd total size used id dev sda model size id dev sdd model wdc size id dev sdc model wdc size id dev sdb model samsung ssd size id dev sdf model wdc size id dev sde model size id usb dev sdg model rainbow line size partition id size used fs dev dev id swap size used fs swap dev dev raid device dev active raid components online sensors system temperatures cpu mobo gpu fan speeds in rpm cpu info processes uptime memory client shell zsh inxi packages that where in the upgrade that broke bit games start date commandline apt upgrade requested by ichi install automatic automatic automatic php phpseclib automatic dbconfig mysql automatic automatic automatic automatic upgrade manpages perl base dbg libltdl dev iso codes acpid dmsetup libnl route libgcc dev python psutil libaspectj java libpackagekit python xapian libvte handbrake publicsuffix netpbm gtk ffmpeg os prober linux libc dev linux libc dev dbg libapt appstream dev libtool bin libgegl imagemagick libgnutls g multilib libopencv dfsg dfsg libnl genl libopencv dfsg dfsg dfsg dfsg libgtk common acl grub common transfig e e aspectj apt libgtk python cssutils libjcommander java cpp libcglib java data dbg dbg binutils libmagickwand libopencv dfsg dfsg handbrake cli vlc nox perl modules nodejs dfsg dfsg console setup linux fop dfsg insserv dbg libthai data vlc plugin notify common gnutls bin udev console setup handbrake gtk rhythmbox plugins alsa utils dev libxmlgraphics commons java libapt packagekit tools ruby unf ext dbg grub pc dbg linux headers dbg libopencv dfsg dfsg python distutils extra libopencv dfsg dfsg phpmyadmin libio socket ssl perl installation report gcc multilib libopencv dfsg dfsg kodi rb python cryptography grub pc bin gcc base gcc base rhythmbox data gcj jre lib libappstream gnome calculator imagemagick libstdc dev nautilus libnautilus libmagickcore extra wnck kodi skin confluence libgtk bin libnss mdns full dfsg dfsg libdatetime timezone perl iceweasel g vte steam libnss myhostname gnutls pinentry systemd sysv libnl gcc tesseract ocr libprotobuf image dfsg dfsg image dfsg dfsg python nose vlc libpam systemd libgail vlc data dfsg dfsg dfsg dfsg libopencv dfsg dfsg packagekit systemd xca libopencv dfsg dfsg gimp gmic libwnck dbg apt utils smartmontools libmagickcore manpages dev keyboard configuration gnome shell extensions dev plugins plugins dev fonts wine nodejs dev dfsg dfsg libopencv dfsg dfsg busybox findutils git libvte common packagekitglib dbg libsoftware license perl libwnck common debtags perl libmagick dfsg dfsg nautilus data libopencv dfsg dfsg apt transport https dbg gparted linux image dev wine kodi bin linux headers common libopencv dfsg dfsg kodi data linux compiler gcc pinentry libstdc libstdc ttf turbo turbo libfop java dfsg libjcommander java doc libtool rhythmbox diffstat libwine libwine libmodule build perl rhythmbox plugin cdrecorder librhythmbox end date | 0 |
285,698 | 24,689,793,256 | IssuesEvent | 2022-10-19 07:41:02 | Shard-Labs/starknet-devnet | https://api.github.com/repos/Shard-Labs/starknet-devnet | opened | Improve naming in get_events test | Type: refactor Type: test Techno: python Context: coupled Duration: under a day | E.g. for the case of `event_address_1`: Instead of adding numeric suffixes, we would find out what the address represents and have it reflected in the variable name. | 1.0 | Improve naming in get_events test - E.g. for the case of `event_address_1`: Instead of adding numeric suffixes, we would find out what the address represents and have it reflected in the variable name. | non_priority | improve naming in get events test e g for the case of event address instead of adding numeric suffixes we would find out what the address represents and have it reflected in the variable name | 0 |
305,072 | 26,359,625,111 | IssuesEvent | 2023-01-11 12:25:20 | unifyai/ivy | https://api.github.com/repos/unifyai/ivy | reopened | Fix linalg.test_tensorflow_cholesky_solve | TensorFlow Frontend Sub Task Failing Test | | | |
|---|---|
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/3679121551/jobs/6518230953" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
<details>
<summary>Not found</summary>
Not found
</details>
| 1.0 | Fix linalg.test_tensorflow_cholesky_solve - | | |
|---|---|
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/3679121551/jobs/6518230953" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
<details>
<summary>Not found</summary>
Not found
</details>
| non_priority | fix linalg test tensorflow cholesky solve jax img src not found not found | 0 |
276,296 | 23,983,071,870 | IssuesEvent | 2022-09-13 16:33:39 | department-of-veterans-affairs/va.gov-team | https://api.github.com/repos/department-of-veterans-affairs/va.gov-team | closed | Flaky E2E Test Detected! session.reloads.on.refresh.cypress.spec.js | qa-standards e2e-flaky-test | Your test spec src/applications/check-in/day-of/tests/e2e/session/session.reloads.on.refresh.cypress.spec.js has been disallowed from running on vets-website due to flakiness. Please make corrections to the test spec and run it through CI to have it re-enabled. To see the details of the test failure, please visit: [Mochawesome Report](https://testing-tools-testing-reports.s3-us-gov-west-1.amazonaws.com/undefined/undefined.html).
Thanks,
The QA Standards Team | 1.0 | Flaky E2E Test Detected! session.reloads.on.refresh.cypress.spec.js - Your test spec src/applications/check-in/day-of/tests/e2e/session/session.reloads.on.refresh.cypress.spec.js has been disallowed from running on vets-website due to flakiness. Please make corrections to the test spec and run it through CI to have it re-enabled. To see the details of the test failure, please visit: [Mochawesome Report](https://testing-tools-testing-reports.s3-us-gov-west-1.amazonaws.com/undefined/undefined.html).
