Commit Graph

6931 Commits

Author SHA1 Message Date
Gerald Combs 74e6ce04b7
Wireshark: Explicitly build fuzzshark. (#7373)
Pass -DBUILD_fuzzshark=ON to CMake in case upstream disables it by
default.
2022-03-10 21:52:57 +00:00
Fabian Meumertzheim 4261d526ad
[infra] Serve raw JaCoCo coverage reports (#7270)
Both the JaCoCo .exec file and the XML report are very useful for
automated analysis of coverage data and IDE integration, so serve them
just like the HTML report.
2022-03-10 13:16:55 -05:00
Ondřej Surý 3067d305ee
[bind9]: Update the list of contacts for BIND 9 (#7370) 2022-03-09 13:08:16 +00:00
Szabolcs Horvát e2e731bc44
[igraph] build libxml2 without ICU (#7368)
* [igraph] build libxml2 without ICU

* [igraph] disable zlib and lzma support when building libxml2
2022-03-08 12:37:12 +00:00
DavidKorczynski b3e265a3a4
fluent-bit: enable HTTP plugin (#7366) 2022-03-08 11:10:53 +00:00
Navidem 8b6a553a12
Pass FuzzIntrospector environment variables to bazel builds (#7367)
* Using bazelrc to pass env vars

* place bazelrc in /root/.bazelrc

* Setting spawn strategy to standalone

* undo changes in Dockerfile
2022-03-08 02:15:47 +00:00
Yong Tang 99f913ee76
Update email to use google email (not an alias email) (#7365)
I noticed that an alternate email alias in google account does not work
https://github.com/google/oss-fuzz/blob/master/docs/faq.md#why-do-you-require-a-google-account-for-authentication
For that the email has been updated to use the main google email instead.

Signed-off-by: Yong Tang <yong.tang.github@outlook.com>
2022-03-07 19:16:35 +00:00
Yong Tang 0aac0529ad
Update coredns with additional auto_ccs (#7364)
Hi, I am a coredns maintainer (see https://github.com/coredns/coredns/blob/master/CODEOWNERS)
and I used to receive oss-fuzz issues through `security@coredns.io`.
Recently I tried to address some of the security issues received, but then I noticed that
I can only access the list with google login. Since security@coredns.io
is a mailing list it will not be possible to login.
So adding my email to this list.

Signed-off-by: Yong Tang <yong.tang.github@outlook.com>
2022-03-07 18:52:38 +00:00
asraa 4811c1237f
add project wide label to envoy (#7360)
Signed-off-by: Asra Ali <asraa@google.com>
2022-03-04 12:31:33 -06:00
asraa 2a72988f71
handle wildcard label applying to all fuzz targets in a project (#7359)
Signed-off-by: Asra Ali <asraa@google.com>
2022-03-04 14:59:08 +11:00
Alex Crichton 4a656409a4
Pin Wasmtime's OCaml version to 4.11.2 (#7361)
This commit takes an alternative approach to #7358 where instead of
specifically ignoring leaks we use a build of OCaml that doesn't have
the leak to begin with. It looks like the leak was introduced in the
4.12 -> 4.13 update (and Wasmtime is currently using the latest of
4.13). This should also help improve reproducibility by always using the
same OCaml version on oss-fuzz runs. We're mostly interested in fuzzing
Rust code, not OCaml code, so our goal is to just get a working OCaml
reference somehow.
2022-03-03 17:44:06 -05:00
Alex Crichton 0beb0f9dea
Ignore leaks in Wasmtime's spec fuzzer (#7358)
This uses an OCaml backend and we're getting leak messages from OCaml
which we don't have control over so suppress them for now for this
specific fuzzer.
2022-03-03 17:44:41 +00:00
DavidKorczynski 8c4e3d8a0a
tesseract-ocr: cleanup build (#7350)
* tesseract-ocr: cleanup build

* fix build

* cleanup
2022-03-03 12:47:19 +00:00
Roman Wagner f127279105
Add base-builder-go-codeintelligencetesting for 15 projects (#7320)
Add base-builder-go-codeintelligencetesting for cilium, cosmos-sdk, fasthttp, fastjson, gitea, go-ethereum, go-sftp, gvisor, istio, jsonparser,  mtail, radon, runc, tidy and ygot
2022-03-03 17:53:32 +11:00
Navidem e7eb519e22
move environment var to Dockerfile to make it visible to bazel builds and bump FI (#7356) 2022-03-03 16:19:09 +11:00
Alex Crichton 7210a5c4e9
wasmtime: Shrink size of compiled fuzzers (#7354)
It looks like Wasmtime's fuzzers are failing to run due to them being to
large, so this is a quick band-aid fix to reduce the size of the
binaries. It looks like Rust's `cargo fuzz` tool by default links in
dead code for code coverage purposes (ish, I'm not 100% sure on this),
so the size of fuzzers are reduced by stripping dead code. In a local
build this reduces the size of Wasmtime's output directory from 6.8G to
3.4G and should buy us some time to implement deeper fixes (such as
having one shared library that all of the fuzzers call into instead of
duplicating statically-linked Wasmtime amongst all the fuzzer binaries).
2022-03-02 20:47:14 +00:00
jonathanmetzman 0d93502de8
Update README.md (#7352) 2022-03-02 10:39:34 -05:00
AdamKorcz 0c6ed8df6f
[istio] Fix failing CI (#7349) 2022-03-02 14:50:13 +00:00
Navidem 33ee62256f
[infra] Temporarily skip failing test. (#7323)
I will fix it later.

Co-authored-by: Jonathan Metzman <metzman@chromium.org>
2022-03-02 09:07:12 -05:00
Alex Crichton 4c10932221
Update Wasmtime's docker image (#7346)
This adds some more ocaml-related dependencies to support fuzzing
against a different spec interpreter recently landed in Wasmtime at
https://github.com/bytecodealliance/wasmtime/pull/3843
2022-03-02 07:18:38 +00:00
James Zern c47f2b3a63
libaom,project.yaml: update cc list (#7345) 2022-03-01 16:44:43 -05:00
DavidKorczynski ff5f7821ef
openvpn: disable forward fuzzer (#7342)
Changes upstream caused it to fail. This should be refined down the
line.
2022-03-01 11:58:43 +00:00
Navidem b75084c74c
update compile to reflect changes in introspector code (#7341) 2022-03-01 15:57:51 +11:00
Yong Tang 359cad3636
Add main_repo to coredns (#7339)
Currently oss-fuzz uses go-coredns as the project name. However,
there is no main_repo in project file, and it looks like
the OSSF's scoreboard will not be able to find the coredns project
from oss-fuzz.

Signed-off-by: Yong Tang <yong.tang.github@outlook.com>
2022-03-01 15:57:14 +11:00
Navidem 95bb7013b2
bump introspector commit and initialize the environment variable used by introspector pass (#7340) 2022-02-28 18:56:56 -08:00
Oliver Chang 9553ab10d7
Fix run_fuzzers_test::CoverageReportIntegrationTest. (#7325)
Fixes #7324.
2022-03-01 10:39:05 +11:00
Navidem 8428a717b1
Avoid using signed url when downloading coverage reports (#7332)
* Avoid using signed url when downloading coverage reports

* fix nits
2022-03-01 10:03:47 +11:00
Kevin Lubick 731a456da6
[skia] Add corpus to SkDescriptor fuzzer (#7337) 2022-02-28 21:52:39 +00:00
John Cupitt 04d3cac6a8
libvips: add pdfium to build (#7336)
* libvips: add pdfium to build

Many Rails users will shortly be switching to libvips pdfium load for
PDF rendering. pdfium is well tested and doesn't need fuzzing itself,
but we do need to fuzz the code that links libvips to pdfium.

This PR adds pdfium nightly builds to the libvips fuzzer.

* fix pdfium download

* ooop missing RUN

* fix pdfium install

* Fix PDFium link

* layout

Co-authored-by: Kleis Auke Wolthuizen <github@kleisauke.nl>
2022-02-28 18:27:06 +00:00
dependabot[bot] f13e294933
Bump nokogiri from 1.12.5 to 1.13.3 in /docs (#7334)
Bumps [nokogiri](https://github.com/sparklemotion/nokogiri) from 1.12.5 to 1.13.3.
- [Release notes](https://github.com/sparklemotion/nokogiri/releases)
- [Changelog](https://github.com/sparklemotion/nokogiri/blob/main/CHANGELOG.md)
- [Commits](https://github.com/sparklemotion/nokogiri/compare/v1.12.5...v1.13.3)

---
updated-dependencies:
- dependency-name: nokogiri
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-02-27 11:39:44 -05:00
DavidKorczynski 0d33c45461
fluent-bit: enable more plugins (#7335)
* fluent-bit: enable more plugins

* disable runtime tests
2022-02-26 23:29:04 +00:00
Guido Vranken 7f4de5d221
[wolfssl] Import more tests/corpora (#7333)
* [wolfssl] Import more tests/corpora

* [wolfssl] Import more corpora
2022-02-26 12:22:37 +00:00
DavidKorczynski 25e07516c7
fluent-bit: enable leak checking (#7331) 2022-02-25 21:08:34 +00:00
DavidKorczynski 5f7d9aad5a
s2geometry: fix build (#7330)
* s2geometry: fix build

* fix patch

* fix patch
2022-02-25 20:14:46 +00:00
Alastair Donaldson 6611766ac0
tint: fix path to script. (#7328) 2022-02-25 18:39:05 +00:00
Alastair Donaldson 3ab1e4fb0b
spirv-tools: fix path to script. (#7329) 2022-02-25 18:10:36 +00:00
Marc Khouzam 24292641cf
Add email to helm project fuzzing (#7327)
Signed-off-by: Marc Khouzam <marc.khouzam@gmail.com>
2022-02-25 15:00:29 +00:00
Navidem 9bf510557c
bump introspector commit to fix some bugs, and adjust the patch (#7322) 2022-02-24 10:07:38 +11:00
Kleis Auke Wolthuizen 6b61960015
libvips: migrate build to Meson (#7317)
- Remove unused dependencies.
- Prefer .git URLs in git clone invocations.
- Use the --static flag of pkg-config for all invocations.
- Remove suspicious LDFLAGS environment variable.
- Disable NLS in libexif.
- Make libc++ a private dependency of libheif and libjxl.
- Build libspng with Meson.
- Ninja does not require a -j flag.
- Re-order linker flags.
2022-02-23 10:24:37 +00:00
Hajime Fujita 1697514a6b
Add Emmanuel to h2o project (#7315) 2022-02-22 17:30:06 +00:00
Oliver Chang 1f67910ba6
Update project.yaml 2022-02-22 12:44:52 +11:00
Oliver Chang 9b03e118c2
Update project.yaml 2022-02-22 12:44:38 +11:00
Andrew Kaster 505b4a4ec5
serenity: Use in-tree BuildFuzzers.sh script to build fuzz targets (#7309)
This replaces the manual CMake invocations, as the project now will
build code generator tools in a first stage build to enable fuzzing
generated code too.
2022-02-21 23:48:21 +00:00
DavidKorczynski d8de53b96f
esp-v2: fix build (#7308)
Build has been broken for 6+ months. This fixes it by updating bazel set
up.
2022-02-21 18:25:16 +00:00
AdamKorcz e06b105b71
[helm] use upstream build script (#7313) 2022-02-21 18:23:39 +00:00
killianmuldoon 77b795ffb1
Add Killian Muldoon to Kubernetes Cluster API (#7311)
Signed-off-by: killianmuldoon <kmuldoon@vmware.com>
2022-02-21 17:44:39 +00:00
Martijn van Beurden 0df5e7b233
[flac] Disable CRC checks in ogg container (#7310) 2022-02-21 16:04:30 +00:00
DavidKorczynski 15e56374d8
grpc: fix build (#7307)
* grpc: fix build

* dont use old patch

* re-enable build file

* no options
2022-02-20 00:47:02 +00:00
Szabolcs Horvát 008a040ac0
[igraph] include another igraph maintainer (#7306) 2022-02-19 19:42:59 +00:00
DavidKorczynski 3f886e7fa4
libigl: fix build following upstream major update (#7305)
libigl introduced breaking changes in
https://github.com/libigl/libigl/pull/1805 This fixes the OSS-Fuzz set
up.
2022-02-19 13:39:55 +00:00