Commit Graph

8388 Commits

Author SHA1 Message Date
Raphael Salas 4dbcd5f3a1
added architecture option to helper reproduce command (#9089)
Similar to #8972, reproducing seems to assume architecture and doesn't
allow specifying a target. This PR adds the `--architecture` flag to the
reproduce command, allowing reproduction in the target platform.

Tested by running `build_fuzzers` and then `reproduce` with defaults.
Now using `--architecture aarch64` works to reproduce.
2022-12-13 10:52:14 +11:00
aschaich 974f255c29
[jaxen] Initial Integration (#9157) 2022-12-13 10:38:54 +11:00
DavidKorczynski 7556698dbc
infra: make it possible to download public corpus (#9155)
Ref: https://github.com/ossf/fuzz-introspector/issues/587

CC @evverx 

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-12-12 09:35:17 -08:00
Bo Chen ff008d21db
cloud-hypervisor: Add new fuzzers (#9188)
New fuzzers are added for linux-loader

Signed-off-by: Bo Chen <chen.bo@intel.com>

Signed-off-by: Bo Chen <chen.bo@intel.com>
2022-12-12 09:32:48 -08:00
jonathanmetzman a9d8d7bb61
[CFL] Allow users to specify custom env vars for building/running (#9171)
They can do this by prefix the env var with CFL_EXTRA_. E.g.
`CFL_EXTRA_BUILD_SERVICE_TOKEN=<redacted>`.
Fixes: https://github.com/google/oss-fuzz/issues/9170
2022-12-12 11:00:19 -05:00
dependabot[bot] ade3ed3b9d
build(deps): bump nokogiri from 1.13.9 to 1.13.10 in /docs (#9165)
Bumps [nokogiri](https://github.com/sparklemotion/nokogiri) from 1.13.9
to 1.13.10.
<details>
<summary>Release notes</summary>
<p><em>Sourced from <a
href="https://github.com/sparklemotion/nokogiri/releases">nokogiri's
releases</a>.</em></p>
<blockquote>
<h2>1.13.10 / 2022-12-07</h2>
<h3>Security</h3>
<ul>
<li>[CRuby] Address CVE-2022-23476, unchecked return value from
<code>xmlTextReaderExpand</code>. See <a
href="https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-qv4q-mr5r-qprj">GHSA-qv4q-mr5r-qprj</a>
for more information.</li>
</ul>
<h3>Improvements</h3>
<ul>
<li>[CRuby] <code>XML::Reader#attribute_hash</code> now returns
<code>nil</code> on parse errors. This restores the behavior of
<code>#attributes</code> from v1.13.7 and earlier. [<a
href="https://github-redirect.dependabot.com/sparklemotion/nokogiri/issues/2715">#2715</a>]</li>
</ul>
<hr />
<p>sha256 checksums:</p>

