Commit Graph

8926 Commits

Author SHA1 Message Date
manunio 74dbbcce98
Update header lint source extension (#9840)
This pr
- Removes duplicate extension from sourceFileExtensions
- Adds `swift` extension as its a oss-fuzz supported language and there
exists a project with .swift extension files.
https://github.com/google/oss-fuzz/tree/master/projects/swift-nio
2023-03-01 16:44:39 -05:00
DavidKorczynski 4639506b4f
markdown-it-py: extend suite (#9844)
Generated from auto-fuzz
https://github.com/ossf/fuzz-introspector/pull/872#issuecomment-1450847118

Signed-off-by: David Korczynski <david@adalogics.com>
2023-03-01 21:44:29 +00:00
Dmitry Vyukov 9503ea34f5
lzo: fix crash on large inputs (#9839)
The target allocates 2*size buffers on the stack.
Stack is not always infinite. If we allocate on the stack,
we need to cap input size.
2023-03-01 10:32:40 -05:00
DavidKorczynski 11d320067b
glom: extend suite (#9837)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-03-01 15:11:06 +00:00
Maksym Sobolyev 5cee1ad696
rtpproxy: initial integration. (#9767)
This patch adds OSS-Fuzz integration for the RTPProxy project. The
RTPProxy is a companion software used by many of the SIP application
servers (OpenSIPS, Kamailio, Sipppy B2BUA etc) to handle RTP streams. We
have completed integration on our side already, e.g.
https://github.com/sippy/rtpproxy/actions/runs/4226614295/jobs/7340239205.
2023-03-01 09:54:18 -05:00
Keith Winstein 95d53d8750
wabt: fix build of external fuzzers with `-std=c++17` (#9831)
wabt moved from C++11 to C++17 about a year ago
(https://github.com/WebAssembly/wabt/pull/1825), but the oss-fuzz repo
includes external fuzzers that were built with C++11. A recent commit
(https://github.com/WebAssembly/wabt/pull/2152) broke the build.
2023-03-01 09:24:36 -05:00
DavidKorczynski 19ae1cbeac
toml: call loads with explicit path (#9835)
To make the fuzz introspector nicer:
https://github.com/google/oss-fuzz/pull/9834#issuecomment-1450019886
2023-03-01 12:10:57 +00:00
Oliver Chang 97a6507178
Add main_repo to build status.json (#9822)
Fixes #9782
2023-03-01 10:56:18 +11:00
jonathanmetzman 0d84900126
Add header linter config (#9826) 2023-02-28 17:58:44 -05:00
Philip Withnall 59425b7c66
Add additional CC to GLib project configuration (#9829)
Todd Cullum is on the Red Hat security team and has been vouched for by
Michael Catanzaro. He is not a GLib upstream maintainer.
2023-02-28 15:47:28 -05:00
jonathanmetzman 3fc0d79468
Fix view restrictions (#9827) 2023-02-28 13:11:45 -05:00
manunio e269f7ffe3
gimli: initial integration (#9753)
gimli is a library for reading and writing the [DWARF debugging
format](https://dwarfstd.org/).
- It has `48 million+` downloads as per
[crates.io](https://crates.io/crates/gimli)
- It has [criticality_score](https://github.com/ossf/criticality_score)
of `0.5228`
- Its being used by projects like:
- [wasmer](https://github.com/wasmerio/wasmer) (integrated to oss-fuzz)
- [wasmtime](https://github.com/bytecodealliance/wasmtime) (integrated
to oss-fuzz)
  - [rust-lang/backtrace-rs](https://github.com/rust-lang/backtrace-rs)
- A library for acquiring backtraces at runtime for Rust. This library
aims to enhance the support of the standard library by providing a
programmatic interface to work with, but it also supports simply easily
printing the current backtrace like libstd's panics.
   - [getsentry/symbolic](https://github.com/getsentry/symbolic)
- [Symbolic](https://docs.rs/symbolic) is a library written in Rust
which is used at [Sentry](https://sentry.io/) to implement symbolication
of native stack traces, sourcemap handling for minified JavaScript and
more.
   - [addr2line](https://github.com/gimli-rs/addr2line)
- A cross-platform `addr2line` clone written in Rust for retrieving
per-address debug information from files with DWARF debug information.
- It has `47 million+` downloads as per
[crates.io](https://crates.io/crates/addr2line)
2023-02-28 09:26:14 -05:00
Patrice.S f3c063cf58
jackson-datatype-joda: initial integration (#9799) 2023-02-28 09:16:26 -05:00
Nathaniel Brough eb2b6b8cba
quick-xml: Adds autodetection for new fuzz tests (#9795) 2023-02-28 09:14:58 -05:00
Phil Turnbull 15fdde6938
krb5: Add gss_accept_sec_context fuzz harness (#9800)
`gss_accept_sec_context` is one of the main APIs used for server
applications and typically accepts untrusted data via the `input_token`
parameter.

@greghudson: fyi, here's the improvements to the fuzzing setup that we
discussed via email.
2023-02-28 09:14:37 -05:00
vargen a1c27dd02e
[snappy-java] initial commit (#9813) 2023-02-28 09:13:54 -05:00
Catena cyber abe86870e7
infra: Golang coverage fixes (#9812)
@AdamKorcz what do you think of these commits ?

cf https://github.com/google/oss-fuzz/pull/8937 and should fix
https://github.com/google/oss-fuzz/issues/9808
2023-02-28 09:13:22 -05:00
Michael Ford b4ff54a398
bitcoin: remove Wlad from email cc list (#9815) 2023-02-28 09:12:31 -05:00
Yifeng He 096a44c0fa
llvm: fix build deprecate LLVM_ENABLE_PROJECTS (#9817)
llvm build has been broken, the reason is that
1. [`LLVM_ENABLE_PROJECTS` for libc++, libc++abi was
deprecate](https://reviews.llvm.org/D112724)
2. compiler-rt is also a runtime according to the
[llvm-docs](https://llvm.org/docs/CMake.html#llvm-related-variables)
2023-02-28 09:10:50 -05:00
DavidKorczynski 482fabbe40
pymysql: fix build (#9825)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-02-28 12:11:25 +00:00
SGills 6d389f49db
Adding urllib3 requests coverage (#9793)
This change added a new fuzzer `fuzz_requests`. This fuzzes the
`.request` method in urllib3, which opens a lot more coverage.

<img width="653" alt="image"
src="https://user-images.githubusercontent.com/5122866/221026547-8097ef14-bc21-4e4e-a5ab-573048259576.png">

I have created a python `HTTPServer` that provides fuzzed responses to
all the different request types. And I try and drive different
combinations of requests including mixes of headers, bodies and request
types. This gives a nice improvement on current coverage levels [urllib3
fuzz inspector report
2023-02-23](https://storage.googleapis.com/oss-fuzz-introspector/urllib3/inspector-report/20230223/fuzz_report.html).
2023-02-28 02:49:16 -08:00
emkornfield edd3dc9d9a
Add some googlers to arrow fuzzer permissions (#9819)
Adds googlers that have interest in some fuzz runs for Arrow/Parquet
2023-02-28 16:14:20 +11:00
Nathaniel Brough 8bc63cee51
croaring: Add a cpp fuzz harness (#9794)
Signed-off-by: Nathaniel Brough <nathaniel.brough@gmail.com>
2023-02-28 16:13:33 +11:00
Guido Vranken 11110bae7c
[libecc] Support BASH hash (#9821)
This is another hash function supported by libecc
2023-02-28 16:12:08 +11:00
madamantis-leviathan 0248ec7d05
libdwarf: switch to fuzzers and corpora maintained by the project owner (#9786)
This pull request updates the Dockerfile and the build script to use the
new [fuzzers](https://github.com/davea42/libdwarf-code/tree/master/fuzz)
and [corpora](https://github.com/davea42/libdwarf-binary-samples)
maintained by the owner of libdwarf-code.

---------

Co-authored-by: Maksym Adamantis <maksym.adamantis@leviathan.corp-partner.google.com>
2023-02-27 14:55:02 +00:00
Ilija Tovilo 0ba4b20807
Add myself (Ilija Tovilo) to PHP project (#9806)
@dstogov Can you confirm that this is ok?
2023-02-27 10:01:04 +00:00
Louis Sautier 788183edf1
cctz: disable benchmark build (#9811)
This is required for the CI to work on
https://github.com/google/cctz/pull/241
2023-02-27 17:00:18 +11:00
Catena cyber df358b948a
Ngolo coverage through corpus (#9807)
More corpus for ngolo-fuzzing

By running `go test` in a dummy package copying the files from the real
package, so as to avoid imports cycles
2023-02-27 16:58:22 +11:00
Jacek Trossen 6b797cb3f7
Initial integration for xercesImpl (#9789) 2023-02-27 16:57:01 +11:00
Alan Modra 976e6f9715
binutils/fuzz_as.c gas_early_init (#9810)
Fix an error passing argv to gas_early_init. &fakeArgv isn't correct.
The address of a pointer of type char** must be passed. That char***
will be passed on to expandargv, which possibly modifies the char**
(although it won't be with current args), which is why the call to
perform_an_assembly_pass is changed too.
2023-02-27 16:54:21 +11:00
Patrice.S 64d5ff6eae
xz-java: initial integration (#9797) 2023-02-27 11:43:54 +11:00
aschaich d97407ce13
[jsch] Initial commit for com.github.mwiede:jsch (#9798) 2023-02-27 11:43:26 +11:00
Patrice.S 7117bf80c2
jline3: initial integration (#9790) 2023-02-27 11:42:07 +11:00
aschaich 1727e5cf69
[StAX] Initial integration for StAX (#9791) 2023-02-27 11:41:51 +11:00
Henry Lin 2e9874f212
Apache Lucene: Initial integration (#9772) 2023-02-27 11:39:35 +11:00
DavidKorczynski 0cb65d0fac
stack_data: initial integration (#9804)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-02-25 15:59:47 +00:00
DavidKorczynski b26eadcbaf
ntlm-auth: initial integration (#9803)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-02-25 15:59:19 +00:00
DavidKorczynski 1ddd283805
flask-wtf: initial integration (#9802)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-02-25 15:58:26 +00:00
Catena cyber fadf6ee1f2
Adds project glog (#9160)
@sergiud are you interested in having glog running on oss-fuzz ?

see also https://github.com/google/glog/issues/816 cc @autofuzzoss

I also quickly find a timeout with input
`_ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ_`
2023-02-25 20:27:04 +11:00
DavidKorczynski c96a0eb202
tensorflow: enable more targets (#9801)
Includes some new fuzzers that are placed outside `security/fuzzing`,
e.g. `saved_model_fuzzer`
2023-02-24 19:29:12 +00:00
Alan Modra 0f2fff3002
binutils/fuzz_objcopy memory leaks (#9796)
This should fix issue 49000, caused by not freeing symbol htabs. The
patch also removes some NULLing out of buffer pointers. These are all
cleared in init_objcopy_global_state.
2023-02-24 07:01:03 -08:00
Khaled Yakdan c7680381a6
infra: use an absolute path to the JavaScript fuzz test file (#9788)
This fixes the issue of running Jazzer.js fuzzer using an absolute path
such as `/out/fuzzer`.

@oliverchang We needed a minor fix in Jazzer.js
(https://github.com/CodeIntelligenceTesting/jazzer.js/pull/341), so you
would need to rebuild the project so that the latest version (1.4.0) is
fetched from npm.
2023-02-24 11:29:50 +11:00
Catena cyber 05d03d3f5a
ngolo-fuzzing: generate corpus for targets (#9783)
Should allow to find new bugs such as
https://github.com/golang/go/issues/58642
2023-02-23 07:26:16 -08:00
DavidKorczynski ecc8a1601b
libhoextdown: only compile relevant libraries (#9787)
This enable Fuzz Introspector build since we avoid some shared libraries
that are not compatible with LLVM LTO.
2023-02-23 10:39:49 +00:00
Alan Modra 2f0202da5a
binutils/fuzz_dwarf memory leak (#9784)
Fixes issue 42739, a leak in the fuzzer.
2023-02-23 02:27:53 -08:00
Khaled Yakdan fd04971319
Source-based code coverage reporting for Jazzer.js (#9758) 2023-02-23 18:51:21 +11:00
Catena cyber 9c2083a08c
rust: do not use none sanitizer (#9763)
rustc errors with
error: incorrect value `none` for unstable option `sanitizer`

Should fix at least ecc-diff-fuzzer build failure cf
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=55912
2023-02-23 13:06:01 +11:00
Hayley Denbraver e5f6911beb
Updated Google Analytics (#9777)
Updated Documentation google analytics from UA to GA4

Resolves #9743
2023-02-23 13:00:42 +11:00
DavidKorczynski bf647ce826
infra: bump fuzz introspector (#9702)
Includes
- Several bug fixes for builds
- Refinement of how static analysis is matched with code coverage data
(https://github.com/ossf/fuzz-introspector/issues/812)
- More output to `summary.json` to make the following logic less hacky:
3d2ec74dba/infra/build/build_status/fuzz_introspector_page_gen.py (L250-L260)
- Improvements to the Sink analyser for detecting e.g. code injections:
https://fuzz-introspector.readthedocs.io/en/latest/user-guides/analyse-sink-function.html
- Various improvements to the java frontend

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2023-02-23 13:00:19 +11:00
DavidKorczynski 8c66f08246
tensorflow: enable all fuzztest fuzzers (#9780)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-02-22 13:37:15 +00:00