Build: #5 failed Manual run by Akeem Wells
Build result summary
Details
- Completed
- Queue duration
- 7 seconds
- Duration
- 4 minutes
- Labels
- None
- Revisions
-
- Casa6
-
5c7ff663419900e4d4db774f37f36ad417f2abc6
5c7ff663419900e4d4db774f37f36ad417f2abc6 - OPEN-CASA-PKG
-
4b9064f16a8d185b162391c3ef324299625bd94b
4b9064f16a8d185b162391c3ef324299625bd94b
- Total tests
- 214
Tests
- 8 New failures
- 4 Existing failures
- 0 Fixed
Responsible
No one has taken responsibility for this failure
Code commits
Author | Commit | Commit date | |
---|---|---|---|
Akeem Wells |
5c7ff663419900e4d4db774f37f36ad417f2abc6
|
||
Akeem Wells |
acf17965893895c92835c7cabddf517ca0821f05
|
||
Takahiro Tsutsumi |
c26249c8821163349498583691736439ba09c78f
|
||
Takahiro Tsutsumi |
bc7512a0f92339aa2ee25a7909238b92e8879733
|
||
Ville Suoranta |
28ed41636d537c89a4c6532cccd25a645a53b89a
|
Tests
Status | Test | View job | Duration | |
---|---|---|---|---|
Collapse |
pip
v_22_3_1
|
Check For Known Vulnerabilities ManyLinux2014 Python 3.10 | < 1 sec | |
When installing a package from a Mercurial VCS URL (ie pip install hg+...) with pip prior to v23.3 the specified Mercurial revision could be used to inject arbitrary configuration options to the hg clone call (ie --config). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who arent installing from Mercurial. When installing a package from a Mercurial VCS URL (ie pip install hg+...) with pip prior to v23.3 the specified Mercurial revision could be used to inject arbitrary configuration options to the hg clone call (ie --config). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who arent installing from Mercurial. |
||||
Collapse |
pip
v_22_3_1
|
Check For Known Vulnerabilities ManyLinux228 Python 3.10 | < 1 sec | |
When installing a package from a Mercurial VCS URL (ie pip install hg+...) with pip prior to v23.3 the specified Mercurial revision could be used to inject arbitrary configuration options to the hg clone call (ie --config). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who arent installing from Mercurial. When installing a package from a Mercurial VCS URL (ie pip install hg+...) with pip prior to v23.3 the specified Mercurial revision could be used to inject arbitrary configuration options to the hg clone call (ie --config). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who arent installing from Mercurial. |
||||
Collapse |
protobuf
v_3_20_1
|
Check For Known Vulnerabilities ManyLinux2014 Python 3.10 | < 1 sec | |
Summary A message parsing and memory management vulnerability in ProtocolBuffer’s C++ and Python implementations can trigger an out of memory (OOM) failure when processing a specially crafted message which could lead to a denial of service (DoS) on services using the libraries. Reporter: ClusterFuzz(https://google.github.io/clusterfuzz/) Affected versions: All versions of C++ Protobufs (including Python) prior to the versions listed below. Summary A message parsing and memory management vulnerability in ProtocolBuffer’s C++ and Python implementations can trigger an out of memory (OOM) failure when processing a specially crafted message which could lead to a denial of service (DoS) on services using the libraries. Reporter: ClusterFuzz(https://google.github.io/clusterfuzz/) Affected versions: All versions of C++ Protobufs (including Python) prior to the versions listed below. |
||||
Collapse |
protobuf
v_3_20_1
|
Check For Known Vulnerabilities ManyLinux228 Python 3.10 | < 1 sec | |
Summary A message parsing and memory management vulnerability in ProtocolBuffer’s C++ and Python implementations can trigger an out of memory (OOM) failure when processing a specially crafted message which could lead to a denial of service (DoS) on services using the libraries. Reporter: ClusterFuzz(https://google.github.io/clusterfuzz/) Affected versions: All versions of C++ Protobufs (including Python) prior to the versions listed below. Summary A message parsing and memory management vulnerability in ProtocolBuffer’s C++ and Python implementations can trigger an out of memory (OOM) failure when processing a specially crafted message which could lead to a denial of service (DoS) on services using the libraries. Reporter: ClusterFuzz(https://google.github.io/clusterfuzz/) Affected versions: All versions of C++ Protobufs (including Python) prior to the versions listed below. |
||||
Collapse |
setuptools
v_65_5_0
|
Check For Known Vulnerabilities ManyLinux2014 Python 3.10 | < 1 sec | |
Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in packageindex.py. Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in packageindex.py. |
||||
Collapse |
setuptools
v_65_5_0
|
Check For Known Vulnerabilities ManyLinux228 Python 3.10 | < 1 sec | |
Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in packageindex.py. Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in packageindex.py. |
||||
Collapse |
urllib3
v_1_26_6
|
Check For Known Vulnerabilities ManyLinux2014 Python 3.10 | < 1 sec | |
