Commit Graph

8240 Commits

Author SHA1 Message Date
Julien Voisin 31f6eba0c2
Fix muparser (#9006)
The recent versions of muparser are using `mu::ParserError`.

Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-11-17 09:35:12 -08:00
Julien Voisin 3ff681232d
Enable support for gnu-tar archive in libarchive (#9001)
archive_read_support_format_gnutar isn't' called in
archive_read_support_format_all.

Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-11-17 04:43:19 -08:00
DavidKorczynski cad29b89d6
croniter: refine fuzzer (#9002)
This is to make it work with fuzz introspector.

Ref: https://github.com/ossf/fuzz-introspector/pull/613

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-11-17 12:25:05 +00:00
Oliver Chang 92c6823da0
Fix miniz_oxide coverage build (#8999)
Fixes #8993
2022-11-17 19:57:24 +11:00
Reed Loden 42b53f4673
teleport: Add @jentfoo to `auto_ccs` (#8998)
@jentfoo needs access to Teleport's OSS-Fuzz results.
2022-11-17 18:53:33 +11:00
Craig Ingram f47d23d049
Add Craig Ingram to containerd project (#8996)
Hello! 

I am a [new security
advisor](https://github.com/containerd/project/pull/97) for the
containerd project and am requesting access to the oss-fuzz test cases.

/cc @samuelkarp
2022-11-16 23:42:04 +00:00
jonathanmetzman 659e1fdd58
Allow skipping trial builds (#8991)
This is useful for NFCs
2022-11-16 20:48:45 +00:00
jonathanmetzman 8df818599b
[cifuzz] Update docs (#8984) 2022-11-16 12:46:27 -08:00
Tyson Smith c849557ec9
Update libpng (#8994) 2022-11-16 12:05:09 -08:00
jonathanmetzman 0d9738c4d5
Update project.yaml 2022-11-16 08:40:46 -05:00
Sergey Bronnikov fba5059127
[tarantool] Use Ninja in building (#8989)
Ninja could significantly speedup building in comparison to Make.
2022-11-16 13:32:55 +00:00
jonathanmetzman 3ebdb071dc
Remove centipede's .git (#8986)
It takes up space, is uneeded and causes irrelevant data to be displayed
in revisions.
2022-11-16 07:53:04 -05:00
Guido Vranken 56900fc661
[openssl] Targets for OpenSSL 1.1.1 branch and 32 bit (#8969)
See https://github.com/openssl/openssl/issues/19642

Do not merge yet, maybe the OpenSSL team would like some changes to this
pr.
2022-11-16 17:50:02 +11:00
Fabian Wienand ae55544c86
u-root: gosh-fuzzing (#8982)
Addition of one more fuzzing test of the project and update of contact
info
Signed-off-by: Fabian Wienand <fabian.wienand@9elements.com>

Signed-off-by: Fabian Wienand <fabian.wienand@9elements.com>
2022-11-16 17:49:10 +11:00
Henry Lin 7623da9d81
Code Intelligence Java projects: Add bug-disclosure email to project.yaml. (#8987)
Add bug-disclosure email to all java projects' project.yaml.
2022-11-16 17:48:01 +11:00
Martijn van Beurden 24b179d5a2
[flac] Add fuzzer_reencoder (#8988)
This PR adds to the flac fuzzer build script to include
fuzzer_reencoder, which is a fuzzer for which the fuzz input is first
decoded and then re-encoded. Additional coverage beyond what is
currently achieved is fuzzing of metadata input to the encoder (which is
copied from the decoded fuzz input) and the use of very large empty
inputs
2022-11-15 17:02:06 -05:00
bharathmohanraj 412e38d599
Update project.yaml (#8973)
Requesting accessing to apache-commons-jxpath project, for the vendor
address bharath_mohanraj@persistent.com

This request is raised to get access to the jxpath vulnerability details
(like crashing build, crashing input, stacktrace, etc.,) that will help
in debugging and fixing these issues.

Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-11-15 18:13:45 +00:00
Arjun 5e4fb0be81
[brpc] initial integration (#8887)
Integration of brpc.

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
2022-11-15 07:05:22 +00:00
Alex Crichton ca045844c4
Update wasmtime's build script (#8976)
Pass an extra feature when fuzzing one of the projects to ensure all the
fuzzers for that project are compiled.
2022-11-15 17:47:44 +11:00
Henry Lin 125afba7bb
apache-commons: Update project.yaml, fix build failure, correctly configure apache-commons-compress, geometry, imaging and math. (#8967)
Because https://github.com/google/oss-fuzz/pull/8933 is not optimal for
oss-fuzz, we make this PR to meet apache-commons requirements. This PR
will add primary contact email, fix apache-commons-logging build failure
and move apache-commons-math, apache-commons-geometry,
apache-commons-compress and apache-commons-imaging out of apache-commons
folder .Each of them will have their own Dockerfile and build.sh.
2022-11-15 15:28:51 +11:00
AdamKorcz 4bb0100e19
remove native go test project (#8981)
It is no longer needed for testing.

