Commit Graph

9840 Commits

Author SHA1 Message Date
DavidKorczynski 3ceb6a32ba
libevent: extend with a http fuzzer (#11024)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-09-26 17:12:56 +01:00
Thomas Klausner 2f0f45740a
libzip: add two maintainers to auto_ccs (#11021)
Closes #11020.
2023-09-26 12:39:31 +00:00
Dominik Stadler 3e38f99461
Apache POI: install libraries for awt and adjust xmx (#11006)
These changes add some additional .so files to the container so that
loading some classes from java.awt works.

See #10933 and #7380 for related discussions.

Also decrease "Xmx" as it seems we get native OOM in Jazzer-runs
otherwise.
2023-09-24 21:20:43 +01:00
DavidKorczynski 62e44b70ef
libevent: fix leak (#11007)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-09-24 20:06:50 +00:00
DavidKorczynski 5b4074a9a9
libevent: add buffer fuzzer (#11003)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-09-23 23:06:55 +01:00
DavidKorczynski 53dcfc70f7
glslang: fix build and update fuzzer (#10999)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-09-22 23:07:56 +00:00
DavidKorczynski 8e9b414eb6
tensorflow: fix coverage (#10998) 2023-09-22 21:01:34 +01:00
jonathanmetzman 0c3d2e3d33
Improve stdout/stderr handling and make sure errors are debuggable (#10993)
Whenever we fail, ensure there's a proper stderr written to stderr.
Also, only write stderr to stderr never to stdout
2023-09-21 21:21:39 -04:00
Arthur Chan 60c2923cf4
undertow: initial integration (#10990)
Initial integration of project undertow.

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>
2023-09-21 09:44:57 +10:00
Arjun 8a2fe3e5da
[trafficserver] remove build.sh (#10986)
Remove `build.sh` and move to trafficserver repo.
https://github.com/apache/trafficserver/pull/10466

---------

Signed-off-by: Arjun Singh <ajsinghyadav00@gmail.com>
2023-09-20 21:20:04 +01:00
Evgeny Vereshchagin 026d218ed7
[avahi] file issues on GitHub (#10988)
to make it easier to keep track of them.
2023-09-20 21:19:30 +01:00
Arthur Chan 71ecd5d4e4
fastify: initial integration (#10983)
Fastify is a javascript web framework and it's a foundation project from
[OpenJS](https://openjsf.org/). It's used by a lot of
[organisations](https://fastify.dev/organisations/) (50+ listed on its
website), including:
- Microsoft
- [Net-a-porter](https://www.net-a-porter.com/en-gb/) (fyi, this is a
large UK e-commerce website with 1.8 billion in revenue)
- [Amerisave](https://www.amerisave.com/)

Maintainers are happy to integrate this and is listed as primary
contact.

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>
2023-09-19 09:55:59 +01:00
Arjun 5046d92f67
[trafficserver] update (#10800)
For PR: https://github.com/apache/trafficserver/pull/10151

Signed-off-by: Arjun Singh <ajsinghyadav00@gmail.com>
2023-09-19 14:10:04 +10:00
DavidKorczynski ff639ce427
libcst: fix build (#10985)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-09-19 10:55:29 +10:00
DavidKorczynski b030f5c948
numpy: fix build (#10984)
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=62481

Signed-off-by: David Korczynski <david@adalogics.com>
2023-09-18 23:24:22 +01:00
Henry Lin 05c5736806
Fix issues for multiple projects (#10971)
Previous Jazzer version only instrument code under the same package as
the fuzz test, this PR adds `--instrumentation_includes` to several
projects.

Also fix build failures in jdom and jsqlparser, fix fuzzing blocker in
qdox and avro, delete not needed file in apache-cxf
2023-09-18 12:22:06 +01:00
Remi Gacogne ec24611f7a
powerdns: Go back to the correct working directory on old branches (#10962)
96b8b80172 did not properly fix the issue
because on older branches, where dnsdist does not have its own fuzzing
targets, we do not properly go back to the checkout directory and thus
the next step fails.
2023-09-18 10:36:27 +10:00
Arthur Chan 44970f4782
javacpp: initial integration (#10964)
Initial integration for project javacpp.

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>
2023-09-18 10:35:54 +10:00
Martin Geisler 58e85c17c0
Use my Gmail address for textwrap (#10977)
I just realized that I don't have access to a dashboard because my
non-Gmail address was used here.
2023-09-18 10:08:59 +10:00
Dominik Stadler 15627bd1f7
apache-poi: Some more expected exceptions (#10978)
Ignore one more case where java.awt is missing native libs and other
expected exceptions

Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=62275
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=62333
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=62354
2023-09-18 10:08:23 +10:00
DavidKorczynski d4f443201a
cubefs: update project yaml (#10961) 2023-09-16 11:24:23 +01:00
AdamKorcz 102dedc774
cubefs: fix broken build (#10974)
Signed-off-by: AdamKorcz <adam@adalogics.com>
2023-09-16 10:42:44 +01:00
Kit Chan 6a8a196aa2
trafficserver: fix build issue (#10972) 2023-09-16 00:04:50 +01:00
manunio 36450c6f68
burntsushi-toml: remove input limit (#10966)
Removing input limit as this target have not found anything notable yet,
mostly because of large cap.
2023-09-15 15:49:39 -04:00
Mihai Maruseac c05ec5dedc
Fix bazel invocations with jcc (#10973)
We only need to make sure that if the wrapped compiler (clang) prints
something to stderr, we report that to stderr in the wrapper, __even
if__ the compiler exits with 0. This is because when starting up, Bazel
invokes the compiler with various flags to detect what features are
available and what flags to pass during regular compilation. The
detection is based on the stderr of the compiler invocation, so we need
to make sure we are properly printing out stderr. Finally, Bazel uses
stderr to determine if the compiler is clang / gcc or a third option. If
we don't report stderr, then Bazel considers we are using a generic
compiler and then gets confused about what to generate in the toolchain.

Currently, this is the diff from the toolchain autoconfig when Bazel
starts up:

```diff
--- w-clang/bazel-w-clang/external/bazel_tools~cc_configure_extension~local_config_cc/BUILD     2023-09-15 16:54:56.131676995 +0000
+++ w-jcc/bazel-w-jcc/external/bazel_tools~cc_configure_extension~local_config_cc/BUILD 2023-09-15 18:17:24.486499047 +0000
@@ -85,16 +85,13 @@
     "/usr/include/x86_64-linux-gnu",
     "/usr/include",
     "/usr/local/lib/clang/15.0.0/share",
-    "/usr/include/c++/9",
-    "/usr/include/x86_64-linux-gnu/c++/9",
-    "/usr/include/c++/9/backward",
     "/usr/local/include/c++/v1"],
     tool_paths = {"ar": "/usr/bin/ar",
         "ld": "/usr/bin/ld",
         "llvm-cov": "/usr/local/bin/llvm-cov",
         "llvm-profdata": "/usr/local/bin/llvm-profdata",
         "cpp": "/usr/bin/cpp",
-        "gcc": "/usr/local/bin/clang-15",
+        "gcc": "/usr/local/bin/clang-jcc",
         "dwp": "/usr/bin/dwp",
         "gcov": "/usr/bin/gcov",
         "nm": "/usr/bin/nm",
```

The 3 missing header files could be because of
7a4eefa869/tools/cpp/unix_cc_configure.bzl (L316-L321)
but I could not find a way to force this. So far, it didn't look like it
was causing problems though.

---------

Signed-off-by: Mihai Maruseac <mihaimaruseac@google.com>
2023-09-15 15:27:18 -04:00
jonathanmetzman 94185e4b20
[libwebp] Enable centipede (#10968)
CC @jzern
2023-09-15 11:42:03 -04:00
van Hauser 318f612d30
Update AFL++ commit ID (#10932)
Adds a few features that are very beneficial for CI fuzzing. e.g.
AFL_IGNORE_SEED_PROBLEMS
This also fixes several minor bugfixes.

---------

Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2023-09-14 16:32:17 -04:00
Arthur Chan a76d1f8ec8
roaring-bitmap: initial integration (#10952)
Initial integration for project RoaringBitmap.

---------

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>
2023-09-15 00:01:55 +10:00
manunio ee9f211d56
askama: initial integration (#10935)
Hi, [Askama](https://github.com/djc/askama) is one of the popular
template rendering engine based on
[Jinja](https://jinja.palletsprojects.com/).
- It has `3 million+` downloads as per
[crates.io](https://crates.io/crates/askama).
 - It being used by projects like:
   - [mozilla/uniffi-rs](https://github.com/mozilla/uniffi-rs)
     - a multi-language bindings generator for rust. 
- It also used along with web frameworks like
[actix](https://crates.io/crates/actix),
[axum](https://crates.io/crates/axum),
[warp](https://crates.io/crates/warp).
2023-09-14 22:39:17 +10:00
Dongge Liu 4b21830e20
Change to `WORKDIR` before running commands in cloud project experiments. (#10918)
Mitigates the known issue where we don't automatically change to the
`WORKDIR` defined in `Dockerfile` when running cloud experiments.

Question:
Would it be preferred if I introduce a flag for this?
(e.g., `--use_workdir` or `--workdir=/src/<project>`)
While this gives more flexibility, I feel `cd` to `WORKDIR` should
always be preferred if we want the cloud experiments to behave the same
as local ones.
2023-09-14 07:05:18 -04:00
Holly Gong d81e44f16c
fix PR helper when commits have no author. (#10959)
PR helper fails when author information is null. Adding a check before
get login name.

![image](https://github.com/google/oss-fuzz/assets/39108850/f4f3aaa8-3edb-4745-93e1-c6da047d0b7b)
https://github.com/google/oss-fuzz/issues/10955
2023-09-14 12:59:14 +10:00
Arthur Chan 868a94f2f0
unirest-java: initial integration (#10943)
Initial integration for project unirest-java.

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>
2023-09-14 11:19:10 +10:00
Arthur Chan 79b11b83ee
dropwizard: initial integration (#10942)
Initial integration for dropwizard.

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>
2023-09-14 11:06:59 +10:00
James Zern f5047a92a1
libwebp: add huffman_fuzzer (#10957)
This was added in:

a35ea50de4
a35ea50d Add a fuzzer for ReadHuffmanCodes
2023-09-13 20:34:07 +01:00
Sergey Bronnikov be54999d4f
lua: use common Lua library by tests (#10956)
Commit 0736b5b08f ("[Lua]initial
integration. (#4653)") introduces a test that used a Lua library built
from source code. Tests [1] added later builds its own Lua library and
as a result we have two directories with the same source code and code
coverage report (and probably Fuzz Introspector) accounts overall code
coverage separately.

The patch switches fuzz_lua test to using Lua library build by
additional tests [1].

1. https://github.com/ligurio/lua-c-api-tests
2.
https://storage.googleapis.com/oss-fuzz-coverage/lua/reports/20230911/linux/src/testdir/build/lua-master/source/report.html
3.
https://storage.googleapis.com/oss-fuzz-coverage/lua/reports/20230911/linux/src/lua/report.html
2023-09-13 20:33:17 +01:00
Catena cyber f71f162a91
infra: update swift to 5.8.1 (#10922)
As done last year by @thomasvl cf
https://github.com/google/oss-fuzz/pull/8501

Hopefully fixes
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=61809

Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2023-09-13 14:05:34 -04:00
AdamKorcz 7f893b209d
Fix broken Go coverage reports (#10948)
Fixes https://github.com/google/oss-fuzz/issues/10916

