Commit Graph

7331 Commits

Author SHA1 Message Date
DavidKorczynski 3930a7c522
jsonschema: refine build to enable coverage (#7835)
This follows https://github.com/python-jsonschema/jsonschema/pull/965
2022-06-09 14:39:28 +01:00
DavidKorczynski f9b1e71abd
infra: fix env checking in base-builder (#7833)
Ref: https://github.com/google/oss-fuzz/pull/7828#discussion_r893332700
2022-06-09 09:07:23 -04:00
Navidem 291956b501
Set flags to use old pass manger (#7828)
* Set flags to use old pass manger

* nit

* Add comment to Dockerfile

* More informative comment

* nit
2022-06-09 19:39:25 +10:00
Dongge Liu 605122c506
Allow searching for the binary to execute in `$PATH` (#7832)
Allow searching for the binary to execute in $PATH
2022-06-09 19:25:57 +10:00
Dongge Liu ddf48c9a74
A PoC of `execSan` with `pytorch-lightning-1.5.10` (#7827)
* A PoC of `execSan` with `pytorch-lightning-1.5.10`
2022-06-09 14:22:41 +10:00
jonathanmetzman 4734e40832
[trial_build] Fix bugs (#7764)
* Fix bugs

1. Don't try to build the script name as a project.
2. Add a flag to force builds of projects that previously failed.
3. Make sure we build projects from our PR branch.
4. Wait on all builds not just builds of the last type.
5. Don't use test bucket for corpus or coverage (will corpus work or fail because of creds?)

Add tests for these features.
2022-06-08 21:59:06 -04:00
Dario Castañé c1cfb6a3e2
mergo: initial integration (#7801) 2022-06-08 17:36:01 -04:00
balteravishay eb7bb2f6a0
[presidio] initial integration (#7783)
initial commit
2022-06-08 17:35:21 -04:00
Catena cyber 8c13dba829
ngolo: applies special patches (#7824)
for instance for image/jpeg which needs DecodeConfig
before Decode is called, otherwise arbitrary allocation is
possible
2022-06-08 22:24:32 +01:00
Evgeny Vereshchagin 79f4ed33d9
infra: allow passing architecture=i386 to CIFuzz (#7779)
to mostly make sure that fuzz targets are buildable with
architecture=i386. Ideally CIFuzz should also download the
latest corpora using the "clusterfuzz-builds-i386" links but
it kind of works even without that.

It was tested in https://github.com/evverx/oss-fuzz/pull/13
by pointing https://github.com/evverx/systemd/pull/110 to
that fork of the oss-fuzz repository. To judge from
https://github.com/evverx/systemd/actions/runs/2406321298 it
seems to be working more or less. The "i386" job failed there
because 89b6a3f13e
to test "i386" as much as possible.
2022-06-08 15:15:27 -04:00
Mihai Maruseac 11f2e698c0
Update TensorFlow emails (for both projects) (#7822)
* Update TensorFlow OSSFuzz people.

Amit leaves Google. Keep the two repositories in sync.

* Update TensorFlow emails (2 projects)

Since I left TF, moving to primary another person in TF Security team.
Also adding another TF Security team member to CC, as well as myself.

Will probably send new updates as new members join :)
2022-06-08 13:49:41 -04:00
jonathanmetzman 2760cb8564
Opt out of allstar binary artifacts check (#7816)
These binaries are necessary and are only run during testing.
Fixes https://github.com/google/oss-fuzz/issues/7802
2022-06-08 09:37:08 -04:00
DavidKorczynski 2c3c4c31c7
glom: initial integration (#7734) 2022-06-08 10:40:24 +01:00
DavidKorczynski 42b47a8b5f
croniter: initial integration (#7753)
croniter: initialer integration
2022-06-08 10:39:30 +01:00
DavidKorczynski 1bec680cad
psqlparse: initial integration (#7724) 2022-06-08 10:38:38 +01:00
Mark Wodrich 67c713bcd6
Update usrsctp auto_ccs (remove Googlers) (#7817)
remove Googlers from usrsctp auto_ccs
2022-06-08 10:37:22 +01:00
Oliver Chang c01ac9a2c2
Enable github issue filing in new projects. (#7810) 2022-06-08 11:47:51 +10:00
Adi (Suissa) Peleg 44e3609168
envoy: updating members list (#7770)
Signed-off-by: Adi Suissa-Peleg <adip@google.com>
2022-06-07 21:37:24 +01:00
DavidKorczynski 5f5163795a
pycrypto: extend fuzzing suite (#7815) 2022-06-07 18:35:54 +01:00
Adi (Suissa) Peleg 97d0732562
envoy: Limiting number of targets in CI (#7809)
* envoy: Limiting number of targets in CI