<pre><code>777ce2e80f64772e91459b943e531dfef387e768f2255f9bc7a1655f254bbaa1
nokogiri-1.13.10-aarch64-linux.gem
b432ff47c51386e07f7e275374fe031c1349e37eaef2216759063bc5fa5624aa
nokogiri-1.13.10-arm64-darwin.gem
73ac581ddcb680a912e92da928ffdbac7b36afd3368418f2cee861b96e8c830b
nokogiri-1.13.10-java.gem
916aa17e624611dddbf2976ecce1b4a80633c6378f8465cff0efab022ebc2900
nokogiri-1.13.10-x64-mingw-ucrt.gem
0f85a1ad8c2b02c166a6637237133505b71a05f1bb41b91447005449769bced0
nokogiri-1.13.10-x64-mingw32.gem
91fa3a8724a1ce20fccbd718dafd9acbde099258183ac486992a61b00bb17020
nokogiri-1.13.10-x86-linux.gem
d6663f5900ccd8f72d43660d7f082565b7ffcaade0b9a59a74b3ef8791034168
nokogiri-1.13.10-x86-mingw32.gem
81755fc4b8130ef9678c76a2e5af3db7a0a6664b3cba7d9fe8ef75e7d979e91b
nokogiri-1.13.10-x86_64-darwin.gem
51d5246705dedad0a09b374d09cc193e7383a5dd32136a690a3cd56e95adf0a3
nokogiri-1.13.10-x86_64-linux.gem
d3ee00f26c151763da1691c7fc6871ddd03e532f74f85101f5acedc2d099e958
nokogiri-1.13.10.gem
</code></pre>
</blockquote>
</details>
<details>
<summary>Changelog</summary>
<p><em>Sourced from <a
href="https://github.com/sparklemotion/nokogiri/blob/main/CHANGELOG.md">nokogiri's
changelog</a>.</em></p>
<blockquote>
<h2>1.13.10 / 2022-12-07</h2>
<h3>Security</h3>
<ul>
<li>[CRuby] Address CVE-2022-23476, unchecked return value from
<code>xmlTextReaderExpand</code>. See <a
href="https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-qv4q-mr5r-qprj">GHSA-qv4q-mr5r-qprj</a>
for more information.</li>
</ul>
<h3>Improvements</h3>
<ul>
<li>[CRuby] <code>XML::Reader#attribute_hash</code> now returns
<code>nil</code> on parse errors. This restores the behavior of
<code>#attributes</code> from v1.13.7 and earlier. [<a
href="https://github-redirect.dependabot.com/sparklemotion/nokogiri/issues/2715">#2715</a>]</li>
</ul>
</blockquote>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="4c80121dc3"><code>4c80121</code></a>
version bump to v1.13.10</li>
<li><a
href="85410e3841"><code>85410e3</code></a>
Merge pull request <a
href="https://github-redirect.dependabot.com/sparklemotion/nokogiri/issues/2715">#2715</a>
from sparklemotion/flavorjones-fix-reader-error-hand...</li>
<li><a
href="9fe0761c47"><code>9fe0761</code></a>
fix(cruby): XML::Reader#attribute_hash returns nil on error</li>
<li><a
href="3b9c736bee"><code>3b9c736</code></a>
Merge pull request <a
href="https://github-redirect.dependabot.com/sparklemotion/nokogiri/issues/2717">#2717</a>
from sparklemotion/flavorjones-lock-psych-to-fix-bui...</li>
<li><a
href="2efa87b49a"><code>2efa87b</code></a>
test: skip large cdata test on system libxml2</li>
<li><a
href="3187d6739c"><code>3187d67</code></a>
dep(dev): pin psych to v4 until v5 builds in CI</li>
<li><a
href="a16b4bf14c"><code>a16b4bf</code></a>
style(rubocop): disable Minitest/EmptyLineBeforeAssertionMethods</li>
<li>See full diff in <a
href="https://github.com/sparklemotion/nokogiri/compare/v1.13.9...v1.13.10">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=nokogiri&package-manager=bundler&previous-version=1.13.9&new-version=1.13.10)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after
your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge
and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot close` will close this PR and stop Dependabot recreating
it. You can achieve the same result by closing it manually
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)
- `@dependabot use these labels` will set the current labels as the
default for future PRs for this repo and language
- `@dependabot use these reviewers` will set the current reviewers as
the default for future PRs for this repo and language
- `@dependabot use these assignees` will set the current assignees as
the default for future PRs for this repo and language
- `@dependabot use this milestone` will set the current milestone as the
default for future PRs for this repo and language

You can disable automated security fix PRs for this repo from the
[Security Alerts
page](https://github.com/google/oss-fuzz/network/alerts).

</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-12-12 10:51:55 -05:00
DavidKorczynski 7730d1d9e7
isodate: make call to parse_date explicit (#9187)
This is to make the introspector reports more clear, due to a current
limitation in control-flow extraction in Python.
2022-12-12 11:50:21 +00:00
DavidKorczynski cfe8beb54c
sqlparse: avoid recursion issues (#9186)
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=54212
2022-12-12 10:32:51 +00:00
DavidKorczynski 1b6c740e2d
infra: replace characters to fuzztest coverage urls (#9167)
The corpus URL generated for fuzztest fuzzers is invalid due to the use
of `@` and `.` characters in the fuzzer names.

The current URL created is e.g.
`gs://fuzztest-raksha-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/fuzztest-raksha_value_test@NumberTest.RoundTripNumberThroughDatalogString/`
whereas the correct URL is
`gs://fuzztest-raksha-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/fuzztest-raksha_value_test-NumberTest-RoundTripNumberThroughDatalogString/`.