Signed-off-by: AdamKorcz <adam@adalogics.com>
2023-09-13 14:04:44 -04:00
Gilles Peskine ab017e5c62
mbedtls: test experimental features (#9824)
In the mbedtls fuzzer, enable some non-default features that are
supposed to be secure and so should be fuzzed. In particular:

* Test both with and without `MBEDTLS_USE_PSA_CRYPTO` (which has a major
impact on X.509 and TLS).
* Test both with and without `MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED` and
`MBEDTLS_RSA_NO_CRT` (which affect X25519 and RSA respectively).
* Enable non-default features (in particular, at this time, PKCS#7).

Fixes https://github.com/Mbed-TLS/mbedtls/issues/6708.

---------

Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2023-09-13 17:49:03 +00:00
maryla-uc 5b4fef3609
Update project.yaml (#10947)
Add vrabaud@google.com
2023-09-13 12:22:36 -04:00
Catena cyber 6efce3bcf4
Update Go to 1.21 (#10920)
cc @DavidKorczynski 

Should replace https://github.com/google/oss-fuzz/pull/9950

Should fix ngolo-fuzzing build cf
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=60807
2023-09-13 12:17:27 -04:00
Sergey Bronnikov d297c02170
tarantool: enable ASAN in LuaJIT (#10953)
The patch enables ASAN in a LuaJIT used by Tarantool. See [1] and [2].

Follows up tarantool/tarantool#5878

1.
bacf4e56eb
2.
6745d4afba
2023-09-13 17:13:33 +01:00
AdamKorcz b6f4f9c497
kyverno: temporarily clone fork (#10944)
My fork of Kyverno contains two new fuzzers that should run for a bit on
OSS-Fuzz before they are merged upstream.

This PR temporarily points Kyvernos OSS-Fuzz integration to my fork to
collect runtime and performance metrics over the next few days.

Signed-off-by: AdamKorcz <adam@adalogics.com>
2023-09-12 23:39:38 +01:00
Norbert Schneider 59b8860883
Update Node.js setup for JavaScript projects (#10941)
Migrate the Node.js setup to the currently recommended way and version.
The previously used installation scripts are no longer maintained.

Fixes #10936
2023-09-12 18:09:41 -04:00
Jan Lübbe 411d3b2cb9
rauc: initial integration (#10910) 2023-09-12 15:21:48 -04:00
Szabolcs Horvát 5f372e6e79
igraph: enable centipede (#10938)
See
https://github.com/google/oss-fuzz/pull/10622#issuecomment-1714795863
2023-09-12 15:51:33 +01:00
Remi Gacogne 96b8b80172
powerdns: Fix CI Fuzz on stable branches (#10939)
Stable branches do not have the recent per-product split that was
introduced in #10926, and thus CI Fuzz fails on them. This commit checks
that there actually is at least one fuzzing target in the `dnsdistdist/`
directory before trying to build them, so that this step can be skipped
on older branches.
2023-09-12 13:59:46 +01:00
Shen-Ta Hsieh(BestSteve) 0707607b81
wasmedge: fix build (#61860) (#10934)
* Add `$origin` in rpath for missing library.
* Update unit test version

Signed-off-by: Shen-Ta Hsieh <beststeve@secondstate.io>
2023-09-11 10:34:35 -04:00
Catena cyber 7c3296b6bc
ecc-diff-fuzzer: fix build with libecc (#10921)
Should fix https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=61637
2023-09-11 10:30:57 -04:00
Dominik Stadler 5bd6213eb0
apache-poi: expect 2 more exceptions (#10933)
Add two more Exceptions which popped up when running fuzzing at large
scale.

There is one more place where font-handling is triggered, but not
available
on the VMs that run fuzzing
2023-09-11 14:29:10 +01:00
DavidKorczynski 31cb5ddba2
nbclasic: fix build (#10928)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-09-08 15:09:39 +01:00