Commit Graph

8225 Commits

Author SHA1 Message Date
Martijn van Beurden 24b179d5a2
[flac] Add fuzzer_reencoder (#8988)
This PR adds to the flac fuzzer build script to include
fuzzer_reencoder, which is a fuzzer for which the fuzz input is first
decoded and then re-encoded. Additional coverage beyond what is
currently achieved is fuzzing of metadata input to the encoder (which is
copied from the decoded fuzz input) and the use of very large empty
inputs
2022-11-15 17:02:06 -05:00
bharathmohanraj 412e38d599
Update project.yaml (#8973)
Requesting accessing to apache-commons-jxpath project, for the vendor
address bharath_mohanraj@persistent.com

This request is raised to get access to the jxpath vulnerability details
(like crashing build, crashing input, stacktrace, etc.,) that will help
in debugging and fixing these issues.

Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-11-15 18:13:45 +00:00
Arjun 5e4fb0be81
[brpc] initial integration (#8887)
Integration of brpc.

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
2022-11-15 07:05:22 +00:00
Alex Crichton ca045844c4
Update wasmtime's build script (#8976)
Pass an extra feature when fuzzing one of the projects to ensure all the
fuzzers for that project are compiled.
2022-11-15 17:47:44 +11:00
Henry Lin 125afba7bb
apache-commons: Update project.yaml, fix build failure, correctly configure apache-commons-compress, geometry, imaging and math. (#8967)
Because https://github.com/google/oss-fuzz/pull/8933 is not optimal for
oss-fuzz, we make this PR to meet apache-commons requirements. This PR
will add primary contact email, fix apache-commons-logging build failure
and move apache-commons-math, apache-commons-geometry,
apache-commons-compress and apache-commons-imaging out of apache-commons
folder .Each of them will have their own Dockerfile and build.sh.
2022-11-15 15:28:51 +11:00
AdamKorcz 4bb0100e19
remove native go test project (#8981)
It is no longer needed for testing.

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-11-15 09:44:35 +11:00
DavidKorczynski 45895f868a
infra: bump fuzz-introspector (#8979)
Contains fixes for some python projects that are failing to be analysed.

Ref: https://github.com/ossf/fuzz-introspector/pull/606
2022-11-14 20:42:52 +00:00
Raphael Salas 2b5577e25e
[xs] Disable stack-use-after-return detection (#8923)
The `detect_stack_use_after_return=1` option in `ASAN_OPTIONS` set by
the runner seemed to cause the fuzzer to not pick up any coverage.

I'm not quite sure why this happens. Any guidance would be appreciated.
The fuzzer seems stuck with this flag set:

`python infra/helper.py run_fuzzer --corpus-dir ../corpus_xst_json/ xs
xst_jsonparse -- seed=1`

```
INFO: seed corpus: files: 1728 min: 1b max: 131336b total: 336638b rss: 92Mb
#64	pulse  cov: 322 ft: 323 corp: 1/1b exec/s: 32 rss: 92Mb
#128	pulse  cov: 322 ft: 323 corp: 1/1b exec/s: 25 rss: 92Mb
#256	pulse  cov: 322 ft: 324 corp: 2/8b exec/s: 23 rss: 93Mb
#512	pulse  cov: 322 ft: 324 corp: 2/8b exec/s: 22 rss: 93Mb
#1024	pulse  cov: 322 ft: 324 corp: 2/8b exec/s: 22 rss: 93Mb
```

However disabling it seems to make progress, with the same command (note
same seed and corpus). After rebuilding image with
`detect_stack_use_after_return` disabled:

`python infra/helper.py run_fuzzer --corpus-dir ../corpus_xst_json/ xs
xst_jsonparse -- seed=1`

```
INFO: seed corpus: files: 1728 min: 1b max: 131336b total: 336638b rss: 92Mb
#64	pulse  cov: 485 ft: 500 corp: 29/55b exec/s: 32 rss: 93Mb
#128	pulse  cov: 574 ft: 673 corp: 70/239b exec/s: 25 rss: 93Mb
#256	pulse  cov: 749 ft: 1060 corp: 132/707b exec/s: 23 rss: 93Mb
#512	pulse  cov: 834 ft: 1560 corp: 214/1767b exec/s: 22 rss: 93Mb
#1024	pulse  cov: 953 ft: 2344 corp: 353/5213b exec/s: 22 rss: 93Mb
```

Setting `detect_stack_use_after_return=0` fixed it -- local runs picked
up coverage with seed corpus, and even a couple of crashes. Until I work
around this it would be preferable to gain some coverage, even if we
don't detect `stack-use-after-return` for now.
2022-11-14 15:20:02 -05:00
DavidKorczynski 9452275da3
fuzztest integration (#8784)
Signed-off-by: David Korczynski <david@adalogics.com>

Cross referencing https://github.com/google/fuzztest/pull/69

Signed-off-by: David Korczynski <david@adalogics.com>
Co-authored-by: Oliver Chang <oliverchang@users.noreply.github.com>
2022-11-14 13:34:29 +11:00
Daniel Novomeský e9a6842d47
kimageformats: upgrade libaom and libavif (#8977) 2022-11-13 22:31:31 +00:00
Guido Vranken 3782450829
Fix mbed TLS builds (#8954)
CC @gilles-peskine-arm @mpg
2022-11-12 23:21:44 +00:00
Raphael Salas 14ec4885b4
added architecture flag to coverage helper command (#8972)
Currently if you make a coverage build for a particular architecture
(e.g. aarch64), running the coverage command doesn't work as it assumes
`x86_64`. This PR adds the `--architecture` flag present in other
commands for parity, allowing to run coverage reports built for the
matching architecture.