Thanks,
The QA Standards Team | non_priority | flaky test detected session reloads on refresh cypress spec js your test spec src applications check in day of tests session session reloads on refresh cypress spec js has been disallowed from running on vets website due to flakiness please make corrections to the test spec and run it through ci to have it re enabled to see the details of the test failure please visit thanks the qa standards team | 0 |
157,785 | 19,984,267,097 | IssuesEvent | 2022-01-30 12:07:48 | davidjj58/Home-assignment | https://api.github.com/repos/davidjj58/Home-assignment | opened | CVE-2017-15095 (High) detected in jackson-databind-2.8.7.jar | security vulnerability | ## CVE-2017-15095 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.7.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /itory/com/fasterxml/jackson/core/jackson-databind/2.8.7/jackson-databind-2.8.7.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.8.7.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/davidjj58/Home-assignment/commit/77c895db92c590fab8e72e59e8be84d821d75fb6">77c895db92c590fab8e72e59e8be84d821d75fb6</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
<p>Publish Date: 2018-02-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15095>CVE-2017-15095</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15095">https://nvd.nist.gov/vuln/detail/CVE-2017-15095</a></p>
<p>Release Date: 2018-02-06</p>
<p>Fix Resolution: 2.8.10,2.9.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2017-15095 (High) detected in jackson-databind-2.8.7.jar - ## CVE-2017-15095 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.7.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /itory/com/fasterxml/jackson/core/jackson-databind/2.8.7/jackson-databind-2.8.7.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.8.7.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/davidjj58/Home-assignment/commit/77c895db92c590fab8e72e59e8be84d821d75fb6">77c895db92c590fab8e72e59e8be84d821d75fb6</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
<p>Publish Date: 2018-02-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15095>CVE-2017-15095</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15095">https://nvd.nist.gov/vuln/detail/CVE-2017-15095</a></p>
<p>Release Date: 2018-02-06</p>
<p>Fix Resolution: 2.8.10,2.9.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library itory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details a deserialization flaw was discovered in the jackson databind in versions before and which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readvalue method of the objectmapper this issue extends the previous flaw cve by blacklisting more classes that could be used maliciously publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
50,652 | 26,718,176,495 | IssuesEvent | 2023-01-28 20:02:12 | dyn4j/dyn4j | https://api.github.com/repos/dyn4j/dyn4j | closed | Reduce the default solver iterations | performance | To improve the performance of the library a developer can configure the number of solver iterations are performed. The higher the number of iterations, the higher the quality, but lower performance. Reducing the number of iterations for both velocity solving and position solving had little effect - in fact, in some respects it made the simulation more stable. There was one JUnit test that needed to be updated, but all others were successful, likely because they are pretty simple though.
Reduce the default velocity solver iterations from 10 to 6 and the default position solver iterations from 10 to 2. | True | Reduce the default solver iterations - To improve the performance of the library a developer can configure the number of solver iterations are performed. The higher the number of iterations, the higher the quality, but lower performance. Reducing the number of iterations for both velocity solving and position solving had little effect - in fact, in some respects it made the simulation more stable. There was one JUnit test that needed to be updated, but all others were successful, likely because they are pretty simple though.
Reduce the default velocity solver iterations from 10 to 6 and the default position solver iterations from 10 to 2. | non_priority | reduce the default solver iterations to improve the performance of the library a developer can configure the number of solver iterations are performed the higher the number of iterations the higher the quality but lower performance reducing the number of iterations for both velocity solving and position solving had little effect in fact in some respects it made the simulation more stable there was one junit test that needed to be updated but all others were successful likely because they are pretty simple though reduce the default velocity solver iterations from to and the default position solver iterations from to | 0 |
66,831 | 16,736,017,992 | IssuesEvent | 2021-06-11 01:33:33 | luchete80/WeldForm | https://api.github.com/repos/luchete80/WeldForm | closed | Not constant expression ('type [n]' ) | buildsystem | D:\Luciano\Numerico\WeldForm\External\../External/laexpr.h(364): error C2131: la expresión no se evaluó como una constante
| 1.0 | Not constant expression ('type [n]' ) - D:\Luciano\Numerico\WeldForm\External\../External/laexpr.h(364): error C2131: la expresión no se evaluó como una constante
| non_priority | not constant expression type d luciano numerico weldform external external laexpr h error la expresión no se evaluó como una constante | 0 |
11,115 | 8,299,130,059 | IssuesEvent | 2018-09-21 01:00:07 | whitesource-yossi/vexflow | https://api.github.com/repos/whitesource-yossi/vexflow | opened | CVE-2017-16138 high severity vulnerability detected by WhiteSource | security vulnerability | ## CVE-2017-16138 - High Vulnerability
<details><summary>:warning: Vulnerable Library - <b>mime-1.3.4.tgz</b></p></summary>
<p>path: /vexflow/node_modules/mime/package.json</p>
<p>
Dependency Hierarchy:
- :x: **mime-1.3.4.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary>:red_circle: Vulnerability Details</summary>
<p>
The mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.
<p>Publish Date: 2018-06-07
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138>CVE-2017-16138</a></p>
</p>
</details>
<p></p>
<details><summary>:dart: CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary>:white_check_mark: Suggested Fix</summary>
<p>
<p>Type: Change files</p>
<p>Origin: <a href="https://github.com/broofa/node-mime/commit/1df903fdeb9ae7eaa048795b8d580ce2c98f40b0">https://github.com/broofa/node-mime/commit/1df903fdeb9ae7eaa048795b8d580ce2c98f40b0</a></p>
<p>Release Date: 2017-09-25</p>
<p>Fix Resolution: Replace or update the following file: Mime.js</p>
</p>
</details>
<p></p>
***
Want to learn more about the open source vulnerabilities in your products? Click [here](https://www.whitesourcesoftware.com) | True | CVE-2017-16138 high severity vulnerability detected by WhiteSource - ## CVE-2017-16138 - High Vulnerability
<details><summary>:warning: Vulnerable Library - <b>mime-1.3.4.tgz</b></p></summary>
<p>path: /vexflow/node_modules/mime/package.json</p>
<p>
Dependency Hierarchy:
- :x: **mime-1.3.4.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary>:red_circle: Vulnerability Details</summary>
<p>
The mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.
<p>Publish Date: 2018-06-07
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138>CVE-2017-16138</a></p>
</p>
</details>
<p></p>
<details><summary>:dart: CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary>:white_check_mark: Suggested Fix</summary>
<p>
<p>Type: Change files</p>
<p>Origin: <a href="https://github.com/broofa/node-mime/commit/1df903fdeb9ae7eaa048795b8d580ce2c98f40b0">https://github.com/broofa/node-mime/commit/1df903fdeb9ae7eaa048795b8d580ce2c98f40b0</a></p>
<p>Release Date: 2017-09-25</p>
<p>Fix Resolution: Replace or update the following file: Mime.js</p>
</p>
</details>
<p></p>
***
Want to learn more about the open source vulnerabilities in your products? Click [here](https://www.whitesourcesoftware.com) | non_priority | cve high severity vulnerability detected by whitesource cve high vulnerability warning vulnerable library mime tgz path vexflow node modules mime package json dependency hierarchy x mime tgz vulnerable library red circle vulnerability details the mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input publish date url a href dart cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href white check mark suggested fix type change files origin a href release date fix resolution replace or update the following file mime js want to learn more about the open source vulnerabilities in your products click | 0 |
14,085 | 8,469,031,618 | IssuesEvent | 2018-10-23 21:29:15 | JuliaLang/julia | https://api.github.com/repos/JuliaLang/julia | closed | Poor type inference/performance using CartesianRange | inference performance | Create a Cartesian iterator to sum elements in a fixed dimension.
```
julia> function foo(x::AbstractArray)
acc = 0
R = CartesianRange(size(x)[2:end])
for I = R
acc += x[1, I]
end
acc
end
foo (generic function with 1 method)
```
The function causes over a million allocations and is kind of slow.
```
julia> x = trunc(Int, rand(25, 25, 25, 25, 25) * 10);
julia> foo(x)
1759015
julia> @time foo(x)
0.099376 seconds (1.56 M allocations: 71.524 MB, 5.76% gc time)
1759015
```
Looking at the [`@code_warntype foo(x)`](https://gist.github.com/amckinlay/057484fa822edd007bffb6d40d6469b6#file-gistfile1-txt), inference cannot infer the type of `R`.
Asserting the type leads to much better performance:
```
julia> function bar{T}(x::AbstractArray{T,5})
acc = 0
R::CartesianRange{CartesianIndex{4}} = CartesianRange(size(x)[2:end])
for I = R
acc += x[1, I]
end
acc
end
bar (generic function with 1 method)
julia> bar(x)
1759015
julia> @time bar(x)
0.006065 seconds (10 allocations: 512 bytes)
1759015
```
[`@code_warntype bar(x)`](https://gist.github.com/amckinlay/057484fa822edd007bffb6d40d6469b6#file-gistfile2-txt)
Incidentally, asserting the type for any array size does not seem to work:
```
julia> function buzz{T,N}(x::AbstractArray{T,N})
acc = 0
R::CartesianRange{CartesianIndex{N-1}} = CartesianRange(size(x)[2:end])
for I = R
acc += x[1, I]
end
acc
end
buzz (generic function with 1 method)
julia> buzz(x)
1759015
julia> @time buzz(x)
0.090423 seconds (1.56 M allocations: 71.524 MB, 5.75% gc time)
1759015
```
[`@code_warntype buzz(x)`](https://gist.github.com/amckinlay/057484fa822edd007bffb6d40d6469b6#file-gistfile3-txt)
| True | Poor type inference/performance using CartesianRange - Create a Cartesian iterator to sum elements in a fixed dimension.
```
julia> function foo(x::AbstractArray)
acc = 0
R = CartesianRange(size(x)[2:end])
for I = R
acc += x[1, I]
end
acc
end
foo (generic function with 1 method)
```
The function causes over a million allocations and is kind of slow.
```
julia> x = trunc(Int, rand(25, 25, 25, 25, 25) * 10);
julia> foo(x)
1759015
julia> @time foo(x)
0.099376 seconds (1.56 M allocations: 71.524 MB, 5.76% gc time)
1759015
```
Looking at the [`@code_warntype foo(x)`](https://gist.github.com/amckinlay/057484fa822edd007bffb6d40d6469b6#file-gistfile1-txt), inference cannot infer the type of `R`.
Asserting the type leads to much better performance:
```
julia> function bar{T}(x::AbstractArray{T,5})
acc = 0
R::CartesianRange{CartesianIndex{4}} = CartesianRange(size(x)[2:end])
for I = R
acc += x[1, I]
end
acc
end
bar (generic function with 1 method)
julia> bar(x)
1759015
julia> @time bar(x)
0.006065 seconds (10 allocations: 512 bytes)
1759015
```
[`@code_warntype bar(x)`](https://gist.github.com/amckinlay/057484fa822edd007bffb6d40d6469b6#file-gistfile2-txt)
Incidentally, asserting the type for any array size does not seem to work:
```
julia> function buzz{T,N}(x::AbstractArray{T,N})
acc = 0
R::CartesianRange{CartesianIndex{N-1}} = CartesianRange(size(x)[2:end])
for I = R
acc += x[1, I]
end
acc
end
buzz (generic function with 1 method)
julia> buzz(x)
1759015
julia> @time buzz(x)
0.090423 seconds (1.56 M allocations: 71.524 MB, 5.75% gc time)
1759015
```
[`@code_warntype buzz(x)`](https://gist.github.com/amckinlay/057484fa822edd007bffb6d40d6469b6#file-gistfile3-txt)
| non_priority | poor type inference performance using cartesianrange create a cartesian iterator to sum elements in a fixed dimension julia function foo x abstractarray acc r cartesianrange size x for i r acc x end acc end foo generic function with method the function causes over a million allocations and is kind of slow julia x trunc int rand julia foo x julia time foo x seconds m allocations mb gc time looking at the inference cannot infer the type of r asserting the type leads to much better performance julia function bar t x abstractarray t acc r cartesianrange cartesianindex cartesianrange size x for i r acc x end acc end bar generic function with method julia bar x julia time bar x seconds allocations bytes incidentally asserting the type for any array size does not seem to work julia function buzz t n x abstractarray t n acc r cartesianrange cartesianindex n cartesianrange size x for i r acc x end acc end buzz generic function with method julia buzz x julia time buzz x seconds m allocations mb gc time | 0 |
87,612 | 25,163,537,320 | IssuesEvent | 2022-11-10 18:43:19 | spack/spack | https://api.github.com/repos/spack/spack | closed | Installation issue: postgresql and multiple build systems | build-error | ### Steps to reproduce the issue
```console
$ spack install postgresql
...
```
### Error message
<details><summary>Error message</summary><pre>
==> Error: AttributeError: type object 'AutotoolsPackage' has no attribute 'install'
The 'postgresql' package cannot find an attribute while trying to build from sources. This might be due to a change in Spack's package format to support multiple build-systems for a single package. You can fix this by updating the build recipe, and you can also report the issue as a bug. More information at https://spack.readthedocs.io/en/latest/packaging_guide.html#installation-procedure
/opt/packages/gpjohnsn/spack/var/spack/repos/builtin/packages/postgresql/package.py:103, in install:
100 with working_dir(os.path.join("src", subdir)):
101 make("install")
102 else:
>> 103 AutotoolsPackage.install(self, spec, prefix)
</pre></details>
### Information on your system
* **Spack:** 0.19.0.dev0
* **Python:** 3.6.8
* **Platform:** linux-centos7-cascadelake
* **Concretizer:** clingo
### Additional information
@alalazo Here is another one that fails after the multi build system PR.