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-12-12 10:27:05 +11:00
Navidem f6ef7cc41a
Bump FI (#9173) 2022-12-12 09:28:18 +11:00
Navidem 35d2567c9c
Add analytic tag for FuzzIntrospector. (#9178)
Fixes #9039.
2022-12-11 17:08:49 +11:00
Ivan Nardi cc613d3fcd
nDPI: use seed corpus and configuration files (#9182) 2022-12-10 13:55:30 -08:00
DavidKorczynski bb0a9f8c32
mrab-regex: avoid recursion error exceptions (#9183)
They are uninteresting.

Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=54203
2022-12-10 21:08:44 +00:00
DavidKorczynski 8ad4bc718b
pandas: fix build (#9181) 2022-12-10 21:08:22 +00:00
Tim Rühsen 4c08dabcbb
[wget2] Add libz-dev to fix the build (#9180)
This should at least fix the ./configure step.
2022-12-10 10:40:44 -08:00
DavidKorczynski 398da218c0
jmespathpy: catch recursion errors (#9179)
Fixes e.g.: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=54198
and https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=54196
2022-12-10 14:43:12 +00:00
Catena cyber fa0e49f4b4
suricata: avoid backslashes in dictionary (#9175)
I hope it can fix
https://github.com/OISF/suricata/actions/runs/3651897995/jobs/6169653264
2022-12-10 03:37:25 -08:00
Li-Yu Yu 0cf7e2cfa4
cras: Fix alsa-lib download (#9177)
* Switch from FTP to HTTPS
* Check checksum
* Simplify tarball unpack

Fixes https://crbug.com/oss-fuzz/54159.

cc @b92paul
2022-12-09 21:45:11 +00:00
Kevin Backhouse 182e63729a
Fix bug that affects reproducibility (#9176)
I made a mistake when I implemented this workaround:


6e299b2e23/projects/ruby/fuzz_ruby_gems.c (L288-L291)

To ensure that the workaround code won't get dead-code-eliminated by a
clever compiler optimization, I decided to feed bytes from the test data
in as an argument:


6e299b2e23/projects/ruby/fuzz_ruby_gems.c (L404-L406)

But that code only gets run on the first iteration (it's protected by a
static variable). That means that the code behaves differently when
you're trying to reproduce a testcase. This PR fixes the bug by
rewinding the bytestream back to the beginning after it's been used for
the workaround code.
2022-12-09 21:44:05 +00:00
DavidKorczynski ebe05f04ce
infra: add project name to python FI reports (#9174)
Fixes: https://github.com/ossf/fuzz-introspector/issues/674
2022-12-09 11:27:15 -08:00
Raphael Salas 6e299b2e23
[xs] Remove xs wrapper stub (#9172)
Previously in #7910 we added a wrapper that injected `detect_leaks=0`
into our fuzz targets, as certain runs of the targets did not disable
and it did not behave well with the allocator and gc (#7708). As far as
I can tell this is no longer needed as most runs of the fuzzing target
binary seem to use the options file to construct its arguments.

* The `run_fuzzer` command respects options.
* The `reproduce` command respects options (locally and in [reproducer
reports](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53429)).

Therefore, we should remove it. I've tested this running, reproducing,
debugging, and coverage with no observed changes.
2022-12-09 11:19:52 +00:00
AdamKorcz 87f8e9efd7
knative: initial integration (#9074)
Knative is an incubating CNCF project that is the foundation of Googles
Cloud Run:
https://cloud.google.com/blog/products/serverless/knative-based-cloud-run-services-are-ga.

Other cloud providers line IBM Cloud Code Engine and Red Hat Openshift
Serverless offer managed Knative solutions:
https://knative.dev/docs/install/knative-offerings.

Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-12-09 11:07:26 +00:00
DavidKorczynski 94d4153f6b
sqlparse: initial integration (#9161)
Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-12-09 10:58:00 +00:00
DavidKorczynski 9c87b13c67
mrab-regex: initial integration (#9152)
Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-12-09 10:57:22 +00:00
DavidKorczynski 7c45cd98db
simplejson: initial integration (#9146)
Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-12-09 10:56:41 +00:00
DavidKorczynski 726fb274b4
jmespath: initial integration (#9141)
Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-12-09 10:56:11 +00:00
DavidKorczynski 102c52351d
soupsieve: initial integration (#9139)
Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-12-09 10:51:31 +00:00
Daniel Novomeský c0e4bb8d15
kimageformats: do not install documentation for libzip (#9168)
This should help to solve/avoid issues like
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=54130
2022-12-08 10:04:05 -08:00
Arjun 99b565c9a9
[pjsip] initial integration (#8934)
@ismangil @trengginas @bennylp @sauwming @nanangizz 

- Thoughts on integration (can pjsip team fix security issues reported
by oss-fuzz)?
- Review the harness code.



Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
Signed-off-by: Arjun Singh <ajsinghyadav00@gmail.com>
2022-12-08 22:52:27 +11:00
Greg Hanson 8371f162ca
Update project.yaml (#9162)
add new member to list of emails:
https://github.com/istio/community/blob/master/org/teams.yaml#L219
2022-12-07 23:27:59 +00:00
AdamKorcz 38d9787e44
istio: fix CI issue (#9163)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-12-07 15:17:25 -08:00
jonathanmetzman 59293013b6
Upgrade packages (related: #9151) (#9164) 2022-12-07 17:50:21 -05:00
Ondřej Surý 6e9d0defcf
bind9: Add libcap-dev as it is mandatory on Linux now (#8949)
Signed-off-by: Ondřej Surý <ondrej@sury.org>
2022-12-07 15:30:38 -05:00
Rainy Sinclair 296a0fc7b6
Add Rainy Sinclair to wasmtime (#9147) 2022-12-07 08:50:21 -08:00
aschaich b3f312b78f
[netty] Add fuzz target for netty-buffer (#9156) 2022-12-07 08:28:28 -08:00
DavidKorczynski 75039c0509
libcst: catch recursion issues (#9150)
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=54087

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-12-07 10:33:59 +00:00
Oliver Chang 09b178f416
Remove network call from github_scarecrow.
This doesn't work in our fuzzing env.
2022-12-07 15:03:41 +11:00
jonathanmetzman 4799eb3012
Undo 2022-12-06 17:40:56 -05:00
Catena cyber a857bfbca0
SystemSan: arbitrary DNS resolution detection (#9119)
cc @oliverchang @Alan32Liu after #9100 and #8448

