Commit Graph

9024 Commits

Author SHA1 Message Date
DavidKorczynski 239874207a
java projects: switch Maven link to permalink to fix build issues (#9947)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-03-20 11:28:00 -04:00
DavidKorczynski 2e2209588c
six: initial integration (#9961)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-03-20 11:25:09 -04:00
jesslatimer d43dc77d31
markupsafe: adds additional functions to fuzzer (#9954)
Improves code coverage by fuzzing:
- striptags
- format
2023-03-20 11:24:20 -04:00
Harish Mahendrakar 5a01fa461c
[libavc, libhevc, libmpeg2]: update auto_ccs (#9956)
Added few contributors to auto_ccs
2023-03-20 11:23:42 -04:00
Niklas Gögge a5e6fd38f5
bitcoin: Add niklas to email cc list (#9953) 2023-03-20 11:21:34 -04:00
Jia Tan 6403e93344
XZ updates (#9960)
Let me know if you would rather have the commits squashed into one, or
separated into multiple PRs. This should address:

- Changing the primary contact email address. This will give the XZ
Utils maintainers access to the filed bugs in the issue tracker since
the previous primary contact email address was not associated with a
Google account.
- Updated the main repository URL. The project recently moved to GitHub
as the main repository. The old repository will still be a mirror, but
it will be updated with a slight delay.
- Fixed [build
issue](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57241) by
adding an extra argument to the autogen.sh script.
2023-03-20 11:21:06 -04:00
Sean Gilligan ab523fb942
Fixing urllib3 port binding crash (#9958)
I've managed to recreate the issue that was stopping the `fuzz_requests`
coverage on `urllib3` ( see #9863 )

The issues not visible running introspector locally but can be see in
clusterfuzzlite which is a port binding error. This change randomises
the port that's used and ensures that it can bind to it before fuzzing
starts. Change is tested and demonstrated as working here
[sg3-141-592/urllib3 - ClusterFuzzLite PR
fuzzing](https://github.com/sg3-141-592/urllib3/actions/runs/4466205991/jobs/7844093473?pr=1).

Also I've changed the style of the main block and atheris to be
consistent with the other fuzzers added lately.
2023-03-20 11:09:52 -04:00
Sergey Bronnikov 8b6e3966c7
helper.py: make shell compatible with build_* (#9959)
`infra/helper.py shell project` used to open docker container with
different volumes mounted than `infra/helper.py build_fuzzers project`
Use the same logics in shell for project workdir calculation as it's
used during build procedure. This way we may easier troubleshoot build
issues in shell.
2023-03-20 11:09:24 -04:00
Sergey Bronnikov 80fe037a1d
tarantool: update building script (#9901)
Patch fixes building of upcoming LPM-based fuzzing tests: [1] and [2].

1. https://github.com/tarantool/tarantool/pull/7708
2. https://github.com/tarantool/tarantool/pull/7709
2023-03-20 11:04:25 -04:00
Guido Vranken 12d55ec698
[cryptofuzz] Fix SymCrypt MSAN issues (#9951) 2023-03-20 05:00:02 -07:00
Seth Michael Larson 6e4788aa3a
Add sean@compactcloud.co.uk to urllib3 project.yaml (#9952)
cc @DavidKorczynski @sg3-141-592
2023-03-19 18:27:49 +00:00
jesslatimer c9e3a82e3d
python-ecdsa: improves code coverage of fuzz_keys (#9911)
This change:

- fixes incorrect data type from string to byte in the `target4`
function.
- adds `SigningKey` fuzz targets to `fuzz_keys.py`.
2023-03-19 00:22:55 +00:00
DavidKorczynski 89436392c7
croniter: catch top-level exceptions (#9948)
The current exceptions caught are not the top-level croniter ones. This
changes it to be that.

Fixes, e.g.: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57122

Signed-off-by: David Korczynski <david@adalogics.com>
2023-03-18 13:29:23 +00:00
Alex Crichton dca8eca5c3
wasmtime: Allow Wasmtime to handle SIGFPE (#9945)
Recently Wasmtime switched code generator tactics for the implementation
of integer division. This means that Wasmtime expects to receive SIGFPE
for divide-by-zero traps and similar. This is similar to other signals
that Wasmtime is expected to handle in JIT code.

