Tim Rühsen
397e3b46f0
Fix wget2 ( #8587 )
...
- Speed up and stabilize the build by building libunistring and libidn2
from tarball.
- Fix the build by explicitly adding -lz at link time.
2022-09-25 22:52:42 +01:00
Tim Rühsen
3075f75c9e
Fix wget ( #8585 )
...
- Speed up and stabilize the build by building libunistring and libidn2
from tarball.
- Fix the build by explicitly adding -lz at link time.
2022-09-25 22:52:21 +01:00
jonathanmetzman
08e3cd0175
Update project.yaml
2022-09-25 15:27:03 -04:00
Julien Voisin
fec3696af5
Fix a file name collision in libmagic's fuzzers ( #8584 )
2022-09-24 16:43:55 +01:00
Julien Voisin
244684cf54
Add a file-base fuzzer for libmagic ( #8542 )
...
Some libmagic features (like ELF parsing) are only working against files
on disk.
Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-09-23 13:07:03 -07:00
Arthur Chan
39a4c95af3
git: Combine multiple git command fuzzer to one ( #8579 )
...
List of git commands covered
GIT_ADD
GIT_BRANCH
GIT_COMMIT
GIT_CONFIG
GIT_DIFF
GIT_DIFF_FILES
GIT_DIFF_INDEX
GIT_DIFF_TREE
GIT_LS_FILES
GIT_LS_TREE
GIT_MV
GIT_RERERE
GIT_STATUS
GIT_VERSION
2022-09-23 19:26:32 +01:00
Patrice.S
551ad63712
spring-messaging: initial integration & improve project structure ( #8573 )
2022-09-23 10:34:35 -07:00
AdamKorcz
4a8e538e4b
lotus: fix broken build ( #8570 )
...
Signed-off-by: AdamKorcz <adam@adalogics.com>
Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-23 10:29:46 -07:00
DavidKorczynski
b9722412e4
lcms: update profile fuzzer ( #8576 )
...
Add more APIs for the profile
2022-09-23 12:02:40 +01:00
Tristan Swadell
2f272a1a2b
Update proto dep to v2 api ( #8572 )
...
With the most recent update to cel-go, the legacy proto package has been
completely replaced
by the v2 proto API. This change updates the import to reflect code
present in the cel-go vendor
directory.
2022-09-23 10:31:10 +01:00
John Hawthorn
8b62de2784
Add additional CCs for Ruby ( #8571 )
...
👋 Hello.
We'd like to include these additional Ruby Core team members in emails
and viewing results
2022-09-23 10:30:19 +01:00
Jacek Trossen
85fd442246
[apache.felix.main] initial integration ( #8561 )
...
Main is not fuzzable. Fuzzing target is a JSON parser which is used in
webconsole. The webconsole is an installable bundle.
2022-09-22 10:50:19 -07:00
AdamKorcz
f227ad74c4
cilium: change base image ( #8569 )
...
Ciliums fuzzers break with the testing image. Changing to get them
running.
Signed-off-by: AdamKorcz <adam@adalogics.com>
Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-22 10:49:31 -07:00
jonathanmetzman
940112608a
Revert "toml_edit: initial integration ( #8524 )" ( #8564 )
...
This reverts commit 60884064b0
.
2022-09-22 09:59:56 -04:00
Arthur Chan
ff454e51fc
git: fix bug in issue 51681 51688 ( #8563 )
...
Fix bugs in fuzzers. Aim to solve double freeing of pointers and divided
by zero float pointer exception and size calculation.
Fixed os-fuzz issue 51681 and 51688.
2022-09-22 13:54:15 +01:00
Arjun
179b15c946
[krb5] initial integration ( #8452 )
...
Hello @krb5 and Team @tlyu @greghudson @kaduk
Can you comment on ```krb5``` integration into ```oss-fuzz``` for
```security and fuzzing``` of krb5?