Tested by running `build_fuzzers` and then `coverage` works as expected
with defaults (x86_64).

Now `build_fuzzers` and then `coverage` also work when `--architecture
aarch64` is used.
2022-11-11 00:32:23 +00:00
DavidKorczynski 4e2f86d3ea
infra: bump fuzz introspector (#8970)
This has a fix for coverage urls for per-fuzzer coverage reports:
https://github.com/ossf/fuzz-introspector/pull/605

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-11-10 14:12:33 -08:00
Navidem 426b8f5f19
Fix Introspector trial build (#8971)
Skip using `-testing` bucket as it breaks coverage download under
`trial_build`.
2022-11-10 13:54:57 -08:00
Kit Chan 0439d667e3
Request access for project trafficserver (#8961)
Signed-off-by: Kit Chan <kichan@apache.org>

Signed-off-by: Kit Chan <kichan@apache.org>
2022-11-10 10:16:53 +00:00
Karel Zak 91c70ce986
add t-8ch to util-linux CC (#8966)
Let's add Thomas Weißschuh (https://github.com/t-8ch) to CC.
2022-11-10 09:38:35 +00:00
Catena cyber d5dc144ad1
SystemSan: log c_str to avoid additional buffered zeroes (#8826)
cc @Alan32Liu
2022-11-10 16:06:07 +11:00
Henry Lin 1d505842f3
Tomcat: Remove fuzz targets that produce large number of false positive (#8958) 2022-11-10 16:04:55 +11:00
Oliver Chang d104f15f90
Fix incorrect os.stat usage. (#8964) 2022-11-10 04:17:23 +00:00
DavidKorczynski 8b9cf2d081
infra: bump introspector and update python compile script (#8957)
This is a follow-up to https://github.com/google/oss-fuzz/pull/8952

This bump is needed to have the Python projects work properly. Scan
should be done for all projects now, so have switched it on by default
in fuzz introspector.

Bump also contains
- Fix for util-linux where per-target coverage report links were broken.
- Reduced logging.

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
Co-authored-by: Navidem <navid.emamdoost@gmail.com>
2022-11-09 17:49:17 -08:00
Navidem fb2592f6f8
Fix Python Coverage Build (#8959)
Skip per_target coverage copy for python.

Co-authored-by: Dongge Liu <donggeliu@google.com>
2022-11-09 17:48:50 -08:00
Navidem bba5bc97d7
Simplify download coverage steps (#8960)
With the python projects enabled, we need to broaden the coverage file
names that should to be downloaded.

This PR changes `download_coverage_data_steps()` function to download
all the contents of `textcov_reports` dir from the coverage bucket.
2022-11-09 17:48:35 -08:00
DavidKorczynski e04e7b44ab
postgresql: fix build (#8963)
Ref: https://github.com/google/oss-fuzz/pull/8948

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-11-10 01:05:42 +00:00
Catena cyber 630c5ebc0e
ngolo-fuzzing: fix build by using python3 (#8916)
Was this the only project where this happened ?
Meant to fix https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=52844
2022-11-10 10:21:34 +11:00
Theo Buehler 76d961ba54
[libressl] add fuzz contact (#8940)
Please add @botovq as a LibreSSL fuzz contact

Co-authored-by: Theo Buehler <theorbuehler@gmail.com>
2022-11-10 10:00:47 +11:00
jonathanmetzman 7bc9fbd3b4
Make sure testcase has correct permissions (#8920)
Fixes #8768
2022-11-09 16:37:36 -05:00
Karel Zak 67deda412c
Update project.yaml (#8953)
Add Milan Broz to CC. Milan is active in libblkid fuzz development.
2022-11-09 13:50:53 +00:00
DavidKorczynski f778ae5547
idna, pyyaml, glom: cleanup build (#8956)
This variable is no longer needed by fuzz-introspector python version
for these projects.

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-11-09 13:48:39 +00:00
Arthur Chan 4925ae2682
[jackson-databind]: Fix dependency version (#8955)
Update roaster jar version

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>
2022-11-09 12:23:56 +00:00
DavidKorczynski 50205ec9e9
infra: bump and refine introspector (#8952)
Bumps fuzz introspector and updates the way python fuzzers are build for
introspector builds.

