Commit Graph

1724 Commits

Author SHA1 Message Date
Guido Vranken 4caafd5aa1 [bignum-fuzzer] Fix OpenSSL build (#2354)
Temporary workaround for OpenSSL's build system problems.
2019-04-28 17:19:25 -07:00
htuch bf05a80651 envoy: remove UBSAN blacklist. (#2351)
This is no longer needed as we handle this Envoy-side. This should fix
the build that has been broken since
https://github.com/envoyproxy/envoy/pull/6610.

Signed-off-by: Harvey Tuch <htuch@google.com>
2019-04-26 09:58:44 -07:00
Catena cyber 1e88b4f948 Custom patch for libpcap to avoid infinite loop (#2344) 2019-04-24 09:16:10 -07:00
Arvid Norberg 50d08b7d7c [libtorrent] update libtorrent project to just pull the main repository and build fuzzers from there (as they recently landed in the release branch) (#2339) 2019-04-22 15:53:44 -07:00
Stanislav Malyshev 30190987f4 Fix build - option got renamed to --without-libxml (#2338) 2019-04-20 22:26:16 -07:00
Guido Vranken 1ea634a278 Cryptofuzz fixes (#2337)
* [cryptofuzz] Use latest OpenSSL version

This is a workaround for an issue OpenSSL's build system is currently
having. I've appended || true to the build command so failure is not
signaled to the Docker process running the build script, and the build
is not aborted.

Multithreaded compiling has been removed temporarily to avoid a race
condition that causes the make procedure to abort before libcrypto.a
has been compiled.

* [cryptofuzz] Build against LIB_FUZZING_ENGINE_DEPRECATED to prevent crashes
2019-04-18 13:07:09 -07:00
Catena cyber 028c9c486a Fixes capstone build (#2335)
Uses a newly compiled file for next branch only
2019-04-18 08:16:58 -07:00
Nick Terrell fb7075b1ed [zstd] Move downloading seed corpora to build.sh (#2331)
I just added a new fuzzer, `zstd_frame_info`, and want to be able to add new
fuzzers without submitting a pull request to oss-fuzz. This change uses zstd's
Makefile to download the corpora. Now I can add a new fuzzer to zstd and it will
automatically get built and download the seed corpus in oss-fuzz.
2019-04-17 21:42:41 -07:00
Guido Vranken 7bdfb2b7d8 Cryptofuzz (differential crypto fuzzing) (#2273)
* Add cryptofuzz

* [cryptofuzz] Specify sanitizers

* [cryptofuzz] Actually disable assembly in second OpenSSL build

* [cryptofuzz] Add BoringSSL

* [cryptofuzz] Enable MemorySanitizer builds

* [cryptofuzz] Fix OpenSSL build

* [cryptofuzz] Add LibreSSL target

* [cryptofuzz] Don't build LibreSSL if MemorySanitizer is enabled

* [cryptofuzz] Adapt build script to latest cryptofuzz code

* [cryptofuzz] Force rebuild of OpenSSL

* [cryptofuzz] Comment and move to Dockerfile OpenSSL's commit lock

* [cryptofuzz] BoringSSL, LibreSSL: only build libcrypto.a for faster builds

* [cryptofuzz] Replace -lFuzzingEngine -> $LIB_FUZZING_ENGINE for compatibility with OSS-Fuzz' new build setup

* [cryptofuzz] Add README.md
2019-04-17 20:33:50 -07:00
Alex Gaynor 7b8971290d [graphicsmagick] Added --time flag to clone (#2333)
This will give us more information if the clone fails (which it does sometimes, probably due to sourceforge infra issues)
2019-04-17 14:21:54 -07:00
Leandro A. F. Pereira c416a8007b [lwan] Use HTTP dictionary to speed up fuzzing (#2329) 2019-04-17 08:28:57 -07:00
tsdgeos 0221e8b030 [kimageformats] Split fuzzer into 9 fuzzers (#2327)
oss-fuzz devels say this is optimal
2019-04-16 15:40:48 -07:00
jonathanmetzman 53c09d30f6
Update patch to fix build and migrate to -fsanitize=fuzzer (#2324)
Update skia.diff to fix build breakage.
Also, use $LIB_FUZZING_ENGINE instead of -lFuzzingEngine to start using -fsanitize=fuzzer
2019-04-16 11:52:23 -07:00
tsdgeos d2f7690886 [karchive] New project: karchive (#2318) 2019-04-15 14:20:24 -07:00
Max Moroz 4fba752cc3 [libxslt] Update project.yaml: replace Chromium owner in auto_cc. 2019-04-15 11:08:34 -07:00
Nick Wellnhofer 8af165e494 [libxslt] Start with integration (#2320)
Integrate the first fuzz targets from libxslt.
2019-04-15 10:27:43 -07:00
Alex Gaynor 7c05d15480 [libical] Make sure to do an apt update before apt install (#2319) 2019-04-15 10:11:25 -07:00
jonathanmetzman ae9398deef
Change LIB_FUZZING_ENGINE to -fsanitize=fuzzer in libFuzzer builds (#2312) 2019-04-15 10:05:02 -07:00
Nick Terrell 3eaad4f3e2 [zstd] Add fuzzers and cc emails (#2309)
* [zstd] Add seed corpora for two new fuzzers

* [zstd] Add two more emails to cc list

It is helpful to add in the corporate email so we don't miss bugs.
2019-04-10 13:35:20 -07:00
tsdgeos 36005daba0 libical: Fix undefined sanitizer not building (#2308)
The cmake option for disabling shared libs was not the correct one
and the compilation was getting confused
2019-04-10 11:23:34 -07:00
Damien Miller 2b49be2eaa Updates for OpenSSH fuzzing (#2306)
* Enable experimental XMSS keys for fuzzing

* Enable auth options fuzzer
2019-04-10 13:31:45 +10:00
Leandro A. F. Pereira 935e25b1ff [lwan] Add fuzzing targets for Lwan (#2302) 2019-04-09 13:54:01 -07:00
Abhishek Arya c4fe1fef9e
Disable UBSan for libical (#2298) 2019-04-09 11:46:33 -07:00
tsdgeos e445a90d94 Add libical (#2298) 2019-04-09 11:23:05 -07:00
Paul Dreik 676071636c Libtorrent take2 (#2299)
* switch to another fuzzer repo aimed to be merged upstream

