Skip to content

Commit 52d3d19

Browse files
authored
test: update e2e fixtures (#203)
* test: update e2e fixtures * test: update fixtures
1 parent ef568d0 commit 52d3d19

File tree

3 files changed

+12
-9
lines changed

3 files changed

+12
-9
lines changed

fixtures/locks-e2e/1-Gemfile.lock.out.txt

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,11 @@ fixtures/locks-e2e/1-Gemfile.lock: found 229 packages
1515
GHSA-xp5h-f8jf-rc8q: rails-ujs vulnerable to DOM Based Cross-site Scripting contenteditable HTML Elements (https://github.com/advisories/GHSA-xp5h-f8jf-rc8q)
1616
[email protected] is affected by the following vulnerabilities:
1717
GHSA-3hhc-qp5v-9p2j: Active Record RCE bug with Serialized Columns (https://github.com/advisories/GHSA-3hhc-qp5v-9p2j)
18-
GHSA-579w-22j4-4749: Denial of Service Vulnerability in ActiveRecords PostgreSQL adapter (https://github.com/advisories/GHSA-579w-22j4-4749)
18+
GHSA-579w-22j4-4749: Denial of Service Vulnerability in ActiveRecord's PostgreSQL adapter (https://github.com/advisories/GHSA-579w-22j4-4749)
1919
[email protected] is affected by the following vulnerabilities:
2020
GHSA-w749-p3v6-hccq: Possible code injection vulnerability in Rails / Active Storage (https://github.com/advisories/GHSA-w749-p3v6-hccq)
2121
[email protected] is affected by the following vulnerabilities:
22-
GHSA-j6gc-792m-qgm2: ReDoS based DoS vulnerability in Active Supports underscore (https://github.com/advisories/GHSA-j6gc-792m-qgm2)
22+
GHSA-j6gc-792m-qgm2: ReDoS based DoS vulnerability in Active Support's underscore (https://github.com/advisories/GHSA-j6gc-792m-qgm2)
2323
GHSA-pj73-v5mw-pm9j: Possible XSS Security Vulnerability in SafeBuffer#bytesplice (https://github.com/advisories/GHSA-pj73-v5mw-pm9j)
2424
[email protected] is affected by the following vulnerabilities:
2525
GHSA-jxhc-q857-3j6g: Regular Expression Denial of Service in Addressable templates (https://github.com/advisories/GHSA-jxhc-q857-3j6g)
@@ -48,14 +48,15 @@ fixtures/locks-e2e/1-Gemfile.lock: found 229 packages
4848
GHSA-xxx9-3xcr-gjj3: XML Injection in Xerces Java affects Nokogiri (https://github.com/advisories/GHSA-xxx9-3xcr-gjj3)
4949
[email protected] is affected by the following vulnerabilities:
5050
GHSA-48w2-rm65-62xx: Puma with proxy which forwards LF characters as line endings could allow HTTP request smuggling (https://github.com/advisories/GHSA-48w2-rm65-62xx)
51+
GHSA-68xg-gqqm-vgj8: Puma HTTP Request/Response Smuggling vulnerability (https://github.com/advisories/GHSA-68xg-gqqm-vgj8)
5152
GHSA-h99w-9q5r-gjq9: Puma vulnerable to HTTP Request Smuggling (https://github.com/advisories/GHSA-h99w-9q5r-gjq9)
5253
GHSA-q28m-8xjw-8vr5: Puma's Keepalive Connections Causing Denial Of Service (https://github.com/advisories/GHSA-q28m-8xjw-8vr5)
5354
GHSA-rmj8-8hhh-gv5h: Puma used with Rails may lead to Information Exposure (https://github.com/advisories/GHSA-rmj8-8hhh-gv5h)
5455
[email protected] is affected by the following vulnerabilities:
5556
GHSA-3h57-hmj3-gj3p: Rack has possible DoS Vulnerability in Multipart MIME parsing (https://github.com/advisories/GHSA-3h57-hmj3-gj3p)
5657
GHSA-65f5-mfpf-vfhj: Denial of service via header parsing in Rack (https://github.com/advisories/GHSA-65f5-mfpf-vfhj)
5758
GHSA-93pm-5p5f-3ghx: Denial of Service Vulnerability in Rack Content-Disposition parsing (https://github.com/advisories/GHSA-93pm-5p5f-3ghx)
58-
GHSA-c6qg-cjj8-47qp: Possible Denial of Service Vulnerability in Racks header parsing (https://github.com/advisories/GHSA-c6qg-cjj8-47qp)
59+
GHSA-c6qg-cjj8-47qp: Possible Denial of Service Vulnerability in Rack's header parsing (https://github.com/advisories/GHSA-c6qg-cjj8-47qp)
5960
GHSA-hxqx-xwvh-44m2: Denial of Service Vulnerability in Rack Multipart Parsing (https://github.com/advisories/GHSA-hxqx-xwvh-44m2)
6061
GHSA-rqv2-275x-2jq5: Denial of service via multipart parsing in Rack (https://github.com/advisories/GHSA-rqv2-275x-2jq5)
6162
GHSA-wq4h-7r42-5hrr: Possible shell escape sequence injection vulnerability in Rack (https://github.com/advisories/GHSA-wq4h-7r42-5hrr)
@@ -75,4 +76,4 @@ fixtures/locks-e2e/1-Gemfile.lock: found 229 packages
7576
[email protected] is affected by the following vulnerabilities:
7677
GHSA-5cm2-9h8c-rvfx: TZInfo relative path traversal vulnerability allows loading of arbitrary files (https://github.com/advisories/GHSA-5cm2-9h8c-rvfx)
7778