### General information
- [X] I have run `spack debug report` and reported the version of Spack/Python/Platform
- [X] I have run `spack maintainers <name-of-the-package>` and **@mentioned** any maintainers
- [X] I have uploaded the build log and environment files
- [X] I have searched the issues of this repo and believe this is not a duplicate | 1.0 | Installation issue: postgresql and multiple build systems - ### Steps to reproduce the issue
```console
$ spack install postgresql
...
```
### Error message
<details><summary>Error message</summary><pre>
==> Error: AttributeError: type object 'AutotoolsPackage' has no attribute 'install'
The 'postgresql' package cannot find an attribute while trying to build from sources. This might be due to a change in Spack's package format to support multiple build-systems for a single package. You can fix this by updating the build recipe, and you can also report the issue as a bug. More information at https://spack.readthedocs.io/en/latest/packaging_guide.html#installation-procedure
/opt/packages/gpjohnsn/spack/var/spack/repos/builtin/packages/postgresql/package.py:103, in install:
100 with working_dir(os.path.join("src", subdir)):
101 make("install")
102 else:
>> 103 AutotoolsPackage.install(self, spec, prefix)
</pre></details>
### Information on your system
* **Spack:** 0.19.0.dev0
* **Python:** 3.6.8
* **Platform:** linux-centos7-cascadelake
* **Concretizer:** clingo
### Additional information
@alalazo Here is another one that fails after the multi build system PR.
### General information
- [X] I have run `spack debug report` and reported the version of Spack/Python/Platform
- [X] I have run `spack maintainers <name-of-the-package>` and **@mentioned** any maintainers
- [X] I have uploaded the build log and environment files
- [X] I have searched the issues of this repo and believe this is not a duplicate | non_priority | installation issue postgresql and multiple build systems steps to reproduce the issue console spack install postgresql error message error message error attributeerror type object autotoolspackage has no attribute install the postgresql package cannot find an attribute while trying to build from sources this might be due to a change in spack s package format to support multiple build systems for a single package you can fix this by updating the build recipe and you can also report the issue as a bug more information at opt packages gpjohnsn spack var spack repos builtin packages postgresql package py in install with working dir os path join src subdir make install else autotoolspackage install self spec prefix information on your system spack python platform linux cascadelake concretizer clingo additional information alalazo here is another one that fails after the multi build system pr general information i have run spack debug report and reported the version of spack python platform i have run spack maintainers and mentioned any maintainers i have uploaded the build log and environment files i have searched the issues of this repo and believe this is not a duplicate | 0 |
131,519 | 18,247,964,929 | IssuesEvent | 2021-10-01 21:23:33 | turkdevops/grafana | https://api.github.com/repos/turkdevops/grafana | closed | CVE-2020-7774 (High) detected in y18n-3.2.1.tgz, y18n-4.0.0.tgz - autoclosed | security vulnerability | ## CVE-2020-7774 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>y18n-3.2.1.tgz</b>, <b>y18n-4.0.0.tgz</b></p></summary>
<p>
<details><summary><b>y18n-3.2.1.tgz</b></p></summary>
<p>the bare-bones internationalization library used by yargs</p>
<p>Library home page: <a href="https://registry.npmjs.org/y18n/-/y18n-3.2.1.tgz">https://registry.npmjs.org/y18n/-/y18n-3.2.1.tgz</a></p>
<p>Path to dependency file: grafana/package.json</p>
<p>Path to vulnerable library: grafana/node_modules/y18n</p>
<p>
Dependency Hierarchy:
- @grafana/toolkit-6.7.0-pre.tgz (Root Library)
- node-sass-4.12.0.tgz
- sass-graph-2.2.4.tgz
- yargs-7.1.0.tgz
- :x: **y18n-3.2.1.tgz** (Vulnerable Library)
</details>
<details><summary><b>y18n-4.0.0.tgz</b></p></summary>
<p>the bare-bones internationalization library used by yargs</p>
<p>Library home page: <a href="https://registry.npmjs.org/y18n/-/y18n-4.0.0.tgz">https://registry.npmjs.org/y18n/-/y18n-4.0.0.tgz</a></p>
<p>Path to dependency file: grafana/package.json</p>
<p>Path to vulnerable library: grafana/node_modules/y18n</p>
<p>
Dependency Hierarchy:
- npm-6.14.6.tgz (Root Library)
- cacache-12.0.3.tgz
- :x: **y18n-4.0.0.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/turkdevops/grafana/commit/eaebfb49103a255dc2d75f384b343f6a7f708816">eaebfb49103a255dc2d75f384b343f6a7f708816</a></p>
<p>Found in base branch: <b>datasource-meta</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require('y18n')(); y18n.setLocale('__proto__'); y18n.updateLocale({polluted: true}); console.log(polluted); // true
<p>Publish Date: 2020-11-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7774>CVE-2020-7774</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1654">https://www.npmjs.com/advisories/1654</a></p>
<p>Release Date: 2020-11-17</p>
<p>Fix Resolution: 3.2.2, 4.0.1, 5.0.5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-7774 (High) detected in y18n-3.2.1.tgz, y18n-4.0.0.tgz - autoclosed - ## CVE-2020-7774 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>y18n-3.2.1.tgz</b>, <b>y18n-4.0.0.tgz</b></p></summary>
<p>
<details><summary><b>y18n-3.2.1.tgz</b></p></summary>
<p>the bare-bones internationalization library used by yargs</p>
<p>Library home page: <a href="https://registry.npmjs.org/y18n/-/y18n-3.2.1.tgz">https://registry.npmjs.org/y18n/-/y18n-3.2.1.tgz</a></p>
<p>Path to dependency file: grafana/package.json</p>
<p>Path to vulnerable library: grafana/node_modules/y18n</p>
<p>
Dependency Hierarchy:
- @grafana/toolkit-6.7.0-pre.tgz (Root Library)
- node-sass-4.12.0.tgz
- sass-graph-2.2.4.tgz
- yargs-7.1.0.tgz
- :x: **y18n-3.2.1.tgz** (Vulnerable Library)
</details>
<details><summary><b>y18n-4.0.0.tgz</b></p></summary>
<p>the bare-bones internationalization library used by yargs</p>
<p>Library home page: <a href="https://registry.npmjs.org/y18n/-/y18n-4.0.0.tgz">https://registry.npmjs.org/y18n/-/y18n-4.0.0.tgz</a></p>
<p>Path to dependency file: grafana/package.json</p>
<p>Path to vulnerable library: grafana/node_modules/y18n</p>
<p>
Dependency Hierarchy:
- npm-6.14.6.tgz (Root Library)
- cacache-12.0.3.tgz
- :x: **y18n-4.0.0.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/turkdevops/grafana/commit/eaebfb49103a255dc2d75f384b343f6a7f708816">eaebfb49103a255dc2d75f384b343f6a7f708816</a></p>
<p>Found in base branch: <b>datasource-meta</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require('y18n')(); y18n.setLocale('__proto__'); y18n.updateLocale({polluted: true}); console.log(polluted); // true
<p>Publish Date: 2020-11-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7774>CVE-2020-7774</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1654">https://www.npmjs.com/advisories/1654</a></p>
<p>Release Date: 2020-11-17</p>
