Guido Vranken
4caafd5aa1
[bignum-fuzzer] Fix OpenSSL build ( #2354 )
...
Temporary workaround for OpenSSL's build system problems.
2019-04-28 17:19:25 -07:00
htuch
bf05a80651
envoy: remove UBSAN blacklist. ( #2351 )
...
This is no longer needed as we handle this Envoy-side. This should fix
the build that has been broken since
https://github.com/envoyproxy/envoy/pull/6610 .
Signed-off-by: Harvey Tuch <htuch@google.com>
2019-04-26 09:58:44 -07:00
Catena cyber
1e88b4f948
Custom patch for libpcap to avoid infinite loop ( #2344 )
2019-04-24 09:16:10 -07:00
Arvid Norberg
50d08b7d7c
[libtorrent] update libtorrent project to just pull the main repository and build fuzzers from there (as they recently landed in the release branch) ( #2339 )
2019-04-22 15:53:44 -07:00
Stanislav Malyshev
30190987f4
Fix build - option got renamed to --without-libxml ( #2338 )
2019-04-20 22:26:16 -07:00
Guido Vranken
1ea634a278
Cryptofuzz fixes ( #2337 )
...
* [cryptofuzz] Use latest OpenSSL version
This is a workaround for an issue OpenSSL's build system is currently
having. I've appended || true to the build command so failure is not
signaled to the Docker process running the build script, and the build
is not aborted.
Multithreaded compiling has been removed temporarily to avoid a race
condition that causes the make procedure to abort before libcrypto.a
has been compiled.
* [cryptofuzz] Build against LIB_FUZZING_ENGINE_DEPRECATED to prevent crashes
2019-04-18 13:07:09 -07:00
Catena cyber
028c9c486a
Fixes capstone build ( #2335 )
...
Uses a newly compiled file for next branch only
2019-04-18 08:16:58 -07:00
Nick Terrell
fb7075b1ed
[zstd] Move downloading seed corpora to build.sh ( #2331 )
...
I just added a new fuzzer, `zstd_frame_info`, and want to be able to add new
fuzzers without submitting a pull request to oss-fuzz. This change uses zstd's
Makefile to download the corpora. Now I can add a new fuzzer to zstd and it will
automatically get built and download the seed corpus in oss-fuzz.
2019-04-17 21:42:41 -07:00
Guido Vranken
7bdfb2b7d8
Cryptofuzz (differential crypto fuzzing) ( #2273 )
...
* Add cryptofuzz
* [cryptofuzz] Specify sanitizers
* [cryptofuzz] Actually disable assembly in second OpenSSL build
* [cryptofuzz] Add BoringSSL
* [cryptofuzz] Enable MemorySanitizer builds
* [cryptofuzz] Fix OpenSSL build
* [cryptofuzz] Add LibreSSL target
* [cryptofuzz] Don't build LibreSSL if MemorySanitizer is enabled
* [cryptofuzz] Adapt build script to latest cryptofuzz code
* [cryptofuzz] Force rebuild of OpenSSL
* [cryptofuzz] Comment and move to Dockerfile OpenSSL's commit lock
* [cryptofuzz] BoringSSL, LibreSSL: only build libcrypto.a for faster builds
* [cryptofuzz] Replace -lFuzzingEngine -> $LIB_FUZZING_ENGINE for compatibility with OSS-Fuzz' new build setup
* [cryptofuzz] Add README.md
2019-04-17 20:33:50 -07:00
Alex Gaynor
7b8971290d
[graphicsmagick] Added --time flag to clone ( #2333 )
...
This will give us more information if the clone fails (which it does sometimes, probably due to sourceforge infra issues)
2019-04-17 14:21:54 -07:00
Leandro A. F. Pereira
c416a8007b
[lwan] Use HTTP dictionary to speed up fuzzing ( #2329 )
2019-04-17 08:28:57 -07:00
tsdgeos
0221e8b030
[kimageformats] Split fuzzer into 9 fuzzers ( #2327 )
...
oss-fuzz devels say this is optimal
2019-04-16 15:40:48 -07:00
jonathanmetzman
53c09d30f6
Update patch to fix build and migrate to -fsanitize=fuzzer ( #2324 )
...
Update skia.diff to fix build breakage.
Also, use $LIB_FUZZING_ENGINE instead of -lFuzzingEngine to start using -fsanitize=fuzzer
2019-04-16 11:52:23 -07:00
tsdgeos
d2f7690886
[karchive] New project: karchive ( #2318 )
2019-04-15 14:20:24 -07:00
Max Moroz
4fba752cc3
[libxslt] Update project.yaml: replace Chromium owner in auto_cc.
2019-04-15 11:08:34 -07:00
Nick Wellnhofer
8af165e494
[libxslt] Start with integration ( #2320 )
...
Integrate the first fuzz targets from libxslt.
2019-04-15 10:27:43 -07:00
Alex Gaynor
7c05d15480
[libical] Make sure to do an apt update before apt install ( #2319 )
2019-04-15 10:11:25 -07:00
jonathanmetzman
ae9398deef
Change LIB_FUZZING_ENGINE to -fsanitize=fuzzer in libFuzzer builds ( #2312 )
2019-04-15 10:05:02 -07:00
Nick Terrell
3eaad4f3e2
[zstd] Add fuzzers and cc emails ( #2309 )
...
* [zstd] Add seed corpora for two new fuzzers
* [zstd] Add two more emails to cc list
It is helpful to add in the corporate email so we don't miss bugs.
2019-04-10 13:35:20 -07:00
tsdgeos
36005daba0
libical: Fix undefined sanitizer not building ( #2308 )
...
The cmake option for disabling shared libs was not the correct one
and the compilation was getting confused
2019-04-10 11:23:34 -07:00
Damien Miller
2b49be2eaa
Updates for OpenSSH fuzzing ( #2306 )
...
* Enable experimental XMSS keys for fuzzing
* Enable auth options fuzzer
2019-04-10 13:31:45 +10:00
Leandro A. F. Pereira
935e25b1ff
[lwan] Add fuzzing targets for Lwan ( #2302 )
2019-04-09 13:54:01 -07:00
Abhishek Arya
c4fe1fef9e
Disable UBSan for libical ( #2298 )
2019-04-09 11:46:33 -07:00
tsdgeos
e445a90d94
Add libical ( #2298 )
2019-04-09 11:23:05 -07:00
Paul Dreik
676071636c
Libtorrent take2 ( #2299 )
...
* switch to another fuzzer repo aimed to be merged upstream
* update email addresses
checked with arvid, he approved adding his address
* [libtorrent] improve building
- use ninja
- don't build tests
- respect CXXFLAGS when building boost
- less verbose output when downloading
* create initial corpus zip files from git
this makes it much easier to add and remove
both fuzzers and corpus upstream and make
sure they work well.
2019-04-09 11:22:07 -07:00
Kostya Serebryany
08af8b64ad
[libpng-proto] remove stale comment
2019-04-09 11:01:58 -07:00
Kostya Serebryany
663d09feb2
[libpng-proto] add asan back
2019-04-09 10:57:09 -07:00
Abhishek Arya
2e3212d8f0
Revert "Remove mbed TLS fuzzer ( #2278 )" ( #2304 )
...
This reverts commit cce2ed4d23
.
2019-04-09 09:07:55 -07:00
Oliver Chang
5c5a10a16d
Update project.yaml
2019-04-09 10:47:13 +10:00
Matt Morehouse
6c3880cfd5
[llvm] Remove proto fuzzers. ( #2301 )
...
Proto fuzzers are slow and haven't found bugs in a long time. Their
builds are also hard to maintain since they build in a different
configuration than any of the LLVM build bots.
2019-04-08 12:30:36 -07:00
Guido Vranken
eb2795c830
[bignum-fuzzer] Fix OpenSSL build ( #2296 )
2019-04-06 07:28:40 -07:00
Sebastian Rasmussen
7fa021dfbe
[mupdf] Update to latest version of API provided by MuPDF. ( #2294 )
2019-04-05 12:16:43 -07:00
Mihai Maruseac
922ea7c8fe
[TensorFlow] Ensure we're always using a valid Bazel ( #2293 )
...
* Determine Bazel version from configure.py script
* Install Bazel at the version from configure.py
* Don't downgrade Bazel on Dockerfile
* Make sure we were able to install proper Bazel
* Comment update
2019-04-04 23:35:11 -07:00
Max Moroz
2eaa543f82
[zlib] Fix build.sh to overwrite seed corpus symlinks.
2019-04-04 12:54:37 -07:00
Mihai Maruseac
2fa5eca226
[tensorflow] Update Bazel version and check that it is compatible ( #2288 )
...
* Update Bazel to 0.24.0
* Always run ./configure
2019-04-03 09:57:58 -07:00
Paul Dreik
7b3ebc2abb
[libtorrent] add address for google account ( #2286 )
...
see https://github.com/google/oss-fuzz/issues/2261#issuecomment-479085906
2019-04-02 09:53:51 -07:00
Kevin Lubick
a1315ef31e
[skia] fix build after rename ( #2283 )
2019-04-01 13:31:15 -07:00
Stanislav Malyshev
795aa42757
Use libonig5 - this will enable mbstring regex limits ( #2282 )
2019-04-01 12:29:42 -07:00
Paul Dreik
b858b0036d
Libtorrent ( #2268 )
...
* [boost] add fuzzers for boost property tree parsers
* [boost] fix missing files in Docker copy command
* add libtorrent
* set email address, clone depth 10
* remove templated text
2019-04-01 11:31:16 -07:00
Guido Vranken
8594957c7e
[libsrtp] Enable MemorySanitizer builds ( #2271 )
2019-04-01 09:15:52 -07:00
Guido Vranken
b3b4a5c3a3
[tesseract-ocr] Add fuzzer that processes 512x512 images ( #2279 )
2019-04-01 09:15:21 -07:00
Guido Vranken
cce2ed4d23
Remove mbed TLS fuzzer ( #2278 )
2019-03-31 22:49:35 -07:00
Konstantin Varlamov
927922aadf
Fix Firestore build by adding missing build dependencies ( #2280 )
...
* Add missing build dependencies
* Update cc list
2019-04-01 08:37:28 +08:00
Alexander Alekhin
b27c51dee4
[opencv] update build scripts ( #2276 )
...
- disable building of tests/apps (not used for fuzzing)
- unlock using local source checkout: https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md#reproduce-using-local-source-checkout
* $SRC - fuzzers sources
* $SRC/opencv - opencv sources
* $WORK/build-$SANITIZER - build directory
2019-04-01 08:37:01 +08:00
Joachim Bauch
e09485feab
[lzma] Add LZMA SDK ( #2267 )
...
* Add LZMA SDK
* Use email of Igor Pavlov as primary contact and add more sanitizers.
2019-03-31 11:24:39 -07:00
tsdgeos
5f2ed9d550
[kimageformats] Include ora and kra handlers ( #2277 )
...
This pulls karchive that pulls, ecm and libzip and libzip pulls zlib
2019-03-31 11:04:40 -07:00
Daniel Marjamäki
080a64aca0
change WORKDIR ( #2275 )
2019-03-30 07:54:24 -07:00
Daniel Marjamäki
94e1e96a99
tweak cppcheck. moved fuzzer client to main cppcheck repo. ( #2274 )
2019-03-29 15:32:47 -07:00
Marc-Andre Lureau
dfd9d777a8
libtpms: update my email address ( #2272 )
...
Use the canonical form, this may help with oss-fuzz.com access.
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2019-03-28 11:19:05 -07:00
Marc-Andre Lureau
1c590dcc35
Add libtpms project ( #2266 )
...
Signed-off-by: Marc-André Lureau <mlureau@redhat.com>
2019-03-28 10:54:49 -07:00
Abhishek Arya
df1bdcdbe3
Update project.yaml
2019-03-28 09:29:40 -07:00
Guido Vranken
c607f5cb3e
[lame] Add LAME dev CC. Enable MemorySanitizer. ( #2269 )
...
* [lame] Enable MemorySanitizer builds
* [lame] Add LAME dev e-mail to auto_ccs
Reference: https://sourceforge.net/p/lame/mailman/message/36621204/
2019-03-28 07:44:12 -07:00
Guido Vranken
b150da5354
[bignum-fuzzer] Compile OpenSSL debug mode ( #2270 )
...
This activates assert()s across the library that might help to detect
issues that other safeguards (sanitizers, differential testing)
aren't capable of.
2019-03-28 07:43:31 -07:00
gnrunge
2099cabe1f
Add ICU project team member email to notification list in icu/project.yaml. ( #2262 )
2019-03-25 10:08:22 -07:00
Daniel Marjamäki
acd7909035
Add project Cppcheck ( #2257 )
...
* Add project Cppcheck
* Add email addresses
2019-03-25 07:57:56 -07:00
Even Rouault
e9a43c10c6
PROJ4: build from root so that data/proj.db is also built ( #2260 )
2019-03-24 11:46:53 -07:00
Dirk Lemstra
92553e2d0c
Changed email address for ImageMagick primary contact. ( #2259 )
2019-03-23 11:29:59 -07:00
Guido Vranken
f51e4cc619
[lame] Initial LAME mp3 encoder/decoder oss-fuzz integration ( #2256 )
2019-03-21 19:02:46 -07:00
Bhargava Shastry
f555f0c260
[Solidity] copy all dicts ( #2254 )
2019-03-20 08:04:57 -07:00
Brent Cook
04d267d0af
add libressl fuzz contacts ( #2253 )
...
This just removes the distribution list in favor of individual
contributors.
2019-03-20 05:33:15 -07:00
Brent Cook
d7b97368dc
[libressl] add jsing (github user 4a6f656c) to libressl ( #2252 )
2019-03-19 06:50:10 -07:00
Abhishek Arya
965e10c6a3
Disable broken MSan build for libressl ( #2251 )
2019-03-18 21:31:49 -07:00
Brent Cook
0500f1f872
update libressl contact email ( #2250 )
2019-03-18 21:16:55 -07:00
htuch
fe3d5c4c9c
envoy: blacklist some problematic external dep UBSAN. ( #2242 )
...
Fix in progress at
https://github.com/protocolbuffers/protobuf/pull/5901 , we might not
update Envoy with it for a while.
Signed-off-by: Harvey Tuch <htuch@google.com>
2019-03-18 20:32:36 -07:00
Andrea Brancaleoni
a203ac045a
New project: libressl (v2) ( #2248 )
...
This reverts commit 098760e6df
.
2019-03-18 17:14:04 -07:00
Kevin Lubick
c1068851e8
[skia] add sksl2pipeline ( #2245 )
2019-03-18 17:13:35 -07:00
Catena cyber
40286086df
Capstone: use the new v4 branch ( #2246 )
2019-03-18 12:34:47 -07:00
Alessandro Toppi
31e74f0dce
[janus] First integration ( #2241 )
2019-03-15 08:24:07 -07:00
Max Moroz
12ac6ff9f2
Revert [janus-gateway] First integration.
2019-03-15 07:05:57 -07:00
Max Moroz
64686cafab
[janus-gateway] Fix copyright years.
2019-03-15 07:02:29 -07:00
Alessandro Toppi
a02467e192
[janus-gateway] First integration ( #2238 )
2019-03-15 07:01:09 -07:00
Toru Maesaka
390d340832
[picotls] Update toru's email address ( #2240 )
2019-03-14 10:38:12 -07:00
Stanislav Malyshev
e5f5406f87
Fuzzer moved to official php repo ( #2239 )
2019-03-13 14:27:13 -07:00
Jonathan Foote
3c03f1174b
[picotls] add asn-1 fuzz target ( #2236 )
2019-03-13 08:27:34 -07:00
pdknsk
94c742f112
[firefox] housekeeping ( #2234 )
...
* disable ContentSecurityPolicyParser target
* disable building av1 (requires new nasm)
* remove ContentSecurityPolicyParser files
2019-03-13 07:58:53 -07:00
Stanislav Malyshev
a51f446e14
Add mbstring fuzzer for PHP ( #2233 )
2019-03-13 07:31:48 -07:00
pdknsk
c879a0cf3e
[glib] add new build flag ( #2235 )
2019-03-13 06:52:41 -07:00
Tim King
8b9583f757
[leptonica] Making leptonica non-experimental. ( #2230 )
2019-03-11 14:10:25 -07:00
Jonathan Foote
7da052c72d
[picotls] disable smaller fuzz targets ( #2229 )
2019-03-11 13:20:04 -07:00
Kevin Lubick
169cae111a
add sksl fuzzers ( #2228 )
2019-03-11 13:16:45 -07:00
Abhishek Arya
f2fa695177
Remove fpizlo@apple.com from jsc
...
The user does not exist anymore.
HttpError: <HttpError 400 when requesting https://www.googleapis.com/storage/v1/b/jsc-quarantine.clusterfuzz-external.appspot.com/iam?alt=json returned "User fpizlo@apple.com does not exist.">
2019-03-10 06:55:07 -07:00
Stanislav Malyshev
a558ea17e7
Also enable exif fuzzer ( #2215 )
2019-03-09 05:35:27 -08:00
Guido Vranken
7b1b0240f3
[bignum-fuzzer, libsrtp] Enable AFL ( #2226 )
2019-03-08 19:38:39 -08:00
Jonathan Foote
f5bfb00f8f
[picotls] initial picotls integration ( #2222 )
2019-03-08 12:38:57 -08:00
Guido Vranken
b4837fc025
[tesseract-ocr] Use Leptonica master branch ( #2224 )
2019-03-08 12:38:14 -08:00
Abhishek Arya
d1afb0ac72
Fix missing $, strip _fuzz from tpm2-tss targets ( #2219 )
2019-03-07 19:48:20 -08:00
John Andersen
a6e3857f93
[tpm2-tss] Change targets from .fuzz to _fuzz ( #2220 )
...
Fixes : #2219
Signed-off-by: John Andersen <john.s.andersen@intel.com>
2019-03-07 16:59:36 -08:00
Jonathan Foote
f3f0c1bc0c
[picotls] Add picotls project.yaml ( #2218 )
2019-03-07 15:23:06 -08:00
Guido Vranken
bf5caa86c3
[tesseract-ocr] Add Tesseract ( #2210 )
...
* Add Tesseract
* Use -lz instead of static library path
* Disable Tesseract shared build
* Minimal repository cloning (--depth 1)
* Improve tessdata directory resolution syntax
* Don't hardcode TESSDATA_PREFIX into binary
* Don't move, but copy $SRC/tessdata to $OUT
Move sometimes results in "inter-device move failed"
2019-03-07 06:57:21 -08:00
Zbigniew Jędrzejewski-Szmek
166745e25d
systemd,casync: add Frantisek Sumsal ( #2216 )
2019-03-07 05:52:39 -08:00
Joachim Bauch
27b37d514a
[libheif] Add libheif ( #2213 )
2019-03-06 06:28:00 -08:00
Bhargava Shastry
80634bf24d
[solidity] Update solidity fuzzing corpus for solc and const_opt fuzzers. ( #2212 )
2019-03-06 06:12:39 -08:00
Bhargava Shastry
371929f997
[solidity] Add new fuzzers (including two LPM proto fuzzers) and minimal fuzzing corpora. ( #2208 )
2019-03-05 12:42:06 -08:00
Max Moroz
8aafddfb9e
[php] Disable UBSan for now (related to #2202 ).
2019-03-05 11:03:25 -08:00
Max Moroz
9087f31be2
[php] Remove experimental flag and specify ASan and UBSan only.
2019-03-05 07:13:46 -08:00
Stanislav Malyshev
b7e17966a8
[php] Add files to run php fuzz ( #2202 )
...
So far only one fuzzer active - json one. More to come.
2019-03-05 07:12:32 -08:00
John Andersen
da89846a21
[tpm2-tss] Fix tpm2-tss build ( #2204 )
...
New checks were added to configure which require that
the GEN_FUZZ environment variable be set during both
the bootstrap and configure scripts.
Fixes : #2203
Signed-off-by: John Andersen <john.s.andersen@intel.com>
2019-03-04 10:25:08 -08:00
Michael Niedermayer
806f7995fb
ffmpeg: use libvdpau-1.2 ( #2200 )
...
This fixes build as later vdpau uses meson and the new build
system seems to have bugs or i failed to get it working quickly with
oss-fuzz
Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
2019-03-04 08:26:09 -08:00
Kostya Serebryany
a0fa24466b
remove security@golang.org per their request
2019-03-01 13:42:01 -08:00
jonathanmetzman
098760e6df
Revert addition of libressl ( #2198 )
...
* Revert "[libressl] Speculative build fix (#2197 )"
This reverts commit 1b6f3555f5
.
* Revert "[libressl] New project (#2075 )"
This reverts commit 3bc10fd753
.
2019-03-01 11:26:43 -08:00
jonathanmetzman
1b6f3555f5
[libressl] Speculative build fix ( #2197 )
2019-03-01 11:11:24 -08:00
John Andersen
32d9f390e6
[tpm2-tss] Integrate tpm2-tss ( #2189 )
...
Signed-off-by: John Andersen <john.s.andersen@intel.com>
2019-03-01 07:10:26 -08:00
Guido Vranken
231ec64fa2
[bignum-fuzzer] Add BoringSSL+libmpdec fuzzer ( #2194 )
2019-03-01 07:03:15 -08:00
Andrea Brancaleoni
3bc10fd753
[libressl] New project ( #2075 )
...
LibreSSL is an API compatible replacement for OpenSSL,
and after the heartbleed attack is employed as a full-fledged
replacement of OpenSSL on OpenBSD, macOS and VoidLinux.
**This work has been sponsored by Doyensec LLC** [![Doyensec](https://www.doyensec.com/images/logo.svg )](https://doyensec.com/ )
Sponsored-by: Doyensec LLC <https://doyensec.com >
2019-03-01 07:02:17 -08:00
Max Moroz
d1cb3ca862
[envoy] Remove debug logging and add rsync for sources from /tmp.
2019-03-01 06:41:20 -08:00
Max Moroz
014f0f5e2c
[envoy] Another speculative fix for coverage build.
2019-02-28 21:00:16 -08:00
Guido Vranken
1bff6fe295
[bignum-fuzzer] Build and use latest Golang ( #2193 )
2019-02-28 15:50:31 -08:00
Max Moroz
dfd4be9f9a
[envoy] Use $HOME instead of /root as Cloud Builder seems to use non-root user.
2019-02-28 14:51:57 -08:00
Max Moroz
e61b75ce75
[envoy] Make sources in bazel cache under /root readable.
2019-02-28 13:27:27 -08:00
i110
f387cd3b69
Adding @i110 to h2o ( #2187 )
2019-02-26 12:57:50 -08:00
Zbigniew Jędrzejewski-Szmek
25e93737e3
Add casync project ( #2185 )
...
The necessary counterpart in casync:
https://github.com/systemd/casync/pull/193 .
2019-02-26 10:06:00 -08:00
Alex Gaynor
e42b35b904
Speed up graphicsmagick clones by including the default branch ( #2186 )
2019-02-26 07:13:39 -08:00
Michael Niedermayer
7a11112c92
projects/ffmpeg/Dockerfile: Replace alsalib ftp URL by https ( #2184 )
...
This avoids using an insecure protocol, also the alsa server does not
seem to work correctly with ftp currently.
This should fix Issue 13270
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
2019-02-26 00:40:33 -08:00
Guido Vranken
e4899ce61a
Add libsrtp fuzzer ( #2183 )
...
* Add libsrtp fuzzer
2019-02-25 13:34:24 -08:00
htuch
8fe16237ef
envoy: coverage support for cmake_external deps. ( #2182 )
...
This now lets us visualize nghttp2 coverage.
Tested via:
python infra/helper.py build_fuzzers --sanitizer=coverage envoy
python infra/helper.py coverage envoy -- "-ignore-filename-regex=.*\.cache.*envoy_deps_cache.*"
Requires https://github.com/envoyproxy/envoy/pull/6036 to yield useful
results.
Signed-off-by: Harvey Tuch <htuch@google.com>
2019-02-25 07:07:27 -08:00
Markus Kusano
4159b0f50f
Disable experimental flag on OpenCV. ( #2181 )
...
We have real OpenCV developers now on the auto-ccs. I've moved Gary as
the owner of the project as well.
I've disabled the experimental flags so that the people on the CCs will
start getting bugs.
2019-02-22 07:41:49 -08:00
Vincent Rabaud
050f713538
Adding @garybradski to OpenCV ( #2177 )
2019-02-20 05:41:12 -08:00
jonathanmetzman
3d8322b9e0
[libteken] Update primary contact ( #2175 )
2019-02-19 14:04:50 -08:00
Alexander Alekhin
4dca9f0622
[opencv] add email to "OpenCV" CCs ( #2168 )
2019-02-19 13:11:38 -08:00
steadmon
8bf4777e00
[git] Add the new fuzz-commit-graph fuzzer. ( #2170 )
2019-02-19 06:27:26 -08:00
Kuang-che Wu
79440d1183
Update libteken's project.yaml ( #2174 )
2019-02-19 06:26:36 -08:00
Darafei Praliaskouski
636b1dfb36
[postgis] Update PostGIS dependencies ( #2173 )
...
PostGIS depends on GEOS, and recently requres GEOS 3.6 which cannot be found in ubuntu 16.04.
With this change build will pull newest GEOS 3.7 from Ubuntu 19.04.
2019-02-16 11:55:04 -08:00
Bhargava Shastry
c205defe5f
giflib: Fix bug in test harness that led to low coverage. ( #2172 )
2019-02-16 10:36:03 -08:00
Kostya Serebryany
e04fe0c39f
revert the previous change: the leak is actually not fixed yet
...
https://github.com/glennrp/libpng/pull/279
https://github.com/glennrp/libpng/issues/274
2019-02-15 17:31:33 -08:00
Bhargava Shastry
ecf26f315b
giflib: Fix build failure and remove disk IO. ( #2169 )
2019-02-15 14:07:49 -08:00
Kostya Serebryany
c455845d91
reenable leak detection now that the leak is fixed
...
report: https://github.com/glennrp/libpng/issues/274#issuecomment-458021367
fix: 3c0b79b4d8
2019-02-15 11:44:43 -08:00
Kostya Serebryany
be46ee59a7
libpng-proto: disable asan for the experimental png fuzzers
...
until https://github.com/glennrp/libpng/issues/275 is fixed upstream.
2019-02-15 11:30:39 -08:00
Kostya Serebryany
893f503de3
[llvm] add Michael to LLVM CCs, as requested in issue #2167
2019-02-14 14:49:33 -08:00
Janne Grunau
4a14f2cb84
ffmpeg: fix build by using nasm from ubuntu bionic ( #2165 )
...
http://www.nasm.us was down for the last couple of days. nasm from
bionic can be used without dependencies. Same change as #2159 for dav1d.
2019-02-14 10:36:47 -08:00
Vincent Rabaud
3fb450c8bc
[opencv] Add myself as a cc ( #2163 )
...
@vpisarev , please don't hesitate to add yourself or anybody from your team. Thx !
2019-02-14 06:58:01 -08:00
Oliver Chang
69210b4622
Enable selective unpack for ffmpeg ( #2161 ). ( #2162 )
2019-02-14 10:59:58 +11:00
gnrunge
6dbcafae6f
Removes break_iterator_utf32_fuzzer target from build script. The target ( #2160 )
...
will be removed in ICU.
2019-02-13 15:04:57 -08:00
Janne Grunau
4db22401aa
Dav1d: fix build and disable logging ( #2159 )
...
Fixes build failure caused by unavailable https://www.nasm.us/
The nasm version in ubuntu xenial is too old. The package from bionic
is new enough and usable without other dependencies from bionic.
2019-02-13 12:36:10 -08:00
Daniel Salzman
685ded7e0a
[knot-dns] fix issue 13050 + tiny script cleanup ( #2157 )
...
Signed-off-by: Daniel Salzman <daniel.salzman@nic.cz>
2019-02-11 07:59:22 -08:00
Even Rouault
fe265a46b0
[proj4] build requires pkg-config ( #2156 )
2019-02-10 10:29:10 -08:00
Evan Miller
0beabd6fc7
Libxls now requires gettext ( #2155 )
...
Add `gettext` to the list of libxls's installed packages to prevent
errors about `AM_ICONV` during autoconf.
2019-02-10 09:18:37 -08:00
Jacob Hoffman-Andrews
4e60829598
Add fuzzer for Unbound's parse_packet. ( #2149 )
...
* Add fuzzer for Unbound's parse_packet.
2019-02-09 19:13:09 -08:00
Evan Miller
65c064ed0e
ReadStat now requires gettext ( #2154 )
...
Add gettext to the list of installed packages. Fixes #13012
2019-02-09 07:12:23 -08:00
Chris Blume
0bb419758f
Add myself to autocc of zlib ( #2152 )
...
I wrote many of the zlib fuzzers that are used in Chromium.
I also just submitted a pull request for those to go to upstream zlib.
It would be handy for me to be notified when the fuzzers find something
in zlib.
This commit adds myself to the autocc of zlib.
2019-02-08 15:38:51 -08:00
Kevin Lubick
ce00810440
Remove jsoncpp ( #2150 )
2019-02-08 07:26:12 -08:00
gnrunge
4dd6280e19
Add team member email to notification list in icu/project.yaml ( #2141 )
2019-02-07 11:08:00 -08:00
Max Moroz
70662a99be
[llvm] Add Mitch Phillips @google.com address to the auto_ccs list.
2019-02-06 15:52:10 -08:00
Leandro A. F. Pereira
3bc121dd86
Add Lwan to OSS-Fuzz ( #2136 )
2019-02-06 12:36:51 -08:00
Tyson Smith
9768f0b4a1
[openh264] Add to auto cc list ( #2140 )
...
* [openh264] Update corpus zip command
* [openh264] Add to auto cc list
2019-02-06 12:36:33 -08:00
gnrunge
3b7db8ac31
Adds build instructions for recently added ICU fuzzer targets ( #2139 )
...
* Update Dockerfile
* Adds instructions to build recently added ICU fuzzer targets.
2019-02-06 10:22:53 -08:00
Alex Gaynor
de5ec6fa49
Add a new person to GraphicsMagick issues ( #2137 )
...
Remove Glenn Randers-Pehrson who sadly passed away last year.
2019-02-06 06:08:22 -08:00
tsdgeos
25afe67574
[kcodecs] Add new project: kcodecs ( #2127 )
2019-02-05 15:45:03 -08:00
htuch
0632162890
envoy: fix ClusterFuzz build regressions. ( #2135 )
...
Envoy should build again once
https://github.com/envoyproxy/envoy/pull/5843 and this merge.
Signed-off-by: Harvey Tuch <htuch@google.com>
2019-02-05 11:10:44 -08:00
matclab
49b6303218
Add new project : S2OPC ( #2133 )
2019-02-05 07:06:50 -08:00
Bhargava Shastry
1708eceb2b
[solidity] Add fuzzing dictionary ( #2132 )
2019-02-05 06:45:39 -08:00
Harish Mahendrakar
3c7d71eb98
[libvpx] Remove depencency on tools_common.c.o ( #2131 )
...
vpx_dec_fuzzer.cc now builds without any dependency on tools_common.c.o
Hence disable examples while configuring libvpx and remove
tools_common.c.o when linking fuzzer binaries
2019-02-04 12:45:51 -08:00
Even Rouault
11f4aaee07
[proj4] Fix coverage build ( #2129 )
...
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12891
Shared library builds failed with
hidden symbol `atexit' in /usr/lib/x86_64-linux-gnu/libc_nonshared.a(atexit.oS) is referenced by DSO
So ./configure --disable-shared
2019-02-04 06:56:51 -08:00
tsdgeos
eb4851cddd
kimageformats: Also exercise the canRead() codepath ( #2128 )
2019-02-03 08:15:24 -08:00
Harish Mahendrakar
318f52f824
[libvpx] Disable encoders in libvpx ( #2126 )
...
Disable encoders while building libvpx
Current tools_common.c requires y4minput.c when encoders are enabled.
