brameret
561775b2e0
S2OPC: update build parameters ( #8142 )
2022-08-03 18:03:00 +01:00
DavidKorczynski
d124b72b7e
woff2: fix afl++ build ( #8141 )
...
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47208
2022-08-03 17:55:00 +01:00
AdamKorcz
ee39b4603c
jackson-databind: add writer fuzzer ( #8137 )
...
Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-08-03 12:02:49 +01:00
Rob Bradford
20e46efddb
cloud-hypervisor: Add newly added fuzzers ( #8135 )
...
New fuzzers for the cmos and serial devices along with fuzzing of the
http API frontend have been added.
Signed-off-by: Rob Bradford <robert.bradford@intel.com>
2022-08-03 10:48:10 +01:00
DavidKorczynski
c2624a1dc0
google-python-firestore: initial integration ( #8014 )
2022-08-03 09:27:49 +01:00
DavidKorczynski
13cc873327
iniconfig: initial integration ( #8130 )
...
* iniconfig: initial integration
* iniconfig: add issue restriction preferences
2022-08-03 09:27:34 +01:00
Catena cyber
2964ab1af5
execscan: detect arbitrary file open ( #8009 )
...
* execscan: detect arbitrary file open
* Checks for unknown top dir
* move the file open test to its own fuzz target
* Fixups from PR review
2022-08-03 13:09:32 +10:00
Arthur Chan
54bd706197
ntlm2-request: initial integration ( #7800 )
...
* ntlm2-request: initial integration
2022-08-03 00:31:11 +01:00
DavidKorczynski
f00696989a
lcms: extend transform_extended fuzzer ( #8129 )
2022-08-02 20:43:09 +01:00
AdamKorcz
a21e0f2eaf
jackson-core: Extend fuzzers ( #8128 )
...
Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-08-02 16:48:04 +01:00
Tomas Tauber
1f30f70eeb
pest: fix build failure ( #8127 )
...
cleared RUSTFLAGS for bootstrap
closes https://github.com/pest-parser/pest/issues/676
2022-08-02 15:42:12 +01:00
Evgeny Vereshchagin
700853c524
[dbus-broker] use wildcards to link dependencies ( #8126 )
...
to make it possible to update them without having to edit
the build script.
2022-08-02 15:41:44 +01:00
DavidKorczynski
31f28b9ea6
g-api-pubsub: extend fuzzing ( #8125 )
...
* g-api-pubsub: extend
- Consume strigns without surrogates instead of catching unicode
exceptions
* pubsub: extend fuzzer
2022-08-02 14:34:15 +01:00
AdamKorcz
0b76cab01b
jackson-core: add 2 fuzzers ( #8123 )
...
Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-08-02 12:55:00 +01:00
Kleis Auke Wolthuizen
199ca9c363
libvips: add missing linker flag for sharpyuv ( #8122 )
2022-08-02 12:09:25 +01:00
AdamKorcz
d5bf9f53f6
Jackson -core and -databind: add maintainers ( #8120 )
...
Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-08-02 10:23:43 +01:00
Arthur Chan
56ca5056a4
ADAL: intial integration ( #8000 )
...
Create fuzzers
2022-08-02 10:02:57 +01:00
Arthur Chan
76eb154ab7
gunicorn: intial integration ( #7921 )
...
Create util fuzzer
2022-08-02 10:01:50 +01:00
Arthur Chan
a8d6f1e9d4
decorator: initial integration ( #7998 )
...
* decorator: initial integration
Create fuzzers
* decorator: initial integtaion
Fix fuzzer
2022-08-02 10:00:55 +01:00
jonathanmetzman
3bed5727dd
Fix test ( #8119 )
2022-08-01 21:00:00 -04:00
jonathanmetzman
093f61f727
Tag builds with image suffix to make clearer in UI ( #8117 )
2022-08-02 00:59:49 +00:00
jonathanmetzman
90d60450aa
Build clang with all available cores. ( #8116 )
...