* update email addresses

checked with arvid, he approved adding his address

* [libtorrent] improve building

 - use ninja
 - don't build tests
 - respect CXXFLAGS when building boost
 - less verbose output when downloading

* create initial corpus zip files from git

this makes it much easier to add and remove
both fuzzers and corpus upstream and make
sure they work well.
2019-04-09 11:22:07 -07:00
Kostya Serebryany 08af8b64ad
[libpng-proto] remove stale comment 2019-04-09 11:01:58 -07:00
Kostya Serebryany 663d09feb2
[libpng-proto] add asan back 2019-04-09 10:57:09 -07:00
Abhishek Arya 2e3212d8f0
Revert "Remove mbed TLS fuzzer (#2278)" (#2304)
This reverts commit cce2ed4d23.
2019-04-09 09:07:55 -07:00
Oliver Chang 5c5a10a16d
Update project.yaml 2019-04-09 10:47:13 +10:00
Matt Morehouse 6c3880cfd5 [llvm] Remove proto fuzzers. (#2301)
Proto fuzzers are slow and haven't found bugs in a long time.  Their
builds are also hard to maintain since they build in a different
configuration than any of the LLVM build bots.
2019-04-08 12:30:36 -07:00
Guido Vranken eb2795c830 [bignum-fuzzer] Fix OpenSSL build (#2296) 2019-04-06 07:28:40 -07:00
Sebastian Rasmussen 7fa021dfbe [mupdf] Update to latest version of API provided by MuPDF. (#2294) 2019-04-05 12:16:43 -07:00
Mihai Maruseac 922ea7c8fe [TensorFlow] Ensure we're always using a valid Bazel (#2293)
* Determine Bazel version from configure.py script

* Install Bazel at the version from configure.py

* Don't downgrade Bazel on Dockerfile

* Make sure we were able to install proper Bazel

* Comment update
2019-04-04 23:35:11 -07:00
Max Moroz 2eaa543f82 [zlib] Fix build.sh to overwrite seed corpus symlinks. 2019-04-04 12:54:37 -07:00
Mihai Maruseac 2fa5eca226 [tensorflow] Update Bazel version and check that it is compatible (#2288)
* Update Bazel to 0.24.0

* Always run ./configure
2019-04-03 09:57:58 -07:00
Paul Dreik 7b3ebc2abb [libtorrent] add address for google account (#2286)
see https://github.com/google/oss-fuzz/issues/2261#issuecomment-479085906
2019-04-02 09:53:51 -07:00
Kevin Lubick a1315ef31e [skia] fix build after rename (#2283) 2019-04-01 13:31:15 -07:00
Stanislav Malyshev 795aa42757 Use libonig5 - this will enable mbstring regex limits (#2282) 2019-04-01 12:29:42 -07:00
Paul Dreik b858b0036d Libtorrent (#2268)
* [boost] add fuzzers for boost property tree parsers

* [boost] fix missing files in Docker copy command

* add libtorrent

* set email address, clone depth 10

* remove templated text
2019-04-01 11:31:16 -07:00
Guido Vranken 8594957c7e [libsrtp] Enable MemorySanitizer builds (#2271) 2019-04-01 09:15:52 -07:00
Guido Vranken b3b4a5c3a3 [tesseract-ocr] Add fuzzer that processes 512x512 images (#2279) 2019-04-01 09:15:21 -07:00
Guido Vranken cce2ed4d23 Remove mbed TLS fuzzer (#2278) 2019-03-31 22:49:35 -07:00
Konstantin Varlamov 927922aadf Fix Firestore build by adding missing build dependencies (#2280)
* Add missing build dependencies

* Update cc list
2019-04-01 08:37:28 +08:00
Alexander Alekhin b27c51dee4 [opencv] update build scripts (#2276)
- disable building of tests/apps (not used for fuzzing)
- unlock using local source checkout: https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md#reproduce-using-local-source-checkout
  * $SRC - fuzzers sources
  * $SRC/opencv - opencv sources
  * $WORK/build-$SANITIZER - build directory
2019-04-01 08:37:01 +08:00
Joachim Bauch e09485feab [lzma] Add LZMA SDK (#2267)
* Add LZMA SDK

* Use email of Igor Pavlov as primary contact and add more sanitizers.
2019-03-31 11:24:39 -07:00
tsdgeos 5f2ed9d550 [kimageformats] Include ora and kra handlers (#2277)
This pulls karchive that pulls, ecm and libzip and libzip pulls zlib
2019-03-31 11:04:40 -07:00
Daniel Marjamäki 080a64aca0 change WORKDIR (#2275) 2019-03-30 07:54:24 -07:00
Daniel Marjamäki 94e1e96a99 tweak cppcheck. moved fuzzer client to main cppcheck repo. (#2274) 2019-03-29 15:32:47 -07:00
Marc-Andre Lureau dfd9d777a8 libtpms: update my email address (#2272)
Use the canonical form, this may help with oss-fuzz.com access.

Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2019-03-28 11:19:05 -07:00
Marc-Andre Lureau 1c590dcc35 Add libtpms project (#2266)
Signed-off-by: Marc-André Lureau <mlureau@redhat.com>
2019-03-28 10:54:49 -07:00
Abhishek Arya df1bdcdbe3
Update project.yaml 2019-03-28 09:29:40 -07:00
Guido Vranken c607f5cb3e [lame] Add LAME dev CC. Enable MemorySanitizer. (#2269)
* [lame] Enable MemorySanitizer builds

* [lame] Add LAME dev e-mail to auto_ccs

Reference: https://sourceforge.net/p/lame/mailman/message/36621204/
2019-03-28 07:44:12 -07:00
Guido Vranken b150da5354 [bignum-fuzzer] Compile OpenSSL debug mode (#2270)
This activates assert()s across the library that might help to detect
issues that other safeguards (sanitizers, differential testing)
aren't capable of.
2019-03-28 07:43:31 -07:00
gnrunge 2099cabe1f Add ICU project team member email to notification list in icu/project.yaml. (#2262) 2019-03-25 10:08:22 -07:00
Daniel Marjamäki acd7909035 Add project Cppcheck (#2257)
* Add project Cppcheck