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesnt treat the Cookie HTTP header special or provide any helpers for managing cookies over HTTP that is the responsibility of the user. However it is possible for a user to specify a Cookie header and unknowingly leak information via HTTP redirects to a different origin if that user doesnt disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5. urllib3 is a user-friendly HTTP client library for Python. urllib3 doesnt treat the Cookie HTTP header special or provide any helpers for managing cookies over HTTP that is the responsibility of the user. However it is possible for a user to specify a Cookie header and unknowingly leak information via HTTP redirects to a different origin if that user doesnt disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5. |
||||
Collapse |
urllib3
v_1_26_6
|
Check For Known Vulnerabilities ManyLinux228 Python 3.10 | < 1 sec | |
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesnt treat the Cookie HTTP header special or provide any helpers for managing cookies over HTTP that is the responsibility of the user. However it is possible for a user to specify a Cookie header and unknowingly leak information via HTTP redirects to a different origin if that user doesnt disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5. urllib3 is a user-friendly HTTP client library for Python. urllib3 doesnt treat the Cookie HTTP header special or provide any helpers for managing cookies over HTTP that is the responsibility of the user. However it is possible for a user to specify a Cookie header and unknowingly leak information via HTTP redirects to a different origin if that user doesnt disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5. |
Status | Test | Failing since | View job | Duration | |
---|---|---|---|---|---|
pip
v_22_3_1
|
Check For Known Vulnerabilities Macos 12 Py 3.10 | < 1 sec | |||
When installing a package from a Mercurial VCS URL (ie pip install hg+...) with pip prior to v23.3 the specified Mercurial revision could be used to inject arbitrary configuration options to the hg clone call (ie --config). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who arent installing from Mercurial. When installing a package from a Mercurial VCS URL (ie pip install hg+...) with pip prior to v23.3 the specified Mercurial revision could be used to inject arbitrary configuration options to the hg clone call (ie --config). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who arent installing from Mercurial. |
|||||
protobuf
v_3_20_1
|
Check For Known Vulnerabilities Macos 12 Py 3.10 | < 1 sec | |||
Summary A message parsing and memory management vulnerability in ProtocolBuffer’s C++ and Python implementations can trigger an out of memory (OOM) failure when processing a specially crafted message which could lead to a denial of service (DoS) on services using the libraries. Reporter: ClusterFuzz(https://google.github.io/clusterfuzz/) Affected versions: All versions of C++ Protobufs (including Python) prior to the versions listed below. Summary A message parsing and memory management vulnerability in ProtocolBuffer’s C++ and Python implementations can trigger an out of memory (OOM) failure when processing a specially crafted message which could lead to a denial of service (DoS) on services using the libraries. Reporter: ClusterFuzz(https://google.github.io/clusterfuzz/) Affected versions: All versions of C++ Protobufs (including Python) prior to the versions listed below. |
|||||
setuptools
v_65_5_0
|
Check For Known Vulnerabilities Macos 12 Py 3.10 | < 1 sec | |||
Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in packageindex.py. Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in packageindex.py. |
|||||
urllib3
v_1_26_6
|
Check For Known Vulnerabilities Macos 12 Py 3.10 | < 1 sec | |||
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesnt treat the Cookie HTTP header special or provide any helpers for managing cookies over HTTP that is the responsibility of the user. However it is possible for a user to specify a Cookie header and unknowingly leak information via HTTP redirects to a different origin if that user doesnt disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5. urllib3 is a user-friendly HTTP client library for Python. urllib3 doesnt treat the Cookie HTTP header special or provide any helpers for managing cookies over HTTP that is the responsibility of the user. However it is possible for a user to specify a Cookie header and unknowingly leak information via HTTP redirects to a different origin if that user doesnt disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5. |
Jira issues
Issue | Description | Status | |
---|---|---|---|
35 more issues… | |||
Unknown Issue Type | CAS-9957 | Could not obtain issue details from Jira | |
Unknown Issue Type | CAS-13863 | Could not obtain issue details from Jira | |
Unknown Issue Type | CAS-14007 | Could not obtain issue details from Jira | |
Unknown Issue Type | CAS-14093 | Could not obtain issue details from Jira | |
Unknown Issue Type | CAS-14218 | Could not obtain issue details from Jira |