Instead of adding y4minput while linking fuzzer binary, encoders are
disabled during libvpx configure.
This resolves undefined reference to functions in y4minput.c
2019-02-01 11:22:56 -08:00
Stefan Bucur
3f97744eab
Preserve the original data buffer in the tidy-html5 fuzzer. Currently, the fuzzer makes a null-terminated copy of the buffer, preventing the input from containing null characters. ( #2125 )
2019-02-01 08:30:43 -08:00
Benjamin Kramer
a2e4a8e152
[llvm] Add corpus to clangd-fuzzer ( #2123 )
...
The fuzzer has been quiet about crashes in the upper layers of clangd (JSON parser) for months. Let's go deeper!
2019-02-01 06:40:08 -08:00
Even Rouault
f395935e32
[gdal] GDAL: fix build ( #2124 )
...
Since yesterday, GDAL requires building against
https://github.com/OSGeo/proj.4 master
2019-02-01 06:38:31 -08:00
Kostya Serebryany
3a03a358de
[libpng-proto] suppress leak reports until https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12716 is fixed
2019-01-31 19:04:19 -08:00
Kostya Serebryany
4b34eb1753
[libpng-proto] extend the fuzz target to cover more APIs
2019-01-31 18:10:20 -08:00
Kostya Serebryany
9689374f84
[libpng-proto] add one more heuristic to speed up libpng_transforms_fuzzer
2019-01-31 15:17:52 -08:00
Tim Rühsen
8d6014f3fe
[libidn2] Add memory sanitizer ( #2122 )
2019-01-30 06:56:50 -08:00
tsdgeos
8c91ce70cd
poppler: exercise the text extraction code ( #2121 )
2019-01-29 10:49:38 -08:00
tsdgeos
0967d02e5f
Add new project: kimageformats ( #2119 )
2019-01-28 18:17:12 -08:00
Randy
de864b54bf
[libspng] add structure aware fuzzer ( #2117 )
2019-01-28 08:23:20 -08:00
Bhargava Shastry
d027fbc238
[solidity] Add Martin Swende to auto_ccs ( #2118 )
2019-01-28 06:55:49 -08:00
Max Moroz
ad6f2d62c6
[dav1d] Add missing .options file.
2019-01-26 21:11:23 -08:00
Nathan Moinvaziri
e9aa2acbb3
Fix minizip fuzz testing ( #2115 )
...
* Set CXX cmake flags for linking with libFuzzer.
* Fixed cmake build argument after name change.
2019-01-26 17:50:51 -08:00
Kostya Serebryany
edf33327b6
[libpng-proto] add libpng_transforms_fuzzer, a fuzz target with more coverage than the in-tree one currently has ( #2114 )
2019-01-25 22:30:11 -08:00
Tyson Smith
456eded09c
[openh264] Add to corpus and enable ASM for non-MSAN ( #2113 )
2019-01-25 12:39:10 -08:00
Bhargava Shastry
7ef4eae22c
solidity: update primary contact email ( #2112 )
2019-01-25 05:25:58 -08:00
Max Moroz
e2522df903
[dav1d] Enable ASM code for non-MSan build configurations. ( #2109 )
2019-01-24 13:27:15 -08:00
Bhargava Shastry
e43f9e186f
[solidity] Add the solidity compiler to oss-fuzz ( #2108 )
2019-01-24 07:52:29 -08:00
Kostya Serebryany
743e4c055d
Merge branch 'master' of github.com:google/oss-fuzz
2019-01-23 18:00:28 -08:00
Kostya Serebryany
a9099bd6af
[libpng-proto] add another fuzzer, this time using a custom mutator specialized for PNG (no protos)
2019-01-23 17:59:58 -08:00
Tyson Smith
d924556164
[openh264] Add project ( #2107 )
...
Add project
2019-01-23 17:39:55 -08:00
Micah Snyder
eeb5d8fa15
[ClamAV] Build script fix ( #2105 )
...
Correction to build.sh script so the script won't fail on clean checkout.
2019-01-23 14:04:47 -08:00
Micah Snyder
624693035b
[ClamAV] Build script improvements ( #2102 )
...
Build script improvements to use the WORK dir, rather than polluting the SRC dir, and to use make in the clamav-devel/fuzz directory rather than building source files manually.
2019-01-23 09:26:18 -08:00
Evan Miller
6c3910186e
Add first fuzzing target for libxls ( #2103 )
...
* Add libxls
* Add fuzzing target for libxls
The library parses only one format, so only one fuzzer (fuzz_xls) is
included. The initial test corpus includes ~30 files. Tested locally
on Linux.
2019-01-22 15:29:29 -08:00
gnrunge
e14908ba50
Update Dockerfile ( #2104 )
2019-01-22 15:27:58 -08:00
Evan Miller
a04edde6a3
Add libxls ( #2101 )
2019-01-22 07:50:00 -08:00
Robert Löhning
0f8915c4ba
Add The Qt Project ( #1799 )
2019-01-21 08:27:24 -08:00
Jonathan Hui
bc4ab87d32
[openthread] add CLI to build ( #2099 )
2019-01-20 11:25:45 -08:00
Kostya Serebryany
f9ed8d9c75
[libpng-proto] simplify the target a bit further: remove a field that don't really need to be mutaed
2019-01-18 16:50:16 -08:00
gnrunge
0af5dcbac4
Icu fuzz ( #2098 )
...
* Update project.yaml
* Remove quotes around email.
* Updates icu/project.yaml with additional emails ids
2019-01-18 14:03:18 -08:00
Evan Miller
d517d05ea0
Add fuzzing targets for ReadStat ( #2093 )
...
* Add ReadStat project
* Add fuzzing targets for new project ReadStat
Adding fuzzers for six file formats supported by ReadStat. A corpus
is generated in each case from example data in the test suite.
Tested locally on Linux, which check_build passing in all six cases.
2019-01-18 12:06:53 -08:00
gnrunge
c545039e1a
Update project.yaml ( #2097 )
...
* Update project.yaml
* Remove quotes around email.
2019-01-18 12:05:08 -08:00
Yang Gao
0e71b3b7e3
Update grpc ( #2096 )
2019-01-18 10:28:01 -08:00
Mihai Maruseac
4bc64932b5
Copy more files on coverage runs ( #2092 )
2019-01-17 21:58:13 -08:00
gnrunge
97e4868a38
Icu fuzz ( #2091 )
...
* Updates the ICU fuzzer project directory:
- Delete the ICU fuzzer tests. The code was transfered to unicode-org/icu
in PR 321 (https://github.com/unicode-org/icu/pull/321 ).
- Adjust the Dockerfile and the build.sh to work with the new ICU repositroy
(now GitHub, migrated from svn recently) and the new code arrangement.
* Removes logging statements used for debugging statements from the Dockerfile.
2019-01-16 20:54:34 -08:00
Stefan Bucur
8f46f4deea
[tidy-html5] Check out tidy-html5 from the 'next' branch, instead of the default 'master'. The next branch is the one that gets the latest features and fixes in practice. ( #2090 )
2019-01-16 10:18:52 -08:00
Jiří Daněk
dfd574a1ba
[qpid-proton] update git url after repo migration ( #2089 )
2019-01-16 07:01:12 -08:00
Evan Miller
e315e8c0ca
[readstat] Add ReadStat project ( #2088 )
2019-01-15 13:37:03 -08:00
Mihai Maruseac
9d22200634
[tensorflow] Add missing directory to the rsync path ( #2086 )
2019-01-14 09:32:40 -08:00
Frank Morgner
61ebf9defe
Add OpenSC ( #2084 )
...
OpenSC provides a set of libraries and utilities to work with smart
cards. Its main focus is on cards that support cryptographic operations,
and facilitate their use in security applications such as
authentication, mail encryption and digital signatures. OpenSC
implements the standard APIs to smart cards, e.g. PKCS#11 API, Windows’
Smart Card Minidriver and macOS Tokend.
2019-01-14 07:42:11 -08:00
Kostya Serebryany
a55a1276d9
Merge branch 'master' of github.com:google/oss-fuzz
2019-01-11 16:00:26 -08:00
Kostya Serebryany
83585a0190
[libpng-proto] extend the example proto fuzz target with explicit support for iCCP PNG chunk
2019-01-11 16:00:03 -08:00
Jonathan Hui
f9d1bea828
[openthread] add NCP to build ( #2083 )
2019-01-11 15:58:13 -08:00
sebpop
b41592118e
oss-fuzz/12299: fix build error due to change in interface for fast crc32 ( #2082 )
2019-01-11 14:14:17 -08:00
Bhargava Shastry
d878422912
[openvswitch] Adds Toms Atteka to auto_ccs list ( #2081 )
2019-01-11 08:46:21 -08:00
Alexander Færøy
c396fd8827
Fix path to module-formats.o for Irssi. ( #2080 )
...
This patch should fix the compilation error reported in issue oss-fuzz:12065.
2019-01-09 17:46:03 -08:00
Guido Vranken
5442f88bc3
[bignum-fuzzer] Fix Rust nightly installation, attempt #2 ( #2079 )
2019-01-09 07:12:33 -08:00
Augie Fackler
658615d59e
mercurial: move Python sources to $SRC and build in build.sh ( #2078 )
...
This will clean up the Makefile on the hg side considerably, and will
also fix the coverage build. Fixes #2076 .
Bonus: I did some extra work in build.sh so that incremental rebuilds
of the fuzzers won't needlessly recompile $OUT/sanpy, shortening
development time on new fuzzers and avoiding issues caused by a $OUT
that was built for a different fuzz configuration.
2019-01-09 14:17:01 +11:00
Vincent Ulitzsch
834a138b39
[giflib] Add giflib ( #2062 )
...
* Add initial version of giflib
* Fix a memory leak in dgif_target
This commit fixes a memory that was caused by calling the wrong
close function.
* giflib: Minor bug fixes that also addressees most comments from Doris
2019-01-08 11:17:29 -08:00
Max Moroz
231f91a5be
[libspng] Enable all sanitizers.
2019-01-08 11:05:17 -08:00
Randy
ea0504c882
[libspng] Integrate libspng ( #1664 )
...
* Integrate libspng
* update copyright year
2019-01-08 11:04:07 -08:00
Stefan Bucur
8b1e8b020e
Fix typos and label names for SunDew fuzzers. ( #2077 )
2019-01-08 08:59:23 -08:00
Matt Morehouse
95bbd881db
[llvm] Update demangler fuzzers. ( #2074 )
2019-01-07 09:50:13 -08:00
Daniel Salzman
d8db26e77f
[knot-dns] fix issue 12386 and remove temporary workaround ( #2072 )
...
* Revert "[knot-dns] use libnettle 3.4.1 to build gnutls (#2013 )"
This reverts commit 269cfb6bf8
.
* [knot-dns] use bootstrap before build (issue 12386)
2019-01-07 07:43:35 -08:00
htuch
d0d79130d3
[envoy] add @jmarantz and @lizan to ACL. ( #2073 )
...
Signed-off-by: Harvey Tuch <htuch@google.com>
2019-01-07 07:27:19 -08:00
Tim Rühsen
77f1da0e60
[wget] Fix gnutls build ( #2070 )
2019-01-04 07:09:15 -08:00
Tim Rühsen
3d70ee5414
[wget2] Fix gnutls build ( #2071 )
2019-01-04 07:08:51 -08:00
Nikos Mavrogiannopoulos
674c259117
[gnutls] use bootstrap before build ( #2069 )
...
Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
2019-01-04 07:06:33 -08:00
Mihai Maruseac
4feaf99b36
[tensorflow] Try to get coverage build to progress ( #2068 )
...
* No need for configure hack as it is covered internally.
* Try to get coverage build to progress
* Remove extra mkdir
2019-01-03 12:22:27 -08:00
Varun Khaneja
9644e3ad4a
Use NOVOLUME. Point to the oss_fuzz branch. ( #2067 )
...
- Start using NOVOLUME since Chromium is going to start using it.
[See: https://crrev.com/c/1393803 ]
- Point to the oss_fuzz branch where all releases will be fuzzed first before being merged into the master branch.
2019-01-03 08:15:59 -08:00
Stefan Bucur
6cbad0dcae
[qpdf] Fix the fuzzer name in the qpdf project.yaml file. ( #2065 )
2019-01-02 11:24:19 -08:00
Kevin Lubick
af5a3f857f
[skia] re-enable checks ( #2064 )
2019-01-02 06:42:52 -08:00
Jack Lloyd
acb6a927a3
Add @mgierlings to botan cc list ( #2063 )
2018-12-31 07:58:11 -08:00
Guido Vranken
6b2eb45a5b
Fix Rust nightly installation ( #2061 )
2018-12-30 10:43:22 -08:00
Max Moroz
3df3b90ebb
[libxml2] Fix std::string use in the fuzz targets: avoid it when possible.
