Evgeny Vereshchagin
55c912c9c7
[systemd] report OSS-Fuzz bugs on GitHub as well ( #7510 )
...
It should hopefully make it easier to keep track of them.
It was discussed in https://github.com/google/oss-fuzz/issues/7023
2022-04-05 14:44:59 -04:00
Yaroslav Lobankov
e71b32c79c
Consider submodules while commit and PR checkout ( #7500 )
...
This fix includes a few updates for infra/repo_manager.py:
* Add step for updating submodules while commit checkout
* Add step for updating submodules while PR checkout
Fixes #7493
2022-04-05 11:14:39 -04:00
Petr Menšík
909a0d7ed3
Attempt to fix insufficient extract_name buffer ( #7293 )
...
* Attempt to fix insufficient extract_name buffer
Some fuzzing failures happen because extract_name always uses in real
dnsmasq code daemon->namebuff of size at least MAXDNAME. Provide long
enough data also to fuzzed functions.
* Add myself as an interested party
Being dnsmasq maintainer in Fedora project and RHEL, I am interested in
new found failures. Especially when security related.
* Allocate full dhcp packet buffer
fuzz_dhcp can fail in clear packet. But that fails, because clear packet
always cleans whole buffer of maximal DHCP packet. But fuzzer allocates
less. Fix fuzzer to allocate similar memory as dhcp_common_init()
function of real dnsmasq.
2022-04-05 02:07:30 +00:00
Navidem
b3b6f748cc
Fuzz JBIG2 code by checking on each object in PDF file ( #7508 )
2022-04-04 17:54:35 -07:00
DavidKorczynski
8bad6b2c75
infra: make per-target coverage reports readable ( #7505 )
...
Similar to the main report make all target reports readable. This is
currently a blocker on fuzz-introspector for running locally.
2022-04-04 23:39:16 +01:00
DavidKorczynski
0bcaec68ab
infra: fuzz-introspector: ensure COVERAGE_URL exists ( #7502 )
...
* infra: fuzz-introspector: ensure COVERAGE_URL exists
This is to make sure fuzz-introspector can run in local builds.
Ref:
https://github.com/ossf/fuzz-introspector/issues/48#issuecomment-1087513497
Ref:
https://github.com/ossf/fuzz-introspector/issues/67#issuecomment-1087518856
* refactor fuzz-introspector command generation
This is to shorten the long line that runs fuzz-introspector and also in
anticipation that down the line we will have more oss-fuzz specific
commands in fuzz-introspector
2022-04-04 23:38:37 +01:00
jonathanmetzman
696a4dd4e5
Setup trial builds in CI. ( #7415 )
...
This adds the script that will be used by the GCB trigger to do trial builds when we have a base-images change.
2022-04-04 17:47:21 -04:00
Roman Wagner
1839964003
[woodstox] update copyright info ( #7504 )
2022-04-04 17:46:51 -04:00
Roman Wagner
fbeb8fb984
[woodstox] Initial Integration ( #7499 )
2022-04-04 09:12:43 -04:00
DavidKorczynski
77bad6cbdb
tensorflow-py: fix build ( #7501 )
2022-04-04 13:03:56 +01:00
DavidKorczynski
4ff34a956e
infra: fuzz-introspector updates and bump ( #7497 )
...
* infra: remove use of git_repo_url to fuzz-introspector
* libarchive,fluent-bit: add fuzz-introspector exclusion config
* fuzz-introspector: bump
Co-authored-by: Oliver Chang <oliverchang@users.noreply.github.com>
2022-04-04 11:35:58 +10:00
Navidem
10fdf2878d
To include latest introspector changes ( #7494 )
2022-04-03 14:08:09 -04:00
Catena cyber
4ae09c2ac2
ngolo-fuzzing: use latest go from git ( #7490 )
2022-04-02 22:05:24 +01:00
Kevin Backhouse
43da75fcc0
Add @piponazo to Exiv2 auto_ccs ( #7496 )
2022-04-02 22:03:39 +01:00
Nathan Moinvaziri
1556fb10d6
[zlib-ng] build fixes and improvements ( #7467 )
...
* [zlib-ng] fixed dataflow sanitizer build error. #7464
* [zlib-ng] use cmake instead of configure to build fuzzers.
