Commit Graph

7654 Commits

Author SHA1 Message Date
manunio a7ef958c49
orjson: catch recursion limit exception (#8295)
Fixes orosn crash
2022-08-19 13:37:46 +10:00
manunio 444a4feafe
burntsushi-toml: Fixes out-of-memory crash (#8297) 2022-08-19 13:37:29 +10:00
AdamKorcz 0b8040e9be
golang: add fuzzer (#8296)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-08-18 23:37:34 +01:00
manunio 911b35fc23
Disables file github issue flag (#8293) 2022-08-18 13:44:59 -07:00
AdamKorcz e08eca5bbe
golang: add fuzzers (#8290)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-08-18 17:36:34 +01:00
Patrice.S f5489ea472
spring-security: Change primary_contact (#8289)
Update project.yaml
2022-08-18 17:35:58 +01:00
Patrice.S 129f8f2639
spring-bean: initial integration (#8287)
Add BeanWrapper test for spring-bean
2022-08-18 09:23:49 -04:00
Henry Lin db700e3ca8
Tomcat: Delete unnecessary code. (#8286)
Delete unnecessary code.
2022-08-18 11:19:38 +01:00
rbehjati 89650d9919
Oak: Fix paths in Dockerfile (#8284)
Oak: Fix the paths in Dockerfile
2022-08-18 10:11:30 +01:00
DavidKorczynski eb7e772953
charset_normalizer: initial integration (#8265)
* charset_normalizer: initial integration

* add primary contact
2022-08-17 20:10:33 -04:00
Henry Lin c1258ad073
Tomcat: Fix build issue and add fuzz targets. (#8282)
Fix build issue and add two fuzz targets.
2022-08-17 23:23:03 +01:00
dependabot[bot] 7893dde4e7
build(deps): update google-cloud-datastore requirement from <2.0 to <3.0 in /infra/build/functions (#7447)
build(deps): update google-cloud-datastore requirement

Updates the requirements on [google-cloud-datastore](https://github.com/googleapis/python-datastore) to permit the latest version.
- [Release notes](https://github.com/googleapis/python-datastore/releases)
- [Changelog](https://github.com/googleapis/python-datastore/blob/main/CHANGELOG.md)
- [Commits](https://github.com/googleapis/python-datastore/compare/v0.21.0...v2.5.1)

---
updated-dependencies:
- dependency-name: google-cloud-datastore
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-08-17 14:27:33 -04:00
DavidKorczynski 6cd3e49c04
underscore: initial integration (#8185)
* underscore: initial integration

* nit

* add primary contact
2022-08-17 14:12:18 -04:00
Greg Myers 63dc00af00
Fix typos in rust_lang.md and cryptofuzz readme (#7362) 2022-08-17 12:31:05 -04:00
DavidKorczynski fb0a357b0c
coveragepy: initial integration (#8161)
* coveragepy: initial integration

* add maintainer as primary contact
2022-08-17 12:28:39 -04:00
Zied Aouini 7d2d694e36
[nfstream] Initiate fuzzing on nfstream project. (#8210) 2022-08-17 12:27:05 -04:00
vargen 95242ed20b
adding PEMParser fuzz test for [bc-java] (#8278) 2022-08-17 12:26:25 -04:00
aschaich 77ab9a3f3d
[h2database] Initial Integration (#8263) 2022-08-17 12:23:52 -04:00
DavidKorczynski afb0b41056
python-oauthlib: initial integration (#8233) 2022-08-17 12:14:12 -04:00
aschaich 3b34a556b7
[commons-collections] Initial Integration (#8280) 2022-08-17 12:13:12 -04:00
manunio f1aba373a6
burntsushi-toml: initial integration (#8279) 2022-08-17 09:50:06 -04:00
vargen 20e8ba44b3
adding X509CertPairParser fuzz test for [bc-java] (#8274) 2022-08-17 07:36:15 -04:00
DavidKorczynski 321c50b854
lcms: extend profile fuzzer (#8277)
* lcms: extend profile fuzzer

