diff options
author | Nick Mathewson <nickm@torproject.org> | 2017-11-11 14:42:39 -0500 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2017-11-11 14:44:45 -0500 |
commit | a7ca71cf6b2fb46b049442569188ce046cfd6c34 (patch) | |
tree | 371524ee86ff1266006f49255c98896e6b778bd0 /changes/bug24247 | |
parent | 512dfa15edf9723cb5bfa2b86d5658e320496445 (diff) | |
download | tor-a7ca71cf6b2fb46b049442569188ce046cfd6c34.tar.gz tor-a7ca71cf6b2fb46b049442569188ce046cfd6c34.zip |
Fix mock_crypto_pk_public_checksig__nocheck() to handle short RSA keys
This function -- a mock replacement used only for fuzzing -- would
have a buffer overflow if it got an RSA key whose modulus was under
20 bytes long.
Fortunately, Tor itself does not appear to have a bug here.
Fixes bug 24247; bugfix on 0.3.0.3-alpha when fuzzing was
introduced. Found by OSS-Fuzz; this is OSS-Fuzz issue 4177.
Diffstat (limited to 'changes/bug24247')
-rw-r--r-- | changes/bug24247 | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/changes/bug24247 b/changes/bug24247 new file mode 100644 index 0000000000..1f4ddcdde2 --- /dev/null +++ b/changes/bug24247 @@ -0,0 +1,6 @@ + o Minor bugfixes (fuzzing): + - Fix a bug in our fuzzing mock replacement for crypto_pk_checksig(), to + correctly handle cases where a caller gives it an RSA key of under 160 + bits. (This is not actually a bug in Tor itself, but wrather in our + fuzzing code.) Fixes bug 24247; bugfix on 0.3.0.3-alpha. + Found by OSS-Fuzz as issue 4177. |