Commit Graph

6237 Commits

Author SHA1 Message Date
Julien Voisin 9cba786762
Fix the path for mutagen's corpus (#10133) 2023-04-20 12:10:16 -04:00
Julien Voisin 0ff05419be
Fix Pygment's corpus paths (#10134) 2023-04-20 12:10:02 -04:00
jonathanmetzman a00aa3c55f
Add google account (#10135) 2023-04-20 11:40:20 -04:00
Benjamin Bannier cf59ba0b1c
spicy: build binaries in Release mode (#10128) 2023-04-20 12:45:17 +01:00
Sergey Bronnikov cbe2d96e16
tarantool: remove --depth in git clone (#10114)
Option breaks checkouts for certain commits in branches.
2023-04-20 09:44:10 +01:00
Sean Gilligan 2a5d850371
urllib3 performance improvements (#10115)
While investigating the urllib3 performance with the `fuzz_requests` I
saw that a lot of tests had been failing with timeouts. I had some
misunderstandings about how oss-fuzz works and that you need light and
quick implementations for the fuzzer to work effectively.

Doing some local testing a single iteration of the fuzzer was taking as
long as 90 seconds.

This change updates the `urllib3` timeouts to be far shorter and reduces
the number of requests the fuzzer tries to do in a single iteration.
This should bring us under the 25 second timeout and hopefully get this
fuzzer closer to working.
2023-04-20 09:43:42 +01:00
Dongge Liu 81f8c1034f
Add missing `main_repo` in `project.yaml` (#10111)
Fix #10110.
2023-04-20 09:49:03 +10:00
AdamKorcz 85ef7b1793
u-root: refactor build (#10121)
Refactor the build so it will pass with
https://github.com/u-root/u-root/pull/2655.

Fixes https://github.com/google/oss-fuzz/issues/10112

Signed-off-by: AdamKorcz <adam@adalogics.com>
2023-04-19 10:25:26 +01:00
Hayden B 0295dfbb45
Update project contacts for Sigstore projects (#10108) 2023-04-19 09:46:49 +01:00
tsdgeos fb32d86890
poppler: Fix build (#10098) 2023-04-18 16:15:26 -04:00
Arthur Chan 2a1c4caf15
Sigstore-java: Add target package prefix environment variable (#9997)
This PR adds an extra environment variable to specify target package
prefix of java classes for the jvm frontend. This could ignore unrelated
class in the frontend processing and decrease the time and resources
overhead.
Reference: https://github.com/ossf/fuzz-introspector/pull/938

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>
2023-04-18 14:28:13 +01:00
DavidKorczynski a01dcaee59
liblouis: add myself to project (#10095)
@bertfrees could you please confirm this is okay?
2023-04-18 10:32:20 +01:00
Raphael Salas 9381b4796d
[xs] disable leak check at exit (#10106)
This PR instructs ASAN to not check for leaks at exit (i.e., after
fuzzing is done), and use only the detection in libfuzzer using lsan's
non-destructive checks.

Currently, the fuzzer reports leaks that only occur because it's
in-process, so they are not true positives. When XS expects to exit (no
`free` immediately before exit), it doesn't actually exit and continues
to the next case. A comprehensive fix would be expensive.

To reduce the amount of false-positives we suppress LSAN in abort paths,
since any allocation would be short lived. However, the at-exit leak
detection still reports non-reproducible leaks when fuzzer is exiting.
We are disabling while we explore other alternatives to fix
comprehensively (a possible one is #7347).
2023-04-18 10:10:52 +01:00
Quentin Young 55312206ce
projects: add user to frr cc list (#10105) 2023-04-17 20:35:59 +01:00
DavidKorczynski bcb3619beb
asteval: initial integration (#10103)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-17 10:14:18 -04:00
DavidKorczynski f23c697958
pdoc: initial integration (#10102)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-17 10:13:54 -04:00
DavidKorczynski f791d737a5
python-markdownify: initial integration (#10101)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-17 10:11:00 -04:00
DavidKorczynski 7e14b08c6b
arrow-py: initial integration (#10100)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-17 10:05:53 -04:00
Julien Voisin c58d80e654
Add Mutagen to OSS-Fuzz (#10072)
This project is used by a couple of *high-profile* music-related
software, like [picard]( https://picard.musicbrainz.org/ ), [beets](
https://beets.io/), [Exaile]( https://exaile.org/),
[QuodLibet](https://quodlibet.readthedocs.io/en/latest/) … Making it
more robust will also help the [metabrainz foundation](
https://metabrainz.org/ ) to collect better quality data, which will
[benefit Google]( https://metabrainz.org/sponsors ) in the end.

CC @phw @lazka
2023-04-17 10:05:27 -04:00
DavidKorczynski a366d6eaea
python-hyperlink: initial integration (#10104)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-17 10:03:49 -04:00
Waldemar Quevedo 184d1fdc4f
Update NATS maintainers (#10099)
Hi! Adding more members to the list to be able to investigate NATS
issues.
2023-04-17 13:24:55 +01:00
AdamKorcz 83b0e6c20e
vitess: bump go (#10096)
Bump Go for Vitess to 1.20.2

Signed-off-by: AdamKorcz <adam@adalogics.com>
2023-04-15 18:22:44 +01:00
DavidKorczynski a9d6535c04
woff2: fix introspector build (#10093)
It currently runs into:

```
Step #6 - "compile-libfuzzer-introspector-x86_64": clang-15: ␛[0;1;35mwarning: ␛[0m␛[1moptimization flag '-fno-tree-vrp' is not supported [-Wignored-optimization-argument]␛[0m
Step #6 - "compile-libfuzzer-introspector-x86_64": llvm-ar crf src/convert_woff2ttf_fuzzer.a  src/font.o  src/glyph.o  src/normalize.o  src/table_tags.o  src/transform.o  src/woff2_dec.o  src/woff2_enc.o  src/woff2_common.o  src/woff2_out.o  src/variable_length.o \
Step #6 - "compile-libfuzzer-introspector-x86_64":       brotli/bin/obj/c/common/*.o brotli/bin/obj/c/enc/*.o brotli/bin/obj/c/dec/*.o src/convert_woff2ttf_fuzzer.o
Step #6 - "compile-libfuzzer-introspector-x86_64": llvm-ar: ␛[0;1;31merror: ␛[0munknown option f
Step #6 - "compile-libfuzzer-introspector-x86_64": OVERVIEW: LLVM Archiver
```

This fixes the above issue.

Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-15 12:15:05 +01:00
DavidKorczynski 3318482738
skia-ftz: fix build (#10086)
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=55584

Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-14 21:29:00 +01:00
Kevin Lubick 5d7e994e31
[skia] Clean up auto-cc list (#10088) 2023-04-14 13:52:19 -04:00
DavidKorczynski 066b11a567
sleuthkit: fix build (#10089)
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=52848

Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-14 16:38:49 +01:00
DavidKorczynski 5e70fbdf53
mbedtls: fix build (#10087)
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57995

Apply the same fix from openssl
https://github.com/google/oss-fuzz/pull/10063

Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-14 16:12:47 +01:00
fanquake df76eb3f27
bitcoin-core: re-enable DEBUG=1 in the depends build (#9828)
We'll be removing the `_LIBCPP_DEBUG` (which has been deprecated/removed
by LLVM), downstream in https://github.com/bitcoin/bitcoin/pull/27447.

So remove the comment about re-enabling DEBUG=1, as that will no-longer
do anything for the builds here.

We could follow up with getting a Debug Mode build of libc++ available
in the
oss-fuzz environment.
2023-04-14 11:00:14 -04:00
DavidKorczynski 1172e269c3
tensorflow-addons: fix build (#10085)
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57778

Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-14 14:58:09 +01:00
Zi Fan 7696fb5b5f
connectedhomeip: initial integration (#10064)
This PR is to bring existing fuzzers in the connectedhomeip project to
OSS-Fuzz.