Signed-off-by: Adi Suissa-Peleg <adip@google.com>

* Removing another target

Signed-off-by: Adi Suissa-Peleg <adip@google.com>
2022-06-07 18:03:19 +01:00
Elias Naur 9e0dd4c311
projects/cosmos-sdk: use main branch (#7814)
The cosmos-sdk fuzz tests have been merged to the main branch in
https://github.com/cosmos/cosmos-sdk/pull/12152 .
2022-06-07 16:30:01 +01:00
psy f96a9ca1d3
spring-boot: fix missing folder for jdk17 (#7813)
Fix missing folder for jdk17
2022-06-07 14:40:05 +01:00
DavidKorczynski e36b080f59
ansible: extend fuzzers (#7811)
* ansible: rename fuzzers

* ansible: add encryption fuzzer
2022-06-07 10:54:40 +01:00
DavidKorczynski 14340a4277
janet: fix build (#7812)
Following
c9f33bbde0
2022-06-07 10:54:11 +01:00
Dongge Liu 639cc9588e
Execsan syntax error (minor fixes) (#7806)
* Removes the `: ` prefix in our previous pattern to capture case ii and reduce false negatives:
   1. Our previous pattern (i.e. `: Syntax error`) is designed to reduce false positives, but it relies on `dash` to print out an error message within one `write` syscall. E.g. `sh: 1: Syntax error: "invalid_command" unexpected`.
   2. In some cases, `dash` breaks the message into multiple `write` syscalls. E.g. it invokes 2 `writes` whose buffers respectively contain `sh: 1:`, ` Syntax error: "invalid_command" unexpected`.

* Fix outdated wording

* A TODO about using more specific patterns of error messages
2022-06-07 11:50:30 +10:00
Henry Lin 4eb1930dda
Tomcat: initial integration (#7790)
Initial integration
2022-06-07 11:34:49 +10:00
afosscontact 69fcf0a86f
opencv: new Fuzzer for readNetFromTensorflow (#7781)
* opencv: new Fuzzer for readNetFromTensorflow

* Add license.

* Fix. Use buffer instead of filepath to call readNetFromTensorflow.

* Fix. Fuzzing only readNetFromTensorflow function.
2022-06-07 11:34:11 +10:00
Catena cyber 09c104b9a8
ngolo-fuzzing: try to get coverage (#7808)
By removing runtime target which times out the whole coverage
2022-06-06 20:58:57 +00:00
DavidKorczynski 4fe3b59a60
gdk-pixbuf: fix build (#7807)
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47473
2022-06-06 12:01:35 +01:00
Dongge Liu 62f034e81d
Detect shell injection based on syntax errors (#7795)
* Remove redundant tripwire from Makefile

* Detect shell corruption based on syntax errors

* Type, name, format, typo, etc.

* Error pattern matching logic

* clang-format

* Code structure fix

* Extend the pathname length of shell to be safe

* Remove redundant operations on memory read from regs

* More specific patterns

* Identify sh

* Remove redudant substr

* Document shell corruption in README.md

* Clang-format

* Organise printf/debug_log/cerr

* Remove a completed TODO

* Use readlink instead of `file`

* Clang-format
2022-06-06 14:14:01 +10:00
Navidem ae83c88a54
Upgrade infra and projects to go1.18 (#7791)
* Replace go get with go install in the scritp

* Remove go get from projects

* Replace gotip with go

* Fix CI

* Add missing dependency for cryptofuzz
2022-06-06 11:31:04 +10:00
Cyril Tovena f99ec824ca
Update logql package location (#7399) 2022-06-03 11:32:27 +01:00
Catena cyber 258dec7e31
ngolo-fuzzing: use DNDEBUG for libprotobufmutator fuzzer (#7792)
* ngolo-fuzzing: use DNDEBUG for libprotobufmutator fuzzer