78-
52 known vulnerabilities found in fixtures/locks-e2e/1-Gemfile.lock
79+
53 known vulnerabilities found in fixtures/locks-e2e/1-Gemfile.lock

fixtures/locks-e2e/2-Gemfile.lock.out.txt

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,12 +16,12 @@ fixtures/locks-e2e/2-Gemfile.lock: found 426 packages
1616
GHSA-xp5h-f8jf-rc8q: rails-ujs vulnerable to DOM Based Cross-site Scripting contenteditable HTML Elements (https://github.com/advisories/GHSA-xp5h-f8jf-rc8q)
1717
[email protected] is affected by the following vulnerabilities:
1818
GHSA-3hhc-qp5v-9p2j: Active Record RCE bug with Serialized Columns (https://github.com/advisories/GHSA-3hhc-qp5v-9p2j)
19-
GHSA-579w-22j4-4749: Denial of Service Vulnerability in ActiveRecords PostgreSQL adapter (https://github.com/advisories/GHSA-579w-22j4-4749)
19+
GHSA-579w-22j4-4749: Denial of Service Vulnerability in ActiveRecord's PostgreSQL adapter (https://github.com/advisories/GHSA-579w-22j4-4749)
2020
GHSA-hq7p-j377-6v63: SQL Injection Vulnerability via ActiveRecord comments (https://github.com/advisories/GHSA-hq7p-j377-6v63)
2121
[email protected] is affected by the following vulnerabilities:
2222
GHSA-w749-p3v6-hccq: Possible code injection vulnerability in Rails / Active Storage (https://github.com/advisories/GHSA-w749-p3v6-hccq)
2323
[email protected] is affected by the following vulnerabilities:
24-
GHSA-j6gc-792m-qgm2: ReDoS based DoS vulnerability in Active Supports underscore (https://github.com/advisories/GHSA-j6gc-792m-qgm2)
24+
GHSA-j6gc-792m-qgm2: ReDoS based DoS vulnerability in Active Support's underscore (https://github.com/advisories/GHSA-j6gc-792m-qgm2)
2525
GHSA-pj73-v5mw-pm9j: Possible XSS Security Vulnerability in SafeBuffer#bytesplice (https://github.com/advisories/GHSA-pj73-v5mw-pm9j)
2626
[email protected] is affected by the following vulnerabilities:
2727
GHSA-23c2-gwp5-pxw9: ReDoS based DoS vulnerability in GlobalID (https://github.com/advisories/GHSA-23c2-gwp5-pxw9)
@@ -38,11 +38,13 @@ fixtures/locks-e2e/2-Gemfile.lock: found 426 packages
3838
GHSA-cgx6-hpwq-fhv5: Integer Overflow or Wraparound in libxml2 affects Nokogiri (https://github.com/advisories/GHSA-cgx6-hpwq-fhv5)
3939
GHSA-pxvg-2qj5-37jq: Nokogiri updates packaged libxml2 to v2.10.4 to resolve multiple CVEs (https://github.com/advisories/GHSA-pxvg-2qj5-37jq)
4040
GHSA-xh29-r2w5-wx8m: Nokogiri Improperly Handles Unexpected Data Type (https://github.com/advisories/GHSA-xh29-r2w5-wx8m)
41+