<p>Fix Resolution: 3.2.2, 4.0.1, 5.0.5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in tgz tgz autoclosed cve high severity vulnerability vulnerable libraries tgz tgz tgz the bare bones internationalization library used by yargs library home page a href path to dependency file grafana package json path to vulnerable library grafana node modules dependency hierarchy grafana toolkit pre tgz root library node sass tgz sass graph tgz yargs tgz x tgz vulnerable library tgz the bare bones internationalization library used by yargs library home page a href path to dependency file grafana package json path to vulnerable library grafana node modules dependency hierarchy npm tgz root library cacache tgz x tgz vulnerable library found in head commit a href found in base branch datasource meta vulnerability details this affects the package before and poc by const require setlocale proto updatelocale polluted true console log polluted true publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
87,844 | 17,381,684,275 | IssuesEvent | 2021-07-31 21:08:13 | maks-sh/scikit-uplift | https://api.github.com/repos/maks-sh/scikit-uplift | closed | Add tests for datasets module | ODS Summer of Code help wanted | ## 💡 Feature request
Implement test for `fetch_lenta` and `fetch_x5` in `tests/test_datasets.py` | 1.0 | Add tests for datasets module - ## 💡 Feature request
Implement test for `fetch_lenta` and `fetch_x5` in `tests/test_datasets.py` | non_priority | add tests for datasets module 💡 feature request implement test for fetch lenta and fetch in tests test datasets py | 0 |
45,095 | 5,688,139,542 | IssuesEvent | 2017-04-14 02:01:17 | Robo3D/Octoprint-Filament | https://api.github.com/repos/Robo3D/Octoprint-Filament | closed | False Positives Reported | bug testing | # Issue
We got reports that some of the reworked C2's still broadcasted false positives.
# Solution and Reasoning
We couldn't recreate the issue with any of the C2's in house so we had to comb through the code in search of potential pit falls. We found a point of vulnerability that looks promising.
Fundamentally, the filament switch suffers from mechanical flaw that leads to a noisy signal. The switch's output can oscillate between 1 and 0, depending on the filament's position within the encasing. We added code to clean the signal in version 2.0. We used a fixed threshold value to determine the switch's true state. Specifically, the switch would have to output a 100,000 1s within 10 seconds for the code to trigger a pause print command.
We have now replaced our confidence interval with relative threshold value. Now, we are using a percentage value to determine when to trigger a pause print command. Specifically, what percentage of the total signals does 1 represent within 10 seconds?
Why do we think this fixes the issue? We ran some tests with the old code (v2.2) and found that in rare cases the code could read the switches's state up to 1,000,000 times within 10 seconds. In that case, 100K 1s could trigger a pause print command yet only signify 10% of the total signal content. A relative threshold value would account for a varying read count. | 1.0 | False Positives Reported - # Issue
We got reports that some of the reworked C2's still broadcasted false positives.
# Solution and Reasoning
We couldn't recreate the issue with any of the C2's in house so we had to comb through the code in search of potential pit falls. We found a point of vulnerability that looks promising.
Fundamentally, the filament switch suffers from mechanical flaw that leads to a noisy signal. The switch's output can oscillate between 1 and 0, depending on the filament's position within the encasing. We added code to clean the signal in version 2.0. We used a fixed threshold value to determine the switch's true state. Specifically, the switch would have to output a 100,000 1s within 10 seconds for the code to trigger a pause print command.
We have now replaced our confidence interval with relative threshold value. Now, we are using a percentage value to determine when to trigger a pause print command. Specifically, what percentage of the total signals does 1 represent within 10 seconds?
Why do we think this fixes the issue? We ran some tests with the old code (v2.2) and found that in rare cases the code could read the switches's state up to 1,000,000 times within 10 seconds. In that case, 100K 1s could trigger a pause print command yet only signify 10% of the total signal content. A relative threshold value would account for a varying read count. | non_priority | false positives reported issue we got reports that some of the reworked s still broadcasted false positives solution and reasoning we couldn t recreate the issue with any of the s in house so we had to comb through the code in search of potential pit falls we found a point of vulnerability that looks promising fundamentally the filament switch suffers from mechanical flaw that leads to a noisy signal the switch s output can oscillate between and depending on the filament s position within the encasing we added code to clean the signal in version we used a fixed threshold value to determine the switch s true state specifically the switch would have to output a within seconds for the code to trigger a pause print command we have now replaced our confidence interval with relative threshold value now we are using a percentage value to determine when to trigger a pause print command specifically what percentage of the total signals does represent within seconds why do we think this fixes the issue we ran some tests with the old code and found that in rare cases the code could read the switches s state up to times within seconds in that case could trigger a pause print command yet only signify of the total signal content a relative threshold value would account for a varying read count | 0 |
160,084 | 13,780,826,059 | IssuesEvent | 2020-10-08 15:23:35 | do-community/creatorlinks | https://api.github.com/repos/do-community/creatorlinks | opened | Set Up Initial Documentation | documentation | Set up documentation. Priorities:
- About
- Contributing.md file
- **How to set up the development environment**
- How to deploy to production on App Platform and other methods (less priority initially) | 1.0 | Set Up Initial Documentation - Set up documentation. Priorities:
- About
- Contributing.md file
- **How to set up the development environment**
- How to deploy to production on App Platform and other methods (less priority initially) | non_priority | set up initial documentation set up documentation priorities about contributing md file how to set up the development environment how to deploy to production on app platform and other methods less priority initially | 0 |
133,146 | 18,837,539,253 | IssuesEvent | 2021-11-11 04:08:02 | react-hook-form/react-hook-form | https://api.github.com/repos/react-hook-form/react-hook-form | reopened | issue: form state becomes incorrect if useFieldArray methods are called asynchronously | design limitation | ### Version Number
