You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Looks like eager allocation is used for Smile binary payload if using "raw"/native embedding.
Similar to #186, this should be only used for relatively short payloads to avoid potential for DoS by attacker specifying allegedly large data size but only sending minimal partial message (essentially just marker, length and maybe a bit or two)
The text was updated successfully, but these errors were encountered:
The issue seems oddly resistant to reproduction: for some reason, allocating a 2-gig byte array succeeds despite my trying to limit heap to 0.5 gigs (for example).
cowtowncoder
changed the title
Allocate byte[] lazily for longer Smile binary data payloads
Allocate byte[] lazily for longer Smile binary data payloads (raw)
Mar 24, 2021
(from https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32180)
Looks like eager allocation is used for Smile binary payload if using "raw"/native embedding.
Similar to #186, this should be only used for relatively short payloads to avoid potential for DoS by attacker specifying allegedly large data size but only sending minimal partial message (essentially just marker, length and maybe a bit or two)
The text was updated successfully, but these errors were encountered: