Commit Graph

8777 Commits

Author SHA1 Message Date
jonathanmetzman 0d515aa665
Add tzdata to match clusterfuzz (#9284)
Fixes https://github.com/google/oss-fuzz/issues/9280
2023-01-23 10:33:32 -05:00
Michał Kępień dcd35e272f
bind9: fix build by force-linking two symbols (#9483)
`isc__initialize()` is a libisc function that is marked with
`__attribute__((constructor))`; it works as expected when the library is
linked dynamically, but it gets stripped away in static builds prepared
by OSS-Fuzz as it is not called directly by any of the fuzzers. However,
one of the fuzzers (`fuzz/dns_message_checksig.c`) calls
`dns_view_create()`, which calls `isc_file_sanitize()`, which in turn
calls `isc_md(ISC_MD_SHA256, ...)`. The latter does not work unless
`isc__md_initialize()` is called beforehand and that function is in turn
expected to be called by `isc__initialize()`. Since the latter is absent
from OSS-Fuzz builds, the `dns_message_checksig` fuzzer crashes on every
input.

Since this is only an issue for static builds, which BIND 9 currently
does not support except for OSS-Fuzz specifically, use the `-u` linker
flag to force-link `isc__initialize()` into the fuzzer binaries. Also
force-link `isc__shutdown()` (a libisc destructor) for consistency.
2023-01-23 10:25:59 -05:00
tsdgeos 826bfa26d1
karchive/kcodecs: Build the kf5 branches for now (#9481)
master is Qt6 based, and needs some work to be adapted
2023-01-23 14:23:28 +01:00
Catena cyber 87ce6ea123
libvnc: add one more mail address for contacts (#9482)
A google account to access https://bugs.chromium.org/p/oss-fuzz/issues/
2023-01-23 14:18:50 +01:00
Peter Samarin a091c28fa7
[spring-cloud-sleuth-brave] initial integration (#8780) 2023-01-23 16:48:13 +11:00
Marten Seemann 3dcb9641ab
quic-go: update repo path to quic-go/quic-go (#9479)
We recently moved the repo into its own org. See
https://github.com/quic-go/quic-go/issues/3611 for motivation and
tracking.
2023-01-23 11:59:33 +11:00
Catena cyber 107f33937f
SystemSan: log correct dns type and class (#9476)
by skipping final null byte of domain name
2023-01-23 09:48:14 +11:00
Catena cyber 05c9ac23d5
suricata: fix rust+C MSAN build (#9478)
Rust MSAN produces false positives when C clang version is not up to the
latest version.
See https://github.com/rust-lang/rust/issues/107149

Will fix
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=55239&q=label%3AProj-suricata
and such

Should the fix be generic for other projects ?
2023-01-21 23:00:18 +01:00
manunio dcb3b18e10
python-email-validator: add corpus (#9475) 2023-01-21 22:58:18 +01:00
Nathaniel Brough 5194616e0c
tinyusb: Updated engines, architectures and sanitizers (#9474)
Signed-off-by: Nathaniel Brough <nathaniel.brough@gmail.com>
2023-01-21 22:57:34 +01:00
Catena cyber abd261f68c
suricata: good targets naming for version 6 (#9477)
The protocol needs to be the last item for fuzz_applayerparserparse
2023-01-21 22:55:06 +01:00
Hayden B 7cdb3b7c9c
Update cc for sigstore project (#9473) 2023-01-21 13:23:34 +00:00
DavidKorczynski ed7eb5e07a
binutils: fix build (#9471) 2023-01-20 14:03:13 +00:00
DavidKorczynski b9cb4398d6
tensorflow: update patch to match recent upstream changes (#9469)
Recent updates in upstream caused the latest build to fail. Am pushing
these patches to ensure the build runs at the moment. The proper next
step is to get rid of the patching but will do that later.

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2023-01-20 13:26:28 +00:00
DavidKorczynski a5f369d9a8
markupsafe: update build (#9468)
Matches recent markupsafe updates
2023-01-20 12:35:05 +00:00
Daniel Novomeský 86859dbc60
kimageformats: upgrade libjxl (#9462)
Hello,
new libjxl version was released. I'd like to include it in testing.
2023-01-20 03:08:53 -08:00
Ludvig Michaelsson c347ac5cae
libfido2: enable more fuzzing engines (#9467) 2023-01-20 03:07:03 -08:00
0xedward 5a9e2a461b
[hermes] Add JS dictionary to improve fuzzing efficiency (#9456)
Currently, the Hermes setup does not use [a dictionary to help mutate
input](https://google.github.io/oss-fuzz/getting-started/new-project-guide/#dictionaries).
This PR adds JS dictionaries and edits the fuzzing setup to use
`hermes.dict` during fuzzing.
2023-01-20 00:44:53 +00:00
Margaret Cullen aec5de2b44
Changes needed to find libkqueue-dev package in the Network Radius ex… (#9387)
…tras distribution.

These changes fix the problem that is currently causing the freeradius
project not to build properly. I am a consultant working with Network
RADIUS, and I am submitting this pull request on their behalf.
2023-01-19 16:27:18 -08:00
DavidKorczynski 5402b1c2bf
bump introspector (#9465)
This is to include silencing of some HTML report generation that is WIP:
https://github.com/ossf/fuzz-introspector/pull/777
2023-01-19 15:46:01 -08:00
0xedward a001375996
[hermes] Use hermes and test262 unit tests as seed corpora (#9459) 2023-01-20 08:19:27 +11:00
0xedward 7e95694c6f
[hermes] Use `honggfuzz` and `centipede` fuzzing engines (#9454) 2023-01-20 08:17:00 +11:00
aschaich 823e0ae892
[xnio] Initial Integration for xnio-api (#9448) 2023-01-20 08:16:19 +11:00
aschaich f6ff6071f1
[jaxrpc] Initial Integration for jaxrpc-api (#9447) 2023-01-20 08:13:26 +11:00
Navidem 69ba24b86d
Enable Introspector for jvm (#9440) 2023-01-19 13:13:09 -08:00
Khaled Yakdan a61fbc0ee7
spring-boot: fix build (#9445) 2023-01-20 08:12:03 +11:00
aschaich aefb2c952a
[apache-axis2] Initial Integration (#9404) 2023-01-20 08:11:40 +11:00
DavidKorczynski fa896cea56
hdf5: simplify build (#9463)
This should enable fuzz introspector builds to run smoothly

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2023-01-19 21:08:31 +00:00
Raphael Salas cf3cb38355
[xs] Set metering limits in xs fuzzer (#9458)
XS is a JavaScript engine, the typical timeouts aren't necessarily bugs
-- it's expected that code will run for a long time. Over time the
fuzzer has generated quite a few timeouts, near-infinite loops.

We added metering to the XS fuzz target to cap execution to a number of
steps. In this PR we set the limits to reduce the amount of timeouts.
Timeouts that still reported are more likely to be bugs we should fix
(either in engine or in metering feature itself).
2023-01-19 11:27:31 -05:00
Navidem b3b439c8e4
Bump FI (#9460) 2023-01-19 08:06:57 -08:00
DavidKorczynski 91d35e7d39
infra: bump introspector (#9406)
The main changes are:
- improvements to code injection sink analyser
- output of data about all functions into summary.json. This is useful
for e.g. comparing reports and making historical analysis.

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2023-01-19 00:26:22 -08:00
Tyson Smith 7efd35c1f2
[mp4parse-rust] Update project.yaml (#9416)
Co-authored-by: Navidem <navid.emamdoost@gmail.com>
2023-01-18 11:32:09 -08:00
Catena cyber 65d4864780
libvnc: add account for access (#9451) 2023-01-18 08:48:31 -08:00
DavidKorczynski 0b97ad90e0
libarchive: handle erroneous archives (#9452)
Some more codepaths were added to the fuzzer in
https://github.com/google/oss-fuzz/pull/9003 However, these paths are
only valid to call in the event `archive_read_open_memory` returns
`ARCHIVE_OK` -- the fuzzer is currently blocked due to this and is why
the coverage decreased between 17th Nov to 19th Nov
(https://storage.googleapis.com/oss-fuzz-coverage/libarchive/reports/20221117/linux/src/libarchive/report.html
vs

https://storage.googleapis.com/oss-fuzz-coverage/libarchive/reports/20221119/linux/src/libarchive/report.html)

Am looking to get the coverage back up as I'm writing some documentation
about

https://github.com/ossf/fuzz-introspector/issues/580#issuecomment-1318961239

@jvoisin could you help review?