After compiling locally, I can see that
`./SystemSan ./target_dns -dict=vuln.dict`
crashes in a few seconds with
```
===BUG DETECTED: Arbitrary domain name resolution===
===Domain resolved: .f.z===
===DNS request type: 0, class: 256===
==315== ERROR: libFuzzer: deadly signal
    #0 0x539131 in __sanitizer_print_stack_trace /src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3
    #1 0x457c48 in fuzzer::PrintStackTrace() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerUtil.cpp:210:5
    #2 0x43c923 in fuzzer::Fuzzer::CrashCallback() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:233:3
    #3 0x7fa57940041f  (/lib/x86_64-linux-gnu/libpthread.so.0+0x1441f) (BuildId: 7b4536f41cdaa5888408e82d0836e33dcf436466)
    #4 0x7fa5793ff7db in send (/lib/x86_64-linux-gnu/libpthread.so.0+0x137db) (BuildId: 7b4536f41cdaa5888408e82d0836e33dcf436466)
    #5 0x503ba4 in __interceptor_send /src/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:6802:17
    #6 0x7fa578abf462  (/lib/x86_64-linux-gnu/libresolv.so.2+0xb462) (BuildId: 4519041bde5b859c55798ac0745b0b6199cb7d94)
    #7 0x7fa578abbc43 in __res_context_query (/lib/x86_64-linux-gnu/libresolv.so.2+0x7c43) (BuildId: 4519041bde5b859c55798ac0745b0b6199cb7d94)
    #8 0x7fa578abc8ed in __res_context_search (/lib/x86_64-linux-gnu/libresolv.so.2+0x88ed) (BuildId: 4519041bde5b859c55798ac0745b0b6199cb7d94)
    #9 0x7fa578ad2cc1  (/lib/x86_64-linux-gnu/libnss_dns.so.2+0x2cc1) (BuildId: 3fac4ec397ba8e8938fe298f103113f315465130)
    #10 0x7fa578ad2e8b in _nss_dns_gethostbyname3_r (/lib/x86_64-linux-gnu/libnss_dns.so.2+0x2e8b) (BuildId: 3fac4ec397ba8e8938fe298f103113f315465130)
    #11 0x7fa578ad2f41 in _nss_dns_gethostbyname2_r (/lib/x86_64-linux-gnu/libnss_dns.so.2+0x2f41) (BuildId: 3fac4ec397ba8e8938fe298f103113f315465130)
    #12 0x7fa5792fdc9d in gethostbyname2_r (/lib/x86_64-linux-gnu/libc.so.6+0x130c9d) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
    #13 0x7fa5792d179e  (/lib/x86_64-linux-gnu/libc.so.6+0x10479e) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
    #14 0x7fa5792d2f58 in getaddrinfo (/lib/x86_64-linux-gnu/libc.so.6+0x105f58) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
    #15 0x4d93ac in getaddrinfo /src/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:2667:13
    #16 0x56c8d9 in LLVMFuzzerTestOneInput /out/SystemSan/target_dns.cpp:35:11
    #17 0x43dec3 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
    #18 0x43d6aa in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
    #19 0x43ed79 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:757:19
    #20 0x43fa45 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:895:5
    #21 0x42edaf in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
    #22 0x458402 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
    #23 0x7fa5791f1082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
    #24 0x41f7ed in _start (/out/SystemSan/target_dns+0x41f7ed)

NOTE: libFuzzer has rudimentary signal handlers.
      Combine libFuzzer with AddressSanitizer or similar for better crash reports.
SUMMARY: libFuzzer: deadly signal
MS: 2 CrossOver-ManualDict- DE: "f.z"-; base unit: ac3478d69a3c81fa62e60f5c3696165a4e5e6ac4
0x66,0x2e,0x7a,
f.z
artifact_prefix='./'; Test unit written to ./crash-926813b2d6adde373f96a10594a5314951588384
Base64: Zi56
```

You can also try
```
echo -n f.z > toto
./SystemSan ./target_dns toto  
```

Co-authored-by: Oliver Chang <oliverchang@users.noreply.github.com>
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-12-06 08:23:32 -05:00
aschaich bfdc5b998d
[netty] Add another maintainer (#9144) 2022-12-06 04:12:26 -08:00
Oliver Chang 298b1fdb3d
Disable arbitrary file read sanitizer. (#9142)
This is currently too noisy, and may mask our other sanitizers.

We can re-enable this once we have flag/options support.
2022-12-06 11:54:32 +11:00
AdamKorcz d411713735
moby: improve daemon fuzzer (#9140)
Adds the `imageService` to the daemon.
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-12-05 14:08:31 -08:00
AdamKorcz f3328ca920
moby: build upstream fuzzers (#9137)
Removes fuzzers from OSS-Fuzz that have been moved upstream. 
Builds the fuzzers from upstream repository.

Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-12-05 20:17:54 +00:00
Riccardo Schirone 2663f7157b
lxml: use upstream static dependencies (#9136)
The dependencies coming from base-builder-python might be old, let's use
the upstream ones that are downloaded by the setup.py script.

Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47038
2022-12-05 12:12:38 -08:00
DavidKorczynski a0c00da018
libcst: initial integration (#9128)
Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-12-05 11:17:02 -08:00
aschaich 48c3ecd9eb
[netty] Initial Integration (#9134) 2022-12-05 11:16:27 -08:00
Ivan Nardi 3baf95b6ec
nDPI: fix introspector build (#9135)
Since
3e4ab39b52
nDPI should be compatibile with LTO and Gold Linker.
Add a workaround for the "missing dependencies errors" described in
#8939
2022-12-05 10:10:35 -08:00
Arjun 7adb2ea138
[CUPS] Issue 54041 in oss-fuzz: cups: Fuzzing build failure (#9133)
```
"compile-afl-address-x86_64": /usr/bin/ld: cannot find -lz
```
2022-12-05 09:46:44 -05:00
jonathanmetzman 1ea19bdf1d
update requirements.txt (#9109) 2022-12-05 09:45:59 -05:00
jonathanmetzman 1766eda106
Update package-lock (#9108) 2022-12-05 09:44:59 -05:00