You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I understand the issue with deserializing a Vec<ZST>, (#52 and #19), but if I'm not mistaken, there is no such attack on the serialization side.
It seems unnecessary to do the ZST check for serialization. If it is unnecessary, what are the chances you could remove that check? If it is necessary, could you point me to the documentation as to why? Or maybe could you document why, if it isn't already?
called `Result::unwrap()` on an `Err` value: Custom { kind: InvalidData, error: "Collections of zero-sized types are not allowed due to deny-of-service concerns on deserialization." }
Specifically the
due to deny-of-service concerns on deserialization.
I'm not deserializing, the check already exists on deserialization, preventing the attack.
The text was updated successfully, but these errors were encountered:
to notify early that deserialization won't be possible . We want to primarily support A -> serialized form -> A cases,
not variations of arbitrary B -> serialized form -> C. A notable exception which was done in the lib is support of some cases of A -> serialized form -> B, where B: Borrow<A>.
If you feel like contributing a short section to doc anywhere you like, it would be most welcome.
I understand the issue with deserializing a
Vec<ZST>
, (#52 and #19), but if I'm not mistaken, there is no such attack on the serialization side.It seems unnecessary to do the ZST check for serialization. If it is unnecessary, what are the chances you could remove that check? If it is necessary, could you point me to the documentation as to why? Or maybe could you document why, if it isn't already?
This just seems wrong to me:
Specifically the
I'm not deserializing, the check already exists on deserialization, preventing the attack.
The text was updated successfully, but these errors were encountered: