Commit Graph

1874 Commits

Author SHA1 Message Date
Catena cyber afd8743634 Fixes gnupg patch with conflict (#2906)
* Fixes gnupg patch with conflict

* Adds npth library to gnupg fuzz target build

* Adds npth lib for regular gnupg build
2019-09-29 06:27:24 -07:00
Felix Weinrank 3d6006c12a [usrsctp] Fix e-mail typo (#2905) 2019-09-29 06:26:58 -07:00
Nikita Popov 6c14075986 [php] Enable i386 architecture (#2899) 2019-09-29 06:25:34 -07:00
tsdgeos 0c1d8d9749 karchive: use newer bzip2 (#2898) 2019-09-27 12:39:32 -07:00
Catena cyber 0c09c35920 use git for all gnupg dependencies (#2894) 2019-09-27 08:06:01 -07:00
Felix Weinrank ad07d59f4b [usrsctp] improve fuzzing mechanisms (#2893)
* add usrsctp project

* Extend usrsctp project

* Fix github repo branch

* improve build.sh script

* usrsctp: improve fuzzing utilities
2019-09-26 22:00:17 -07:00
Google AutoFuzz Team 2f517a2833 [c-blosc] Add c-blosc (#2891)
* add c-blosc

* disabled UBSAN and edited the files
2019-09-26 10:21:20 -07:00
tsdgeos 58df29fd3f Use 5.15 branch of Qt for now (#2888)
A direct clone now gives you dev which is future Qt 6, none of the
code using Qt expects Qt6 yet

Using 5.15 now (instead 5.12 before) means we have to disable
sanitize=vptr in parts of qt in kimageformats since those
parts now compile with no-rtti

While at it make the compilation script a bit better:
 * Don't need to disable compressing rcc files, only needed to pass
the CFLAGS to the QMAKE_CFLAGS
 * Also fix the "make qmake faster" sed command
2019-09-26 09:17:32 -07:00
Sebastian Rasmussen 198345dc17 [ghostscript] Limit ghostscript memory usage to 1Gbyte. (#2890) 2019-09-26 08:35:13 -07:00
Tyson Smith c511c7b118 [libtheora] Build OGG with --disable-crc (#2885) 2019-09-24 17:55:54 -07:00
Nikita Popov 09aa9ac556 [php] Enable fuzzer for parser (#2883) 2019-09-24 07:08:09 -07:00
asraa 2b13d85d0c use updated version of cmake (#2882)
Signed-off-by: Asra Ali <asraa@google.com>
2019-09-23 13:19:02 -07:00
jonathanmetzman d488ec15e7
[proxygen] Set rpath properly (#2880) 2019-09-23 10:43:47 -07:00
Guido Vranken 8f82af5a61 [cryptofuzz] Add @slontis (#2879) 2019-09-23 08:40:04 -07:00
Hasnain Lakhani 54c35a54ef [proxygen] Re-enable AFL; change build script to put libunwind in the generated directory and make the fuzzer find it (#2872)
I'm re-enabling AFL since the issue with gmock's main being present was fixed in e8616a31f4

This libunwind changes solve the issues we were seeing with the fuzzers not running in the clusterfuzz bot environment. What this PR does, roughly:

* Copy the .so from the build image into `/out/lib`
* Patch the binaries so they have an rpath which specifies looking in `/out/lib` for libraries in addition to the normal search path

This will work *assuming* `/out/lib` is copied over in the bot environment and is available. I'm relying on code reviewers to let me know if this is true or not. If not, it should be an easy path update.

Test plan:

Verifying the AFL build was easy:

    python infra/helper.py build_fuzzers --sanitizer address --engine afl proxygen
    python infra/helper.py check_build --engine afl proxygen
    python infra/helper.py run_fuzzer --engine afl proxygen ProxygenHTTP1xFuzzer

I verified the libunwind changes by using the shell command (thanks for the tip, didn't know that was there!).

I first built the binary using this build script.

I then used `python infra/helper.py shell --sanitizer address proxygen`

In the shell, I:

* Ran `/out/ProxygenHTTP1xFuzzer` and verified it worked
* Ran `ldd` on it and showed it pointed to `/out/lib` for `libunwind.so.8`
* Uninstalled libunwind
* Verified it still worked
* Used `patchelf --print-rpath ProxygenHTTP1xFuzzer` to verify that the rpath was set as I expected (inside `/out/lib`)
* Removed the patch using `patchelf --remove-rpath to_patch`
* Verified that the fuzzer no longer runs (crashes on startup, complaining about missing `libunwind.so.8`)
* I verified that the binary still finds the system one if rpath isn't set, by reinstalling it, using `patchelf --print-rpath` again, verifying that it prints the path to the system `libunwind` when I run `ldd`, and that the fuzzer runs fine. This implies it can find other system libraries fine too (and I saw that in the `ldd` output)

I don't think I can do any further testing, so we will just have to hope that this works in the bot environment.
2019-09-21 20:08:51 -07:00
Michael Niedermayer ea9ee34d52 [ffmpeg] Add my main email address to the CC (#2873)
It seems mails from ossfuzz are not reliably received on *gmx
(that is michaelni@gmx.at in my case)
They sometimes appear days later or not at all.

Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
2019-09-21 20:08:33 -07:00
Nikita Popov 5d8994506e [php] Enable unserialize fuzzer (#2871)
* [php] Enable leak detection

* [php] Enable unserialize fuzzer

* [php] Pass -n$(proc) to make
2019-09-20 15:06:06 -07:00
John Andersen ef93ae10da [ibmswtpm2] Integrate ibmswtpm2 (#2852)
* [ibmswtpm2] Integrate ibmswtpm2

Signed-off-by: John Andersen <john.s.andersen@intel.com>
2019-09-20 13:44:49 -07:00
Tyson Smith 33124442c6 [libtheora] Add vendor CC (#2870) 2019-09-20 12:48:17 -07:00
Randy 30632cae6b [libzip] Fix build (#2866) 2019-09-20 12:24:53 -07:00
Andreas Schneider 48c079da32 [libssh] Add Jakub and enable msan (#2863)
* [libssh] Enable msan

Signed-off-by: Andreas Schneider <asn@cryptomilk.org>

* [libssh] Add Jakub Jelen to the project

Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
2019-09-20 05:54:31 -07:00
Guido Vranken 476895179a [xvid] Add e-mail (#2864) 2019-09-20 05:53:06 -07:00
jonathanmetzman c53d627636
Disable AFL (#2862)
* Update project.yaml
2019-09-19 22:26:36 -07:00
Tyson Smith 74a35f9a1a [libtheora] Add vendor CC (#2861) 2019-09-19 21:15:20 -07:00
Alex Gaynor 99e8203840 [graphicsmagick] build for i386 (#2859) 2019-09-19 20:09:49 -07:00
Guido Vranken 12bfec359e [libtheora] Integrate project (#2827) 2019-09-19 18:37:03 -07:00
Guido Vranken c8beb492ec [xvid] Integrate project (#2844) 2019-09-19 17:02:44 -07:00
jonathanmetzman c3c5602ab4
disable GraphicsFuzz project (#2819) 2019-09-19 17:01:16 -07:00
Hasnain Lakhani da1cd591c2 Remove fuzzing_engines specification for proxygen. (#2860)
This addresses review comments from #2856
2019-09-19 16:58:37 -07:00
Hasnain Lakhani 4b5a47fe3b Add fuzzing support for proxygen (#2856)
This adds support for compiling and running the fuzzers present in the proxygen repository.
Right now there's only one fuzzer committed there, but this build script is generic
and will pull all of them in as we add more (if oss-fuzz integration proves fruitful).

Test plan is below - following https://google.github.io/oss-fuzz/getting-started/new-project-guide/#testing-locally

I verified the base image builds:

    python infra/helper.py build_image proxygen

I built and verified the ASAN fuzzer works:

    python infra/helper.py build_fuzzers --sanitizer address proxygen
    python infra/helper.py check_build proxygen
    python infra/helper.py run_fuzzer proxygen ProxygenHTTP1xFuzzer

Similar thing for UBSAN:

    python infra/helper.py build_fuzzers --sanitizer undefined proxygen
    python infra/helper.py check_build proxygen
    python infra/helper.py run_fuzzer proxygen ProxygenHTTP1xFuzzer

Note the last one seemed to run ASAN build by default so I pulled out the command it runs and ran it manually:

    docker run --rm -i --privileged -e FUZZING_ENGINE=libfuzzer -e SANITIZER=undefined -e ARCHITECTURE=x86_64 -v /home/mhl/oss-fuzz/build/out/proxygen:/out -t gcr.io/oss-fuzz-base/base-runner test_all

I tested the coverage build:

    python infra/helper.py build_fuzzers --sanitizer coverage proxygen
    python infra/helper.py coverage proxygen ProxygenHTTP1xFuzzer

Note that this "runs" but threw some warnings which I will file a separate issue for.
It does generate the files though.