I and the ```oss-fuzz``` team would like to hear your thought on
integration.
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
2022-09-22 07:48:58 -04:00
DavidKorczynski
25abca6b48
mongoose: refine build ( #8550 )
...
Fixes: https://github.com/google/oss-fuzz/issues/8549
2022-09-21 14:32:08 -07:00
Guido Vranken
c801737278
[wolfssl] Add seed corpus ( #8558 )
2022-09-21 21:51:26 +01:00
Jacek Trossen
c8c9ee902b
[greenmail] initial integration ( #8556 )
2022-09-21 10:55:31 -07:00
Roman Wagner
6c1c004067
[spring-data-redis] Initial Integration ( #8555 )
2022-09-21 10:53:19 -07:00
aschaich
20ab1292c1
[jmh] Initial Integration ( #8500 )
2022-09-21 10:46:38 -07:00
DavidKorczynski
53205c63ec
jupyter_server: install npm to fix build ( #8557 )
...
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51399
2022-09-21 17:36:53 +01:00
DavidKorczynski
bd848023c1
libass: migrate to upstream changes ( #8552 )
...
Fixes: https://github.com/google/oss-fuzz/issues/8526
2022-09-21 15:18:39 +01:00
Arthur Chan
7cd6569f8a
git: create git command fuzzers ( #8553 )
...
This PR aims to create fuzzers for the git project that fuzz each of the
git commands. The initial fuzzers created are targetting the following
git commands.
1. git-version
2. git-status
3. git-diff
4. git-diff-tree
5. git-diff-files
6. git-diff-index
2022-09-21 15:17:55 +01:00
DavidKorczynski
1a651ea2fc
libevent: adding myself as auto_ccs ( #8551 )
...
CC @azat
2022-09-21 10:43:55 +01:00
Patrice.S
a01c454376
spring-expression: initial integration ( #8488 )
2022-09-21 17:37:22 +10:00
Szabolcs Horvát
b95ae7b412
igraph: move libxml2 download to build script ( #8545 )
...
I have moved the libxml2 download to the build script from the
Dockerfile, so I can more easily update the version, and related
operations would not be split up. Is this okay with you?
See
5a89bbc76c
2022-09-20 14:39:26 -04:00
Julien Voisin
0fe33b3bd3
Add more compressed formats support for libmagic ( #8540 )
...
Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-09-20 17:27:38 +01:00
Mirco Miranda
1690d89456
KImageFormats: add RAW plugin fuzzer ( #8539 )
...
New fuzzer to test the new camera RAW plugin.
2022-09-20 17:27:19 +01:00
Patrice.S
3f2bb3b38e
checker-framework: initial integration ( #8532 )
2022-09-20 09:50:42 -04:00
AdamKorcz
d5eb14f834
golang: modify fuzzer ( #8541 )
...
Signed-off-by: AdamKorcz <adam@adalogics.com>
Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-20 14:36:44 +01:00
Rob Bradford
e8ac9ba77e
cloud-hypervisor: Add additional fuzzers ( #8538 )
...
New fuzzers since last update: virtio-{balloon, pmem, rng, watchdog}
Signed-off-by: Rob Bradford <robert.bradford@intel.com>
Signed-off-by: Rob Bradford <robert.bradford@intel.com>
2022-09-20 10:50:27 +01:00
Oliver Chang
a6af5704de
Revert "[gpsd] initial integration" ( #8537 )
...
Reverts google/oss-fuzz#8493
2022-09-20 17:30:12 +10:00
Arjun
81006e27df
[gpsd] initial integration ( #8493 )
...
Hey @ckuethe ,
Can you take a look at this?
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
2022-09-20 16:52:15 +10:00
Julien Voisin
f42f2551a9
Add a fuzzer for libmagic's db parsing ( #8536 )
...
Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-09-19 13:57:09 -07:00
Julien Voisin
44d55a37f3
Process compressed files and analyse as much as possible ( #8535 )
...