7.19.1
### Codesandbox/Expo snack
https://codesandbox.io/s/delicate-sun-l482x
### Steps to reproduce
1. Go to https://codesandbox.io/s/delicate-sun-l482x
2. Click on the first 'duplicate' button
3. Then remove duplicated inputs, by clicking corresponding 'delete' button
4. Then click first 'delete' button
5. See that 'submit' button is inactive, because form is invalid, though the 'errors' object is empty
### Expected behaviour
Form shouldn't become invalid
### What browsers are you seeing the problem on?
_No response_
### Relevant log output
_No response_
### Code of Conduct
- [X] I agree to follow this project's Code of Conduct | 1.0 | issue: form state becomes incorrect if useFieldArray methods are called asynchronously - ### Version Number
7.19.1
### Codesandbox/Expo snack
https://codesandbox.io/s/delicate-sun-l482x
### Steps to reproduce
1. Go to https://codesandbox.io/s/delicate-sun-l482x
2. Click on the first 'duplicate' button
3. Then remove duplicated inputs, by clicking corresponding 'delete' button
4. Then click first 'delete' button
5. See that 'submit' button is inactive, because form is invalid, though the 'errors' object is empty
### Expected behaviour
Form shouldn't become invalid
### What browsers are you seeing the problem on?
_No response_
### Relevant log output
_No response_
### Code of Conduct
- [X] I agree to follow this project's Code of Conduct | non_priority | issue form state becomes incorrect if usefieldarray methods are called asynchronously version number codesandbox expo snack steps to reproduce go to click on the first duplicate button then remove duplicated inputs by clicking corresponding delete button then click first delete button see that submit button is inactive because form is invalid though the errors object is empty expected behaviour form shouldn t become invalid what browsers are you seeing the problem on no response relevant log output no response code of conduct i agree to follow this project s code of conduct | 0 |
183,440 | 14,231,215,143 | IssuesEvent | 2020-11-18 09:15:43 | mindsdb/mindsdb | https://api.github.com/repos/mindsdb/mindsdb | closed | Use a different dataset for every database | tests | Use a different dataset for the tests of every different database. E.g. use home_rentals for clickhouse, us_health_insurance for mysql, diamonds for postgres... etc | 1.0 | Use a different dataset for every database - Use a different dataset for the tests of every different database. E.g. use home_rentals for clickhouse, us_health_insurance for mysql, diamonds for postgres... etc | non_priority | use a different dataset for every database use a different dataset for the tests of every different database e g use home rentals for clickhouse us health insurance for mysql diamonds for postgres etc | 0 |
12,111 | 5,146,502,748 | IssuesEvent | 2017-01-13 01:32:34 | dotnet/cli | https://api.github.com/repos/dotnet/cli | closed | Can't reference Microsoft.TeamFoundation.Client in net461 app | msbuild-mitigated | ## Steps to reproduce
1. Create a new .NET Core App
2. Change framework to net461 instead of netcoreapp1.0
3. Try to add a reference to framework assembly "Microsoft.TeamFoundation.Client"
## Expected behavior
I expect that it would be added and can compile against
## Actual behavior
It doesn't show up in the project.json intellisense, and when I try to add it via the reference dialog, I don't see it and get the following error when I browse to it:
> .NET Core projects only support referencing .NET framework assemblies in this release. To reference other assemblies, they need to be included in a NuGet package and reference that package
I can create a nuget package for it, but I consider it a regression from the previous console experience. In case someone is wondering why I'm using a the cli for this is because it references other libraries which are .NET Core projects.
## Environment data
`dotnet --info` output:
```
.NET Command Line Tools (1.0.0-preview1-002702)
Product Information:
Version: 1.0.0-preview1-002702
Commit Sha: 6cde21225e
Runtime Environment:
OS Name: Windows
OS Version: 10.0.10586
OS Platform: Windows
RID: win10-x64
```
| 1.0 | Can't reference Microsoft.TeamFoundation.Client in net461 app - ## Steps to reproduce
1. Create a new .NET Core App
2. Change framework to net461 instead of netcoreapp1.0
3. Try to add a reference to framework assembly "Microsoft.TeamFoundation.Client"
## Expected behavior
I expect that it would be added and can compile against
## Actual behavior
It doesn't show up in the project.json intellisense, and when I try to add it via the reference dialog, I don't see it and get the following error when I browse to it:
> .NET Core projects only support referencing .NET framework assemblies in this release. To reference other assemblies, they need to be included in a NuGet package and reference that package
I can create a nuget package for it, but I consider it a regression from the previous console experience. In case someone is wondering why I'm using a the cli for this is because it references other libraries which are .NET Core projects.
## Environment data
`dotnet --info` output:
```
.NET Command Line Tools (1.0.0-preview1-002702)
Product Information:
Version: 1.0.0-preview1-002702
Commit Sha: 6cde21225e
Runtime Environment:
OS Name: Windows
OS Version: 10.0.10586
OS Platform: Windows
RID: win10-x64
```
| non_priority | can t reference microsoft teamfoundation client in app steps to reproduce create a new net core app change framework to instead of try to add a reference to framework assembly microsoft teamfoundation client expected behavior i expect that it would be added and can compile against actual behavior it doesn t show up in the project json intellisense and when i try to add it via the reference dialog i don t see it and get the following error when i browse to it net core projects only support referencing net framework assemblies in this release to reference other assemblies they need to be included in a nuget package and reference that package i can create a nuget package for it but i consider it a regression from the previous console experience in case someone is wondering why i m using a the cli for this is because it references other libraries which are net core projects environment data dotnet info output net command line tools product information version commit sha runtime environment os name windows os version os platform windows rid | 0 |
108,823 | 23,667,198,772 | IssuesEvent | 2022-08-26 22:54:13 | joomla/joomla-cms | https://api.github.com/repos/joomla/joomla-cms | closed | Breadcrumbs Structured Data Contains Errors | No Code Attached Yet | ### Steps to reproduce the issue
Add a bread crumb to your website
Test coding best practises on Google Structured Data testing tools
https://search.google.com/structured-data/testing-tool
Errors Appear
### Expected result
No Errors
### Actual result
Errors
### System information (as much as possible)
Joomla 3.9.13
### Additional comments
SEO is important for websites and breadcrumbs add vital code that can set users apart in search results giving Joomla an edge on Wordpress and other CMS's. | 1.0 | Breadcrumbs Structured Data Contains Errors - ### Steps to reproduce the issue
Add a bread crumb to your website
Test coding best practises on Google Structured Data testing tools
https://search.google.com/structured-data/testing-tool
Errors Appear
### Expected result
No Errors
### Actual result
Errors
### System information (as much as possible)
Joomla 3.9.13
### Additional comments
SEO is important for websites and breadcrumbs add vital code that can set users apart in search results giving Joomla an edge on Wordpress and other CMS's. | non_priority | breadcrumbs structured data contains errors steps to reproduce the issue add a bread crumb to your website test coding best practises on google structured data testing tools errors appear expected result no errors actual result errors system information as much as possible joomla additional comments seo is important for websites and breadcrumbs add vital code that can set users apart in search results giving joomla an edge on wordpress and other cms s | 0 |
201,422 | 22,957,735,404 | IssuesEvent | 2022-07-19 13:04:02 | elastic/integrations | https://api.github.com/repos/elastic/integrations | closed | [Netskope] Add support to handle null values in ip field and handle failure in uri_parts processor applied on url | enhancement Team:Security-External Integrations Integration:Netskope | **Problem statement:**
Netskope events data is getting dropped when ip fields are having null values. When uri_parts processor is applied on url field and url field contains url without protocol in it, then data is getting dropped.
**Describe the enhancement:**
Data received from newer version of Netskope CLS, it is found that ip field are having null values because of which ip processor applied on that field is getting failed and so data is getting dropped. So there is a need to handle null values when received for the field source.ip, destination.ip and user.ip. There is a need to handle the failure in uri_parts processor when url field contains url without protocol in it.
| True | [Netskope] Add support to handle null values in ip field and handle failure in uri_parts processor applied on url - **Problem statement:**
Netskope events data is getting dropped when ip fields are having null values. When uri_parts processor is applied on url field and url field contains url without protocol in it, then data is getting dropped.
**Describe the enhancement:**
Data received from newer version of Netskope CLS, it is found that ip field are having null values because of which ip processor applied on that field is getting failed and so data is getting dropped. So there is a need to handle null values when received for the field source.ip, destination.ip and user.ip. There is a need to handle the failure in uri_parts processor when url field contains url without protocol in it.
| non_priority | add support to handle null values in ip field and handle failure in uri parts processor applied on url problem statement netskope events data is getting dropped when ip fields are having null values when uri parts processor is applied on url field and url field contains url without protocol in it then data is getting dropped describe the enhancement data received from newer version of netskope cls it is found that ip field are having null values because of which ip processor applied on that field is getting failed and so data is getting dropped so there is a need to handle null values when received for the field source ip destination ip and user ip there is a need to handle the failure in uri parts processor when url field contains url without protocol in it | 0 |
169,108 | 13,124,148,364 | IssuesEvent | 2020-08-06 02:51:02 | DiscordSRV/DiscordSRV | https://api.github.com/repos/DiscordSRV/DiscordSRV | closed | Error on latest snapshot | bug needs testing | Hi!
I get this on start up after update:
https://pastebin.com/m1Zim7ia
I use java 11 - papermc 1.16.1
| 1.0 | Error on latest snapshot - Hi!
I get this on start up after update:
https://pastebin.com/m1Zim7ia
I use java 11 - papermc 1.16.1
| non_priority | error on latest snapshot hi i get this on start up after update i use java papermc | 0 |
268,775 | 20,361,071,687 | IssuesEvent | 2022-02-20 17:43:31 | countercept/chainsaw | https://api.github.com/repos/countercept/chainsaw | closed | --json output path not working for hunts | documentation | I'm trying to generate a json output file. Unfortuanttly it seems not to work because it's not allowed to add a path after --json like --json C:\TEMP\test.json
**Expected behavior:**
If I'm running the command:
chainsaw.exe" hunt C:\Windows\System32\winevt\Logs --rules "C:\xyz\xyz\xyz\chainsaw\sigma_rules" --mapping "xyz\xyz\xyz\chainsaw\mapping_files\sigma-mapping.yml --json C:\xyz\xyz\xyz\chainsaw\output.json
I would execpet in the folder C:\xyz\xyz\xyz\chainsaw\ the output.json.
Actual behavior
If I'm running the command:
chainsaw.exe" hunt C:\Windows\System32\winevt\Logs --rules "C:\xyz\xyz\xyz\chainsaw\sigma_rules" --mapping "xyz\xyz\xyz\chainsaw\mapping_files\sigma-mapping.yml --json C:\xyz\xyz\xyz\chainsaw\output.json
I get the following "error" dialog:
error: Found argument 'C:\xyz\xyz\xyz\chainsaw\output.json' which wasn't expected, or isn't valid in this context
If I'm running it without a path like:
chainsaw.exe" hunt C:\Windows\System32\winevt\Logs --rules "C:\xyz\xyz\xyz\chainsaw\sigma_rules" --mapping "xyz\xyz\xyz\chainsaw\mapping_files\sigma-mapping.yml --json
Its working but prints the json in the console which is not what I expect from this paramter.
Could you maybe have a look on it?
Thanks already and many greetings
| 1.0 | --json output path not working for hunts - I'm trying to generate a json output file. Unfortuanttly it seems not to work because it's not allowed to add a path after --json like --json C:\TEMP\test.json
**Expected behavior:**
If I'm running the command:
chainsaw.exe" hunt C:\Windows\System32\winevt\Logs --rules "C:\xyz\xyz\xyz\chainsaw\sigma_rules" --mapping "xyz\xyz\xyz\chainsaw\mapping_files\sigma-mapping.yml --json C:\xyz\xyz\xyz\chainsaw\output.json
I would execpet in the folder C:\xyz\xyz\xyz\chainsaw\ the output.json.
Actual behavior
If I'm running the command:
chainsaw.exe" hunt C:\Windows\System32\winevt\Logs --rules "C:\xyz\xyz\xyz\chainsaw\sigma_rules" --mapping "xyz\xyz\xyz\chainsaw\mapping_files\sigma-mapping.yml --json C:\xyz\xyz\xyz\chainsaw\output.json
I get the following "error" dialog:
error: Found argument 'C:\xyz\xyz\xyz\chainsaw\output.json' which wasn't expected, or isn't valid in this context
If I'm running it without a path like:
chainsaw.exe" hunt C:\Windows\System32\winevt\Logs --rules "C:\xyz\xyz\xyz\chainsaw\sigma_rules" --mapping "xyz\xyz\xyz\chainsaw\mapping_files\sigma-mapping.yml --json
Its working but prints the json in the console which is not what I expect from this paramter.
Could you maybe have a look on it?