* remove unused fuzzer
2022-08-17 11:22:53 +01:00
Oliver Chang d412c6b08b
Pin Jazzer to older revision (#8275)
All latest builds seem to be broken with:

```
OpenJDK 64-Bit Server VM warning: Sharing is only supported for boot loader classes because bootstrap classpath has been appended
INFO: Loaded 112 hooks from com.code_intelligence.jazzer.runtime.TraceCmpHooks
INFO: Loaded 4 hooks from com.code_intelligence.jazzer.runtime.TraceDivHooks
INFO: Loaded 2 hooks from com.code_intelligence.jazzer.runtime.TraceIndirHooks
INFO: Loaded 4 hooks from com.code_intelligence.jazzer.runtime.NativeLibHooks
INFO: Loaded 8 hooks from com.code_intelligence.jazzer.sanitizers.Deserialization
INFO: Loaded 5 hooks from com.code_intelligence.jazzer.sanitizers.ExpressionLanguageInjection
INFO: Loaded 70 hooks from com.code_intelligence.jazzer.sanitizers.LdapInjection
INFO: Loaded 46 hooks from com.code_intelligence.jazzer.sanitizers.NamingContextLookup
INFO: Loaded 1 hooks from com.code_intelligence.jazzer.sanitizers.OsCommandInjection
INFO: Loaded 52 hooks from com.code_intelligence.jazzer.sanitizers.ReflectiveCall
INFO: Loaded 8 hooks from com.code_intelligence.jazzer.sanitizers.RegexInjection
Exception in thread "main" java.lang.ExceptionInInitializerError
  at com.code_intelligence.jazzer.sanitizers.RegexRoadblocks.<clinit>(RegexRoadblocks.java:72)
  at java.base/java.lang.Class.forName0(Native Method)
  at java.base/java.lang.Class.forName(Class.java:398)
  at com.code_intelligence.jazzer.instrumentor.Hooks$Companion$HooksLoader.loadHooks(Hooks.kt:66)
  at com.code_intelligence.jazzer.instrumentor.Hooks$Companion$HooksLoader.load(Hooks.kt:48)
  at com.code_intelligence.jazzer.instrumentor.Hooks$Companion.loadHooks(Hooks.kt:42)
  at com.code_intelligence.jazzer.agent.Agent.premain(Agent.kt:137)
  at com.code_intelligence.jazzer.driver.Driver.start(Driver.java:97)
Caused by: java.lang.NumberFormatException: For input string: "./jazzer_driver"
  at java.base/java.lang.NumberFormatException.forInputString(NumberFormatException.java:66)
  at java.base/java.lang.Long.parseLong(Long.java:680)
  at java.base/java.lang.Integer.parseUnsignedInt(Integer.java:835)
  at java.base/java.lang.Integer.parseUnsignedInt(Integer.java:929)
  at com.code_intelligence.jazzer.api.Jazzer.getLibFuzzerSeed(Jazzer.java:635)
  at com.code_intelligence.jazzer.api.Jazzer.<clinit>(Jazzer.java:38)
  ... 8 more
```
2022-08-17 19:21:53 +10:00
Paulo Gomes 0b416da224
native go fuzzing: Restrict fuzzer lookup to `*.go` (#8238)
native go fuzzing: Restrict fuzzer lookup to *.go
Projects containing words starting with Fuzz in non-go
files break compile_native_go_fuzzer with the error:
sed: -e expression #1, char 15: unknown option to 's'

Signed-off-by: Paulo Gomes <pjbgf@linux.com>

Signed-off-by: Paulo Gomes <pjbgf@linux.com>
2022-08-16 20:03:34 -07:00
jonathanmetzman c113501247
Upgrade to codeqlv2 to avoid warning (#8272)
* Upgrade to codeqlv2 to avoid warning

* debug
2022-08-16 17:08:56 -07:00
jonathanmetzman 9f150d831f
Fix trial build for coverage (#8268)
* Fix trial build for coverage

