mirror of
https://github.com/stefanberger/libtpms
synced 2026-01-09 14:11:36 +00:00
The new TPM 2 code casts bigNum's to Crypt_Int, which has an array 'd' of type 'crypt_uword_t[2]' which then leads to the following types of errors that we haven't found another solution for so far. Running: /mnt/scratch0/clusterfuzz/bot/inputs/fuzzer-testcases/crash-2675de6341d4e056d04ab49179b8e5b8bd456589 /src/libtpms/src/tpm2/crypto/openssl/CryptPrime.c:377:20: runtime error: index 23 out of bounds for type 'crypt_uword_t[2]' (aka 'unsigned long[2]') #0 0x5b4196 in RsaAdjustPrimeCandidate_New libtpms/src/tpm2/crypto/openssl/CryptPrime.c:377:20 #1 0x5b4196 in RsaAdjustPrimeCandidate libtpms/src/tpm2/crypto/openssl/CryptPrime.c:405:9 #2 0x5b4366 in TpmRsa_GeneratePrimeForRSA libtpms/src/tpm2/crypto/openssl/CryptPrime.c:454:6 #3 0x590953 in CryptRsaGenerateKey libtpms/src/tpm2/crypto/openssl/CryptRsa.c:1433:9 Signed-off-by: Stefan Berger <stefanb@linux.ibm.com> |
||
|---|---|---|
| .. | ||
| corpus-execute-command | ||
| base64decode.c | ||
| base64decode.sh | ||
| common | ||
| freebl_sha1flattensize.c | ||
| fuzz-main.c | ||
| fuzz.cc | ||
| fuzz.sh | ||
| Makefile.am | ||
| nvram_offsets.c | ||
| oss-fuzz.sh | ||
| run-fuzzer.sh | ||
| tpm2_createprimary.c | ||
| tpm2_createprimary.sh | ||
| tpm2_cve-2023-1017.c | ||
| tpm2_cve-2023-1017.sh | ||
| tpm2_cve-2023-1018.c | ||
| tpm2_cve-2023-1018.sh | ||
| tpm2_pcr_read.c | ||
| tpm2_pcr_read.sh | ||
| tpm2_run_test.sh | ||
| tpm2_selftest.c | ||
| tpm2_selftest.sh | ||