- MAGIC_COMPRESS: If the file is compressed, unpack it and look at the
contents.
- MAGIC_CONTINUE: Return all matches, not just the first.
Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-09-19 08:48:28 -07:00
Patrice.S
5678b99ef5
spring-security-web: initial integration ( #8530 )
...
Co-authored-by: CheeseHunter117 <yoshi.weber@gmail.com>
2022-09-19 10:54:20 -04:00
Julien Voisin
609535a8df
Improve libmagic's corpus ( #8533 )
...
Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-09-19 10:53:29 -04:00
Szabolcs Horvát
ee3a25c0a4
igraph: update libxml2 to 2.10.0 ( #8534 )
2022-09-19 10:52:57 -04:00
manunio
60884064b0
toml_edit: initial integration ( #8524 )
...
Hi, [toml_edit](https://github.com/ordian/toml_edit ) crate allows you to
parse and modify toml documents, while preserving comments, spaces and
relative order or items.
- It has 2 million+ downloads as per
[crates.io](https://crates.io/crates/toml_edit ).
- It's being used by projects like
[cargo](https://github.com/rust-lang/cargo ),
[diem](https://github.com/diem/diem ),
[lapce](https://github.com/lapce/lapce ),
[materialize](https://github.com/MaterializeInc/materialize ),
[clap](https://github.com/clap-rs/clap ),
[foundry](https://github.com/foundry-rs/foundry ) as per [github's
dependent
graph](https://github.com/ordian/toml_edit/network/dependents?dependent_type=PACKAGE&package_id=UGFja2FnZS0zMjE3NzcwMjM2 )
and [crates.io's reverse
dependencies](https://crates.io/crates/toml_edit/reverse_dependencies ).
2022-09-19 10:52:29 -04:00
DavidKorczynski
783cdab978
g-api-common-protos: fix build ( #8531 )
2022-09-19 11:28:33 +01:00
Arjun
0277ae2e42
Update Mail ID ( #8529 )
...
updating the mail ID of Mr. @geographika
2022-09-19 10:25:20 +01:00
jduart
bc079ae27d
Copy all fuzzers into SRC so they can be built ( #8496 )
...
build.sh is taking all the *_fuzzer.cc files and builds them as targets,
but the Dockerfile was not updated to copy the new fuzzers.
Co-authored-by: Jose Duart <jduart@google.com>
2022-09-19 11:55:01 +10:00
jonathanmetzman
60d8521290
Reenable MSAN for some more projects ( #8523 )
...
Co-authored-by: Dongge Liu <donggeliu@google.com>
2022-09-19 01:43:22 +00:00
Arjun
dc7ece55e7
[ntpsec] initial integration ( #8134 )
...
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
2022-09-18 06:50:06 -04:00
Arjun
c370184983
[coturn] initial integration ( #8239 )
...
Hello @misi
For More Security Related issues in the @coturn interface, The
```coturn``` project can in deployed in ```oss-fuzz``` infrastructure.
I and ```oss-fuzz``` team would like to hear your thoughts on
integration.
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-09-18 06:49:07 -04:00
Evgeny Vereshchagin
730ee7b927
[elfutils] create tmpfiles properly ( #7408 )
...
Now fuzz-libdwfl and fuzz-libelf can be run a few times in a row
with files triggering crashes.
It's another follow-up to https://github.com/google/oss-fuzz/pull/7395
and https://github.com/google/oss-fuzz/pull/7393 .
2022-09-18 06:42:11 -04:00
aschaich
9c8bf5c834
[reload4j] Initial Integration ( #8428 )
2022-09-17 20:55:50 -04:00
aschaich
1279124c3c
[hamcrest] Initial Integration ( #8430 )
2022-09-17 20:55:12 -04:00
aschaich
ddb15112cc
[guava] add more fuzz targets ( #8499 )
2022-09-17 20:51:14 -04:00