Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability on Codelet class #24

Open
wandgibaut opened this issue Sep 22, 2021 · 1 comment
Open

Vulnerability on Codelet class #24

wandgibaut opened this issue Sep 22, 2021 · 1 comment
Assignees
Labels
bug CST CST tasks

Comments

@wandgibaut
Copy link
Contributor

It's possible to a code inadvertently (or on purpose) to completely break a running Codelet by using the method getOutput(String type, int index). If someone tries to access an index greater than the size of the outputs, it will change the enable field to false and increment enable_count. As the Codelet tries to run again it will raise an exception, but there is no place where the entity revert to its original state, preventing the Codelet from running indefinitely.

@rgudwin
Copy link
Member

rgudwin commented Jun 13, 2024

Wander, I was looking at these old issues not yet dealt with. In this case, I believe it is possible to get the Codelet back on track using the setEnable(true) method. Do you confirm that the problem still persists after you run setEnable(true) ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug CST CST tasks
Projects
None yet
Development

No branches or pull requests

3 participants