Commit Graph

5159 Commits

Author SHA1 Message Date
Tim Rühsen 397e3b46f0
Fix wget2 (#8587)
- Speed up and stabilize the build by building libunistring and libidn2
from tarball.
- Fix the build by explicitly adding -lz at link time.
2022-09-25 22:52:42 +01:00
Tim Rühsen 3075f75c9e
Fix wget (#8585)
- Speed up and stabilize the build by building libunistring and libidn2
from tarball.
- Fix the build by explicitly adding -lz at link time.
2022-09-25 22:52:21 +01:00
jonathanmetzman 08e3cd0175
Update project.yaml 2022-09-25 15:27:03 -04:00
Julien Voisin fec3696af5
Fix a file name collision in libmagic's fuzzers (#8584) 2022-09-24 16:43:55 +01:00
Julien Voisin 244684cf54
Add a file-base fuzzer for libmagic (#8542)
Some libmagic features (like ELF parsing) are only working against files
on disk.

Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-09-23 13:07:03 -07:00
Arthur Chan 39a4c95af3
git: Combine multiple git command fuzzer to one (#8579)
List of git commands covered
        GIT_ADD
        GIT_BRANCH
        GIT_COMMIT
        GIT_CONFIG
        GIT_DIFF
        GIT_DIFF_FILES
        GIT_DIFF_INDEX
        GIT_DIFF_TREE
        GIT_LS_FILES
        GIT_LS_TREE
        GIT_MV
	GIT_RERERE
      	GIT_STATUS
        GIT_VERSION
2022-09-23 19:26:32 +01:00
Patrice.S 551ad63712
spring-messaging: initial integration & improve project structure (#8573) 2022-09-23 10:34:35 -07:00
AdamKorcz 4a8e538e4b
lotus: fix broken build (#8570)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-23 10:29:46 -07:00
DavidKorczynski b9722412e4
lcms: update profile fuzzer (#8576)
Add more APIs for the profile
2022-09-23 12:02:40 +01:00
Tristan Swadell 2f272a1a2b
Update proto dep to v2 api (#8572)
With the most recent update to cel-go, the legacy proto package has been
completely replaced
by the v2 proto API. This change updates the import to reflect code
present in the cel-go vendor
directory.
2022-09-23 10:31:10 +01:00
John Hawthorn 8b62de2784
Add additional CCs for Ruby (#8571)
👋 Hello.

We'd like to include these additional Ruby Core team members in emails
and viewing results
2022-09-23 10:30:19 +01:00
Jacek Trossen 85fd442246
[apache.felix.main] initial integration (#8561)
Main is not fuzzable. Fuzzing target is a JSON parser which is used in
webconsole. The webconsole is an installable bundle.
2022-09-22 10:50:19 -07:00
AdamKorcz f227ad74c4
cilium: change base image (#8569)
Ciliums fuzzers break with the testing image. Changing to get them
running.

Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-22 10:49:31 -07:00
jonathanmetzman 940112608a
Revert "toml_edit: initial integration (#8524)" (#8564)
This reverts commit 60884064b0.
2022-09-22 09:59:56 -04:00
Arthur Chan ff454e51fc
git: fix bug in issue 51681 51688 (#8563)
Fix bugs in fuzzers. Aim to solve double freeing of pointers and divided
by zero float pointer exception and size calculation.
Fixed os-fuzz issue 51681 and 51688.
2022-09-22 13:54:15 +01:00
Arjun 179b15c946
[krb5] initial integration (#8452)
Hello @krb5 and Team @tlyu @greghudson @kaduk
Can you comment on ```krb5``` integration into ```oss-fuzz``` for
```security and fuzzing``` of krb5?
I and the ```oss-fuzz``` team would like to hear your thought on
integration.


Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
2022-09-22 07:48:58 -04:00
DavidKorczynski 25abca6b48
mongoose: refine build (#8550)
Fixes: https://github.com/google/oss-fuzz/issues/8549
2022-09-21 14:32:08 -07:00
Guido Vranken c801737278
[wolfssl] Add seed corpus (#8558) 2022-09-21 21:51:26 +01:00
Jacek Trossen c8c9ee902b
[greenmail] initial integration (#8556) 2022-09-21 10:55:31 -07:00
Roman Wagner 6c1c004067
[spring-data-redis] Initial Integration (#8555) 2022-09-21 10:53:19 -07:00
aschaich 20ab1292c1
[jmh] Initial Integration (#8500) 2022-09-21 10:46:38 -07:00
DavidKorczynski 53205c63ec
jupyter_server: install npm to fix build (#8557)
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51399
2022-09-21 17:36:53 +01:00
DavidKorczynski bd848023c1
libass: migrate to upstream changes (#8552)
Fixes: https://github.com/google/oss-fuzz/issues/8526
2022-09-21 15:18:39 +01:00
Arthur Chan 7cd6569f8a
git: create git command fuzzers (#8553)
This PR aims to create fuzzers for the git project that fuzz each of the
git commands. The initial fuzzers created are targetting the following
git commands.

1. git-version
2. git-status
3. git-diff
4. git-diff-tree
5. git-diff-files
6. git-diff-index
2022-09-21 15:17:55 +01:00
DavidKorczynski 1a651ea2fc
libevent: adding myself as auto_ccs (#8551)
CC @azat
2022-09-21 10:43:55 +01:00
Patrice.S a01c454376
spring-expression: initial integration (#8488) 2022-09-21 17:37:22 +10:00
Szabolcs Horvát b95ae7b412
igraph: move libxml2 download to build script (#8545)
I have moved the libxml2 download to the build script from the
Dockerfile, so I can more easily update the version, and related
operations would not be split up. Is this okay with you?

See
5a89bbc76c
2022-09-20 14:39:26 -04:00
Julien Voisin 0fe33b3bd3
Add more compressed formats support for libmagic (#8540)
Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-09-20 17:27:38 +01:00
Mirco Miranda 1690d89456
KImageFormats: add RAW plugin fuzzer (#8539)
New fuzzer to test the new camera RAW plugin.
2022-09-20 17:27:19 +01:00
Patrice.S 3f2bb3b38e
checker-framework: initial integration (#8532) 2022-09-20 09:50:42 -04:00
AdamKorcz d5eb14f834
golang: modify fuzzer (#8541)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-20 14:36:44 +01:00
Rob Bradford e8ac9ba77e
cloud-hypervisor: Add additional fuzzers (#8538)
New fuzzers since last update: virtio-{balloon, pmem, rng, watchdog}

Signed-off-by: Rob Bradford <robert.bradford@intel.com>

Signed-off-by: Rob Bradford <robert.bradford@intel.com>
2022-09-20 10:50:27 +01:00
Oliver Chang a6af5704de
Revert "[gpsd] initial integration" (#8537)
Reverts google/oss-fuzz#8493
2022-09-20 17:30:12 +10:00
Arjun 81006e27df
[gpsd] initial integration (#8493)
Hey @ckuethe , 
Can you take a look at this?

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
2022-09-20 16:52:15 +10:00
Julien Voisin f42f2551a9
Add a fuzzer for libmagic's db parsing (#8536)
Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-09-19 13:57:09 -07:00
Julien Voisin 44d55a37f3
Process compressed files and analyse as much as possible (#8535)
- MAGIC_COMPRESS: If the file is compressed, unpack it and look at the
contents.
- MAGIC_CONTINUE:  Return all matches, not just the first.

Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-09-19 08:48:28 -07:00
Patrice.S 5678b99ef5
spring-security-web: initial integration (#8530)
Co-authored-by: CheeseHunter117 <yoshi.weber@gmail.com>
2022-09-19 10:54:20 -04:00
Julien Voisin 609535a8df
Improve libmagic's corpus (#8533)
Co-authored-by: Julien Voisin <jvoisin@google.com>
2022-09-19 10:53:29 -04:00
Szabolcs Horvát ee3a25c0a4
igraph: update libxml2 to 2.10.0 (#8534) 2022-09-19 10:52:57 -04:00
manunio 60884064b0
toml_edit: initial integration (#8524)
Hi, [toml_edit](https://github.com/ordian/toml_edit) crate allows you to
parse and modify toml documents, while preserving comments, spaces and
relative order or items.
- It has 2 million+ downloads as per
[crates.io](https://crates.io/crates/toml_edit).
- It's being used by projects like
[cargo](https://github.com/rust-lang/cargo),
[diem](https://github.com/diem/diem),
[lapce](https://github.com/lapce/lapce),
[materialize](https://github.com/MaterializeInc/materialize),
[clap](https://github.com/clap-rs/clap),
[foundry](https://github.com/foundry-rs/foundry) as per [github's
dependent
graph](https://github.com/ordian/toml_edit/network/dependents?dependent_type=PACKAGE&package_id=UGFja2FnZS0zMjE3NzcwMjM2)
and [crates.io's reverse
dependencies](https://crates.io/crates/toml_edit/reverse_dependencies).
2022-09-19 10:52:29 -04:00
DavidKorczynski 783cdab978
g-api-common-protos: fix build (#8531) 2022-09-19 11:28:33 +01:00
Arjun 0277ae2e42
Update Mail ID (#8529)
updating the mail ID of Mr. @geographika
2022-09-19 10:25:20 +01:00
jduart bc079ae27d
Copy all fuzzers into SRC so they can be built (#8496)
build.sh is taking all the *_fuzzer.cc files and builds them as targets,
but the Dockerfile was not updated to copy the new fuzzers.

Co-authored-by: Jose Duart <jduart@google.com>
2022-09-19 11:55:01 +10:00
jonathanmetzman 60d8521290
Reenable MSAN for some more projects (#8523)
Co-authored-by: Dongge Liu <donggeliu@google.com>
2022-09-19 01:43:22 +00:00
Arjun dc7ece55e7
[ntpsec] initial integration (#8134)
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
2022-09-18 06:50:06 -04:00
Arjun c370184983
[coturn] initial integration (#8239)
Hello @misi 
For More Security Related issues in the @coturn interface, The
```coturn``` project can in deployed in ```oss-fuzz``` infrastructure.
I and ```oss-fuzz``` team would like to hear your thoughts on
integration.

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-09-18 06:49:07 -04:00
Evgeny Vereshchagin 730ee7b927
[elfutils] create tmpfiles properly (#7408)
Now fuzz-libdwfl and fuzz-libelf can be run a few times in a row
with files triggering crashes.

It's another follow-up to https://github.com/google/oss-fuzz/pull/7395
and https://github.com/google/oss-fuzz/pull/7393.
2022-09-18 06:42:11 -04:00
aschaich 9c8bf5c834
[reload4j] Initial Integration (#8428) 2022-09-17 20:55:50 -04:00
aschaich 1279124c3c
[hamcrest] Initial Integration (#8430) 2022-09-17 20:55:12 -04:00
aschaich ddb15112cc
[guava] add more fuzz targets (#8499) 2022-09-17 20:51:14 -04:00