2022-04-01 15:05:01 +11:00
Fabian Meumertzheim
4aeb753191
Revert "Pin Jazzer to older revision. ( #7484 )" ( #7486 )
...
This reverts commit 86a4d9d11f
.
The build issue has been fixed on Jazzer's main branch.
2022-04-01 15:04:34 +11:00
Dave Rodgman
7f8fe932ca
Mbed TLS: update references to old Github org ( #7487 )
...
Replace references to ARMmbed organisation with the new
org, Mbed-TLS, following project migration. The new home
for Mbed TLS is:
https://github.com/Mbed-TLS
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
2022-03-31 16:42:43 +00:00
Julien Voisin
d527319cf1
Fix possible uninitialized values in zlib's compress.c fuzzer ( #7488 )
...
Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-03-31 10:19:26 -04:00
Julien Cretin
87554e18a8
Add OpenSK member ( #7485 )
2022-03-31 09:55:25 -04:00
Oliver Chang
221b39181a
Bump introspector ( #7482 )
2022-03-31 17:13:04 +11:00
Oliver Chang
86a4d9d11f
Pin Jazzer to older revision. ( #7484 )
2022-03-31 15:54:50 +11:00
Oliver Chang
8d55f22548
Fix libarchive build. ( #7481 )
...
Set --enable-static for libxml2. This was set to false by default in a
recent commit
2022-03-31 13:52:59 +11:00
Julien Voisin
e3aaf609aa
Improve a bit the coverage of libraw's fuzzer ( #7478 )
...
Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-03-30 19:32:02 -04:00
tsdgeos
e3d89bccaf
libical: Add Ken Murchison ( #7480 )
2022-03-30 19:25:52 -04:00
jonathanmetzman
9f236c1c9c
Update new_project_guide.md ( #7477 )
2022-03-30 10:43:25 -04:00
Oliver Chang
f1a882a076
Update zlib URL ( #7474 )
...
* Update zlib URL
Per #7468
* Update Dockerfile
2022-03-30 10:14:46 -04:00
Rob Mohr
c8e84159db
pigweed: Update team list and website ( #7414 )
...
Co-authored-by: asraa <asraa@google.com>
2022-03-30 10:13:59 -04:00
Navidem
b4dcddf1ee
Check for non-null baseStream ( #7476 )
2022-03-30 02:14:32 +00:00
Navidem
c13fa231dc
Fuzzing for JBIG2 streams ( #7475 )
2022-03-30 12:57:32 +11:00
DavidKorczynski
fe93ec53c8
infra: bump fuzz-introspector ( #7471 )
...
Following fix of https://github.com/ossf/fuzz-introspector/issues/154
2022-03-29 16:33:51 -07:00
MacroFake
528d0810f2
bitcoin-core: Fix msan ( #7472 )
2022-03-29 16:50:42 -04:00
Liviu Chircu
e48b906242
opensips: Add support for -DFUZZ_BUILD ( #7469 )
...
OpenSIPS runs on a custom memory allocator, which makes use of a
pre-allocated, large heap chunk, so buffer read overflows are harmless
and allow for some SIP parsing optimizations.
By enabling FUZZ_BUILD for the fuzzer runs, we add extra runtime checks,
so the fuzzer should no longer crash due to ASan detecting
false-positive buffer read overflows in the SIP parser.
2022-03-29 20:26:30 +01:00
Evgeny Vereshchagin
d94ac89d00
[elfutils] always build zlib ( #7470 )
...
* [elfutils] always build zlib
to make sure all the fuzz targets use the same version of zlib
* [elfutils] switch to the latest version of zlib
2022-03-29 10:55:54 -04:00
jonathanmetzman
1abbd8bf08
Revert "Fix run_fuzzers_test::CoverageReportIntegrationTest. ( #7325 )" ( #7466 )
...
This reverts commit 9553ab10d7
.
2022-03-29 14:46:36 +11:00
Dongge Liu
090c5fc586
Add a scarecrow project to test GitHub issue filing/closing ( #7437 )
...
* Add a scarecrow project to test github issue filing/closing
* Add file_github_issue as a new valid section name
2022-03-29 08:59:43 +11:00
Li-Yu Yu
c462cad1be
cras: Disable featured in configure ( #7456 )
...
featured [1] is a ChromeOS specific daemon that's not available in gcr.io/oss-fuzz-base/base-builder-rust
Disable it to fix the build [2].