Thanks already and many greetings
| non_priority | json output path not working for hunts i m trying to generate a json output file unfortuanttly it seems not to work because it s not allowed to add a path after json like json c temp test json expected behavior if i m running the command chainsaw exe hunt c windows winevt logs rules c xyz xyz xyz chainsaw sigma rules mapping xyz xyz xyz chainsaw mapping files sigma mapping yml json c xyz xyz xyz chainsaw output json i would execpet in the folder c xyz xyz xyz chainsaw the output json actual behavior if i m running the command chainsaw exe hunt c windows winevt logs rules c xyz xyz xyz chainsaw sigma rules mapping xyz xyz xyz chainsaw mapping files sigma mapping yml json c xyz xyz xyz chainsaw output json i get the following error dialog error found argument c xyz xyz xyz chainsaw output json which wasn t expected or isn t valid in this context if i m running it without a path like chainsaw exe hunt c windows winevt logs rules c xyz xyz xyz chainsaw sigma rules mapping xyz xyz xyz chainsaw mapping files sigma mapping yml json its working but prints the json in the console which is not what i expect from this paramter could you maybe have a look on it thanks already and many greetings | 0 |
113,266 | 14,404,155,864 | IssuesEvent | 2020-12-03 16:55:58 | wellcomecollection/wellcomecollection.org | https://api.github.com/repos/wellcomecollection/wellcomecollection.org | opened | Improving styling of document downloads | improvement ✨ needs:design | # What is it and who's it for?
- All site users
The styling on downloadable documents is a bit odd.
When a document is linked from inside body text, it picks up the download icon and filesize, interrupting the reading flow
<img width="871" alt="Screenshot 2020-12-03 at 16 52 41" src="https://user-images.githubusercontent.com/1446139/101061262-37079400-3588-11eb-8180-c44aafee17d9.png">
When a document title is long and wraps to next line, the hyperlink takes the full width of the line, rather than the text
<img width="528" alt="Screenshot 2020-12-03 at 16 52 59" src="https://user-images.githubusercontent.com/1446139/101061335-4e468180-3588-11eb-9fed-67eeb8e1585d.png">
| 1.0 | Improving styling of document downloads - # What is it and who's it for?
- All site users
The styling on downloadable documents is a bit odd.
When a document is linked from inside body text, it picks up the download icon and filesize, interrupting the reading flow
<img width="871" alt="Screenshot 2020-12-03 at 16 52 41" src="https://user-images.githubusercontent.com/1446139/101061262-37079400-3588-11eb-8180-c44aafee17d9.png">
When a document title is long and wraps to next line, the hyperlink takes the full width of the line, rather than the text
<img width="528" alt="Screenshot 2020-12-03 at 16 52 59" src="https://user-images.githubusercontent.com/1446139/101061335-4e468180-3588-11eb-9fed-67eeb8e1585d.png">
| non_priority | improving styling of document downloads what is it and who s it for all site users the styling on downloadable documents is a bit odd when a document is linked from inside body text it picks up the download icon and filesize interrupting the reading flow img width alt screenshot at src when a document title is long and wraps to next line the hyperlink takes the full width of the line rather than the text img width alt screenshot at src | 0 |
169,325 | 26,780,727,763 | IssuesEvent | 2023-01-31 20:56:23 | department-of-veterans-affairs/vets-design-system-documentation | https://api.github.com/repos/department-of-veterans-affairs/vets-design-system-documentation | closed | Conversion to USWDS v3 - Select box - Design | vsp-design-system-team va-select | ## Description
We need to incorporate the designs for the [USWDS Select component](https://designsystem.digital.gov/components/select/) into the VA Sketch library.
## Tasks
- [ ] Audit differences between the USWDS version and ours and present to the DST
- [ ] Incorporate designs for USWDS Select into our select box component in Sketch
- [ ] Review designs with PO
- [ ] Review designs with DST members (Carol can help schedule this)
- [ ] Address any comments from reviews, if necessary
- [ ] Comment on this ticket with a link to the designs and post in DST Slack channel
## Acceptance Criteria
- [ ] Where necessary, USWDS Text input designs have been incorporated into our Sketch library
- [ ] Designs have been presented to the DST
| 1.0 | Conversion to USWDS v3 - Select box - Design - ## Description
We need to incorporate the designs for the [USWDS Select component](https://designsystem.digital.gov/components/select/) into the VA Sketch library.
## Tasks
- [ ] Audit differences between the USWDS version and ours and present to the DST
- [ ] Incorporate designs for USWDS Select into our select box component in Sketch
- [ ] Review designs with PO
- [ ] Review designs with DST members (Carol can help schedule this)
- [ ] Address any comments from reviews, if necessary
- [ ] Comment on this ticket with a link to the designs and post in DST Slack channel
## Acceptance Criteria
- [ ] Where necessary, USWDS Text input designs have been incorporated into our Sketch library
- [ ] Designs have been presented to the DST
| non_priority | conversion to uswds select box design description we need to incorporate the designs for the into the va sketch library tasks audit differences between the uswds version and ours and present to the dst incorporate designs for uswds select into our select box component in sketch review designs with po review designs with dst members carol can help schedule this address any comments from reviews if necessary comment on this ticket with a link to the designs and post in dst slack channel acceptance criteria where necessary uswds text input designs have been incorporated into our sketch library designs have been presented to the dst | 0 |
17,611 | 5,447,803,827 | IssuesEvent | 2017-03-07 14:30:14 | TheUnrealMattix/W | https://api.github.com/repos/TheUnrealMattix/W | opened | The option to restart the level or start the next level! | code graphics | When the player reaches/walks into the stump at the end of each level, a temporary UI will show up that will give the player the option to restart the level or go to the next level! | 1.0 | The option to restart the level or start the next level! - When the player reaches/walks into the stump at the end of each level, a temporary UI will show up that will give the player the option to restart the level or go to the next level! | non_priority | the option to restart the level or start the next level when the player reaches walks into the stump at the end of each level a temporary ui will show up that will give the player the option to restart the level or go to the next level | 0 |
43,680 | 5,681,115,893 | IssuesEvent | 2017-04-13 04:45:21 | Jerome-Joestar/milk-intake-calculator | https://api.github.com/repos/Jerome-Joestar/milk-intake-calculator | closed | Implement responsive design | design enhancement frontend won't fix | Need to implement the wireframes created for this project (mobile - large desktop) | 1.0 | Implement responsive design - Need to implement the wireframes created for this project (mobile - large desktop) | non_priority | implement responsive design need to implement the wireframes created for this project mobile large desktop | 0 |
1,500 | 3,801,496,234 | IssuesEvent | 2016-03-23 23:13:18 | chri55w/QuickBooks-Timer | https://api.github.com/repos/chri55w/QuickBooks-Timer | closed | Hide exported items | Requirement | It would be good to be able to hide exported items from the list of activities. In fact, this should probably be the default view. | 1.0 | Hide exported items - It would be good to be able to hide exported items from the list of activities. In fact, this should probably be the default view. | non_priority | hide exported items it would be good to be able to hide exported items from the list of activities in fact this should probably be the default view | 0 |