Commit Graph

7779 Commits

Author SHA1 Message Date
Navidem b8ef6a216d
Bump Introspector (#8436) 2022-09-08 01:16:05 +00:00
DavidKorczynski c31105f7b7
ghostscript: extend dictionary to more fuzzers (#8435) 2022-09-07 21:00:04 +01:00
DavidKorczynski 0010d64e08
lcms: extend universal transform fuzzer (#8434)
Create intents and flags based on fuzzer-derived data and ensure size of
input/output buffers matches the upper bound of the transformation
functions in lcms.
2022-09-07 20:20:57 +01:00
aschaich 157ce1a9a3
[cglib] Initial Integration (#8429) 2022-09-07 12:53:13 -04:00
AdamKorcz a22f581a19
golang: Run fuzzers against latest master (#8433)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-07 16:29:28 +01:00
aschaich 7b0f4f7d1d
[log4j] Add fuzz target for slf4j (#8426) 2022-09-07 12:46:48 +01:00
AdamKorcz f1c59a4935
golang: add glob fuzzer (#8427)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-07 12:46:07 +01:00
AdamKorcz 05ddc83fdf
golang: fix false positive (#8425)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-07 12:03:51 +01:00
DavidKorczynski a3eef65ec8
bluez: minor fix (#8424)
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51072
2022-09-07 11:24:42 +01:00
Dirk Lemstra e96d506bbd
Use official GitHub mirror for freetype instead. (#8419) 2022-09-07 13:29:11 +10:00
Arthur Chan 2d5d3eba7d
redis-py: intial integration (#7980)
Create fuzzers
2022-09-06 17:12:41 -04:00
Alper Rifat Ulucinar 5462c9977d
Add alper.oss.fuzz@gmail.com to Crossplane auto_ccs (#8421)
Signed-off-by: Alper Rifat Ulucinar <ulucinar@users.noreply.github.com>

Signed-off-by: Alper Rifat Ulucinar <ulucinar@users.noreply.github.com>
2022-09-06 21:33:41 +01:00
aschaich 34d40481f2
[groovy-test] Initial Integration (#8408)
[groovy-test] Initial integration
2022-09-06 10:18:52 -04:00
DavidKorczynski 45c964b3f7
bluez: extend fuzzing (#8418) 2022-09-06 11:04:25 +01:00
Oliver Chang 91acda2611
Centipede fixes. (#8417)
- Replace newlines with spaces in centipede/clang-flags.txt. Build
  systems don't like them.

- Fix a missing newline in output logs.
2022-09-06 07:41:13 +00:00
CheeseHunter117 fb187e47d2
Changes to apache-commons-configuration and new fuzz targets for httpmime (#8395) 2022-09-06 16:39:59 +10:00
aschaich 6992d5873a
[groovy] Initial Integration (#8407) 2022-09-06 16:38:50 +10:00
aschaich 2623306a5b
[aspectj] Initial Integration (#8409) 2022-09-06 16:37:44 +10:00
DavidKorczynski af2d9c810a
kiwisolver: initial integration (#8237)
* kiwisolver: initial integration

* Fix contacts
2022-09-06 16:36:45 +10:00
Dongge Liu 22488896f6
Centipede integration (#8046)
* Add Centipede as a fuzzer

* Specify dictionary param of Centipede

* Update docs

* Mark Centipede as experimental

* More accurate description

* Remove garbage

* Simplify code

* Move mkdir to dockerfile

* Add the weak.c trick

* Install deps with Centipede's script & uninstall new deps

* Fix doc

* Reuse libweak_sancov_stubs.so

* Reorganise flags

* format

* Consistent file type

* Reuse the weak references defined in Centipede

* Replace the shared library of weak symbols with a static one

* Correct the place to call mkdir

* Allow 2G of SHM for Centipede

* Create dirs in run_fuzzer

* Keep Centipede up-to-date

* Avoid duplicating Centipede's binary

* The params of Centipede and their explanations

* The engine info of centipede

* Save the target binary (with san) in a subdir of the project

* Set the target (with san) dir in check_build

* Create the target (with san) first to avoid side-effects

* Fic clone

* Fix format

* Add periods

* Fix comments

* Fix dirs

* Fix parameters

* Adding Centipede as a fuzzing engine for Scarecrow

* Add CI support

* Represent sanitizer with a variable

* Remove the unnecessary definition of FUZZER_OUT

* Reorganise binary directories

* format

* A minor note

* Present issues with dirs that alread exist

* Use os.path.join to join path

* Make a function to get the out/ in check build

* Reusing existing flags in .bazel

* Avoid hardcoding sanitizer, set rss_limit_mb=4096, leave address_space_limit_mb disabled

* Better ways to add bazel build options

* A better way to add bazel flags

* Remove redundant --bazelrc

* Better Cohesion

* Avoid code duplication

* Simplify code

* Exit on crash
2022-09-06 02:34:58 +00:00
DavidKorczynski aba5810e7f
lcms: add dict and corpus to universal fuzzer (#8415) 2022-09-05 16:39:30 +01:00
DavidKorczynski 7a6671e016
pyyaml: extend to fuzz emitter (#8414) 2022-09-05 14:37:16 +01:00
Szabolcs Horvát 245789e8d5
igraph: switch to master branch and update libxml2 dependency (#8413)
* igraph: switch to master branch and update libxml2 dependency

* igraph: do not use shallow clone
2022-09-05 14:35:43 +01:00
AdamKorcz 42f0fbb7e3
golang: add corpora (#8412)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-05 12:40:17 +01:00
AdamKorcz c98737278b
golang: clone in Dockerfile instead of build.sh (#8411)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-05 12:00:06 +01:00
AdamKorcz 67d397c788
golang: fix false positive (#8410)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-05 11:47:40 +01:00
Guido Vranken f72a0a659a
[libressl] Add libgmp, Botan (#8403) 2022-09-05 16:01:56 +10:00
Guido Vranken 37cf22b6c7
[cryptofuzz] Add mini-gmp (#8404) 2022-09-05 16:01:20 +10:00
AdamKorcz b5c6cd48c0
golang: add fuzzer (#8402)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-03 11:20:15 +01:00
AdamKorcz 6407cd0ea0
golang: add fuzzer (#8401)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-02 22:15:38 +01:00
Henry Lin 91d725667b
Tomcat: Improve fuzz targets 2 (#8399)
Tomcat: Improve fuzz targets
2022-09-02 13:22:51 -07:00
AdamKorcz ec5f5b0d0f
golang: minor updates (#8400)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-02 20:29:05 +01:00
Paulo Gomes 4714950e17
fluxcd: Revert to base-builder-go to fix build (#8397)
fluxcd: Revert to base-builder-go
The project recently started moving into Go fuzz native, and using
the codeintelligencetesting variant is causing the error below:
ERROR: no interesting inputs were found

This PR reverts https://github.com/google/oss-fuzz/pull/7683 for fluxcd
which fixes the issue.

Signed-off-by: Paulo Gomes <pjbgf@linux.com>

Signed-off-by: Paulo Gomes <pjbgf@linux.com>
2022-09-02 18:47:02 +01:00
Daiki AMINAKA 50f1686323
[msquic] initial integration (#8381) 2022-09-02 13:52:10 +00:00
Henry Lin 64bc43dfb4
Retrofit: Initial integration (#8392) 2022-09-02 09:49:43 -04:00
Damien Miller 017cf397ca
[openssh] Turn off toolchain hardening flags in configure (#8394)
turn off toolchain hardening flags in configure

these seem to clash with the oss-fuzz environment leading to weird
crashes like monorail #50678

Co-authored-by: Damien Miller <djm@google.com>
2022-09-02 11:12:01 +01:00
Henry Lin 7b26bfcaa9
Tomcat: Improve fuzz targets (#8393)
Tomcat: Enhance fuzz targets
2022-09-01 16:44:30 -07:00
AdamKorcz 6752ebd9af
golang: add fuzzer (#8391)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-01 22:56:03 +01:00
AdamKorcz 281dc4276d
golang: modify fuzzer (#8390)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-09-01 22:05:17 +01:00
Naveen 123f3fa892
New : OSSF Scorecard webapp (#8388)
* New : OSSF Scorecard webapp

- Fuzzing scorecard webapp

Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com>

* Fixed the path in the Dockerfile

Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com>

* New : OSSF Scorecard webapp

- Fuzzing scorecard webapp

Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com>

* Fixed the path in the Dockerfile

Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com>

* Fixed the year in the header.

Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com>

Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com>
2022-09-01 17:57:24 +00:00
vargen defe7e091d
[dom4j] initial integration (#8385) 2022-09-01 12:30:11 -04:00
aschaich 2367c55b20
[hibernate-orm] Initial Integration (#8382) 2022-09-01 12:29:46 -04:00
Patrice.S d3456fc09f
spring-boot-configuration-processor: Initial integration (#8387)
Add JsonMarshallerFuzzer
2022-09-01 12:29:12 -04:00
vargen c696d87010
adding project maintainer (#8386) 2022-09-01 14:52:47 +01:00
DavidKorczynski e93fb6ddbe
ffmpeg, libarchive: bump automate to fix builds (#8383)
Similar to: https://github.com/google/oss-fuzz/pull/8365

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-09-01 12:10:53 +01:00
Patrice.S 21ddaca38a
spring-aop: Initial integration (#8379)
Add AspectJExpressionPointcutFuzzer
2022-08-31 09:52:42 -07:00
aschaich 7f8684c89b
[spring-framework] Intial Integration for jdbc (#8359)
* [spring-framework] Apply patches in the Dockerfile

Applying patches is part of the sourcecode retrieval, which
we do in the Dockerfile, so apply the patches as part of the
Docker image creation, too.

While here, compile and install _all_ java files rather then
only those ending on "Fuzzer.java", and use a "real" git
checkout, which is required for more "advanced" git features,
most notoriously "log".

* [spring-framework] Use cp over mv in build.sh

Copying the files rather then moving them brings us one step
closer to being re-runable w/o restarting the docker container

* [spring-framework] shadow all our jar files

Also refactor the build.sh and Dockerfile to allow us adding
shadowJars more straightforwardly

* [spring-framework] Also build orm and jdbc, remove commented code

* [spring-framework] Copy all .class files to $OUT/

* [spring-framework] Use install over cp

* [spring-framework] Initial Integration for jdbc

* [spring-framework-jdbc] add copyright headers
2022-08-31 09:47:57 -07:00
aschaich e51830c2d4
[osgi] Initial Integration (#8378)
* [osgi] Initial Integration

* [osgi] Add trailing slashes to Docker COPY instructions
2022-08-31 11:55:21 -04:00
jonathanmetzman d7b7141068
Fix ARM manifest building (#8349)
Related #8164
2022-08-31 15:18:21 +00:00
Dongge Liu 7286a718e1
Add `architecture` to `run_fuzzer_parser`'s namespace (#8377)
Add architecture to run_fuzzer's namespace
2022-08-31 08:09:20 -04:00