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-11-15 09:44:35 +11:00
DavidKorczynski 45895f868a
infra: bump fuzz-introspector (#8979)
Contains fixes for some python projects that are failing to be analysed.

Ref: https://github.com/ossf/fuzz-introspector/pull/606
2022-11-14 20:42:52 +00:00
Raphael Salas 2b5577e25e
[xs] Disable stack-use-after-return detection (#8923)
The `detect_stack_use_after_return=1` option in `ASAN_OPTIONS` set by
the runner seemed to cause the fuzzer to not pick up any coverage.

I'm not quite sure why this happens. Any guidance would be appreciated.
The fuzzer seems stuck with this flag set:

`python infra/helper.py run_fuzzer --corpus-dir ../corpus_xst_json/ xs
xst_jsonparse -- seed=1`

```
INFO: seed corpus: files: 1728 min: 1b max: 131336b total: 336638b rss: 92Mb
#64	pulse  cov: 322 ft: 323 corp: 1/1b exec/s: 32 rss: 92Mb
#128	pulse  cov: 322 ft: 323 corp: 1/1b exec/s: 25 rss: 92Mb
#256	pulse  cov: 322 ft: 324 corp: 2/8b exec/s: 23 rss: 93Mb
#512	pulse  cov: 322 ft: 324 corp: 2/8b exec/s: 22 rss: 93Mb
#1024	pulse  cov: 322 ft: 324 corp: 2/8b exec/s: 22 rss: 93Mb
```

However disabling it seems to make progress, with the same command (note
same seed and corpus). After rebuilding image with
`detect_stack_use_after_return` disabled:

`python infra/helper.py run_fuzzer --corpus-dir ../corpus_xst_json/ xs
xst_jsonparse -- seed=1`

```
INFO: seed corpus: files: 1728 min: 1b max: 131336b total: 336638b rss: 92Mb
#64	pulse  cov: 485 ft: 500 corp: 29/55b exec/s: 32 rss: 93Mb
#128	pulse  cov: 574 ft: 673 corp: 70/239b exec/s: 25 rss: 93Mb
#256	pulse  cov: 749 ft: 1060 corp: 132/707b exec/s: 23 rss: 93Mb
#512	pulse  cov: 834 ft: 1560 corp: 214/1767b exec/s: 22 rss: 93Mb
#1024	pulse  cov: 953 ft: 2344 corp: 353/5213b exec/s: 22 rss: 93Mb
```

Setting `detect_stack_use_after_return=0` fixed it -- local runs picked
up coverage with seed corpus, and even a couple of crashes. Until I work
around this it would be preferable to gain some coverage, even if we
don't detect `stack-use-after-return` for now.
2022-11-14 15:20:02 -05:00
DavidKorczynski 9452275da3
fuzztest integration (#8784)
Signed-off-by: David Korczynski <david@adalogics.com>

Cross referencing https://github.com/google/fuzztest/pull/69

Signed-off-by: David Korczynski <david@adalogics.com>
Co-authored-by: Oliver Chang <oliverchang@users.noreply.github.com>
2022-11-14 13:34:29 +11:00
Daniel Novomeský e9a6842d47
kimageformats: upgrade libaom and libavif (#8977) 2022-11-13 22:31:31 +00:00
Guido Vranken 3782450829
Fix mbed TLS builds (#8954)
CC @gilles-peskine-arm @mpg
2022-11-12 23:21:44 +00:00
Raphael Salas 14ec4885b4
added architecture flag to coverage helper command (#8972)
Currently if you make a coverage build for a particular architecture
(e.g. aarch64), running the coverage command doesn't work as it assumes
`x86_64`. This PR adds the `--architecture` flag present in other
commands for parity, allowing to run coverage reports built for the
matching architecture.

Tested by running `build_fuzzers` and then `coverage` works as expected
with defaults (x86_64).

