Fix capacity overflow on invalid zips reads
Preemptively allocating structures with the number of reported files can lead to trouble as an invalid zip can still have a valid central directory end that is fed into a `with_capacity` causing it to overflow. This commit introduces a heuristic that will use the reported number of files as long as the number is less than the cde offset. Benchmarks were unaffected by this change.
This commit is contained in:
parent
7f424a7ffe
commit
03613cb56e
3 changed files with 42 additions and 2 deletions
44
src/read.rs
44
src/read.rs
|
@ -408,8 +408,16 @@ impl<R: Read + io::Seek> ZipArchive<R> {
|
|||
let (archive_offset, directory_start, number_of_files) =
|
||||
Self::get_directory_counts(&mut reader, &footer, cde_start_pos)?;
|
||||
|
||||
let mut files = Vec::with_capacity(number_of_files);
|
||||
let mut names_map = HashMap::with_capacity(number_of_files);
|
||||
// If the parsed number of files is greater than the offset then
|
||||
// something fishy is going on and we shouldn't trust number_of_files.
|
||||
let file_capacity = if number_of_files > cde_start_pos as usize {
|
||||
0
|
||||
} else {
|
||||
number_of_files
|
||||
};
|
||||
|
||||
let mut files = Vec::with_capacity(file_capacity);
|
||||
let mut names_map = HashMap::with_capacity(file_capacity);
|
||||
|
||||
if reader.seek(io::SeekFrom::Start(directory_start)).is_err() {
|
||||
return Err(ZipError::InvalidArchive(
|
||||
|
@ -1267,4 +1275,36 @@ mod test {
|
|||
);
|
||||
}
|
||||
}
|
||||
|
||||
/// test case to ensure we don't preemptively over allocate based on the
|
||||
/// declared number of files in the CDE of an invalid zip when the number of
|
||||
/// files declared is more than the alleged offset in the CDE
|
||||
#[test]
|
||||
fn invalid_cde_number_of_files_allocation_smaller_offset() {
|
||||
use super::ZipArchive;
|
||||
use std::io;
|
||||
|
||||
let mut v = Vec::new();
|
||||
v.extend_from_slice(include_bytes!(
|
||||
"../tests/data/invalid_cde_number_of_files_allocation_smaller_offset.zip"
|
||||
));
|
||||
let reader = ZipArchive::new(io::Cursor::new(v));
|
||||
assert!(reader.is_err());
|
||||
}
|
||||
|
||||
/// test case to ensure we don't preemptively over allocate based on the
|
||||
/// declared number of files in the CDE of an invalid zip when the number of
|
||||
/// files declared is less than the alleged offset in the CDE
|
||||
#[test]
|
||||
fn invalid_cde_number_of_files_allocation_greater_offset() {
|
||||
use super::ZipArchive;
|
||||
use std::io;
|
||||
|
||||
let mut v = Vec::new();
|
||||
v.extend_from_slice(include_bytes!(
|
||||
"../tests/data/invalid_cde_number_of_files_allocation_greater_offset.zip"
|
||||
));
|
||||
let reader = ZipArchive::new(io::Cursor::new(v));
|
||||
assert!(reader.is_err());
|
||||
}
|
||||
}
|
||||
|
|
Binary file not shown.
Binary file not shown.
Loading…
Add table
Reference in a new issue