* nproc
* Remove comment
2022-08-01 20:56:55 -04:00
jonathanmetzman
3f31d55731
Update docs gems ( #8115 )
2022-08-02 10:44:36 +10:00
jonathanmetzman
b64ec26f8d
Use test-image ( #8118 )
2022-08-01 20:43:20 -04:00
jonathanmetzman
04c738d9bc
Fix trial builds ( #8114 )
2022-08-01 19:04:31 -04:00
jonathanmetzman
c3495be8f4
Support concurrent trial builds. ( #8113 )
...
Do this by appending the branch to the test image suffix.
2022-08-01 18:47:44 -04:00
Reed Loden
7e8cab3d29
teleport: Add @jakule to `auto_ccs` to grant access to issues ( #8109 )
2022-08-01 18:49:43 +00:00
Christopher Durham
5ffb6577b7
Switch to primary Google Account email address ( #8097 )
...
as with #8090
2022-08-01 13:22:32 -04:00
Navidem
d8fefb5b76
Bump FI and adjust the path to main.py in compile ( #8078 )
...
* Bump FI and adjust the path to main.py in compile
* Fix llvm build script
* Update FI version
* Update FI version
2022-08-01 09:59:21 -07:00
Tomas Tauber
2a28ab5bc9
pest: Add my Google Account email address ( #8099 )
...
As with https://github.com/google/oss-fuzz/pull/8090 https://github.com/google/oss-fuzz/pull/8097
I cannot access the pages with oss-fuzz bug reports (e.g. links in https://github.com/pest-parser/pest/issues/674 ).
I am one of maintainers (you can verify my address by checking the recent pest repository git log entries).
2022-08-01 11:08:40 -04:00
DavidKorczynski
5c5dab6745
git: add myself to auto_ccs ( #8106 )
...
Following internal discussions with @steadmon and @oliverchang
2022-08-01 11:05:13 +01:00
Arjun
f0aacdb10b
Fix mail authorization. ( #8101 )
...
You (email=) are not authorized to access this page!
2022-07-31 21:39:16 +01:00
Kleis Auke Wolthuizen
16d7deebd6
libvips: build improvements ( #8102 )
...
- Remove libgflags-dev, no longer needed by libjxl.
- Remove CMake options that are already default.
- Split long build options across multiple lines.
- Use the RelWithDebInfo build type for CMake builds.
- Use the debugoptimized build type for Meson builds (except for libvips itself).
- Avoid using the bundled lcms2 dependency in libjxl.
- Ensure libjxl builds against the static zlib library.
2022-07-31 21:37:39 +01:00
Max
d417f39fed
Improve e2fsprogs fuzzers ( #8098 )
...
* Fixed up ext2fs fuzzers.
Disable checksum fatal errors, making fuzzing a bit easier.
* Fixed missing path separator
Co-authored-by: mxms <mxms@google.com>
2022-07-29 14:06:14 -07:00
DavidKorczynski
ace5408cf5
lcms: extend fuzzing suite ( #8095 )
...
* lcms: extend fuzzing suite
Add a fuzzer that target various output formats when transforming. There
are more oppournities to extend this further but will let this fuzzer
run for a while to see how it goes.
* nit
2022-07-29 13:34:34 +01:00
DavidKorczynski
2bb650c6ef
jsmin: initial integration ( #8077 )
2022-07-28 21:35:01 -07:00
Arjun
ca2d1558d5
[libmodbus] initial integration ( #8048 )
...
* [libmodbus] initial integration
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
* fix hardcode flags
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
* [libmodbus] libfuzz support
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
* [libmodbus] fix
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
* add opt in build.sh
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
* everything is brrr
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
* add new line
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
* Update Dockerfile
* Update build.sh
* Update FuzzClient.c
* Update FuzzServer.c
* fix copy dir
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
* fix ld error
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
* fix input for fuzzer
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
* set size of input
Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-28 23:25:47 +00:00
Henry Lin
accf707b54
Tomcat: Update project.yaml and add fuzz targets ( #8092 )
...
Update project.yaml and add fuzz targets
2022-07-28 15:32:38 -07:00
Hasnain Lakhani
2d87d21344
Update ownership of Meta projects. ( #8093 )
...
I'll no longer be working on fuzzing at Meta, so updating the ownership lists to add more folks from my team.
I added the vendor_cc list where it was missing.
I also removed a few employees that no longer are at Meta from the proxygen project list.
2022-07-28 15:31:19 -07:00
b92paul
06efe97ba0
[MSAN] Enable memory sanitizer build ( #8094 )
...
* CRAS: Use CARGO_BUILD_TARGET="x86_64-unknown-linux-gnu"
In oss-fuzz, to build with MemorySanitizer, Rust part needs to use
```
CARGO_BUILD_TARGET="x86_64-unknown-linux-gnu"
```
to resolve libc `MemorySanitizer: use-of-uninitialized-value` error
according to https://github.com/google/oss-fuzz/issues/3469 .
* CRAS: Add new member to auto_ccs
Co-authored-by: paulhsia <paulhsia@google.com>
2022-07-28 12:18:18 +01:00
Arthur Chan
6945f4c77c
oauth2client: initial integration ( #8083 )
...
* oauth2client: initial integration
Create fuzzers
* Update fuzz_basic.py
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-27 09:27:56 -07:00
aschaich
f23485dbad
[apache-commons] Add some fuzz-targets for commons-math ( #8089 )
...
Add some fuzz-targets for commons-math
Bring in some fuzz targets for Clustering, DistanceMetrics
and Linear Optimization
Co-authored-by: psy <patrice.salathe@code-intelligence.com>
2022-07-27 14:54:14 +00:00
Noah
7d01c93774
Switch to primary Google Account email address ( #8090 )
2022-07-27 14:52:45 +00:00
b92paul
d876e1aead
cras: Support -DHAVE_FUZZER ( #8088 )
...
To fix https://crbug.com/oss-fuzz/49371 ,
passing HAVE_FUZZER flag during library build stage.
And by pass DBus usage in https://crrev.com/c/3787999 .
BUG=oss-fuzz:49371
Co-authored-by: paulhsia <paulhsia@google.com>
2022-07-27 14:29:57 +01:00
DavidKorczynski
c751c97df5
lcms: add dictionary to transform_all_fuzzer ( #8087 )
2022-07-27 10:53:13 +01:00
DavidKorczynski
c00c701743
wuffs: fix build by fixing corpus link ( #8084 )
...
Existing corpus link is no longer accessible. Switching to a reliable source.
Fixing this also to unbreak Fuzz Introspector tests here https://github.com/ossf/fuzz-introspector/issues/412#issuecomment-1195537545
2022-07-26 13:48:31 -07:00
Alexander Bulekov
0a8db249a5
qemu: limit input size to avoid timeouts ( #8085 )
...
QEMU coverage builds have been failing for a long time. Maybe this is
occuring due to the inputs being too large and timing out. Limit the
input size, in an attempt to fix this.
Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
2022-07-26 17:01:17 +01:00
DavidKorczynski
2efe7c9ee5
g-api-auth-library-python: embed .pem files in pyinstalled exec ( #8082 )
...
This fixes:
https://github.com/google/oss-fuzz/issues/8030#issuecomment-1194645711
2022-07-26 09:56:36 +01:00
Guido Vranken
a34bf6d822
[nettle] Update auto_ccs ( #8076 )
2022-07-26 00:41:32 +01:00
Arthur Chan
3b7fa87b7d
Retry: initial integration ( #7952 )
...
* Retry: initial integration
Create retry fuzzer
* retry: Fix fuzzer
Remove randomization in fuzzer
2022-07-26 00:41:05 +01:00