This commit adds an option for Wasmtime to let it handle signals in the
same manner that it's allowed to handle SIGILL and SIGSEGV currently.
2023-03-18 04:43:33 -07:00
Tatu Saloranta 34640bceec
Update Jackson branches to latest 2.x, 2.15 (from 2.14) (#9946)
As per title, development has moved to 2.15 from 2.14 for next version.
2023-03-18 04:42:49 -07:00
DavidKorczynski 832017c593
tensorflow: fix build (#9944)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-03-18 11:14:31 +00:00
Kevin Lubick a0dcc4c4cf
[skia] Use non-deprecated GN flag (#9939)
Result of http://review.skia.org/649523
2023-03-17 15:41:29 -07:00
Raphael Salas 5b07156a53
[xs] Add ps from Moddable (#9941)
As titled, adds another member of the Moddable team to allow reviewing
OSS-Fuzz stats.
2023-03-17 11:38:46 -07:00
Philippe Scorsolini b46fccd5f5
crossplane: add crossplane-runtime (#9917)
We moved a test case to crossplane-runtime, so we are going to also
build fuzzers from that repo.
Should wait for
https://github.com/crossplane/crossplane-runtime/pull/394 to be merged
before moving forward with this one.

Signed-off-by: Philippe Scorsolini <p.scorsolini@gmail.com>
2023-03-17 15:41:27 +00:00
AdamKorcz 42a8b50224
moby: fix broken build (#9938)
Signed-off-by: AdamKorcz <adam@adalogics.com>
2023-03-17 07:39:33 -07:00
AdamKorcz 2a3a1bb45f
compress: fix broken build (#9937)
Signed-off-by: AdamKorcz <adam@adalogics.com>
2023-03-17 06:33:04 -07:00
AdamKorcz 43ec92a973
istio: bump Go (#9936)
Bumps Go for Istio.

Signed-off-by: AdamKorcz <adam@adalogics.com>
2023-03-17 06:05:15 -07:00
DavidKorczynski c7463eeb1b
validators: remove APIs no longer supported (#9935) 2023-03-17 12:59:06 +00:00
Catena cyber 65b66c733c
ngolo: fix build even when there is no corpus (#9932)
This should fix build of ngolo-fuzzing even when the corpus for one
target is empty.

net/http does not give a corpus because of `use of internal package
net/http/internal not allowed` in the tests...
2023-03-16 14:51:43 -07:00
Will Jones 9df7263f34
Add Will Jones to arrow ccs (#9934)
I am a committer and PMC member of Arrow:
https://arrow.apache.org/committers/

See email as example from:

8732b27858
2023-03-16 13:19:29 -07:00
jonathanmetzman 3f304fc32d
Cifuzz upload fix (#9899) 2023-03-16 11:35:55 -04:00
AdamKorcz 027c588603
sigstore-java: initial integration (#9896)
Adds initial integration of the sigstore java client.

---------

Signed-off-by: AdamKorcz <adam@adalogics.com>
2023-03-16 10:37:13 +00:00
Lukasz Lenart affb17e85e
Apache Struts: Adds proper contact details (#9915)
Closes [WW-5291](https://issues.apache.org/jira/browse/WW-5291)
2023-03-16 19:36:02 +11:00
温绍锦 7d99a16dba
replace fatjson1 with fastjson2 (#9885) 2023-03-16 01:24:25 +00:00
DavidKorczynski a6263b73be
numactl: initial integration (#9877)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-03-15 15:56:45 +00:00
Arjun 264b67c943
[pjsip] Update for ideal integration (#9908)
`libssl-dev zlib1g-dev` are used for `Differential` fuzzing.

Issue
[57067](https://oss-fuzz-build-logs.storage.googleapis.com/log-787f7b85-e65f-48d9-9ff1-eb854c8c4ac1.txt)
can be fixed after merge.

