This commit is contained in:
Tony Torralba 2024-03-07 15:22:46 +01:00
Родитель 7d74125508
Коммит 138ce42cf6
1 изменённых файлов: 2 добавлений и 2 удалений

Просмотреть файл

@ -19,12 +19,12 @@
of size <code>n</code> without further verification, potentially exhausting all the available
memory.</p>
<sample src="UncontrolledAllocationSize.go" />
<sample src="UncontrolledAllocationSizeBad.go" />
<p>One way to prevent this vulnerability is by implementing a maximum allowed value for the
user-controlled input, as seen in the following example:</p>
<sample src="UncontrolledAllocationSize.go" />
<sample src="UncontrolledAllocationSizeGood.go" />
</example>
<references>