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2023-01-18 16:01:44 +00:00
Catena cyber 6217f71642
libhtp: adds people (#9446)
cc @cccs-rtmorti
2023-01-18 04:53:25 -08:00
Guido Vranken 5e342f2acf
[wolfssl, cryptofuzz] Build wolfCrypt with small elliptic curves (#9438)
Build wolfCrypt with all supported elliptic curves smaller than the
default of 224 bits.
2023-01-18 04:52:45 -08:00
DavidKorczynski 3f83a9146c
imageio: fix coverage build (#9443)
In order for code coverage to work we need to use
`compile_python_fuzzer` when building the fuzzers

Fixes: https://github.com/google/oss-fuzz/issues/9442
2023-01-17 15:31:17 -08:00
Kevin Backhouse 63e38959bf
Build Exiv2 without inih library (#9437)
This fixes the build failure in Exiv2.

We recently added [inih](https://github.com/benhoyt/inih) as a
dependency to Exiv2, but we need a newer version of inih that includes
the C++ bindings. OSS-Fuzz is still using a docker image based on Ubuntu
20.04 which doesn't include a sufficiently up-to-date version of the
`libinih-dev` package. So I've added a build flag to Exiv2 in
https://github.com/Exiv2/exiv2/pull/2465 which enables us to build
without the inih dependency. The fuzz target doesn't need inih, so it
shouldn't make any difference to the fuzzing results.
2023-01-17 11:24:44 -08:00
Philippe Scorsolini 387895b196
Add p.scorsolini@gmail.com to Crossplane auto_ccs (#9435)
Signed-off-by: Philippe Scorsolini <p.scorsolini@gmail.com>

Signed-off-by: Philippe Scorsolini <p.scorsolini@gmail.com>
2023-01-17 18:36:53 +00:00
Khaled Yakdan 14a026e173
angus-mail: fix build (#9434) 2023-01-17 02:20:09 -08:00
Khaled Yakdan 1fe8664cbb
spring-boot-actuator: fix build (#9433) 2023-01-17 02:19:51 -08:00
Khaled Yakdan 0cb38e950c
snakeyaml: add loader options to the safe constructor (#9432) 2023-01-17 02:19:30 -08:00
Bob Callaway 5f6f0f9cd9
Update email for rekor maintainer (#9430)
swap an email address for rekor maintainer
2023-01-16 14:15:10 +00:00
Miguel Company 3ca66ce05f
[fast-dds] Fix asio version to 1-18-1 (#9424)
Should fix https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53025
by fixing the asio version to the one used on Fast DDS as submodule. We
could probably revert this after
https://github.com/chriskohlhoff/asio/issues/1188 is solved.
2023-01-16 04:14:42 -08:00
DavidKorczynski 3a0b110383
rustls: copy out fuzzers in general manner (#9429)
@djc
2023-01-16 10:57:32 +00:00
Dirkjan Ochtman e46a4823a2
rustls: update build script to avoid hardcoding fuzzer names (#9425)
I am removing one of the existing fuzzers in
https://github.com/rustls/rustls/pull/1171 (which should be subsumed by
one of the existing ones). However, the fuzzing CI job that we run is
currently failing because the build script hard codes the fuzzer names.
Make an attempt at copying whatever the fuzzer builds instead.

I am not very experienced at shell stuff, but in some local testing this
seems to do the job.

cc @ctz
2023-01-16 01:36:45 -08:00
Guido Vranken 2c1c9603db
[cryptofuzz, wolfssl] Enable ECCSI (#9421) 2023-01-16 01:35:44 -08:00
Dongge Liu e1529c3ee3
Update Centipede to eb91dd2 (#9426)
Update Centipede to [its latest commit
eb91dd2](eb91dd2157),
which added some new features and fixed runtime bugs found in recent
FuzzBench experiments.
2023-01-16 13:14:45 +11:00
DavidKorczynski 2e0402ca1f
tensorflow: reduce cpu usage further (#9423)
The build on the bots continue to exhaust memory usage as far as I can
tell:
https://oss-fuzz-build-logs.storage.googleapis.com/log-6f2d0692-4002-45b2-a1f4-01471de13add.txt
However, the build is getting further now than before.
2023-01-15 12:24:21 +00:00
DavidKorczynski 65ca1db619
tensorflow: specify explicit fuzztest to build (#9422)
Build only status_fuzz fuzztest for now in addition to all the
non-fuzztest fuzzers. The build will be extended to new fuzztest fuzzers
once the overall build starts passing again.

Recent commits on Tensorflow made the build not work e.g.
77e3480998
and the reason is we need proper diffing in place (e.g. remove `no_oss`
in the BUILD tag). These should be included in the build, but will
handle that after the current build starts working agains.

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2023-01-14 13:04:14 +00:00