Commit Graph

6661 Commits

Author SHA1 Message Date
Evgeny Vereshchagin 8bc388e3e0
[elfutils] turn on i386 (#7000) 2021-12-10 09:39:05 +00:00
Richard Russon f53095fad5
neomutt: merge test code (#6996)
The test code has been merged into master.
Remove the branch reference from the Dockerfile.
2021-12-09 14:08:11 -05:00
Catena cyber 968b2c73a8
suricata: uses better dictionaries (#6990) 2021-12-09 09:26:39 -08:00
DavidKorczynski 08464c60af
neomutt: remove memoery sanitizer as it introduces false positives (#6994) 2021-12-09 15:09:41 +00:00
DavidKorczynski f01a0f0411
fluent-bit: disable all leaks (#6991) 2021-12-09 10:35:11 +00:00
Tyson Smith e7b8d7d693
[hunspell] Update CC list (#6989) 2021-12-09 01:51:50 +00:00
Guido Vranken 9e746de359
[cryptofuzz] Update (#6973)
* [cryptofuzz] Update

- Enable Mozilla NSS fuzzer again
- Enable libgmp debug asserts
- Build libgmp with MSAN
- Remove LibreSSL (moved to the 'libressl' project some time ago)
- Don't pipe output to /dev/null (this was necessary for some previous version of the OSS-Fuzz build system)

* [cryptofuzz] Temporarily disable noble-secp256k1
2021-12-08 20:21:18 +00:00
Damien Miller 65637510f4
dump config.log when configure fails (#6981)
* dump config.log when configure fails

Motivated by https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41899
which I'm unable to debug locally, but would have also saved time for
previous failures at configure time, e.g.
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41424

* send config.log to stderr too

Co-authored-by: Damien Miller <djm@google.com>
2021-12-08 10:27:48 -05:00
Ali Zhang 49cdfd9880
Pigweed: Add Dmitry Yatsushkevich to auto_ccs (#6975) 2021-12-07 16:06:29 -05:00
Evgeny Vereshchagin 467ad6b66e
[elfutils] show config.log when ./configure fails (#6963)
to make it easier to figure out why configure fails with something like
```
Step #3 - "compile-afl-address-x86_64": configure: error: in `/src/elfutils':
Step #3 - "compile-afl-address-x86_64": configure: error: C compiler cannot create executables
Step #3 - "compile-afl-address-x86_64": See `config.log' for more details
```
2021-12-07 16:06:15 -05:00
Caolán McNamara c96a4221e6
ofz#41602 install lockfile-progs for libreoffice build (#6959) 2021-12-07 16:05:57 -05:00
AdamKorcz 83e36bd562
[kubernetes] Add CCs (#6912) 2021-12-07 14:13:00 -05:00
jonathanmetzman 9d864ee0e3
Use llvmorg-14-init-7378-gaee49255 for LLVM (#6979)
This version is confirmed to fix the AFL++ issues and was the last version we
used prior to the breakages on December 2nd.
2021-12-07 11:47:58 -05:00
AdamKorcz 5f83a8b681
[runc] Add more fuzzers (#6976) 2021-12-07 11:51:51 +00:00
AdamKorcz ec36235da9
[istio] Do shallow clone (#6977) 2021-12-06 16:23:09 -05:00
Catena cyber c9d1f408b8
gonids: try to test golang fix (#6971) 2021-12-06 14:35:50 -05:00
Nikita Mikhaylov b7f0b3e047
Added (#6972) 2021-12-06 11:59:27 -05:00
MarcoFalke 79e5dc3d77
[base-clang] Change OUR_LLVM_REVISION (#6970)
* [base-clang] Change OUR_LLVM_REVISION

* llvmorg-14-init-8033-gabb2a91b
2021-12-06 10:24:41 -05:00
Naveen cadd938bc1
sigstore - Included corpus (#6964)
- Included corpus.
- Included additional targets.
2021-12-05 10:48:35 +00:00
6543 ea2e70c4a9
Gitea: change mail of @6543 (#6962) 2021-12-03 20:40:01 +00:00
jonathanmetzman e3ecb89696
[base-clang] Use llvmorg-14-init-8564-g34b903d8 (#6961)
Use clang version before this change: https://chromium-review.googlesource.com/c/chromium/src/+/3310960
Fixes: #6957
2021-12-03 14:42:20 -05:00
Eugene Kliuchnikov 5e9a6f2184
Stop fuzzing once output size limit is reached (#6958)
As with most other compressors, brotli input could be a "bomb".
Limiting output size defuses such inputs (to avoid timeouts).
2021-12-03 10:32:00 +00:00
Felicia Lim bc4aed352b
Update auto_ccs (#6955) 2021-12-03 00:22:00 +00:00
Kevin Lubick 7a6fc73897
[skia] Fix cc list (#6953)
* [skia] Fix cc list

* one more
2021-12-02 14:11:40 -05:00
DavidKorczynski ff66332a4a
gvisor: cifuzz fix (#6951) 2021-12-02 11:13:07 +00:00
DavidKorczynski 0bed7945b3
unbound: fix new fuzzer names (#6842)
* unbound: fix new fuzzer names

* unbound: fix license headers
2021-12-02 10:01:01 +11:00
MarcoFalke 723bdbc7a8
bitcoin-core: Update auto CC email (#6949) 2021-12-01 21:04:09 +00:00
AdamKorcz aee8d9330b
[tink] Initial integration (#5725) 2021-12-01 09:45:05 -05:00
jonathanmetzman a458e3c8ed
[cifuzz] Copy repo from image before checking out. (#6941)
* [cifuzz] Copy repo from image before checking out.

Do this instead of cloning repo anew.
Fixes: https://github.com/google/oss-fuzz/issues/6755

* fix tests

* Add test code for cifuzz-example

* fix
2021-12-01 09:36:08 -05:00
DavidKorczynski faaa6c1300
tdengine: fix build (#6948)
* tdengine: fix build

* tdengine: fix cov
2021-12-01 14:31:23 +00:00
DavidKorczynski bc5ee4f128
clamav: rename git clone and get corpus in build script. CIFuzz-related (#6947) 2021-12-01 11:29:34 +00:00
Evgeny Vereshchagin fc94ed50ba
[elfutils] start afresh (#6944)
The elfutils project was integrated into OSS-Fuzz in
https://github.com/google/oss-fuzz/pull/6670 where
Dockerfile pointed to a fork of the official repository
with a series of patches that were supposed to make it compile
on OSS-Fuzz. Apart from that there was a fuzz target that
effectively wrapped the readelf utility by applying a patch
to its source code. On the whole it worked at the time
but I think there are a few issues:

1. It's hard to point OSS-Fuzz to the official repository
(because most of the patches touch the build system and
they can't always be applied cleanly);

2. It's almost impossible to add new fuzz targets covering
other use cases;

3. It's not possible to build fuzz targets without Docker

4. Since the fuzz target mostly wraps the readelf utility
it looks more like a CLI tool than a fuzz target. It calls
exit when it should just return 0 to let it keep going
and so on.

This PR should addresses all those issues apart from 4. The fuzz
target was just removed and another one was added instead. (It can
be added later though but since it isn't exactly maintainable with
the build script pointing at the official repository it should
probably be rewritten:
https://sourceware.org/pipermail/elfutils-devel/2021q4/004295.html)

The new fuzz target covers the code that `systemd` uses to parse
untrusted data. Currently it can be used to trigger various issues
like heap-buffer-overflows and inifinite loops that in theory can bring down
coredump processing on machines where systemd-coredump is used by
default. Even though those issues were discovered by one of `systemd`
fuzz targets I think elfutils bugs should be caught and reported
by elfutils fuzz targets.
2021-12-01 11:15:17 +00:00
Evgeny Vereshchagin fb3be33af9
[libbpf] use --disable-libdebuginfod while building libelf (#6945)
Looks like --disable-libdebuginfod works now so it seems
it can safely be used instead of installing libcurl and
letting ./configure find and ignore it.
2021-12-01 11:09:05 +00:00
AdamKorcz a1eb5b60fc
[etcd] Add cncf fuzzers (#6946) 2021-12-01 11:07:42 +00:00
DavidKorczynski 8d85237a84
clamav: update build to fix CIFuzz repo identification (#6943)
* clamav: update build to fix CIFuzz repo identification

* clamav: fix build
2021-11-30 23:03:10 +00:00
Jonathan Metzman b96b60c7a8 Test handling of untracked files 2021-11-30 11:43:54 -08:00
Florian Apolloner 37f213eb44
Updated Django to use a python based fuzzer. (#6940) 2021-11-30 19:22:36 +00:00
Greg Guthe cd46b67509
bleach: update maintainers (#6939)
Update bleach maintainers primary contact to @willkg (listed on ad0004f682/CONTRIBUTORS (L8)) and move @g-k to personal email address
2021-11-30 17:08:57 +00:00
van Hauser 574fd118ed
update afl++ commit id (#6936)
* update afl++ commit id
2021-11-30 10:31:30 -06:00
van Hauser cfa0a24958
Allow for easy reproducable builds with afl++ (#6889)
* update afl++ commit id

* update afl++ commit id

* fix for afl++

* attempt fix for curl

* allow easy reproducable afl++ builds
2021-11-30 08:13:58 -05:00
Guido Vranken bb1bb30db1
[libecc] Enable HMAC (#6935) 2021-11-30 08:10:32 -05:00
jonathanmetzman 18a5b07b6b
[java][coverage] Make sure filenames is a string and not a list. (#6928)
* single quotes

* [java][coverage] Make sure filenames is a string and not a list.

Fixes: https://github.com/google/oss-fuzz/issues/6913

* fmt
2021-11-30 08:10:08 -05:00
Nikita Mikhaylov de1ccb4623
[clickhouse] Fix build (#6655)
* Fix

* Fix

* Bump 2

* Update build.sh
2021-11-30 08:04:58 -05:00
DavidKorczynski 73ed0f7bbf
openjpeg: fix build for cifuzz (#6934) 2021-11-30 11:21:56 +00:00
DavidKorczynski 8ddb0acb26
caddy: update set up for cifuzz (#6933) 2021-11-30 11:01:47 +00:00
Evgeny Vereshchagin 3c1abd23c3
[libbpf] point the script to elfutils-0.186 (#6932)
Hopefully it should be more stable than elfutils-0.185
with a bunch of commits on top of it
2021-11-30 11:01:23 +00:00
Evgeny Vereshchagin bec389762b
[libbpf] remove an out-of-date comment (#6931)
All the issues that check was supposed to catch should be
caught by the libbpf testsuite when it's run under UBSan
so it doesn't seem to make much sense to add it to the compiler
flags on OSS-Fuzz.
2021-11-30 10:14:44 +00:00
jonathanmetzman 971850a64d
Delete obsolete docs (#6930) 2021-11-29 23:00:04 -05:00
Dzmitry f3f9c37196
pigweed: Fix coverage build failure (#6924)
Use correct compilation directory in the coverage mapping.

Bug: https://crbug.com/oss-fuzz/38518
2021-11-30 03:43:53 +00:00
Guido Vranken 948a1128b4
[rustcrypto] Initial integration (#6908) 2021-11-29 22:35:32 -05:00