-
Wouter van Oortmerssen authored
Theoretically, an attacker could construct a FlatBuffer with the sole purpose of making verification really expensive, essentially DOS-ing a server that uses verification on FlatBuffers. This adds a max table depth and max table amount at which point the verifier declares the buffer malformed. Bug: 16301336 Change-Id: I6b098c31d030d24c19e852b33609110658e66aa9 Tested: on OS X
11b74368
Name |
Last commit
|
Last update |
---|---|---|
CMake | ||
android | ||
build | ||
docs | ||
go | ||
include/flatbuffers | ||
java/flatbuffers | ||
samples | ||
src | ||
tests | ||
.gitattributes | ||
.gitignore | ||
CMakeLists.txt | ||
LICENSE.txt | ||
readme.md |