Commit Graph

7520 Commits

Author SHA1 Message Date
brameret 561775b2e0
S2OPC: update build parameters (#8142) 2022-08-03 18:03:00 +01:00
DavidKorczynski d124b72b7e
woff2: fix afl++ build (#8141)
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47208
2022-08-03 17:55:00 +01:00
AdamKorcz ee39b4603c
jackson-databind: add writer fuzzer (#8137)
Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-08-03 12:02:49 +01:00
Rob Bradford 20e46efddb
cloud-hypervisor: Add newly added fuzzers (#8135)
New fuzzers for the cmos and serial devices along with fuzzing of the
http API frontend have been added.

Signed-off-by: Rob Bradford <robert.bradford@intel.com>
2022-08-03 10:48:10 +01:00
DavidKorczynski c2624a1dc0
google-python-firestore: initial integration (#8014) 2022-08-03 09:27:49 +01:00
DavidKorczynski 13cc873327
iniconfig: initial integration (#8130)
* iniconfig: initial integration

* iniconfig: add issue restriction preferences
2022-08-03 09:27:34 +01:00
Catena cyber 2964ab1af5
execscan: detect arbitrary file open (#8009)
* execscan: detect arbitrary file open

* Checks for unknown top dir

* move the file open test to its own fuzz target

* Fixups from PR review
2022-08-03 13:09:32 +10:00
Arthur Chan 54bd706197
ntlm2-request: initial integration (#7800)
* ntlm2-request: initial integration
2022-08-03 00:31:11 +01:00
DavidKorczynski f00696989a
lcms: extend transform_extended fuzzer (#8129) 2022-08-02 20:43:09 +01:00
AdamKorcz a21e0f2eaf
jackson-core: Extend fuzzers (#8128)
Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-08-02 16:48:04 +01:00
Tomas Tauber 1f30f70eeb
pest: fix build failure (#8127)
cleared RUSTFLAGS for bootstrap
closes https://github.com/pest-parser/pest/issues/676
2022-08-02 15:42:12 +01:00
Evgeny Vereshchagin 700853c524
[dbus-broker] use wildcards to link dependencies (#8126)
to make it possible to update them without having to edit
the build script.
2022-08-02 15:41:44 +01:00
DavidKorczynski 31f28b9ea6
g-api-pubsub: extend fuzzing (#8125)
* g-api-pubsub: extend

- Consume strigns without surrogates instead of catching unicode
exceptions

* pubsub: extend fuzzer
2022-08-02 14:34:15 +01:00
AdamKorcz 0b76cab01b
jackson-core: add 2 fuzzers (#8123)
Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-08-02 12:55:00 +01:00
Kleis Auke Wolthuizen 199ca9c363
libvips: add missing linker flag for sharpyuv (#8122) 2022-08-02 12:09:25 +01:00
AdamKorcz d5bf9f53f6
Jackson -core and -databind: add maintainers (#8120)
Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-08-02 10:23:43 +01:00
Arthur Chan 56ca5056a4
ADAL: intial integration (#8000)
Create fuzzers
2022-08-02 10:02:57 +01:00
Arthur Chan 76eb154ab7
gunicorn: intial integration (#7921)
Create util fuzzer
2022-08-02 10:01:50 +01:00
Arthur Chan a8d6f1e9d4
decorator: initial integration (#7998)
* decorator: initial integration
Create fuzzers

* decorator: initial integtaion
Fix fuzzer
2022-08-02 10:00:55 +01:00
jonathanmetzman 3bed5727dd
Fix test (#8119) 2022-08-01 21:00:00 -04:00
jonathanmetzman 093f61f727
Tag builds with image suffix to make clearer in UI (#8117) 2022-08-02 00:59:49 +00:00
jonathanmetzman 90d60450aa
Build clang with all available cores. (#8116)
* nproc

* Remove comment
2022-08-01 20:56:55 -04:00
jonathanmetzman 3f31d55731
Update docs gems (#8115) 2022-08-02 10:44:36 +10:00
jonathanmetzman b64ec26f8d
Use test-image (#8118) 2022-08-01 20:43:20 -04:00
jonathanmetzman 04c738d9bc
Fix trial builds (#8114) 2022-08-01 19:04:31 -04:00
jonathanmetzman c3495be8f4
Support concurrent trial builds. (#8113)
Do this by appending the branch to the test image suffix.
2022-08-01 18:47:44 -04:00
Reed Loden 7e8cab3d29
teleport: Add @jakule to `auto_ccs` to grant access to issues (#8109) 2022-08-01 18:49:43 +00:00
Christopher Durham 5ffb6577b7
Switch to primary Google Account email address (#8097)
as with #8090
2022-08-01 13:22:32 -04:00
Navidem d8fefb5b76
Bump FI and adjust the path to main.py in compile (#8078)
* Bump FI and adjust the path to main.py in compile

* Fix llvm build script

* Update FI version

* Update FI version
2022-08-01 09:59:21 -07:00
Tomas Tauber 2a28ab5bc9
pest: Add my Google Account email address (#8099)
As with https://github.com/google/oss-fuzz/pull/8090 https://github.com/google/oss-fuzz/pull/8097
I cannot access the pages with oss-fuzz bug reports (e.g. links in https://github.com/pest-parser/pest/issues/674).
I am one of maintainers (you can verify my address by checking the recent pest repository git log entries).
2022-08-01 11:08:40 -04:00
DavidKorczynski 5c5dab6745
git: add myself to auto_ccs (#8106)
Following internal discussions with @steadmon and @oliverchang
2022-08-01 11:05:13 +01:00
Arjun f0aacdb10b
Fix mail authorization. (#8101)
You (email=) are not authorized to access this page!
2022-07-31 21:39:16 +01:00
Kleis Auke Wolthuizen 16d7deebd6
libvips: build improvements (#8102)
- Remove libgflags-dev, no longer needed by libjxl.
- Remove CMake options that are already default.
- Split long build options across multiple lines.
- Use the RelWithDebInfo build type for CMake builds.
- Use the debugoptimized build type for Meson builds (except for libvips itself).
- Avoid using the bundled lcms2 dependency in libjxl.
- Ensure libjxl builds against the static zlib library.
2022-07-31 21:37:39 +01:00
Max d417f39fed
Improve e2fsprogs fuzzers (#8098)
* Fixed up ext2fs fuzzers.

Disable checksum fatal errors, making fuzzing a bit easier.

* Fixed missing path separator

Co-authored-by: mxms <mxms@google.com>
2022-07-29 14:06:14 -07:00
DavidKorczynski ace5408cf5
lcms: extend fuzzing suite (#8095)
* lcms: extend fuzzing suite

Add a fuzzer that target various output formats when transforming. There
are more oppournities to extend this further but will let this fuzzer
run for a while to see how it goes.

* nit
2022-07-29 13:34:34 +01:00
DavidKorczynski 2bb650c6ef
jsmin: initial integration (#8077) 2022-07-28 21:35:01 -07:00
Arjun ca2d1558d5
[libmodbus] initial integration (#8048)
* [libmodbus] initial integration

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

* fix hardcode flags

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

* [libmodbus] libfuzz support

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

* [libmodbus] fix

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

* add opt in build.sh

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

* everything is brrr

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

* add new line

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

* Update Dockerfile

* Update build.sh

* Update FuzzClient.c

* Update FuzzServer.c

* fix copy dir

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

* fix ld error

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

* fix input for fuzzer

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

* set size of input

Signed-off-by: 0x34d <ajsinghyadav00@gmail.com>

Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-28 23:25:47 +00:00
Henry Lin accf707b54
Tomcat: Update project.yaml and add fuzz targets (#8092)
Update project.yaml and add fuzz targets
2022-07-28 15:32:38 -07:00
Hasnain Lakhani 2d87d21344
Update ownership of Meta projects. (#8093)
I'll no longer be working on fuzzing at Meta, so updating the ownership lists to add more folks from my team.
I added the vendor_cc list where it was missing.
I also removed a few employees that no longer are at Meta from the proxygen project list.
2022-07-28 15:31:19 -07:00
b92paul 06efe97ba0
[MSAN] Enable memory sanitizer build (#8094)
* CRAS: Use CARGO_BUILD_TARGET="x86_64-unknown-linux-gnu"

In oss-fuzz, to build with MemorySanitizer, Rust part needs to use

```
CARGO_BUILD_TARGET="x86_64-unknown-linux-gnu"
```

to resolve libc `MemorySanitizer: use-of-uninitialized-value` error
according to https://github.com/google/oss-fuzz/issues/3469.

* CRAS: Add new member to auto_ccs

Co-authored-by: paulhsia <paulhsia@google.com>
2022-07-28 12:18:18 +01:00
Arthur Chan 6945f4c77c
oauth2client: initial integration (#8083)
* oauth2client: initial integration
Create fuzzers

* Update fuzz_basic.py

Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-27 09:27:56 -07:00
aschaich f23485dbad
[apache-commons] Add some fuzz-targets for commons-math (#8089)
Add some fuzz-targets for commons-math

Bring in some fuzz targets for Clustering, DistanceMetrics
and Linear Optimization

Co-authored-by: psy <patrice.salathe@code-intelligence.com>
2022-07-27 14:54:14 +00:00
Noah 7d01c93774
Switch to primary Google Account email address (#8090) 2022-07-27 14:52:45 +00:00
b92paul d876e1aead
cras: Support -DHAVE_FUZZER (#8088)
To fix https://crbug.com/oss-fuzz/49371,
passing HAVE_FUZZER flag during library build stage.

And by pass DBus usage in https://crrev.com/c/3787999.

BUG=oss-fuzz:49371

Co-authored-by: paulhsia <paulhsia@google.com>
2022-07-27 14:29:57 +01:00
DavidKorczynski c751c97df5
lcms: add dictionary to transform_all_fuzzer (#8087) 2022-07-27 10:53:13 +01:00
DavidKorczynski c00c701743
wuffs: fix build by fixing corpus link (#8084)
Existing corpus link is no longer accessible. Switching to a reliable source.

Fixing this also to unbreak Fuzz Introspector tests here https://github.com/ossf/fuzz-introspector/issues/412#issuecomment-1195537545
2022-07-26 13:48:31 -07:00
Alexander Bulekov 0a8db249a5
qemu: limit input size to avoid timeouts (#8085)
QEMU coverage builds have been failing for a long time. Maybe this is
occuring due to the inputs being too large and timing out. Limit the
input size, in an attempt to fix this.

Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
2022-07-26 17:01:17 +01:00
DavidKorczynski 2efe7c9ee5
g-api-auth-library-python: embed .pem files in pyinstalled exec (#8082)
This fixes:
https://github.com/google/oss-fuzz/issues/8030#issuecomment-1194645711
2022-07-26 09:56:36 +01:00
Guido Vranken a34bf6d822
[nettle] Update auto_ccs (#8076) 2022-07-26 00:41:32 +01:00
Arthur Chan 3b7fa87b7d
Retry: initial integration (#7952)
* Retry: initial integration
Create retry fuzzer

* retry: Fix fuzzer
Remove randomization in fuzzer
2022-07-26 00:41:05 +01:00