mirror of https://github.com/google/oss-fuzz.git
qubes-os: add fuzzers, update contact emails (#3554)
Qrexec [1] is a secure communication channel between virtual machines in Qubes OS. We have fuzzers for some parts of its message parsing code [2]. [1] https://www.qubes-os.org/doc/qrexec/ [2] https://github.com/QubesOS/qubes-core-qrexec/tree/master/fuzz
This commit is contained in:
parent
3166399f80
commit
0584ab45df
|
@ -21,8 +21,10 @@ RUN apt-get update && apt-get -y install build-essential automake libtool git py
|
|||
|
||||
WORKDIR qubes-os
|
||||
|
||||
RUN git clone --single-branch https://github.com/QubesOS/qubes-app-linux-input-proxy $SRC/qubes-os/app-linux-input-proxy
|
||||
RUN git clone --single-branch https://github.com/QubesOS/qubes-app-linux-input-proxy $SRC/qubes-os/app-linux-input-proxy
|
||||
|
||||
RUN git clone --single-branch https://github.com/QubesOS/qubes-core-qubesdb $SRC/qubes-os/qubes-core-qubesdb
|
||||
|
||||
RUN git clone --single-branch https://github.com/QubesOS/qubes-core-qrexec $SRC/qubes-os/qubes-core-qrexec
|
||||
|
||||
COPY build.sh *.options $SRC/
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
|
||||
if [ "$SANITIZER" != 'undefined' ]; then
|
||||
cd $SRC/qubes-os/app-linux-input-proxy
|
||||
|
||||
|
||||
make -C fuzz
|
||||
cp fuzz/*_fuzzer $OUT/
|
||||
cp fuzz/*_seed_corpus.zip $OUT/
|
||||
|
@ -30,3 +30,10 @@ make -C fuzz
|
|||
cp fuzz/*_fuzzer $OUT/
|
||||
cp fuzz/*_seed_corpus.zip $OUT/
|
||||
cp fuzz/*.options $OUT/
|
||||
|
||||
cd $SRC/qubes-os/qubes-core-qrexec
|
||||
|
||||
make -C fuzz
|
||||
cp fuzz/*_fuzzer $OUT/
|
||||
cp fuzz/*_seed_corpus.zip $OUT/
|
||||
cp fuzz/*.options $OUT/
|
||||
|
|
|
@ -2,9 +2,8 @@ homepage: "https://www.qubes-os.org/"
|
|||
language: c++
|
||||
primary_contact: "jpo@vt.edu"
|
||||
auto_ccs:
|
||||
- "joanna@invisiblethingslab.com"
|
||||
- "marmarek@invisiblethingslab.com"
|
||||
- "paras.chetal@gmail.com"
|
||||
- "pawel@invisiblethingslab.com"
|
||||
fuzzing_engines:
|
||||
- libfuzzer
|
||||
- afl
|
||||
|
|
Loading…
Reference in New Issue