NOTE: I didn't run the MSAN build as I would have to figure out instrumenting all dependencies.
We can investigate that in a follow up.

Similarly, I haven't yet tried the dataflow build.

Note that I haven't tried testing this with the AFL build yet either. There were no instructions on the page (https://google.github.io/oss-fuzz/getting-started/new-project-guide/#testing-locally) on how to do so -- if someone can mention them here I am happy to test that too before committing.
2019-09-19 16:32:39 -07:00
Kevin Lubick bec7b59ada use different account (#2854) 2019-09-19 10:52:21 -07:00
Catena cyber 85a46fce69 Adds people to libhtp project (#2853) 2019-09-19 06:30:23 -07:00
Tyson Smith acf183321c [vorbis] Enable UBSan (#2851) 2019-09-18 18:23:49 -07:00
Nathan Moinvaziri ea7c5506ae Added 32-bit fuzzing for minizip project. (#2850) 2019-09-18 18:09:03 -07:00
Bhargava Shastry 66faf75fb3 Solidity: Use release build (#2848) 2019-09-18 12:04:32 -07:00
Even Rouault 49c3d46ddb [GDAL] Add new GDAL developer to the list of authorized viewers (#2847) 2019-09-18 07:14:43 -07:00
Nikita Popov 88e3c3e420 Switch email address to use gmail (#2842)
Switch auto_ccs entry to my gmail address, as authentication in the bug tracker does not work otherwise.
2019-09-18 07:11:08 -07:00
Bhargava Shastry 7aa1d7b9a3 solidity: Use cmake toolchain file (#2841) 2019-09-17 14:15:03 -07:00
Stanislav Malyshev 44e7362ff5 fuzzer has been merged into upstream repo, no need to check out extra repo anymore (#2839) 2019-09-17 07:52:40 -07:00
Stanislav Malyshev 8b911bf10c Add Nikita Popov to CC addresses for PHP issues (#2840) 2019-09-17 06:54:28 -07:00
Josh Bleecher Snyder ba3947ee40 [golang] add my email to project.yaml (#2838)
Updates #2825
2019-09-16 14:31:13 -07:00
Thomas Orgis 356f2b9476 mpg123: limit fuzzer runtime (#2832)
* mpg123: limit runtime of decode_fuzzer

To avoid spurious timeout reports, the test shall end after 10000 MPEG frames
or 1 MiB of data, which should both be reasonable numbers. The timeout
report motivating this had 500K with 140k bad frames. The limit of
10000 frames corresponds to a normal radio song as MP3 stream.

* mpg123: limit runtime of read_fuzzer

This applies the same logic as the decode fuzzer: stop decoding after
10000 MPEG frames or 1 MiB of input data. We could debate a bigger
limit on the data size, but we do want compact testcases, right?
2019-09-16 07:06:25 -07:00
Bhargava Shastry 9e6a3ca660 solidity: Add and link solc against z3 (#2835) 2019-09-16 07:04:26 -07:00
Guido Vranken 67dde67647 [cryptofuzz] Compile OpenSSL 1.0.2/noasm with -DPURIFY (#2833)
This prevents MSAN false positives in its bignum code.
2019-09-15 15:01:43 -07:00
Sebastian Rasmussen 2f79af92cc [jbig2dec]: Remove debug commands included by accident. (#2831) 2019-09-13 13:19:09 -07:00
Sebastian Rasmussen b70dfdbb22 [jbig2dec] Add jbig2dec fuzzer (#2815) (#2816) 2019-09-13 10:06:12 -07:00
Catena cyber 9917e148ea Adds botan to ecc differential fuzzer (#2830) 2019-09-13 09:52:40 -07:00
Janne Grunau f986fafb8e dav1d: add i386 as fuzzing architecture (#2824)
Meson requires a cross file for compiling i386 on x86_64. This
unfortunately needs to be generated on the fly to honor oss-fuzz'
compiler and compiler flags.
Supercedes #2823.
2019-09-12 12:29:02 -07:00
Joseph Bisch a30a76c93f Fix irssi build (#2785) 2019-09-11 18:33:27 -07:00
Christoph Diehl 7b4370c2fb [Firefox] Remove redundant environment variables (#2822) 2019-09-10 16:46:44 -07:00