Now `build_fuzzers` and then `coverage` also work when `--architecture
aarch64` is used.
2022-11-11 00:32:23 +00:00
DavidKorczynski 4e2f86d3ea
infra: bump fuzz introspector (#8970)
This has a fix for coverage urls for per-fuzzer coverage reports:
https://github.com/ossf/fuzz-introspector/pull/605

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-11-10 14:12:33 -08:00
Navidem 426b8f5f19
Fix Introspector trial build (#8971)
Skip using `-testing` bucket as it breaks coverage download under
`trial_build`.
2022-11-10 13:54:57 -08:00
Kit Chan 0439d667e3
Request access for project trafficserver (#8961)
Signed-off-by: Kit Chan <kichan@apache.org>

Signed-off-by: Kit Chan <kichan@apache.org>
2022-11-10 10:16:53 +00:00
Karel Zak 91c70ce986
add t-8ch to util-linux CC (#8966)
Let's add Thomas Weißschuh (https://github.com/t-8ch) to CC.
2022-11-10 09:38:35 +00:00
Catena cyber d5dc144ad1
SystemSan: log c_str to avoid additional buffered zeroes (#8826)
cc @Alan32Liu
2022-11-10 16:06:07 +11:00
Henry Lin 1d505842f3
Tomcat: Remove fuzz targets that produce large number of false positive (#8958) 2022-11-10 16:04:55 +11:00
Oliver Chang d104f15f90
Fix incorrect os.stat usage. (#8964) 2022-11-10 04:17:23 +00:00
DavidKorczynski 8b9cf2d081
infra: bump introspector and update python compile script (#8957)
This is a follow-up to https://github.com/google/oss-fuzz/pull/8952

This bump is needed to have the Python projects work properly. Scan
should be done for all projects now, so have switched it on by default
in fuzz introspector.

Bump also contains
- Fix for util-linux where per-target coverage report links were broken.
- Reduced logging.

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
Co-authored-by: Navidem <navid.emamdoost@gmail.com>
2022-11-09 17:49:17 -08:00
Navidem fb2592f6f8
Fix Python Coverage Build (#8959)
Skip per_target coverage copy for python.

Co-authored-by: Dongge Liu <donggeliu@google.com>
2022-11-09 17:48:50 -08:00
Navidem bba5bc97d7
Simplify download coverage steps (#8960)
With the python projects enabled, we need to broaden the coverage file
names that should to be downloaded.

This PR changes `download_coverage_data_steps()` function to download
all the contents of `textcov_reports` dir from the coverage bucket.
2022-11-09 17:48:35 -08:00
DavidKorczynski e04e7b44ab
postgresql: fix build (#8963)
Ref: https://github.com/google/oss-fuzz/pull/8948

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-11-10 01:05:42 +00:00
Catena cyber 630c5ebc0e
ngolo-fuzzing: fix build by using python3 (#8916)
Was this the only project where this happened ?
Meant to fix https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=52844
2022-11-10 10:21:34 +11:00
Theo Buehler 76d961ba54
[libressl] add fuzz contact (#8940)
Please add @botovq as a LibreSSL fuzz contact

Co-authored-by: Theo Buehler <theorbuehler@gmail.com>
2022-11-10 10:00:47 +11:00
jonathanmetzman 7bc9fbd3b4
Make sure testcase has correct permissions (#8920)
Fixes #8768
2022-11-09 16:37:36 -05:00
Karel Zak 67deda412c
Update project.yaml (#8953)
Add Milan Broz to CC. Milan is active in libblkid fuzz development.
2022-11-09 13:50:53 +00:00
DavidKorczynski f778ae5547
idna, pyyaml, glom: cleanup build (#8956)
This variable is no longer needed by fuzz-introspector python version
for these projects.

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-11-09 13:48:39 +00:00
Arthur Chan 4925ae2682
[jackson-databind]: Fix dependency version (#8955)
Update roaster jar version

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>
2022-11-09 12:23:56 +00:00
DavidKorczynski 50205ec9e9
infra: bump and refine introspector (#8952)
Bumps fuzz introspector and updates the way python fuzzers are build for
introspector builds.

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-11-08 23:13:31 -08:00
DavidKorczynski 7797279c27
infra: base-builder: compile: wrap find names in quotes (#8943)
Wrap wildcards in quotes as otherwise the script will autocomplete if
there is a e.g. .json file in the current directory. This causes the
wrong files to be moved, which means `all_cov.json` will not be moved to
the introspector folder and thus wrong (no) coverage data will be used.

This error happens in e.g. g-api-auth-library-python
2022-11-09 09:24:41 +11:00
jonathanmetzman e48e615124
Remove @syoyo as CC (#8951) 2022-11-08 13:34:53 -08:00
zhangskz f2d79d7877
Change label prefix for protobuf projects (#8944)
Avoid clashing with labels used by envoy in
https://github.com/google/oss-fuzz/blob/master/projects/envoy/project.yaml.
2022-11-08 13:32:18 +11:00
AdamKorcz d4362b84e9
fabric: use latest instrumentation (#8947)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-11-07 23:10:12 +00:00
Navidem 490a91a265
Enable Introspector on Python projects (#8945) 2022-11-07 22:48:16 +00:00