Commit Graph

11 Commits

Author SHA1 Message Date
devtty1er d561c49ae5
Update Dockerfiles (#4070)
* Use LABEL in place of MAINTAINER

* Remove LABEL maintainer from Dockerfiles
2020-07-06 13:18:23 -07:00
Paweł Marczewski 0584ab45df
qubes-os: add fuzzers, update contact emails (#3554)
Qrexec [1] is a secure communication channel between virtual
machines in Qubes OS. We have fuzzers for some parts of its message
parsing code [2].

[1] https://www.qubes-os.org/doc/qrexec/
[2] https://github.com/QubesOS/qubes-core-qrexec/tree/master/fuzz
2020-03-30 10:17:19 -07:00
Max Moroz 51dd9a02cb
Enable dataflow build config for 22 more projects (#1632). (#3519)
* Enable dataflow build config for 22 more projects (#1632).

* suppress warnings in libteken

* move suppressing DFSAN_OPTIONS to the builder image
2020-03-18 13:12:58 -07:00
Max Moroz 71f4914c45
[presubmit] Enforce language attribute in project.yaml to be always set. (#3477)
* [presubmit] Enforce language attribute in projectt.yaml to be always set.

* Update documentation, better presubmit check, new project template.

* add docstring to templates.py

* Add example values in the project.yaml template and remove python value for now

* Add "project: c++" to 256 projects

* format

* Add labels and selective_unpack sections to the presubmit check

* fix incorrect auto_ccs format in three projects

* fix nss emails after rebase
2020-03-10 11:08:01 -07:00
jonathanmetzman 0a1c3c67c9
Enable i386 fuzzing on another 11 projects (#2752) 2019-08-23 11:59:56 -04:00
Marta Marczykowska-Górecka 3c93f4ffc0 Added integration for qubes-core-qubesdb (#2540)
* Added integration for qubes-core-qubesdb

Integration for qubesdb daemon used for communication between VMs.

* Build qubes fuzzers only for the appropriate sanitizer
2019-06-26 17:29:47 -07:00
Marek Marczykowski-Górecki 9d49131473 qubes-os: disable ubsan (#1564)
input-proxy (the only fuzzer target for now) have only 1 UBSan call right
now, which doesn't make much sense to fuzz. Disable it, until
input-proxy gets more complex for that.
2018-06-25 08:35:22 -07:00
Paras Chetal d9f615a97c Remove buggy libqubes-rpc-filecopy for now (#1376) 2018-04-29 07:17:05 -07:00
Marek Marczykowski-Górecki e01619962e qubes-os: add app-linux-input-proxy fuzzer (#1340) 2018-04-23 12:25:11 -07:00
Paras Chetal 2d577f5251 [qubes-os] Initial integration of libqubes-rpc-filecopy fuzz target (#679)
* Add Dockerfile for qubes-linux-utils build

* Add the outline for fuzzer build

* Integrate libqubes-rpc-filecopy

* Remove BACKEND_VMM env var
2017-06-16 08:43:59 -07:00
Jean-Philippe Ouellet b794dfe099 [qubes-os] New project: Qubes OS (#637)
Qubes OS wishes to improve its automated testing pipeline in various
ways, one of which being the introduction of continuous fuzzing.

The initial work will be performed by Paras Chetal as part of his
Google Summer of Code project [1], for which I am the mentor.

There are many pieces of code in Qubes OS which could benefit from
fuzzing, but initial focus is currently on the inter-vm file-copy
unpacker, and the GUI protocol [2][3].

According to [4], the way to request a new project be added to oss-fuzz
is for a member of the project to submit a PR here. I'm not an official
member of the Qubes OS team [5], but I am an active contributor.
Hopefully that's good enough...

[1]: https://summerofcode.withgoogle.com/projects/#5530206738579456
[2]: https://www.qubes-os.org/doc/gui/
[3]: https://github.com/QubesOS/qubes-gui-daemon/blob/master/gui-daemon/xside.c
[4]: https://github.com/google/oss-fuzz#accepting-new-projects
[5]: https://www.qubes-os.org/team/
2017-05-31 09:14:10 -07:00