* ngolo-fuzzing: temporary workaround to work with latest go
2022-06-03 10:27:58 +01:00
Arthur Chan 5af82b8e38
ansible: initial integration (#7732)
* ansible: initial integration
initial fuzzer setup
2022-06-02 16:59:18 +01:00
Navidem 863f16e280
Give introspector builds a timeout same as other builds (#7794)
Give introspector buids same TO
2022-06-02 10:32:01 -05:00
Kobrin Eli d533911bf3
[tensorflow] Fix libfuzzer-undefined build. (#7780) 2022-06-01 22:28:21 -04:00
Alan32Liu 5c56efe1c2 Revert "Remove redundant tripwire from Makefile"
This reverts commit 514d2928bd.
2022-06-02 11:10:41 +10:00
Alan32Liu 3cb7bae824 Revert "Detect shell corruption based on syntax errors"
This reverts commit 5bb187777b.
2022-06-02 11:10:32 +10:00
Alan32Liu 5bb187777b Detect shell corruption based on syntax errors 2022-06-02 11:05:03 +10:00
Alan32Liu 514d2928bd Remove redundant tripwire from Makefile 2022-06-02 10:44:40 +10:00
Navidem d8a7e45314
Remove unnecessary step in fuzz introspector (#7793)
Remove unncessary step in fuzz introspector
2022-06-01 18:00:22 -05:00
Brandon Weeks c065902ddd
go-attestation: fix build (#6988) 2022-06-01 20:34:13 +01:00
DavidKorczynski dc435d0be5
infra: set fuzz-introspector to work with O0 (#7788)
-O0 will skip fuzz-introspector when -flegacy-pass-manager is used, but
not when the new pass manager is used.
2022-06-01 16:52:21 +01:00
Arthur Chan 4a879e62d4
airflow-py: initial integration (#7731)
* airflow-py: initial integration
initial fuzzer setup

* Fix fuzzer
2022-06-01 09:42:09 +01:00
DavidKorczynski 9f6368db95
google-py-crc32c: initial integration (#7742) 2022-06-01 09:41:07 +01:00
Oliver Chang 2af5e25a48
Print sanitizer stacktrace for execSan bugs. (#7782)
Send SIGABRT to the root process being fuzzed to generate a stacktrace.

Also distinguish between syscall enter and exit.
2022-06-01 08:57:27 +10:00
Evgeny Vereshchagin a4befa22a0
[base-runner] no longer fail silently in test_one.py (#7776)
It should make it easier to figure out why exactly
`./infra/helper.py check_build project fuzz-target` fails
by turning
```
INFO: performing bad build checks for /tmp/not-out/tmpa4lph9dr/fuzz-bus-message
ERROR:root:Check build failed.
```
into something like
```
INFO: performing bad build checks for /tmp/not-out/tmpa4lph9dr/fuzz-bus-message
BAD BUILD: /tmp/not-out/tmpa4lph9dr/fuzz-bus-message seems to have either startup crash or exit:
/tmp/not-out/tmpa4lph9dr/fuzz-bus-message -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null
/tmp/not-out/tmpa4lph9dr/fuzz-bus-message: error while loading shared libraries: libcap.so.2: cannot open shared object file: No such file or directory

ERROR:root:Check build failed.
```
2022-05-31 17:07:52 -04:00
DavidKorczynski 1beea533a6
infra: bump fuzz-introspector (#7774)
* infra: bump fuzz-introspector

Bump includes the upgrades:
- calltree overview image improvements:
https://github.com/ossf/fuzz-introspector/pull/284
- UI improvements in calltree page:
https://github.com/ossf/fuzz-introspector/pull/277
- Branch-blocker logic:
https://github.com/ossf/fuzz-introspector/pull/269
- Bug fix: https://github.com/ossf/fuzz-introspector/pull/261

* bump
2022-05-31 11:56:25 -05:00
DavidKorczynski a72b785e95
pyxdg: refine build and extend fuzzers (#7786)
Adds 3 new fuzzers and build pyxdg by way of pip3 install rather than
python3 setup.py
2022-05-31 17:33:25 +01:00
DavidKorczynski f0f58d51ee
aiohttp: add web_http request fuzzer (#7785)
* aiohttp: add web_http request fuzzer

* nit
2022-05-31 13:01:29 +01:00