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-11-08 23:13:31 -08:00
DavidKorczynski 7797279c27
infra: base-builder: compile: wrap find names in quotes (#8943)
Wrap wildcards in quotes as otherwise the script will autocomplete if
there is a e.g. .json file in the current directory. This causes the
wrong files to be moved, which means `all_cov.json` will not be moved to
the introspector folder and thus wrong (no) coverage data will be used.

This error happens in e.g. g-api-auth-library-python
2022-11-09 09:24:41 +11:00
jonathanmetzman e48e615124
Remove @syoyo as CC (#8951) 2022-11-08 13:34:53 -08:00
zhangskz f2d79d7877
Change label prefix for protobuf projects (#8944)
Avoid clashing with labels used by envoy in
https://github.com/google/oss-fuzz/blob/master/projects/envoy/project.yaml.
2022-11-08 13:32:18 +11:00
AdamKorcz d4362b84e9
fabric: use latest instrumentation (#8947)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-11-07 23:10:12 +00:00
Navidem 490a91a265
Enable Introspector on Python projects (#8945) 2022-11-07 22:48:16 +00:00
AdamKorcz 693a47fea0
moby: add extended instrumentation (#8946)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-11-07 22:44:27 +00:00
Henry Lin 450037bac0
hibernate-orm: Fix build failure (#8823)
Fix build failure for
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51159
2022-11-07 16:42:45 -05:00
Sean Kau e5a96424a2
Add another Google maintainer for ghostscript (#8942)
Adding bmgordon@ who is currently looking after printing.
2022-11-07 21:02:05 +00:00
Henry Lin ae9b121213
snakeyaml: Add DefaultYamlFuzzer (#8941)
Add DefaultYamlFuzzer to test default snakeyaml behavior.
2022-11-07 12:35:23 -08:00
Fabian Meumertzheim 514febd38c
java: Fix bash escaping in memory setting logic (#8825)
These issues were missed in 5b1953b201 and
prevent the new logic from applying correctly for some projects.
2022-11-07 10:34:37 -08:00
Fabian Wienand 362cb376b2
u-root: fix auto_ccs contact (#8938)
Updated my mail in the contacts for u-root, since the web login does not
accept my non-Gmail address.
Sorry, I got confused not knowing what exactly counts as an alternative
e-mail address for a Google account.

Signed-off-by: Fabian Wienand <fabian.wienand@9elements.com>

Signed-off-by: Fabian Wienand <fabian.wienand@9elements.com>
2022-11-07 17:56:49 +00:00
Fabian Wienand d149cddfad
u-root: init project (#8911)
Following the addition of some fuzzing tests
([#1](https://github.com/u-root/u-root/pull/2528),
[#2](https://github.com/u-root/u-root/pull/2535),
[#3](https://github.com/u-root/u-root/pull/2536)) in the u-root project
and [preparations for this
integration](https://github.com/u-root/u-root/pull/2543).
You can check out its [website](https://u-root.org/) for more info on
the project.

Signed-off-by: Fabian Wienand <fabian.wienand@9elements.com>

Signed-off-by: Fabian Wienand <fabian.wienand@9elements.com>
2022-11-07 08:15:55 -08:00
jonathanmetzman 3f14b420ef
[CFL] Don't print fuzzing logs in realtime (#8919)
Fixes https://github.com/google/oss-fuzz/issues/8588
2022-11-07 11:11:51 -05:00
zhangskz 8fd6d0c182
Add sha256 to Dockerfile (#8930)
Same temporary fix as https://github.com/google/oss-fuzz/pull/8914

Seems to be affected by https://github.com/google/oss-fuzz/issues/8915
per failures in
https://github.com/google/oss-fuzz/actions/runs/3396815368/jobs/5648300142

Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-11-07 16:09:10 +00:00
zhangskz f0bba2daf6
Add copybara to cc's and and label (#8929)
Same as https://github.com/google/oss-fuzz/pull/8927 but for
protobuf-python

Co-authored-by: Navidem <navid.emamdoost@gmail.com>
2022-11-07 10:37:46 -05:00
zhangskz 235ff2d274
Replace buganizer cc with protobuf-oss-fuzz (#8925)
Co-authored-by: Navidem <navid.emamdoost@gmail.com>
2022-11-07 10:37:23 -05:00
Teju Nareddy 51297b4791
jwt-verify-lib: OSS-fuzz integration for bazel project (#8909)
Following
https://google.github.io/oss-fuzz/getting-started/new-project-guide/bazel/

Signed-off-by: Teju Nareddy <nareddyt@google.com>

Signed-off-by: Teju Nareddy <nareddyt@google.com>
2022-11-07 10:34:03 -05:00
jonathanmetzman b975afe5e3
[wycheproof] Fix typo (#8935) 2022-11-07 09:16:31 -05:00
AdamKorcz 05b0539525
rekor: add maintainers (#8936)
@bobcallaway @loosebazooka

Gives @DavidKorczynski and me access to bug reports for Rekor.

Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-11-07 08:50:31 -05:00
jonathanmetzman e9ca7b1120
Create blackbox fuzzer for wycheproof. (#8926)
Related: https://github.com/google/oss-fuzz/issues/8034
2022-11-07 07:07:31 -05:00