* Add email addresses
2019-03-25 07:57:56 -07:00
Even Rouault e9a43c10c6 PROJ4: build from root so that data/proj.db is also built (#2260) 2019-03-24 11:46:53 -07:00
Dirk Lemstra 92553e2d0c Changed email address for ImageMagick primary contact. (#2259) 2019-03-23 11:29:59 -07:00
Guido Vranken f51e4cc619 [lame] Initial LAME mp3 encoder/decoder oss-fuzz integration (#2256) 2019-03-21 19:02:46 -07:00
Bhargava Shastry f555f0c260 [Solidity] copy all dicts (#2254) 2019-03-20 08:04:57 -07:00
Brent Cook 04d267d0af add libressl fuzz contacts (#2253)
This just removes the distribution list in favor of individual
contributors.
2019-03-20 05:33:15 -07:00
Brent Cook d7b97368dc [libressl] add jsing (github user 4a6f656c) to libressl (#2252) 2019-03-19 06:50:10 -07:00
Abhishek Arya 965e10c6a3
Disable broken MSan build for libressl (#2251) 2019-03-18 21:31:49 -07:00
Brent Cook 0500f1f872 update libressl contact email (#2250) 2019-03-18 21:16:55 -07:00
htuch fe3d5c4c9c envoy: blacklist some problematic external dep UBSAN. (#2242)
Fix in progress at
https://github.com/protocolbuffers/protobuf/pull/5901, we might not
update Envoy with it for a while.

Signed-off-by: Harvey Tuch <htuch@google.com>
2019-03-18 20:32:36 -07:00
Andrea Brancaleoni a203ac045a New project: libressl (v2) (#2248)
This reverts commit 098760e6df.
2019-03-18 17:14:04 -07:00
Kevin Lubick c1068851e8 [skia] add sksl2pipeline (#2245) 2019-03-18 17:13:35 -07:00
Catena cyber 40286086df Capstone: use the new v4 branch (#2246) 2019-03-18 12:34:47 -07:00
Alessandro Toppi 31e74f0dce [janus] First integration (#2241) 2019-03-15 08:24:07 -07:00
Max Moroz 12ac6ff9f2 Revert [janus-gateway] First integration. 2019-03-15 07:05:57 -07:00
Max Moroz 64686cafab [janus-gateway] Fix copyright years. 2019-03-15 07:02:29 -07:00
Alessandro Toppi a02467e192 [janus-gateway] First integration (#2238) 2019-03-15 07:01:09 -07:00
Toru Maesaka 390d340832 [picotls] Update toru's email address (#2240) 2019-03-14 10:38:12 -07:00
Stanislav Malyshev e5f5406f87 Fuzzer moved to official php repo (#2239) 2019-03-13 14:27:13 -07:00
Jonathan Foote 3c03f1174b [picotls] add asn-1 fuzz target (#2236) 2019-03-13 08:27:34 -07:00
pdknsk 94c742f112 [firefox] housekeeping (#2234)
* disable ContentSecurityPolicyParser target

* disable building av1 (requires new nasm)

* remove ContentSecurityPolicyParser files
2019-03-13 07:58:53 -07:00
Stanislav Malyshev a51f446e14 Add mbstring fuzzer for PHP (#2233) 2019-03-13 07:31:48 -07:00
pdknsk c879a0cf3e [glib] add new build flag (#2235) 2019-03-13 06:52:41 -07:00
Tim King 8b9583f757 [leptonica] Making leptonica non-experimental. (#2230) 2019-03-11 14:10:25 -07:00
Jonathan Foote 7da052c72d [picotls] disable smaller fuzz targets (#2229) 2019-03-11 13:20:04 -07:00
Kevin Lubick 169cae111a add sksl fuzzers (#2228) 2019-03-11 13:16:45 -07:00
Abhishek Arya f2fa695177
Remove fpizlo@apple.com from jsc
The user does not exist anymore.

HttpError: <HttpError 400 when requesting https://www.googleapis.com/storage/v1/b/jsc-quarantine.clusterfuzz-external.appspot.com/iam?alt=json returned "User fpizlo@apple.com does not exist.">
2019-03-10 06:55:07 -07:00
Stanislav Malyshev a558ea17e7 Also enable exif fuzzer (#2215) 2019-03-09 05:35:27 -08:00
Guido Vranken 7b1b0240f3 [bignum-fuzzer, libsrtp] Enable AFL (#2226) 2019-03-08 19:38:39 -08:00
Jonathan Foote f5bfb00f8f [picotls] initial picotls integration (#2222) 2019-03-08 12:38:57 -08:00
Guido Vranken b4837fc025 [tesseract-ocr] Use Leptonica master branch (#2224) 2019-03-08 12:38:14 -08:00
Abhishek Arya d1afb0ac72
Fix missing $, strip _fuzz from tpm2-tss targets (#2219) 2019-03-07 19:48:20 -08:00
John Andersen a6e3857f93 [tpm2-tss] Change targets from .fuzz to _fuzz (#2220)
Fixes: #2219

Signed-off-by: John Andersen <john.s.andersen@intel.com>
2019-03-07 16:59:36 -08:00
Jonathan Foote f3f0c1bc0c [picotls] Add picotls project.yaml (#2218) 2019-03-07 15:23:06 -08:00
Guido Vranken bf5caa86c3 [tesseract-ocr] Add Tesseract (#2210)
* Add Tesseract

* Use -lz instead of static library path

* Disable Tesseract shared build

* Minimal repository cloning (--depth 1)

* Improve tessdata directory resolution syntax

* Don't hardcode TESSDATA_PREFIX into binary

* Don't move, but copy $SRC/tessdata to $OUT

Move sometimes results in "inter-device move failed"
2019-03-07 06:57:21 -08:00
Zbigniew Jędrzejewski-Szmek 166745e25d systemd,casync: add Frantisek Sumsal (#2216) 2019-03-07 05:52:39 -08:00
Joachim Bauch 27b37d514a [libheif] Add libheif (#2213) 2019-03-06 06:28:00 -08:00
Bhargava Shastry 80634bf24d [solidity] Update solidity fuzzing corpus for solc and const_opt fuzzers. (#2212) 2019-03-06 06:12:39 -08:00
Bhargava Shastry 371929f997 [solidity] Add new fuzzers (including two LPM proto fuzzers) and minimal fuzzing corpora. (#2208) 2019-03-05 12:42:06 -08:00
Max Moroz 8aafddfb9e [php] Disable UBSan for now (related to #2202). 2019-03-05 11:03:25 -08:00
Max Moroz 9087f31be2 [php] Remove experimental flag and specify ASan and UBSan only. 2019-03-05 07:13:46 -08:00
Stanislav Malyshev b7e17966a8 [php] Add files to run php fuzz (#2202)
So far only one fuzzer active - json one. More to come.
2019-03-05 07:12:32 -08:00
John Andersen da89846a21 [tpm2-tss] Fix tpm2-tss build (#2204)
New checks were added to configure which require that
the GEN_FUZZ environment variable be set during both
the bootstrap and configure scripts.

Fixes: #2203

Signed-off-by: John Andersen <john.s.andersen@intel.com>
2019-03-04 10:25:08 -08:00
Michael Niedermayer 806f7995fb ffmpeg: use libvdpau-1.2 (#2200)
This fixes build as later vdpau uses meson and the new build
system seems to have bugs or i failed to get it working quickly with
oss-fuzz

Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
2019-03-04 08:26:09 -08:00
Kostya Serebryany a0fa24466b
remove security@golang.org per their request 2019-03-01 13:42:01 -08:00
jonathanmetzman 098760e6df
Revert addition of libressl (#2198)
* Revert "[libressl] Speculative build fix (#2197)"

This reverts commit 1b6f3555f5.

* Revert "[libressl] New project (#2075)"

This reverts commit 3bc10fd753.
2019-03-01 11:26:43 -08:00
jonathanmetzman 1b6f3555f5
[libressl] Speculative build fix (#2197) 2019-03-01 11:11:24 -08:00
John Andersen 32d9f390e6 [tpm2-tss] Integrate tpm2-tss (#2189)
Signed-off-by: John Andersen <john.s.andersen@intel.com>
2019-03-01 07:10:26 -08:00
Guido Vranken 231ec64fa2 [bignum-fuzzer] Add BoringSSL+libmpdec fuzzer (#2194) 2019-03-01 07:03:15 -08:00
Andrea Brancaleoni 3bc10fd753 [libressl] New project (#2075)
LibreSSL is an API compatible replacement for OpenSSL,
and after the heartbleed attack is employed as a full-fledged
replacement of OpenSSL on OpenBSD, macOS and VoidLinux.

**This work has been sponsored by Doyensec LLC** [![Doyensec](https://www.doyensec.com/images/logo.svg)](https://doyensec.com/)

Sponsored-by: Doyensec LLC <https://doyensec.com>
2019-03-01 07:02:17 -08:00
Max Moroz d1cb3ca862 [envoy] Remove debug logging and add rsync for sources from /tmp. 2019-03-01 06:41:20 -08:00
Max Moroz 014f0f5e2c [envoy] Another speculative fix for coverage build. 2019-02-28 21:00:16 -08:00
Guido Vranken 1bff6fe295 [bignum-fuzzer] Build and use latest Golang (#2193) 2019-02-28 15:50:31 -08:00
Max Moroz dfd4be9f9a [envoy] Use $HOME instead of /root as Cloud Builder seems to use non-root user. 2019-02-28 14:51:57 -08:00
Max Moroz e61b75ce75 [envoy] Make sources in bazel cache under /root readable. 2019-02-28 13:27:27 -08:00
i110 f387cd3b69 Adding @i110 to h2o (#2187) 2019-02-26 12:57:50 -08:00
Zbigniew Jędrzejewski-Szmek 25e93737e3 Add casync project (#2185)
The necessary counterpart in casync:
https://github.com/systemd/casync/pull/193.
2019-02-26 10:06:00 -08:00
Alex Gaynor e42b35b904 Speed up graphicsmagick clones by including the default branch (#2186) 2019-02-26 07:13:39 -08:00
Michael Niedermayer 7a11112c92 projects/ffmpeg/Dockerfile: Replace alsalib ftp URL by https (#2184)
This avoids using an insecure protocol, also the alsa server does not
seem to work correctly with ftp currently.
This should fix Issue 13270

Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
2019-02-26 00:40:33 -08:00
Guido Vranken e4899ce61a Add libsrtp fuzzer (#2183)
* Add libsrtp fuzzer
2019-02-25 13:34:24 -08:00
htuch 8fe16237ef envoy: coverage support for cmake_external deps. (#2182)
This now lets us visualize nghttp2 coverage.

Tested via:

python infra/helper.py build_fuzzers --sanitizer=coverage envoy
python infra/helper.py coverage envoy -- "-ignore-filename-regex=.*\.cache.*envoy_deps_cache.*"

Requires https://github.com/envoyproxy/envoy/pull/6036 to yield useful
results.

Signed-off-by: Harvey Tuch <htuch@google.com>
2019-02-25 07:07:27 -08:00
Markus Kusano 4159b0f50f Disable experimental flag on OpenCV. (#2181)
We have real OpenCV developers now on the auto-ccs. I've moved Gary as
the owner of the project as well.

I've disabled the experimental flags so that the people on the CCs will
start getting bugs.
2019-02-22 07:41:49 -08:00
Vincent Rabaud 050f713538 Adding @garybradski to OpenCV (#2177) 2019-02-20 05:41:12 -08:00
jonathanmetzman 3d8322b9e0
[libteken] Update primary contact (#2175) 2019-02-19 14:04:50 -08:00
Alexander Alekhin 4dca9f0622 [opencv] add email to "OpenCV" CCs (#2168) 2019-02-19 13:11:38 -08:00
steadmon 8bf4777e00 [git] Add the new fuzz-commit-graph fuzzer. (#2170) 2019-02-19 06:27:26 -08:00
Kuang-che Wu 79440d1183 Update libteken's project.yaml (#2174) 2019-02-19 06:26:36 -08:00
Darafei Praliaskouski 636b1dfb36 [postgis] Update PostGIS dependencies (#2173)
PostGIS depends on GEOS, and recently requres GEOS 3.6 which cannot be found in ubuntu 16.04. 

With this change build will pull newest GEOS 3.7 from Ubuntu 19.04.
2019-02-16 11:55:04 -08:00
Bhargava Shastry c205defe5f giflib: Fix bug in test harness that led to low coverage. (#2172) 2019-02-16 10:36:03 -08:00
Kostya Serebryany e04fe0c39f
revert the previous change: the leak is actually not fixed yet
https://github.com/glennrp/libpng/pull/279
https://github.com/glennrp/libpng/issues/274
2019-02-15 17:31:33 -08:00
Bhargava Shastry ecf26f315b giflib: Fix build failure and remove disk IO. (#2169) 2019-02-15 14:07:49 -08:00
Kostya Serebryany c455845d91
reenable leak detection now that the leak is fixed
report: https://github.com/glennrp/libpng/issues/274#issuecomment-458021367
fix: 3c0b79b4d8
2019-02-15 11:44:43 -08:00
Kostya Serebryany be46ee59a7
libpng-proto: disable asan for the experimental png fuzzers
until https://github.com/glennrp/libpng/issues/275 is fixed upstream.
2019-02-15 11:30:39 -08:00
Kostya Serebryany 893f503de3 [llvm] add Michael to LLVM CCs, as requested in issue #2167 2019-02-14 14:49:33 -08:00
Janne Grunau 4a14f2cb84 ffmpeg: fix build by using nasm from ubuntu bionic (#2165)
http://www.nasm.us was down for the last couple of days. nasm from
bionic can be used without dependencies. Same change as #2159 for dav1d.
2019-02-14 10:36:47 -08:00
Vincent Rabaud 3fb450c8bc [opencv] Add myself as a cc (#2163)
@vpisarev , please don't hesitate to add yourself or anybody from your team. Thx !
2019-02-14 06:58:01 -08:00
Oliver Chang 69210b4622
Enable selective unpack for ffmpeg (#2161). (#2162) 2019-02-14 10:59:58 +11:00
gnrunge 6dbcafae6f Removes break_iterator_utf32_fuzzer target from build script. The target (#2160)
will be removed in ICU.
2019-02-13 15:04:57 -08:00
Janne Grunau 4db22401aa Dav1d: fix build and disable logging (#2159)
Fixes build failure caused by unavailable https://www.nasm.us/
The nasm version in ubuntu xenial is too old. The package from bionic
is new enough and usable without other dependencies from bionic.
2019-02-13 12:36:10 -08:00
Daniel Salzman 685ded7e0a [knot-dns] fix issue 13050 + tiny script cleanup (#2157)
Signed-off-by: Daniel Salzman <daniel.salzman@nic.cz>
2019-02-11 07:59:22 -08:00
Even Rouault fe265a46b0 [proj4] build requires pkg-config (#2156) 2019-02-10 10:29:10 -08:00
Evan Miller 0beabd6fc7 Libxls now requires gettext (#2155)
Add `gettext` to the list of libxls's installed packages to prevent
errors about `AM_ICONV` during autoconf.
2019-02-10 09:18:37 -08:00
Jacob Hoffman-Andrews 4e60829598 Add fuzzer for Unbound's parse_packet. (#2149)
* Add fuzzer for Unbound's parse_packet.
2019-02-09 19:13:09 -08:00
Evan Miller 65c064ed0e ReadStat now requires gettext (#2154)
Add gettext to the list of installed packages. Fixes #13012
2019-02-09 07:12:23 -08:00
Chris Blume 0bb419758f Add myself to autocc of zlib (#2152)
I wrote many of the zlib fuzzers that are used in Chromium.
I also just submitted a pull request for those to go to upstream zlib.

It would be handy for me to be notified when the fuzzers find something
in zlib.

This commit adds myself to the autocc of zlib.
2019-02-08 15:38:51 -08:00
Kevin Lubick ce00810440 Remove jsoncpp (#2150) 2019-02-08 07:26:12 -08:00
gnrunge 4dd6280e19 Add team member email to notification list in icu/project.yaml (#2141) 2019-02-07 11:08:00 -08:00
Max Moroz 70662a99be [llvm] Add Mitch Phillips @google.com address to the auto_ccs list. 2019-02-06 15:52:10 -08:00
Leandro A. F. Pereira 3bc121dd86 Add Lwan to OSS-Fuzz (#2136) 2019-02-06 12:36:51 -08:00
Tyson Smith 9768f0b4a1 [openh264] Add to auto cc list (#2140)
* [openh264] Update corpus zip command

* [openh264] Add to auto cc list
2019-02-06 12:36:33 -08:00
gnrunge 3b7db8ac31 Adds build instructions for recently added ICU fuzzer targets (#2139)
* Update Dockerfile

* Adds instructions to build recently added ICU fuzzer targets.
2019-02-06 10:22:53 -08:00
Alex Gaynor de5ec6fa49 Add a new person to GraphicsMagick issues (#2137)
Remove Glenn Randers-Pehrson who sadly passed away last year.
2019-02-06 06:08:22 -08:00
tsdgeos 25afe67574 [kcodecs] Add new project: kcodecs (#2127) 2019-02-05 15:45:03 -08:00
htuch 0632162890 envoy: fix ClusterFuzz build regressions. (#2135)
Envoy should build again once
https://github.com/envoyproxy/envoy/pull/5843 and this merge.

Signed-off-by: Harvey Tuch <htuch@google.com>
2019-02-05 11:10:44 -08:00
matclab 49b6303218 Add new project : S2OPC (#2133) 2019-02-05 07:06:50 -08:00
Bhargava Shastry 1708eceb2b [solidity] Add fuzzing dictionary (#2132) 2019-02-05 06:45:39 -08:00
Harish Mahendrakar 3c7d71eb98 [libvpx] Remove depencency on tools_common.c.o (#2131)
vpx_dec_fuzzer.cc now builds without any dependency on tools_common.c.o
Hence disable examples while configuring libvpx and remove
tools_common.c.o when linking fuzzer binaries
2019-02-04 12:45:51 -08:00
Even Rouault 11f4aaee07 [proj4] Fix coverage build (#2129)
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12891

Shared library builds failed with
hidden symbol `atexit' in /usr/lib/x86_64-linux-gnu/libc_nonshared.a(atexit.oS) is referenced by DSO

So ./configure --disable-shared
2019-02-04 06:56:51 -08:00
tsdgeos eb4851cddd kimageformats: Also exercise the canRead() codepath (#2128) 2019-02-03 08:15:24 -08:00
Harish Mahendrakar 318f52f824 [libvpx] Disable encoders in libvpx (#2126)
Disable encoders while building libvpx
Current tools_common.c requires y4minput.c when encoders are enabled.
Instead of adding y4minput while linking fuzzer binary, encoders are
disabled during libvpx configure.
This resolves undefined reference to functions in y4minput.c
2019-02-01 11:22:56 -08:00
Stefan Bucur 3f97744eab Preserve the original data buffer in the tidy-html5 fuzzer. Currently, the fuzzer makes a null-terminated copy of the buffer, preventing the input from containing null characters. (#2125) 2019-02-01 08:30:43 -08:00
Benjamin Kramer a2e4a8e152 [llvm] Add corpus to clangd-fuzzer (#2123)
The fuzzer has been quiet about crashes in the upper layers of clangd (JSON parser) for months. Let's go deeper!
2019-02-01 06:40:08 -08:00
Even Rouault f395935e32 [gdal] GDAL: fix build (#2124)
Since yesterday, GDAL requires building against
https://github.com/OSGeo/proj.4 master
2019-02-01 06:38:31 -08:00
Kostya Serebryany 3a03a358de [libpng-proto] suppress leak reports until https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12716 is fixed 2019-01-31 19:04:19 -08:00
Kostya Serebryany 4b34eb1753 [libpng-proto] extend the fuzz target to cover more APIs 2019-01-31 18:10:20 -08:00
Kostya Serebryany 9689374f84 [libpng-proto] add one more heuristic to speed up libpng_transforms_fuzzer 2019-01-31 15:17:52 -08:00
Tim Rühsen 8d6014f3fe [libidn2] Add memory sanitizer (#2122) 2019-01-30 06:56:50 -08:00
tsdgeos 8c91ce70cd poppler: exercise the text extraction code (#2121) 2019-01-29 10:49:38 -08:00
tsdgeos 0967d02e5f Add new project: kimageformats (#2119) 2019-01-28 18:17:12 -08:00
Randy de864b54bf [libspng] add structure aware fuzzer (#2117) 2019-01-28 08:23:20 -08:00
Bhargava Shastry d027fbc238 [solidity] Add Martin Swende to auto_ccs (#2118) 2019-01-28 06:55:49 -08:00
Max Moroz ad6f2d62c6 [dav1d] Add missing .options file. 2019-01-26 21:11:23 -08:00
Nathan Moinvaziri e9aa2acbb3 Fix minizip fuzz testing (#2115)
* Set CXX cmake flags for linking with libFuzzer.

* Fixed cmake build argument after name change.
2019-01-26 17:50:51 -08:00
Kostya Serebryany edf33327b6 [libpng-proto] add libpng_transforms_fuzzer, a fuzz target with more coverage than the in-tree one currently has (#2114) 2019-01-25 22:30:11 -08:00
Tyson Smith 456eded09c [openh264] Add to corpus and enable ASM for non-MSAN (#2113) 2019-01-25 12:39:10 -08:00
Bhargava Shastry 7ef4eae22c solidity: update primary contact email (#2112) 2019-01-25 05:25:58 -08:00
Max Moroz e2522df903
[dav1d] Enable ASM code for non-MSan build configurations. (#2109) 2019-01-24 13:27:15 -08:00
Bhargava Shastry e43f9e186f [solidity] Add the solidity compiler to oss-fuzz (#2108) 2019-01-24 07:52:29 -08:00
Kostya Serebryany 743e4c055d Merge branch 'master' of github.com:google/oss-fuzz 2019-01-23 18:00:28 -08:00
Kostya Serebryany a9099bd6af [libpng-proto] add another fuzzer, this time using a custom mutator specialized for PNG (no protos) 2019-01-23 17:59:58 -08:00
Tyson Smith d924556164 [openh264] Add project (#2107)
Add project
2019-01-23 17:39:55 -08:00
Micah Snyder eeb5d8fa15 [ClamAV] Build script fix (#2105)
Correction to build.sh script so the script won't fail on clean checkout.
2019-01-23 14:04:47 -08:00
Micah Snyder 624693035b [ClamAV] Build script improvements (#2102)
Build script improvements to use the WORK dir, rather than polluting the SRC dir, and to use make in the clamav-devel/fuzz directory rather than building source files manually.
2019-01-23 09:26:18 -08:00
Evan Miller 6c3910186e Add first fuzzing target for libxls (#2103)
* Add libxls

* Add fuzzing target for libxls

The library parses only one format, so only one fuzzer (fuzz_xls) is
included. The initial test corpus includes ~30 files. Tested locally
on Linux.
2019-01-22 15:29:29 -08:00
gnrunge e14908ba50 Update Dockerfile (#2104) 2019-01-22 15:27:58 -08:00
Evan Miller a04edde6a3 Add libxls (#2101) 2019-01-22 07:50:00 -08:00
Robert Löhning 0f8915c4ba Add The Qt Project (#1799) 2019-01-21 08:27:24 -08:00
Jonathan Hui bc4ab87d32 [openthread] add CLI to build (#2099) 2019-01-20 11:25:45 -08:00
Kostya Serebryany f9ed8d9c75 [libpng-proto] simplify the target a bit further: remove a field that don't really need to be mutaed 2019-01-18 16:50:16 -08:00
gnrunge 0af5dcbac4 Icu fuzz (#2098)
* Update project.yaml

* Remove quotes around email.

* Updates icu/project.yaml with additional emails ids
2019-01-18 14:03:18 -08:00
Evan Miller d517d05ea0 Add fuzzing targets for ReadStat (#2093)
* Add ReadStat project

* Add fuzzing targets for new project ReadStat

Adding fuzzers for six file formats supported by ReadStat. A corpus
is generated in each case from example data in the test suite.

Tested locally on Linux, which check_build passing in all six cases.
2019-01-18 12:06:53 -08:00
gnrunge c545039e1a Update project.yaml (#2097)
* Update project.yaml

* Remove quotes around email.
2019-01-18 12:05:08 -08:00
Yang Gao 0e71b3b7e3 Update grpc (#2096) 2019-01-18 10:28:01 -08:00
Mihai Maruseac 4bc64932b5 Copy more files on coverage runs (#2092) 2019-01-17 21:58:13 -08:00
gnrunge 97e4868a38 Icu fuzz (#2091)
* Updates the ICU fuzzer project directory:
- Delete the ICU fuzzer tests. The code was transfered to unicode-org/icu
  in PR 321 (https://github.com/unicode-org/icu/pull/321).
- Adjust the Dockerfile and the build.sh to work with the new ICU repositroy
  (now GitHub, migrated from svn recently) and the new code arrangement.