[1] https://chromium.googlesource.com/chromiumos/platform2/+/HEAD/featured/
[2] https://crbug.com/oss-fuzz/45744
2022-03-28 18:54:10 +00:00
Julien Voisin
d5cb28fb0c
Increase a bit zlib's compress fuzzer coverage ( #7465 )
...
Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-03-28 14:47:47 -04:00
Evgeny Vereshchagin
56e0158135
[elfutils] bring MSan back ( #7460 )
...
Now that all the false positives are gone and MSan reports real
issues like https://sourceware.org/bugzilla/show_bug.cgi?id=29000
confirmed by Valgrind it should be safe to bring MSan back.
It reverts 6e6d6068ae
2022-03-28 14:47:26 -04:00
Guido Vranken
a36be92ad9
[Nettle] Enable MSAN ( #7463 )
...
* [Nettle] Enable MSAN
* [Nettle] Add main_repo section
2022-03-28 14:47:01 -04:00
jonathanmetzman
7be7db9e50
Remove jinja2, no longer used ( #7452 )
2022-03-28 14:46:04 -04:00
Florian Apolloner
eeb2d1fbf8
[django] Fixed pyinstaller creation to include neccessary translations. ( #7458 )
2022-03-28 14:45:30 -04:00
Daniel Novomeský
981efa8d32
kimageformats: upgrade libaom dependency ( #7461 )
2022-03-28 13:19:10 -04:00
Catena cyber
4d723ba451
Adds ngolo-fuzzing project ( #7372 )
...
* Adds ngolo-fuzzing project
* fixup use exclude.txt from upstream repo
* summary in the end
* hard fail on supported packages
* exact package match
2022-03-28 12:50:46 -04:00
Navidem
b748536b39
Revert "infra: fuzz-introspector: force no inline ( #7413 )" ( #7455 )
...
* Revert "infra: fuzz-introspector: force no inline (#7413 )"
This reverts commit ba7f8eb9bf
.
* put back no function inlining
2022-03-24 18:58:45 -07:00
Wan-Teh Chang
b016b8f3fe
libavif: go back to using dav1d.cmd to build dav1d ( #7454 )
...
It is no longer necessary to use dav1d_oss_fuzz.sh.
2022-03-24 19:24:15 -04:00
jonathanmetzman
acd32966b9
Make CI build experimental jobs. ( #7433 )
...
Fixes https://github.com/google/oss-fuzz/issues/7432
2022-03-24 18:54:45 +00:00
dependabot[bot]
3a216f4e7a
build(deps): bump actions/setup-python from 2 to 3 ( #7438 )
...
Bumps [actions/setup-python](https://github.com/actions/setup-python ) from 2 to 3.
- [Release notes](https://github.com/actions/setup-python/releases )
- [Commits](https://github.com/actions/setup-python/compare/v2...v3 )
---
updated-dependencies:
- dependency-name: actions/setup-python
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-03-24 13:29:23 -04:00
jonathanmetzman
df0e13ebda
Remove dependabot ( #7453 )
2022-03-24 11:40:31 -04:00
dependabot[bot]
e1b93ba81b
build(deps): bump pyyaml from 5.4 to 6.0 in /infra/ci ( #7439 )
...
Bumps [pyyaml](https://github.com/yaml/pyyaml ) from 5.4 to 6.0.
- [Release notes](https://github.com/yaml/pyyaml/releases )
- [Changelog](https://github.com/yaml/pyyaml/blob/master/CHANGES )
- [Commits](https://github.com/yaml/pyyaml/compare/5.4...6.0 )
---
updated-dependencies:
- dependency-name: pyyaml
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-03-24 15:32:37 +00:00
dependabot[bot]
22c78b9fbb
build(deps): bump yapf from 0.30.0 to 0.32.0 in /infra/ci ( #7443 )
...
Bumps [yapf](https://github.com/google/yapf ) from 0.30.0 to 0.32.0.
- [Release notes](https://github.com/google/yapf/releases )
- [Changelog](https://github.com/google/yapf/blob/main/CHANGELOG )
- [Commits](https://github.com/google/yapf/compare/v0.30.0...v0.32.0 )
---
updated-dependencies:
- dependency-name: yapf
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-03-24 10:41:36 -04:00