My PR: https://github.com/pjsip/pjproject/pull/3430
2023-03-15 04:30:58 -07:00
Sean Gilligan 4325da9f17
Improving coverage for croniter (#9860)
`fuzz_iter.py`
- Added coverage of optional `hash_id` parameter
- Added call to `is_valid` method
- Added call to `get_next` & `get_prev` methods for the returned
croniter iterator

`fuzz_match.py`
- Added fuzzing of `croniter.match`

`fuzz_range.py`
- Added fuzzing of `croniter.range`
2023-03-15 03:42:13 -07:00
DavidKorczynski 72b70fe56e
fonttools: extend and clean-up (#9929)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-03-15 10:37:22 +00:00
neildhar 6ba23acc5b
Change email addresses to @meta.com (#9925)
Update email addresses, and remove an inactive email address.
2023-03-14 14:10:55 -07:00
DavidKorczynski a68462928a
fonttools: add maintainers (#9927)
Ref:
https://github.com/fonttools/fonttools/issues/3041#issuecomment-1468613631
Ref:
https://github.com/fonttools/fonttools/issues/3041#issuecomment-1468616607

CC @anthrotype @behdad
2023-03-14 18:33:25 +00:00
DavidKorczynski 39eebf89b2
configparser: catch another exception (#9924)
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=56168
2023-03-14 17:38:29 +00:00
AdamKorcz 0cace22082
kubernetes: wget and git clone in Dockerfile (#9922)
The git clone and wget calls have been removed from the build script.

Signed-off-by: AdamKorcz <adam@adalogics.com>
2023-03-14 10:37:48 -07:00
DavidKorczynski ab88810686
bottleneck: catch some known exceptions (#9923)
`ValueError` are raised various places, e.g.
ffb2fe8cf2/bottleneck/src/move_template.c (L974)

Fixes e.g. https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50587
2023-03-14 15:57:43 +00:00
DavidKorczynski b259d06fec
soupsieve: refine and extend fuzzers (#9921)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-03-14 15:01:02 +00:00
Marcono1234 6b96cec28d
Guava: Choose proper minimumBits value for HashingFuzzer (#9862)
See https://github.com/google/guava/issues/6324#issuecomment-1433981628
for more context.
This change makes sure that (1) `minimumBits` is valid (previously it
could be negative, which is invalid) and (2) the value is not too large
to prevent spurious `OutOfMemoryError`s.
2023-03-13 13:00:47 -04:00
AdamKorcz ff8fb6640c
rekor: git clone in Dockerfile and bump Go (#9918)
The `git clone`s were removed from the upstream build script.

Bump Go to 1.20.2.

Signed-off-by: AdamKorcz <adam@adalogics.com>
2023-03-13 07:28:34 -07:00
Nick Wellnhofer 58bff0d272
libxml2: Update build script (#9912)
- Enable integer sanitizer
- Update autoconf options
- Enable XInclude fuzzer
- Simplify libxslt build script
- Fix libxslt build after recent changes
2023-03-13 02:50:26 -07:00
DavidKorczynski e10473c061
scipy: fix build (#9910)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-03-11 18:28:33 +00:00
Mark 7f992d802f
duckdb: Compile in relassert mode and enable CRASH_ON_ASSERT for fuzzing (#9904)
This should enable assertion checking, and sets it up so DuckDB calls
`abort()` on any assertion trigger, which should lead to more effective
fuzzing.
2023-03-11 09:16:16 -08:00
jesslatimer 0b607feb21
ipykernel: improves code coverage (#9842)
Changes made:

- Made buffers more variable
- Change input of `deserialized_obj` to be more appropriate
- Fixed a spelling mistake of the variable `deserialized_obj`
2023-03-11 09:11:53 -08:00
DavidKorczynski f371650508
matplotlib: fix build (#9907)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-03-11 15:19:02 +00:00
DavidKorczynski 11c63707a2
validators: remove call to removed module (#9906) 2023-03-11 15:18:44 +00:00
Catena cyber ef223dc0ca
ngolo-fuzzing-x: do not remove generated fuzz targets (#9903)
They will be used for coverage
2023-03-10 21:53:13 +00:00
DRC c09f789073
[libjpeg-turbo] Add TGA images to compression seed corpus (#9905)
Our "cjpeg" fuzz target, which tests rarely-used compression code paths,
inputs only TARGA images (because that's a rarely-used compression code
path as well), so the lack of those images in the seed corpus was
preventing the rarely-used compression code paths from being fuzz-tested
at all. This should improve the overall coverage.
2023-03-10 21:52:43 +00:00
DavidKorczynski 90cfcf7be3
mrab-regex: avoid sys.maxsize (#9898)
Avoid exhausting the fuzz data on the first call to
`ConsumeUnicodeNoSurrogates`.
2023-03-09 20:35:55 +00:00