* Fix
2022-08-16 08:59:28 -04:00
jonathanmetzman 4ca6508278
Update project.yaml 2022-08-15 21:02:44 -04:00
jonathanmetzman 8515dad2eb
Update project.yaml 2022-08-15 21:01:53 -04:00
jonathanmetzman 1749ae2b0f
Fix failing unittest. (#8262) 2022-08-15 19:34:34 -04:00
vargen 01548ade02
[apache-commons-cli] Initial Integration (#8255)
Initial commit [apache-commons-cli]
2022-08-15 18:56:35 -04:00
DavidKorczynski c3fd7c761f
mako: initial integration (#8231)
* mako: initial integration

* mako: add primary contact

* mako: simplify fuzzer
2022-08-15 11:32:22 -07:00
DavidKorczynski 9747f8923b
py-serde: initial integration (#8139) 2022-08-15 13:41:01 -04:00
DavidKorczynski 5d550cb66c
et-xmlfile: initial integration (#8187) 2022-08-15 13:40:40 -04:00
Arthur Chan 715d2daf0c
gc-iam:initial integration (#8086)
Create fuzzer
2022-08-15 13:39:55 -04:00
DavidKorczynski 66e90bbf6c
python-tasks: initial integration (#8192) 2022-08-15 13:39:22 -04:00
DavidKorczynski 4ec2c13401
ghostscript: extend with eps2write device fuzzer (#8258)
* ghostscript: extend with eps2write device fuzzer

eps2write is one of the high-level devices currently not targeted by the
fuzzing suite. This adds a fuzzer for this high-level device.

* cleanup build
2022-08-15 15:43:12 +01:00
DavidKorczynski 6929137715
g-cloud-logging: refine fuzzing set up (#8256)
Add mocking to resources fuzzer and simplify others.
2022-08-15 12:41:11 +01:00
Joachim Metz 5260d875b2
Added libvsapm to libyal project configuration (#8249) 2022-08-15 10:38:33 +01:00
Tim Rühsen 83b899cfb2
Add rootkea to wget2 project (#8252) 2022-08-15 10:38:10 +01:00
Oliver Chang 901fc68112
Update maintainer email for hsqldb (#8253)
Update project.yaml
2022-08-15 15:30:46 +10:00
DavidKorczynski 6ce3dbb3d3
ghostscript: add psd and fax fuzzer (#8247) 2022-08-14 00:03:44 +01:00
DavidKorczynski 680fe65b23
two python projects: fix protobuf install (#8246) 2022-08-13 22:33:21 +01:00
AdamKorcz 91e148cbb3
golang: build upstream fuzzers (#8245)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-08-13 19:20:20 +01:00
AdamKorcz 54996950a0
golang: use tar reader options file (#8242)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-08-13 17:40:13 +01:00
Fabian Meumertzheim 34c7aa99a3
protobuf-java: Fix build by building with Bazel (#8240)
* protobuf-java: Fix build by building with Bazel

* Fix typo

* Use bazel rather than bazelisk

* Install Bazel

* Install bazel

* Fix Java build
2022-08-13 15:15:10 +01:00
AdamKorcz d154d875ad
llvm: fix broken build (#8211)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-08-12 14:10:26 -07:00
Tatu Saloranta 384173eb12
Add "fanningpj@gmail.com" as auto_cc for jackson-core, jackson-databind (#8235) 2022-08-12 20:42:03 +01:00
Paulo Gomes 07a9b6f38d
fluxcd: Update Flux Security Team details (#8232)
Updating contact details based on current members of
the Flux Security Team:
https://github.com/fluxcd/.github/blob/main/SECURITY.md\#security-team

Signed-off-by: Paulo Gomes <pjbgf@linux.com>

Signed-off-by: Paulo Gomes <pjbgf@linux.com>
2022-08-12 18:02:52 +01:00
AdamKorcz ac2f797f40
golang: add fuzzers (#8228)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-08-12 16:29:23 +01:00