CC: @gmarcosb, @andy31415
2023-04-14 13:08:19 +00:00
Max Jonas Werner 1fb9716d99
Flux: Update affiliations; add makkes (#10082)
This updates the email addresses of @pjbgf and @scottrigby and adds my
own email address (cc @hiddeco).

Signed-off-by: Max Jonas Werner <mail@makk.es>
2023-04-14 08:19:56 -04:00
DavidKorczynski 67d5cafe85
lark-parser: initial integration (#10076)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-14 08:06:26 -04:00
Henry Lin baab3431e0
opencsv: Initial integration (#10069)
Initial integration of opencsv into OSS-Fuzz.
2023-04-14 08:05:45 -04:00
DavidKorczynski 987055edc8
ipaddress: initial integration (#10077)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-14 08:04:35 -04:00
DavidKorczynski a337794d97
python-jose: initial integration (#10078)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-14 08:04:11 -04:00
Phil Turnbull 29fd94099f
gss-ntlmssp: New project (#9891)
This PR adds a new gss-ntlmssp project.
[gss-ntlmssp](https://github.com/gssapi/gss-ntlmssp) is a mechglue
plugin for [krb5](https://github.com/krb5/krb5) that implements NTLM
authentication via GSSAPI.

The plugin is available in the Debian, Ubuntu and Suse package
repositories.

cc @simo5 as the gss-ntlmssp maintainer.
2023-04-14 08:03:27 -04:00
DavidKorczynski cd08a88b50
urlextract: initial integration (#10080)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-14 07:59:02 -04:00
DavidKorczynski c2d65ada62
pytables: fix build (#10083)
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57762

Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-14 07:56:48 -04:00
Arjun 35ac856ce5
[unit] Issue 57574 build failure (#10061)
Fix : https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57574#c1

Signed-off-by: Arjun Singh <ajsinghyadav00@gmail.com>
2023-04-14 15:52:25 +10:00
Guido Vranken 380cf4b6fd
[openssl] Fix build (#10063)
Fixes the OpenSSL build by downloading the corpora submodule.

Fixes https://github.com/openssl/openssl/issues/20712
2023-04-12 19:57:27 +01:00
tsdgeos a339ef28de
Fix karchive/kimageformats build (#10048) 2023-04-12 19:57:11 +01:00
Sean Gilligan 2aa8de903e
Croniter get_next fix (#10068)
Fix for an incorrect call to `get_next` that was stopping the Croniter
`fuzz_iter` executing, see
[https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57139#c2](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57139#c2).

It was being called with a `datetime` object instead of a `datetime`
class as it's `ret_type` argument causing a type error. I've removed the
argument that's fixed it.

Also I've added the `undefined` sanitizer as it was missing from the
`project.yaml`. I've done a local run and it works fine with it enabled.
2023-04-12 19:55:49 +01:00
Julien Voisin 05338d3e0d
Fuzz filters as well in Pygments (#10071) 2023-04-12 19:54:36 +01:00
Julien Voisin b82e1a2fa4
Fix pygment's corpus creation (#10070)
Example files are now in folders
2023-04-12 19:54:09 +01:00
Benjamin Bannier bfa2f705b5
spicy: add files missing for coverage generation (#10067)
Automatic copying of the source files skipped softlinks which lead to
some include files not being found during coverage generation. With this
patch we now manually deep-copy softlinks in the source tree to their
export target locations.
2023-04-12 13:10:54 +01:00
Richard Russon f09ce842f4
neomutt: install libidn2 (#10062)
NeoMutt now uses IDN2 by default.

Sorry, another NeoMutt update.
Thanks.
2023-04-11 16:29:04 -04:00
DavidKorczynski a30e95a5ca
parsimonious: initial integration (#10035)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-11 12:56:40 -04:00
DavidKorczynski 7768ca2c9a
genshi: initial integration (#10038)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-11 12:56:06 -04:00
DavidKorczynski be8fded65f
astroid: initial integration (#10039)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-11 12:52:22 -04:00
DavidKorczynski 1bf3f372a2
autoflake: initial integration (#10037)
Signed-off-by: David Korczynski <david@adalogics.com>
2023-04-11 12:52:01 -04:00