2018-12-28 14:25:13 -08:00
Christoph Diehl
9316b4180e
[libldac] Disable UBSan ( #2060 )
2018-12-28 10:57:54 -08:00
Tim Rühsen
b332fd9f75
[wget2] Fix order of link libraries ( #2059 )
2018-12-28 09:28:29 -08:00
Christoph Diehl
2b67387299
[libldac] Disable MSan ( #2058 )
2018-12-28 09:28:10 -08:00
Tim Rühsen
eed522674c
[wget] Fix order of link libraries ( #2057 )
2018-12-27 13:42:55 -08:00
Max Moroz
3275a3d010
[perfetto] Disable empty expression check (similar to #2055 ).
2018-12-27 12:41:33 -08:00
Tim King
96d51be047
[qpdf] Limiting the number of bytes the read_memory_fuzzer handles. ( #2056 )
...
* [qpdf] Limiting the number of bytes the read_memory_fuzzer handles.
* Raising the limit to 64 KiB.
2018-12-27 11:13:11 -08:00
Kevin Lubick
9fa6d673de
Disable empty expression check ( #2055 )
2018-12-27 09:31:07 -08:00
Max Moroz
17e1a02f7b
[libxml2] Remove libxml2_xml_regexp_compile_fuzzer. ( #1988 )
2018-12-27 08:43:07 -08:00
Wei Wang
9d0ab6e60e
[jsonnet] Integrate jsonnet and add a fuzzer ( #2045 )
...
* Add jsonnet
* Update build.sh
* Update build.sh
* Update build file
* Update build.sh
* Update build.sh
* Made it workgit status
* Add more sanitizer configs
* Minor update
* Remove emacs
2018-12-27 08:33:44 -08:00
Max Moroz
b66302cde7
[leptonica] Fix the build by installing libwebp library after building it.
2018-12-26 14:31:54 -08:00
Tim King
a122dd46b7
[leptonica] Initial integration for leptonica ( #2040 )
...
* leptonica: initial integration for OSS-Fuzz.
* Adding the sundew label for the leptonica fuzzer.
* Adding a copy right header to pix_rotate_shear_fuzzer.cc.
2018-12-26 13:19:43 -08:00
Mihai Maruseac
4c8a28e400
[tensorflow] Updates to get coverage build pass ( #2052 )
...
* Allow bazel to use version 0.21.0.
* Build only 5 fuzzers to get coverage build to also succeed.
2018-12-26 09:46:04 -08:00
Christoph Diehl
6d6f5377b6
Add libldac for LDAC codec ( #2051 )
...
* Add libldac for LDAC codec
* Fix primary email casing
2018-12-25 06:45:41 -08:00
Tim King
05a0e52d22
[qpdf] Initial integration for qpdf. ( #2050 )
2018-12-22 01:09:53 -08:00
Kostya Serebryany
86cc0eecbb
libpng-proto: compress IDAT chunks
2018-12-21 18:22:54 -08:00
Kostya Serebryany
dd5fb22985
libpng-proto: use the Release build of LPM
2018-12-21 17:02:31 -08:00
Kostya Serebryany
0b9b883b79
libpng-proto: don't use vector, use a plain array instead
2018-12-21 15:42:50 -08:00
Kostya Serebryany
e47326293d
Adding libpng-proto, an example of proto-based fuzzer ( #2048 )
...
* Adding libpng-proto, an example of proto-based fuzzer
* fix year
* remove redundant line
* address comments
* simplify names
* small update in build.sh
2018-12-21 15:10:13 -08:00
jonathanmetzman
8858ee1de6
disable msan ( #2049 )
2018-12-21 13:50:25 -08:00
Markus Kusano
2ae303bc3b
Add mpg123_decode fuzzer ( #2037 )
...
* Add fuzzer for mpg123_decode.
This fuzzes a different and non-filebased API that read_fuzzer.c.
mpg123_decode is, however, streaming based so we need to chunk the
fuzzer's input into multiple pieces, and pass them to the library. This
is pretty annoying to do by hand so I've introduced byte_stream.h to do
this automatically. Sadly, byte_stream.h is very C++ so the
decode_fuzzer is also C++ now. This isn't ideal since mpg123 is a
C library but this is the easiest way to do it.
* Do not carry next input within std::string.
* Malloc a new buffer for each decode invocation.
I used malloc instead of new since ideally this fuzz target would be
written in C.
2018-12-21 11:20:00 -08:00
Micah Snyder
194c7de657
Added the clamav project. ( #2047 )
2018-12-21 11:19:14 -08:00
Catena cyber
ca0396dd75
Change email address for primary contact of libhtp ( #2046 )
...
To have the one with a google account
2018-12-21 07:58:25 -08:00
Markus Kusano
243a4d86e7
Hardcode pkg-config results ( #2043 )
...
* Hardcode pkg-config results.
Fixes non-deterministic results from pkg-config that cause build
failures due to library dependencies not being available.
* Use $WORK instead of /work
* Pretty print fuzzer target linking options.
2018-12-20 22:28:41 -08:00
Jonathan Hui
6482891150
[openthread] update build configuration ( #2044 )
2018-12-20 16:18:08 -08:00
Markus Kusano
3c3648fd1d
Integrate libsass and add a fuzz target. ( #2039 )
2018-12-19 20:20:49 -08:00
Stefan Bucur
b6aefa51cb
Integration of tidy-html5 into OSS-Fuzz ( #2038 )
...
* Basic skeleton for tidy-html5 OSS-Fuzz integration.
* Added two tidy-html5 fuzzers: One that exercises the HTML parser and one that exercises the configuration file parser.
* Added the copyright headers.
* Clarified why the tidy config fuzzer uses a file interface.
2018-12-19 20:18:01 -08:00
Markus Kusano
f9971c4914
Integrate opencv and add two fuzz targets. ( #2034 )
2018-12-19 16:25:05 -08:00
Abhishek Arya
2b8d7322f0
Update project.yaml
2018-12-19 14:12:28 -08:00
Markus Kusano
b793e9a7c7
Integrate FreeImage and add a fuzz target. ( #2035 )
...
* Integrate FreeImage and add a fuzz target.
* Initialize FreeImage within LLVMFuzzerTestOneInput.
* Return 0 and not EXIT_SUCCESS.
* Use https when downloading FreeImage source.
2018-12-19 07:56:47 -08:00
Oliver Chang
261e7f2972
libhtp: remove fuzz.diff patch ( #1949 )
2018-12-19 18:22:08 +11:00
Catena cyber
6754971302
[libhtp] Integrate project ( #1949 )
2018-12-18 15:47:34 -08:00