[email protected] is affected by the following vulnerabilities:
42+
GHSA-68xg-gqqm-vgj8: Puma HTTP Request/Response Smuggling vulnerability (https://github.com/advisories/GHSA-68xg-gqqm-vgj8)
4143
[email protected] is affected by the following vulnerabilities:
4244
GHSA-3h57-hmj3-gj3p: Rack has possible DoS Vulnerability in Multipart MIME parsing (https://github.com/advisories/GHSA-3h57-hmj3-gj3p)
4345
GHSA-65f5-mfpf-vfhj: Denial of service via header parsing in Rack (https://github.com/advisories/GHSA-65f5-mfpf-vfhj)
4446
GHSA-93pm-5p5f-3ghx: Denial of Service Vulnerability in Rack Content-Disposition parsing (https://github.com/advisories/GHSA-93pm-5p5f-3ghx)
45-
GHSA-c6qg-cjj8-47qp: Possible Denial of Service Vulnerability in Racks header parsing (https://github.com/advisories/GHSA-c6qg-cjj8-47qp)
47+
GHSA-c6qg-cjj8-47qp: Possible Denial of Service Vulnerability in Rack's header parsing (https://github.com/advisories/GHSA-c6qg-cjj8-47qp)
4648
GHSA-hxqx-xwvh-44m2: Denial of Service Vulnerability in Rack Multipart Parsing (https://github.com/advisories/GHSA-hxqx-xwvh-44m2)
4749
GHSA-rqv2-275x-2jq5: Denial of service via multipart parsing in Rack (https://github.com/advisories/GHSA-rqv2-275x-2jq5)
4850
GHSA-wq4h-7r42-5hrr: Possible shell escape sequence injection vulnerability in Rack (https://github.com/advisories/GHSA-wq4h-7r42-5hrr)
@@ -55,4 +57,4 @@ fixtures/locks-e2e/2-Gemfile.lock: found 426 packages
5557
[email protected] is affected by the following vulnerabilities:
5658
GHSA-5cm2-9h8c-rvfx: TZInfo relative path traversal vulnerability allows loading of arbitrary files (https://github.com/advisories/GHSA-5cm2-9h8c-rvfx)
5759

58-
37 known vulnerabilities found in fixtures/locks-e2e/2-Gemfile.lock
60+
38 known vulnerabilities found in fixtures/locks-e2e/2-Gemfile.lock

pkg/semantic/version-pypi.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -313,7 +313,7 @@ func (pv PyPIVersion) compareLocal(pw PyPIVersion) int {
313313
}
314314

315315
// Additionally a local version with a great number of segments will always compare as greater than a local version with fewer segments,
316-
// as long as the shorter local versions segments match the beginning of the longer local versions segments exactly.
316+
// as long as the shorter local version's segments match the beginning of the longer local version's segments exactly.
317317
if len(pv.local) > len(pw.local) {
318318
return +1
319319
}

0 commit comments

Comments
 (0)