* Removes logging statements used for debugging statements from the Dockerfile.
2019-01-16 20:54:34 -08:00
Stefan Bucur 8f46f4deea [tidy-html5] Check out tidy-html5 from the 'next' branch, instead of the default 'master'. The next branch is the one that gets the latest features and fixes in practice. (#2090) 2019-01-16 10:18:52 -08:00
Jiří Daněk dfd574a1ba [qpid-proton] update git url after repo migration (#2089) 2019-01-16 07:01:12 -08:00
Evan Miller e315e8c0ca [readstat] Add ReadStat project (#2088) 2019-01-15 13:37:03 -08:00
Mihai Maruseac 9d22200634 [tensorflow] Add missing directory to the rsync path (#2086) 2019-01-14 09:32:40 -08:00
Frank Morgner 61ebf9defe Add OpenSC (#2084)
OpenSC provides a set of libraries and utilities to work with smart
cards. Its main focus is on cards that support cryptographic operations,
and facilitate their use in security applications such as
authentication, mail encryption and digital signatures. OpenSC
implements the standard APIs to smart cards, e.g. PKCS#11 API, Windows’
Smart Card Minidriver and macOS Tokend.
2019-01-14 07:42:11 -08:00
Kostya Serebryany a55a1276d9 Merge branch 'master' of github.com:google/oss-fuzz 2019-01-11 16:00:26 -08:00
Kostya Serebryany 83585a0190 [libpng-proto] extend the example proto fuzz target with explicit support for iCCP PNG chunk 2019-01-11 16:00:03 -08:00
Jonathan Hui f9d1bea828 [openthread] add NCP to build (#2083) 2019-01-11 15:58:13 -08:00
sebpop b41592118e oss-fuzz/12299: fix build error due to change in interface for fast crc32 (#2082) 2019-01-11 14:14:17 -08:00
Bhargava Shastry d878422912 [openvswitch] Adds Toms Atteka to auto_ccs list (#2081) 2019-01-11 08:46:21 -08:00
Alexander Færøy c396fd8827 Fix path to module-formats.o for Irssi. (#2080)
This patch should fix the compilation error reported in issue oss-fuzz:12065.
2019-01-09 17:46:03 -08:00
Guido Vranken 5442f88bc3 [bignum-fuzzer] Fix Rust nightly installation, attempt #2 (#2079) 2019-01-09 07:12:33 -08:00
Augie Fackler 658615d59e mercurial: move Python sources to $SRC and build in build.sh (#2078)
This will clean up the Makefile on the hg side considerably, and will
also fix the coverage build. Fixes #2076.

Bonus: I did some extra work in build.sh so that incremental rebuilds
of the fuzzers won't needlessly recompile $OUT/sanpy, shortening
development time on new fuzzers and avoiding issues caused by a $OUT
that was built for a different fuzz configuration.
2019-01-09 14:17:01 +11:00
Vincent Ulitzsch 834a138b39 [giflib] Add giflib (#2062)
* Add initial version of giflib

* Fix a memory leak in dgif_target

This commit fixes a memory that was caused by calling the wrong
close function.

* giflib: Minor bug fixes that also addressees most comments from Doris
2019-01-08 11:17:29 -08:00
Max Moroz 231f91a5be [libspng] Enable all sanitizers. 2019-01-08 11:05:17 -08:00
Randy ea0504c882 [libspng] Integrate libspng (#1664)
* Integrate libspng

* update copyright year
2019-01-08 11:04:07 -08:00
Stefan Bucur 8b1e8b020e Fix typos and label names for SunDew fuzzers. (#2077) 2019-01-08 08:59:23 -08:00
Matt Morehouse 95bbd881db [llvm] Update demangler fuzzers. (#2074) 2019-01-07 09:50:13 -08:00
Daniel Salzman d8db26e77f [knot-dns] fix issue 12386 and remove temporary workaround (#2072)
* Revert "[knot-dns] use libnettle 3.4.1 to build gnutls (#2013)"

This reverts commit 269cfb6bf8.

* [knot-dns] use bootstrap before build (issue 12386)
2019-01-07 07:43:35 -08:00
htuch d0d79130d3 [envoy] add @jmarantz and @lizan to ACL. (#2073)
Signed-off-by: Harvey Tuch <htuch@google.com>
2019-01-07 07:27:19 -08:00
Tim Rühsen 77f1da0e60 [wget] Fix gnutls build (#2070) 2019-01-04 07:09:15 -08:00
Tim Rühsen 3d70ee5414 [wget2] Fix gnutls build (#2071) 2019-01-04 07:08:51 -08:00
Nikos Mavrogiannopoulos 674c259117 [gnutls] use bootstrap before build (#2069)
Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
2019-01-04 07:06:33 -08:00
Mihai Maruseac 4feaf99b36 [tensorflow] Try to get coverage build to progress (#2068)
* No need for configure hack as it is covered internally.

* Try to get coverage build to progress

* Remove extra mkdir
2019-01-03 12:22:27 -08:00
Varun Khaneja 9644e3ad4a Use NOVOLUME. Point to the oss_fuzz branch. (#2067)
- Start using NOVOLUME since Chromium is going to start using it.
[See: https://crrev.com/c/1393803]

- Point to the oss_fuzz branch where all releases will be fuzzed first before being merged into the master branch.
2019-01-03 08:15:59 -08:00
Stefan Bucur 6cbad0dcae [qpdf] Fix the fuzzer name in the qpdf project.yaml file. (#2065) 2019-01-02 11:24:19 -08:00
Kevin Lubick af5a3f857f [skia] re-enable checks (#2064) 2019-01-02 06:42:52 -08:00
Jack Lloyd acb6a927a3 Add @mgierlings to botan cc list (#2063) 2018-12-31 07:58:11 -08:00
Guido Vranken 6b2eb45a5b Fix Rust nightly installation (#2061) 2018-12-30 10:43:22 -08:00
Max Moroz 3df3b90ebb [libxml2] Fix std::string use in the fuzz targets: avoid it when possible. 2018-12-28 14:25:13 -08:00
Christoph Diehl 9316b4180e [libldac] Disable UBSan (#2060) 2018-12-28 10:57:54 -08:00
Tim Rühsen b332fd9f75 [wget2] Fix order of link libraries (#2059) 2018-12-28 09:28:29 -08:00
Christoph Diehl 2b67387299 [libldac] Disable MSan (#2058) 2018-12-28 09:28:10 -08:00
Tim Rühsen eed522674c [wget] Fix order of link libraries (#2057) 2018-12-27 13:42:55 -08:00
Max Moroz 3275a3d010 [perfetto] Disable empty expression check (similar to #2055). 2018-12-27 12:41:33 -08:00
Tim King 96d51be047 [qpdf] Limiting the number of bytes the read_memory_fuzzer handles. (#2056)
* [qpdf] Limiting the number of bytes the read_memory_fuzzer handles.

* Raising the limit to 64 KiB.
2018-12-27 11:13:11 -08:00
Kevin Lubick 9fa6d673de Disable empty expression check (#2055) 2018-12-27 09:31:07 -08:00
Max Moroz 17e1a02f7b
[libxml2] Remove libxml2_xml_regexp_compile_fuzzer. (#1988) 2018-12-27 08:43:07 -08:00
Wei Wang 9d0ab6e60e [jsonnet] Integrate jsonnet and add a fuzzer (#2045)
* Add jsonnet

* Update build.sh

* Update build.sh

* Update build file

* Update build.sh

* Update build.sh

* Made it workgit status

* Add more sanitizer configs

* Minor update

* Remove emacs
2018-12-27 08:33:44 -08:00
Max Moroz b66302cde7 [leptonica] Fix the build by installing libwebp library after building it. 2018-12-26 14:31:54 -08:00
Tim King a122dd46b7 [leptonica] Initial integration for leptonica (#2040)
* leptonica: initial integration for OSS-Fuzz.

* Adding the sundew label for the leptonica fuzzer.

* Adding a copy right header to pix_rotate_shear_fuzzer.cc.
2018-12-26 13:19:43 -08:00
Mihai Maruseac 4c8a28e400 [tensorflow] Updates to get coverage build pass (#2052)
* Allow bazel to use version 0.21.0.

* Build only 5 fuzzers to get coverage build to also succeed.
2018-12-26 09:46:04 -08:00
Christoph Diehl 6d6f5377b6 Add libldac for LDAC codec (#2051)
* Add libldac for LDAC codec

* Fix primary email casing
2018-12-25 06:45:41 -08:00
Tim King 05a0e52d22 [qpdf] Initial integration for qpdf. (#2050) 2018-12-22 01:09:53 -08:00
Kostya Serebryany 86cc0eecbb libpng-proto: compress IDAT chunks 2018-12-21 18:22:54 -08:00
Kostya Serebryany dd5fb22985 libpng-proto: use the Release build of LPM 2018-12-21 17:02:31 -08:00
Kostya Serebryany 0b9b883b79 libpng-proto: don't use vector, use a plain array instead 2018-12-21 15:42:50 -08:00
Kostya Serebryany e47326293d
Adding libpng-proto, an example of proto-based fuzzer (#2048)
* Adding libpng-proto, an example of proto-based fuzzer

* fix year

* remove redundant line

* address comments

* simplify names

* small update in build.sh
2018-12-21 15:10:13 -08:00
jonathanmetzman 8858ee1de6
disable msan (#2049) 2018-12-21 13:50:25 -08:00
Markus Kusano 2ae303bc3b Add mpg123_decode fuzzer (#2037)
* Add fuzzer for mpg123_decode.

This fuzzes a different and non-filebased API that read_fuzzer.c.
mpg123_decode is, however, streaming based so we need to chunk the
fuzzer's input into multiple pieces, and pass them to the library. This
is pretty annoying to do by hand so I've introduced byte_stream.h to do
this automatically. Sadly, byte_stream.h is very C++ so the
decode_fuzzer is also C++ now. This isn't ideal since mpg123 is a
C library but this is the easiest way to do it.

* Do not carry next input within std::string.

* Malloc a new buffer for each decode invocation.

I used malloc instead of new since ideally this fuzz target would be
written in C.
2018-12-21 11:20:00 -08:00
Micah Snyder 194c7de657 Added the clamav project. (#2047) 2018-12-21 11:19:14 -08:00
Catena cyber ca0396dd75 Change email address for primary contact of libhtp (#2046)
To have the one with a google account
2018-12-21 07:58:25 -08:00
Markus Kusano 243a4d86e7 Hardcode pkg-config results (#2043)
* Hardcode pkg-config results.

Fixes non-deterministic results from pkg-config that cause build
failures due to library dependencies not being available.

* Use $WORK instead of /work

* Pretty print fuzzer target linking options.
2018-12-20 22:28:41 -08:00
Jonathan Hui 6482891150 [openthread] update build configuration (#2044) 2018-12-20 16:18:08 -08:00
Markus Kusano 3c3648fd1d Integrate libsass and add a fuzz target. (#2039) 2018-12-19 20:20:49 -08:00
Stefan Bucur b6aefa51cb Integration of tidy-html5 into OSS-Fuzz (#2038)
* Basic skeleton for tidy-html5 OSS-Fuzz integration.

* Added two tidy-html5 fuzzers: One that exercises the HTML parser and one that exercises the configuration file parser.

* Added the copyright headers.

* Clarified why the tidy config fuzzer uses a file interface.
2018-12-19 20:18:01 -08:00
Markus Kusano f9971c4914 Integrate opencv and add two fuzz targets. (#2034) 2018-12-19 16:25:05 -08:00
Abhishek Arya 2b8d7322f0
Update project.yaml 2018-12-19 14:12:28 -08:00
Markus Kusano b793e9a7c7 Integrate FreeImage and add a fuzz target. (#2035)
* Integrate FreeImage and add a fuzz target.

* Initialize FreeImage within LLVMFuzzerTestOneInput.

* Return 0 and not EXIT_SUCCESS.

* Use https when downloading FreeImage source.
2018-12-19 07:56:47 -08:00
Oliver Chang 261e7f2972
libhtp: remove fuzz.diff patch (#1949) 2018-12-19 18:22:08 +11:00
Catena cyber 6754971302 [libhtp] Integrate project (#1949) 2018-12-18 15:47:34 -08:00