Skip to content

Stack limit #166

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 5 commits into from
Feb 11, 2015
Merged

Stack limit #166

merged 5 commits into from
Feb 11, 2015

Conversation

cdunn2001
Copy link
Contributor

Bad input should not cause seg-fault.

This is an improper solution. If multiple Readers exist,
then the effect stackLimit is reduced because of side-effects.
But our options are limited. We need to address the security
hole without breaking binary-compatibility.

However, this is not likely to cause any practical problems because:

* Anyone using `operator>>(istream, Json::Value)` will be using the
new code already
* Multiple Readers are uncommon.
* The stackLimit is quite high.
* Deeply nested JSON probably would have hit the system limits anyway.
cdunn2001 added a commit that referenced this pull request Feb 11, 2015
@cdunn2001 cdunn2001 merged commit acbf4eb into open-source-parsers:master Feb 11, 2015
@cdunn2001 cdunn2001 deleted the stackLimit branch February 11, 2015 16:37
@cdunn2001 cdunn2001 mentioned this pull request Mar 15, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant