Commit Graph

1724 Commits

Author SHA1 Message Date
Ammar Askar 5d3b2f969d [cpython] Use altinstall to avoid creating symlinks (#2510) 2019-06-13 10:41:04 -07:00
Jay Berkenbilt dd8032434a [qpdf] transfer fuzz targets to qpdf repository (#2509)
This switches control of the fuzzers to the qpdf repository and
switches ownership of the project to qpdf's author.
2019-06-13 08:20:42 -07:00
Marco Elver 063fcbd54e [hostap] Switch to new fuzz targets (#2499) 2019-06-13 14:52:15 +10:00
Max Moroz 5025b3517c
[zstd] Enable experimental dataflow build configuration (#1632). (#2507) 2019-06-12 12:31:25 -07:00
Émile Grégoire 9ba3387a66 Force usage of master branch. (#2506) 2019-06-12 07:22:48 -07:00
Micah Snyder 7394fb5eec clamav - Minor update to fix built failure now that libcurl is a hard requirement to build clamav. (#2505) 2019-06-12 17:45:59 +10:00
Ammar Askar 9a67b6be92 [cpython] Pull in corpuses and dictionaries for CPython (#2504)
* Pull in corpuses and dictionaries for CPython

* Ignore MSAN errors in build
2019-06-11 16:40:08 -07:00
Mihai Maruseac 20830e74fe [tensorflow] Fix the build by adding python-future to the list of installed deps. (#2503) 2019-06-11 14:08:42 -07:00
Ammar Askar 88d9006f38 Fix coverage build for cpython (#2502) 2019-06-11 11:25:01 -07:00
Max Moroz 2446d3bb5d [zstd] Remove build code for .option files as those are removed upstream. 2019-06-11 10:34:18 -07:00
Alex Hultman 04f5f4c7dc [uwebsockets] Add uwebsockets (#2457) 2019-06-11 06:40:39 -07:00
Evan Miller 7f94b5cf61 [readstat] Add dictionary files and update corpus location (#2498)
* Add fuzzing dictionaries for new ReadStat targets

They still need proper input corpuses, but this is a start.

* [readstat] Accommodate new file layout

corpus => fuzz/corpus

Dictionary files now included in source tree
2019-06-10 14:36:45 -07:00
Ammar Askar ff4bae9c43 Create docker and build files for cpython3 (#2493)
* Create docker and build files for cpython

* Remove temporary patch (merged upstream)
2019-06-10 11:13:22 -07:00
Jay Berkenbilt f858510cbe Qpdf ownership (#2496)
* example project: fix minor problems with standalone fuzzer

* typo: "successfull" -> "successful"
* main should explicitly return 0 on success

* example project: fix minor problems with Makefile

* make "all" the first target
* use LIB_FUZZING_ENGINE to reference fuzzer in all places

* example project: fix typos in README

* Add upstream qpdf maintainer as auto_cc for qpdf

I am adding myself (using my Google account) as an auto_cc in
preparation for taking over ownership of the qpdf project and doing a
full integration with oss-fuzz.
2019-06-09 18:59:50 -07:00
Alex Gaynor 3257d8471c [imagemagick] clone bz2 from its new repo (#2495) 2019-06-08 07:39:30 -07:00
Alex Gaynor a4ef884bf4 [graphicsmagick] clone bz2 from its new repo (#2494) 2019-06-08 07:38:51 -07:00
Max Moroz 755518f802 [njs] Fix coverage build and exclude pcre sources from coverage report (#2481). 2019-06-06 07:44:27 -07:00
steadmon c9bb73a407 [git] Fuzz against the upstream "next" branch. (#2488)
The next branch is where relatively-stable changes live while testing
for stability. We should fuzz against this branch to give extra
confidence that these patches are bug-free before they are merged into
master.
2019-06-05 14:25:59 -07:00
Janos Follath 54733ddc84 Fix a build failure in bignum fuzzer when building the Mbed TLS module (#2487)
* [bignum-fuzzer] Clone Mbed TLS recursively

The cryptography library of Mbed TLS has been moved to a separate
repository. It is now included into the project as a git submodule and
therefore we need to clone Mbed TLS recursively.

* [bignum-fuzzer] Use new Mbed TLS library location

The bignum module in Mbed TLS as part of the cryptography library has
been moved to a new location. This commit sets the corresponding paths
to their new values.
2019-06-04 08:13:23 -07:00
John Andersen eb6be0506e [tpm2-tss] Add Andreas to CC list and sync Dockerfile (#2482)
Signed-off-by: John Andersen <john.s.andersen@intel.com>
2019-06-03 17:15:59 -07:00
Matt Klein 44cbbf7def Update Envoy configuration (#2486)
Update email address.
2019-06-03 15:47:10 -07:00
Max Moroz 7f85bc7b5a [njs] Add xeioex@ as a primary contact (#2481). 2019-06-03 11:14:51 -07:00
Max Moroz 2317c8aacb
[njs] Build pcre dependency manually and enable MSan (#2481). (#2484) 2019-06-03 09:06:53 -07:00
Michael Niedermayer c9fd3f45db projects/ffmpeg/build: Add Demuxer fuzzer (#2483)
Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
2019-06-03 08:49:12 -07:00
Max Moroz 68d71e179c [njs] Remove "Experimental: True" as it does not affect the disclosure deadlines w/o auto_ccs (#2481). 2019-06-03 07:40:33 -07:00
Max Moroz 981266767f [njs] Revert "Null terminate the script string.", as the API accepts size value. 2019-05-31 21:40:00 -07:00
Max Moroz b8762b0e99 [njs] Disable memory sanitizer for now, the builder is not happy. 2019-05-31 20:49:43 -07:00
Max Moroz ecf68cf70b [njs] Null terminate the script string. 2019-05-31 20:47:11 -07:00
Max Moroz 230751d78e
[njs] Add nginx/njs project and njs_process_script_fuzzer. (#2481)
* [njs] Add nginx/njs project and njs_process_script_fuzzer.

* Add copyright, disable logging, disable leaks detection.

* fix memory leaks

* use $LIB_FUZZING_ENGINE

* list myself as a primary contact for now

* enable all sanitizers
2019-05-31 16:59:45 -07:00
Guido Vranken e5280acde4 [cryptofuzz] Add OpenSSL 1.0.2 and 1.1.0 targets (#2454) 2019-05-30 18:02:28 -07:00
Matt Johnston 1bdad3560d [dropbear] Disable AFL to avoid timeouts (#2474)
* Copy dictionaries

* disable AFL to avoid timeouts in initialisation
2019-05-30 08:08:22 -07:00
Bhargava Shastry 0d7479744f [ovs] use zip -rq instead of zip -j * (#2477) 2019-05-30 07:58:25 -07:00
gnrunge 037c1a75b0 Modifes build.sh script to work with ICU fuzzer target files that were renamed (#2476)
to end with .cpp suffix instead of .cc to align with ICU standards.
2019-05-29 16:54:13 -07:00
Paul Dreik 55fdfd13d7 [libfmt] needs recursive clone (#2475)
* the fmt-fuzzer needs recursive clone now
2019-05-29 12:04:12 -07:00
Max Moroz d4fc73db43
[fuzzing-puzzles] Disable the project for now, as no one is trying to solve the puzzle. 2019-05-29 09:21:06 -07:00
Evan Miller bf8820fde8 [ReadStat] Enable more fuzzers (#2472)
These additional fuzzers all pass the existing check_build heuristics.

In the future, they would probably benefit from an input grammar file or corpus.
2019-05-29 08:32:24 -07:00
Abhishek Arya 56259f98d9
Revert "[gnupg] Disable afl (#2447)" (#2467)
This reverts commit b7227fdd01.
2019-05-27 17:38:59 -07:00
Marco Elver 9248c34b82 [hostap] Fix build (#2466)
1. Ensure targets are re-linked after re-compiling libfuzzer_entry.o

2. Don't rely on LIBS to link libfuzzer_entry.o correctly (cannot
   reproduce bot build failure, but log suggests this is the issue).
2019-05-27 09:58:44 -07:00
Catena cyber e790ed5b5f Fixes path for mbedtls crypto library (#2464) 2019-05-27 00:53:55 -07:00
Catena cyber 6a1aa9ef0c Mbedtls needs recusive clone now (#2463) 2019-05-27 11:26:06 +10:00
Abhishek Arya 8e128aa324
Fix JSC build with cmake default FindICU.cmake 2019-05-26 10:57:58 -07:00
Abhishek Arya cac28fd860
Update project.yaml 2019-05-25 09:20:15 -07:00
Janne Grunau e5c8204c58 dav1d: fix afl build by using $LIB_FUZZING_ENGINE (#2462)
Requires https://code.videolan.org/videolan/dav1d/merge_requests/714
2019-05-24 18:20:59 -07:00
Garret Rieger 2de6dcc337 Add qxliu@google.com to harfbuzz cc list. (#2456) 2019-05-24 11:05:09 -07:00
Marco Elver d4c9198a03 [hostap] Add hostap fuzzers (#2413) 2019-05-24 05:56:38 -07:00
Vincent Ulitzsch 02a91a656b Extend giflib harness: Cover more functions and add protobuf specification (#2442)
* Add protobuf target prototype

* Generalized architecture and added message stubs for future enhancements

* Added fine grained conversion of global/local color tables, LSD and image data

* Added conversion of extensions

* Flagged important TODOs

* Address important todos and add converter for GraphicControlExtension

* Minor bugfix: m_hasLct now reset for every image

* Fixed minor bugs and added GCExt to plaintext chunk

* Minor change to bug fix just for clarity

* Refactoring and add fuzz_dgif_extended

Refactor the code so that both targets import from dgif_fuzz_common.
Also add fuzz_dgif_extended, which exercises more functionality
of giflib

* Added minor comment

* Add new function that is a replica of Android JNI code

* Minor fix

* print errors (covers gif_err.c)

* bug fix in printing and disable it

* bug fix in printing error desc

* Add version variants to header message

* Add draw function from gif_font.c

* Remove LIB_FUZZING_ENGINE from compilation step and add GifDrawText8x8 API to custom fuzz harness

* WIP

* WIP

* WIP

* WIP

* WIP

* WIP

* Remove unnecessary loop

* Small bugfix: x is no longer unitialized

* Change to consistent formatting

* Fix bug that caused build failure
2019-05-24 05:17:05 -07:00
gnrunge b27b7dbc80 Replaces explicit listing of fuzzer target and corpus files with generic (#2455)
detection of these files using wildcards.
2019-05-22 13:02:31 -07:00
Catena cyber 34a719c97f Gnupg: avoids filling disk with logs (#2453) 2019-05-22 09:09:42 -07:00
Émile Grégoire 174f9caad9 [opendnp3] Fix build by installing modern CMake (#2452)
* Install CMake 3.12.

* Move CMake installation in Dockerfile.
2019-05-22 07:42:56 -07:00
jonathanmetzman b7227fdd01
[gnupg] Disable afl (#2447) 2019-05-20 17:28:55 -07:00
Oliver Chang 11baf9c03e
Install latest cmake for JSC. (#2446) 2019-05-20 13:10:38 -07:00
Stefan Bucur 8537bf73b9 [double-conversion] Import the fuzz target into OSS-Fuzz. (#2444)
* Import the double-conversion fuzz target into OSS-Fuzz. double-conversion is a V8 library for computing and parsing string representations of floating point numbers.
2019-05-20 12:20:19 -07:00
Bhargava Shastry e7f7996260 [mruby] Update Dockerfile and build scripts for proto fuzzer (#2432) 2019-05-20 11:07:30 -07:00
Guido Vranken 1198743824 [cryptofuzz] EverCrypt: Don't explicitly allow AVX instructions (#2441)
* [cryptofuzz] EverCrypt: Don't explicitly allow AVX instructions

Recent crashes involving EverCrypt were found to be caused by
AVX instructions in the EverCrypt library. The Makefile explicitly
allowed the use of AVX instructions via hardcoded CFLAGS. The authors
have released a new version that should resolve this problem.

* [cryptofuzz, bignum-fuzzer] Revert to default OpenSSL build method

Reverts the workaround for OpenSSL broken build script, which is
now fixed.

* [cryptofuzz] Compile with -D_GLIBCXX_DEBUG (runtime C++ UB checks)
2019-05-19 07:59:05 -07:00
Zbigniew Jędrzejewski-Szmek c20c3b8029 [systemd]: add Jóhann B. Guðmundsson (#2438) 2019-05-18 07:04:21 -07:00
tsdgeos 3077e22f2e karchive: Also exercise the compressed tar codepaths (#2439) 2019-05-18 07:03:43 -07:00
jonathanmetzman c079879a2b
[i386][skcms] Fix typo (#2436) 2019-05-17 13:48:36 -07:00
jonathanmetzman 9add5745bc
[i386] Do i386 builds of skcms (#2433) 2019-05-17 09:48:40 -07:00
Guido Vranken a8d264b377 [cryptofuzz] Add EverCrypt (#2430) 2019-05-17 08:03:10 -07:00
Martin Matuška a996649c2c [libarchive] process archive_read_next_header() return codes like bsdtar (#2427)
ARCHIVE_EOF and ARCHIVE_FATAL are the only valid exit codes
ARCHIVE_RETRY should read to re-entering the loop
All other codes (ARCHIVE_OK, ARCHIVE_WARN, ARCHIVE_FAILED) do not prohibit
the caller from reading data and next headers.

This behavior is identical with bsdtar (tar/read.c) and enables better
discovery of possible bugs by fuzzing.
2019-05-16 10:11:20 -07:00
Émile Grégoire d64e4db184 Updated build.sh for the additional fuzzers. (#2421) 2019-05-16 07:27:52 -07:00
Bhargava Shastry 012ad644ca [mruby] Update primary email (#2425) 2019-05-15 13:21:38 -07:00
Catena cyber 0c8b8eaa21 [gnupg] Removes a patch applied to gnupg (#2422) 2019-05-15 11:18:54 -07:00
Bhargava Shastry a8acfd51bd [solidity] Fix failing build (#2418) 2019-05-15 06:55:16 -07:00
Guido Vranken 3d4e351c0b [cryptofuzz] Add Crypto++ and libgcrypt (#2401) 2019-05-14 09:45:13 -07:00
htuch 7b6c4674b9 [envoy] Add new project auto CCs. (#2409)
Signed-off-by: Harvey Tuch <htuch@google.com>
2019-05-13 14:54:33 -07:00
Bhargava Shastry 8017ffc384 [mruby] Add mruby compile fuzzer (#2380) 2019-05-13 10:40:34 -07:00
Kent Sutherland ccef143c58 [libical] libical requires cmake 3.11 whereas Ubuntu 16.04 only has 3.5.1 (#2402) 2019-05-13 07:48:54 -07:00
Brent Cook a7c12d0010 [libressl] add fuzz contact (#2398) 2019-05-10 15:17:26 -07:00
Varun Khaneja 8825651f9f [unrar] Use std::error_code in calls to fs::current_path and fs::remove_all (#2394)
* Use std::error_code in calls to fs::current_path and fs::remove_all

* Fuzzers must always return 0
2019-05-10 12:35:08 -07:00
Joseph Bisch 70ed28ab42 Add @gahr to neomutt auto_ccs (#2396) 2019-05-10 08:11:37 -07:00
Jacob Hoffman-Andrews 63b40ccb6c Fix unbound compile reallocarray failure. (#2393)
This fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14648
Caused by reallocarray test succeeding in the docker image used by the
build worker.  But the build.sh script assumes reallocarray is not
available and attempts to link in reallocarray.o replacement code, that
is not there, because the build image support linking with reallocarray.
This can be seen in the script lines in log above where ./configure
detects that that works.  But this does not link if the instructions
are followed to reproduce the build, that docker image has no
reallocarray.  The fix is to fetch the correct list of replaced
functions so that the build can succeed regardless of the version of
the base system that is used.
2019-05-09 15:43:53 -07:00
brameret df44085534 [s2opc] Fix cmake not using clang++ as linker (#2392) 2019-05-09 10:32:07 -07:00
jonathanmetzman 807096efc9
[unrar] speculative fix for build breakage (#2390) 2019-05-09 10:02:50 -07:00
Joseph Bisch 6ab0654184 [neomutt] Add project (#2383) 2019-05-08 10:35:21 -07:00
Nick Wellnhofer 2b6fc9a943 [libxslt] Adjust build script (#2389)
- Link targets with fuzz.o
- Move code block for readability
2019-05-08 07:35:18 -07:00
Alex Gaynor 53ce9c70ee [graphicsmagick] checkout ghostscript for use in the PDF decoder (#2388) 2019-05-07 10:08:45 -07:00
Abhishek Arya 087c8445bc
Update build.sh 2019-05-07 09:28:59 -07:00
htuch af308ce292 envoy: fix build after recent clang update. (#2387)
Signed-off-by: Harvey Tuch <htuch@google.com>
2019-05-07 07:37:14 -07:00
Matt Morehouse 9c94b0166b [llvm] Update clangd test path. (#2385)
Fixes LLVM build.
2019-05-06 12:57:04 -07:00
Paul Dreik fa5089b800 [libfmt] Add libfmt project to OSS-Fuzz (#2381) 2019-05-06 09:43:09 -07:00
Paul Dreik ef2694640e [libtorrent] corpus url changed (#2384)
* reduce verboseness in unpacking boost

* fix changed url

* reduce wget verbosity
2019-05-05 07:19:51 -07:00
Guido Vranken 955616ba12 [cryptofuzz] Add libsodium, Whirlpool reference impl, Veracrypt, Monero (#2378) 2019-05-03 17:41:16 -07:00
Roman Lebedev 960cc7d793 [librawspeed] LIB_FUZZING_ENGINE fixes (#2317) (#2377)
* [librawspeed] LIB_FUZZING_ENGINE fixes

Depends on 8906ca4a40
Refs. https://github.com/google/oss-fuzz/issues/2317

* [librawspeed] Drop dead CMake WITH_PTHREADS param

It is gone from RawSpeed's CMake, there is no longer any direct
dependecy on PThreads.
2019-05-03 11:28:58 -07:00
Abhishek Arya ab3cede757
Update project.yaml 2019-05-03 07:18:39 -07:00
Arvid Norberg dde14d4709 update libtorrent build script to only build and expose large fuzz targets (#2376) 2019-05-03 07:09:54 -07:00
Varun Khaneja 7d2884aaea [unrar] Re-enable fuzzing by creating/clearing a temporary directory (#2368) 2019-05-02 11:32:32 -07:00
Max Moroz a9c4e0fa07 [s2opc] Address review comments (#2348). 2019-05-02 11:24:41 -07:00
brameret 18b9c57f4e [s2opc] Add build scripts (#2348) 2019-05-02 10:54:18 -07:00
jonathanmetzman acb1bae5b4
[unicorn][libpcap] Try using -lFuzzingEngine to fix MSAN issue (#2370) 2019-05-01 21:09:40 -04:00
jonathanmetzman bbd509dca4
Speculative fix for yajl migration: Reorder arguments (#2366)
Use $LIB_FUZZING_ENGINE before -x c which causes all subsequent files to be treated as C source,
including libFuzzingEngine.a during AFL builds.
2019-05-01 16:58:41 -04:00
jonathanmetzman f6be0078df
Try to migrate yajl-ruby and libxslt to LIB_FUZZING_ENGINE (#2365) 2019-05-01 16:11:29 -04:00
Sebastian Rasmussen 27240f86f5 [mupdf] Update to latest version of API provided by MuPDF. (#2362)
This reverts commit 7fa021dfbe
because the corresponding API was reverted in the upstream project.
2019-05-01 15:47:53 -04:00
Guido Vranken 60a23d3841 [gfwx] Add gfwx fuzzers (#2346)
* [gfwx] Add gfwx fuzzers

* [gfwx] Update maintainer fields to GFWX maintainer address
2019-05-01 10:42:18 -07:00
jonathanmetzman 5217d8efb4
[qpid-proton] Undo change to comment during migration (#2361) 2019-05-01 12:14:33 -04:00
jonathanmetzman 3049c50d48
Migrate projects using -lFuzzingEngine to $LIB_FUZZING_ENGINE (#2325)
Migrate from -lFuzzingEngine to $LIB_FUZZING_ENGINE where possible and not causing breakage
2019-05-01 11:09:55 -04:00
CY Chiang 22f5e3e0b8 [cras] Modify accounts to auto-cc (#2360)
Modify accounts for CRAS team member changes.
2019-05-01 07:31:13 -07:00
jonathanmetzman 7553ee876d
Migrate projects with trouble with exceptions to $LIB_FUZZING_ENGINE (#2359)
Migrate projects that broke libFuzzer with exceptions to $LIB_FUZZING_ENGINE.
Replace uses of -lFuzzingEngine with `$LIB_FUZZING_ENGINE`
2019-04-30 16:48:34 -04:00
Abhishek Arya c1c6ea69a0
Disable unrar project due to file creation spam (#2355) 2019-04-29 09:18:52 -07:00
Matt Morehouse e7b479a8cc [llvm] Switch to LIB_FUZZING_ENGINE. (#2352) 2019-04-29 10:35:29 -04:00
Guido Vranken 4caafd5aa1 [bignum-fuzzer] Fix OpenSSL build (#2354)
Temporary workaround for OpenSSL's build system problems.
2019-04-28 17:19:25 -07:00
htuch bf05a80651 envoy: remove UBSAN blacklist. (#2351)
This is no longer needed as we handle this Envoy-side. This should fix
the build that has been broken since
https://github.com/envoyproxy/envoy/pull/6610.

Signed-off-by: Harvey Tuch <htuch@google.com>
2019-04-26 09:58:44 -07:00
Catena cyber 1e88b4f948 Custom patch for libpcap to avoid infinite loop (#2344) 2019-04-24 09:16:10 -07:00
Arvid Norberg 50d08b7d7c [libtorrent] update libtorrent project to just pull the main repository and build fuzzers from there (as they recently landed in the release branch) (#2339) 2019-04-22 15:53:44 -07:00
Stanislav Malyshev 30190987f4 Fix build - option got renamed to --without-libxml (#2338) 2019-04-20 22:26:16 -07:00
Guido Vranken 1ea634a278 Cryptofuzz fixes (#2337)
* [cryptofuzz] Use latest OpenSSL version

This is a workaround for an issue OpenSSL's build system is currently
having. I've appended || true to the build command so failure is not
signaled to the Docker process running the build script, and the build
is not aborted.

Multithreaded compiling has been removed temporarily to avoid a race
condition that causes the make procedure to abort before libcrypto.a
has been compiled.

* [cryptofuzz] Build against LIB_FUZZING_ENGINE_DEPRECATED to prevent crashes
2019-04-18 13:07:09 -07:00
Catena cyber 028c9c486a Fixes capstone build (#2335)
Uses a newly compiled file for next branch only
2019-04-18 08:16:58 -07:00
Nick Terrell fb7075b1ed [zstd] Move downloading seed corpora to build.sh (#2331)
I just added a new fuzzer, `zstd_frame_info`, and want to be able to add new
fuzzers without submitting a pull request to oss-fuzz. This change uses zstd's
Makefile to download the corpora. Now I can add a new fuzzer to zstd and it will
automatically get built and download the seed corpus in oss-fuzz.
2019-04-17 21:42:41 -07:00
Guido Vranken 7bdfb2b7d8 Cryptofuzz (differential crypto fuzzing) (#2273)
* Add cryptofuzz

* [cryptofuzz] Specify sanitizers

* [cryptofuzz] Actually disable assembly in second OpenSSL build

* [cryptofuzz] Add BoringSSL

* [cryptofuzz] Enable MemorySanitizer builds

* [cryptofuzz] Fix OpenSSL build

* [cryptofuzz] Add LibreSSL target

* [cryptofuzz] Don't build LibreSSL if MemorySanitizer is enabled

* [cryptofuzz] Adapt build script to latest cryptofuzz code

* [cryptofuzz] Force rebuild of OpenSSL

* [cryptofuzz] Comment and move to Dockerfile OpenSSL's commit lock

* [cryptofuzz] BoringSSL, LibreSSL: only build libcrypto.a for faster builds

* [cryptofuzz] Replace -lFuzzingEngine -> $LIB_FUZZING_ENGINE for compatibility with OSS-Fuzz' new build setup

* [cryptofuzz] Add README.md
2019-04-17 20:33:50 -07:00
Alex Gaynor 7b8971290d [graphicsmagick] Added --time flag to clone (#2333)
This will give us more information if the clone fails (which it does sometimes, probably due to sourceforge infra issues)
2019-04-17 14:21:54 -07:00
Leandro A. F. Pereira c416a8007b [lwan] Use HTTP dictionary to speed up fuzzing (#2329) 2019-04-17 08:28:57 -07:00
tsdgeos 0221e8b030 [kimageformats] Split fuzzer into 9 fuzzers (#2327)
oss-fuzz devels say this is optimal
2019-04-16 15:40:48 -07:00
jonathanmetzman 53c09d30f6
Update patch to fix build and migrate to -fsanitize=fuzzer (#2324)
Update skia.diff to fix build breakage.
Also, use $LIB_FUZZING_ENGINE instead of -lFuzzingEngine to start using -fsanitize=fuzzer
2019-04-16 11:52:23 -07:00
tsdgeos d2f7690886 [karchive] New project: karchive (#2318) 2019-04-15 14:20:24 -07:00
Max Moroz 4fba752cc3 [libxslt] Update project.yaml: replace Chromium owner in auto_cc. 2019-04-15 11:08:34 -07:00
Nick Wellnhofer 8af165e494 [libxslt] Start with integration (#2320)
Integrate the first fuzz targets from libxslt.
2019-04-15 10:27:43 -07:00
Alex Gaynor 7c05d15480 [libical] Make sure to do an apt update before apt install (#2319) 2019-04-15 10:11:25 -07:00
jonathanmetzman ae9398deef
Change LIB_FUZZING_ENGINE to -fsanitize=fuzzer in libFuzzer builds (#2312) 2019-04-15 10:05:02 -07:00
Nick Terrell 3eaad4f3e2 [zstd] Add fuzzers and cc emails (#2309)
* [zstd] Add seed corpora for two new fuzzers

* [zstd] Add two more emails to cc list

It is helpful to add in the corporate email so we don't miss bugs.
2019-04-10 13:35:20 -07:00
tsdgeos 36005daba0 libical: Fix undefined sanitizer not building (#2308)
The cmake option for disabling shared libs was not the correct one
and the compilation was getting confused
2019-04-10 11:23:34 -07:00
Damien Miller 2b49be2eaa Updates for OpenSSH fuzzing (#2306)
* Enable experimental XMSS keys for fuzzing

* Enable auth options fuzzer
2019-04-10 13:31:45 +10:00
Leandro A. F. Pereira 935e25b1ff [lwan] Add fuzzing targets for Lwan (#2302) 2019-04-09 13:54:01 -07:00
Abhishek Arya c4fe1fef9e
Disable UBSan for libical (#2298) 2019-04-09 11:46:33 -07:00
tsdgeos e445a90d94 Add libical (#2298) 2019-04-09 11:23:05 -07:00
Paul Dreik 676071636c Libtorrent take2 (#2299)
* switch to another fuzzer repo aimed to be merged upstream

* update email addresses

checked with arvid, he approved adding his address

* [libtorrent] improve building

 - use ninja
 - don't build tests
 - respect CXXFLAGS when building boost
 - less verbose output when downloading

* create initial corpus zip files from git

this makes it much easier to add and remove
both fuzzers and corpus upstream and make
sure they work well.
2019-04-09 11:22:07 -07:00
Kostya Serebryany 08af8b64ad
[libpng-proto] remove stale comment 2019-04-09 11:01:58 -07:00
Kostya Serebryany 663d09feb2
[libpng-proto] add asan back 2019-04-09 10:57:09 -07:00
Abhishek Arya 2e3212d8f0
Revert "Remove mbed TLS fuzzer (#2278)" (#2304)
This reverts commit cce2ed4d23.
2019-04-09 09:07:55 -07:00
Oliver Chang 5c5a10a16d
Update project.yaml 2019-04-09 10:47:13 +10:00
Matt Morehouse 6c3880cfd5 [llvm] Remove proto fuzzers. (#2301)
Proto fuzzers are slow and haven't found bugs in a long time.  Their
builds are also hard to maintain since they build in a different
configuration than any of the LLVM build bots.
2019-04-08 12:30:36 -07:00
Guido Vranken eb2795c830 [bignum-fuzzer] Fix OpenSSL build (#2296) 2019-04-06 07:28:40 -07:00
Sebastian Rasmussen 7fa021dfbe [mupdf] Update to latest version of API provided by MuPDF. (#2294) 2019-04-05 12:16:43 -07:00
Mihai Maruseac 922ea7c8fe [TensorFlow] Ensure we're always using a valid Bazel (#2293)
* Determine Bazel version from configure.py script

* Install Bazel at the version from configure.py

* Don't downgrade Bazel on Dockerfile

* Make sure we were able to install proper Bazel

* Comment update
2019-04-04 23:35:11 -07:00
Max Moroz 2eaa543f82 [zlib] Fix build.sh to overwrite seed corpus symlinks. 2019-04-04 12:54:37 -07:00
Mihai Maruseac 2fa5eca226 [tensorflow] Update Bazel version and check that it is compatible (#2288)
* Update Bazel to 0.24.0

* Always run ./configure
2019-04-03 09:57:58 -07:00
Paul Dreik 7b3ebc2abb [libtorrent] add address for google account (#2286)
see https://github.com/google/oss-fuzz/issues/2261#issuecomment-479085906
2019-04-02 09:53:51 -07:00
Kevin Lubick a1315ef31e [skia] fix build after rename (#2283) 2019-04-01 13:31:15 -07:00
Stanislav Malyshev 795aa42757 Use libonig5 - this will enable mbstring regex limits (#2282) 2019-04-01 12:29:42 -07:00
Paul Dreik b858b0036d Libtorrent (#2268)
* [boost] add fuzzers for boost property tree parsers

* [boost] fix missing files in Docker copy command

* add libtorrent

* set email address, clone depth 10

* remove templated text
2019-04-01 11:31:16 -07:00
Guido Vranken 8594957c7e [libsrtp] Enable MemorySanitizer builds (#2271) 2019-04-01 09:15:52 -07:00
Guido Vranken b3b4a5c3a3 [tesseract-ocr] Add fuzzer that processes 512x512 images (#2279) 2019-04-01 09:15:21 -07:00
Guido Vranken cce2ed4d23 Remove mbed TLS fuzzer (#2278) 2019-03-31 22:49:35 -07:00
Konstantin Varlamov 927922aadf Fix Firestore build by adding missing build dependencies (#2280)
* Add missing build dependencies

* Update cc list
2019-04-01 08:37:28 +08:00
Alexander Alekhin b27c51dee4 [opencv] update build scripts (#2276)
- disable building of tests/apps (not used for fuzzing)
- unlock using local source checkout: https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md#reproduce-using-local-source-checkout
  * $SRC - fuzzers sources
  * $SRC/opencv - opencv sources
  * $WORK/build-$SANITIZER - build directory
2019-04-01 08:37:01 +08:00
Joachim Bauch e09485feab [lzma] Add LZMA SDK (#2267)
* Add LZMA SDK

* Use email of Igor Pavlov as primary contact and add more sanitizers.
2019-03-31 11:24:39 -07:00
tsdgeos 5f2ed9d550 [kimageformats] Include ora and kra handlers (#2277)
This pulls karchive that pulls, ecm and libzip and libzip pulls zlib
2019-03-31 11:04:40 -07:00
Daniel Marjamäki 080a64aca0 change WORKDIR (#2275) 2019-03-30 07:54:24 -07:00
Daniel Marjamäki 94e1e96a99 tweak cppcheck. moved fuzzer client to main cppcheck repo. (#2274) 2019-03-29 15:32:47 -07:00
Marc-Andre Lureau dfd9d777a8 libtpms: update my email address (#2272)
Use the canonical form, this may help with oss-fuzz.com access.

Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2019-03-28 11:19:05 -07:00
Marc-Andre Lureau 1c590dcc35 Add libtpms project (#2266)
Signed-off-by: Marc-André Lureau <mlureau@redhat.com>
2019-03-28 10:54:49 -07:00