Commit Graph

7239 Commits

Author SHA1 Message Date
DavidKorczynski dc435d0be5
infra: set fuzz-introspector to work with O0 (#7788)
-O0 will skip fuzz-introspector when -flegacy-pass-manager is used, but
not when the new pass manager is used.
2022-06-01 16:52:21 +01:00
Arthur Chan 4a879e62d4
airflow-py: initial integration (#7731)
* airflow-py: initial integration
initial fuzzer setup

* Fix fuzzer
2022-06-01 09:42:09 +01:00
DavidKorczynski 9f6368db95
google-py-crc32c: initial integration (#7742) 2022-06-01 09:41:07 +01:00
Oliver Chang 2af5e25a48
Print sanitizer stacktrace for execSan bugs. (#7782)
Send SIGABRT to the root process being fuzzed to generate a stacktrace.

Also distinguish between syscall enter and exit.
2022-06-01 08:57:27 +10:00
Evgeny Vereshchagin a4befa22a0
[base-runner] no longer fail silently in test_one.py (#7776)
It should make it easier to figure out why exactly
`./infra/helper.py check_build project fuzz-target` fails
by turning
```
INFO: performing bad build checks for /tmp/not-out/tmpa4lph9dr/fuzz-bus-message
ERROR:root:Check build failed.
```
into something like
```
INFO: performing bad build checks for /tmp/not-out/tmpa4lph9dr/fuzz-bus-message
BAD BUILD: /tmp/not-out/tmpa4lph9dr/fuzz-bus-message seems to have either startup crash or exit:
/tmp/not-out/tmpa4lph9dr/fuzz-bus-message -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null
/tmp/not-out/tmpa4lph9dr/fuzz-bus-message: error while loading shared libraries: libcap.so.2: cannot open shared object file: No such file or directory

ERROR:root:Check build failed.
```
2022-05-31 17:07:52 -04:00
DavidKorczynski 1beea533a6
infra: bump fuzz-introspector (#7774)
* infra: bump fuzz-introspector

Bump includes the upgrades:
- calltree overview image improvements:
https://github.com/ossf/fuzz-introspector/pull/284
- UI improvements in calltree page:
https://github.com/ossf/fuzz-introspector/pull/277
- Branch-blocker logic:
https://github.com/ossf/fuzz-introspector/pull/269
- Bug fix: https://github.com/ossf/fuzz-introspector/pull/261

* bump
2022-05-31 11:56:25 -05:00
DavidKorczynski a72b785e95
pyxdg: refine build and extend fuzzers (#7786)
Adds 3 new fuzzers and build pyxdg by way of pip3 install rather than
python3 setup.py
2022-05-31 17:33:25 +01:00
DavidKorczynski f0f58d51ee
aiohttp: add web_http request fuzzer (#7785)
* aiohttp: add web_http request fuzzer

* nit
2022-05-31 13:01:29 +01:00
Evgeny Vereshchagin aaac6a9686
[systemd] turn on i386 (#7777)
https://github.com/systemd/systemd/issues/23532
2022-05-30 13:47:21 +10:00
Oliver Chang a5d3ab8cb0
execSan: Follow forks. (#7771)
* execSan: Follow forks.

- ptrace all child processes.
- Look for execve() calls with /tmp/tripwire as the first argument.
  There's no need for it to actually run.
- Convert to C++.

* remove ununused tripwire code

* comments
2022-05-30 10:31:12 +10:00
Kleis Auke Wolthuizen cbaaca1806
libvips: enable WebP/JPEG support in libtiff (#7775) 2022-05-28 22:20:43 +01:00
psy a0701f06d0
spring-boot: initial integration (#7743)
* Initial integration
2022-05-27 10:57:00 +10:00
DavidKorczynski 7376d3f077
xlrd: initial integration (#7733) 2022-05-27 10:55:59 +10:00
happy-qop 45176751e8
initial integration for fuzzing zip4j (#7748)
* initial integration for fuzzing zip4j

* update developer's email
2022-05-27 10:55:27 +10:00
happy-qop 285405387f
Initial integration of Junrar (#7750)
initial integration of junrar
2022-05-27 10:54:58 +10:00
AdamKorcz 51e8fdeb42
[kubeedge] Initial integration (#7755)
KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge. It is a CNCF project that is being used by several large and publicly traded companies in China includig Huawei and Raisecom.

A non-exhaustive list of adopters can be found here: https://github.com/kubeedge/kubeedge/blob/master/ADOPTERS.md
CNCF profile: https://www.cncf.io/projects/kubeedge/
2022-05-27 10:26:26 +10:00
AdamKorcz c7e7c454ca
[containerd] Fix broken build (#7767) 2022-05-26 12:11:23 +01:00
DavidKorczynski c2c093ddac
aiohttp: ensure compiled python runs (#7768) 2022-05-26 12:09:22 +01:00
Emmanuel Bourg 35d9b115e7
jsign: load the keystore from the classpath (#7762) 2022-05-26 11:22:19 +01:00
Dongge Liu d75b3c28aa
pin the version of protobuf (#7766)
pin the version of `protobuf` to fix infra test errors.
2022-05-26 16:12:38 +10:00
Dongge Liu e249bcc669
An attempt to detect shell injection with `ptrace` (#7757)
* An attempt to detect shell injection with ptrace

* Relocate sanitizer files

* Add headers and file descriptions

* Better cleanup

* Name and analogy

* TODOs

* safer cleanup

* More descriptive name

* More descriptive README.md

* More descriptive file names

* One more TODOs
2022-05-26 15:37:04 +10:00
DavidKorczynski a615678670
infra: use only valid targets for python coverage (#7746)
* infra: use only valid targets for python coverage

Some python coverage reports gets clobbered because non-fuzz targets are
included in FUZZ_TARGETS. The consequence of this is that some reports
will have erroneous data. This commit ensures only valid targets are
used when running coverage, which consequently fixes the reports.

* Move executable logic into python fuzzer builder instead
2022-05-26 14:52:30 +10:00
Tim Wojtulewicz a6dbb91560
zeek: Add libfl-dev dependency, remove mobile-ipv6 flag (#7745)
zeek: Add libfl-dev dependency, remove mobile-ipv6 flag, disable spicy plugin
2022-05-25 22:41:36 +01:00
DavidKorczynski 379868d7a9
aiohttp: enable analysis of Pure python code (#7761)
This is in addition to the existing fuzzers that analyse compiled code.
2022-05-25 14:08:22 +01:00
DavidKorczynski 83b5bfcae8
mruby: fix build (#7759)
* mruby: fix build

Ref: https://github.com/google/oss-fuzz/issues/7736

* nit
2022-05-25 11:42:00 +01:00
DavidKorczynski 7baa40678e
pycrypto: initial integration (#7747)
* pycrypto: initial integration

* Add roundtrip fuzzer
2022-05-25 16:33:03 +10:00
Arthur Chan 4bad1173e0
pyca-cryptography: initial integration (#7729)
* pyca-cryptography: initial integration
initial fuzzer setup

* pyca-cryptography: fix ci

* Fix fuzzer

* Fix project.yaml

* Fix project yaml
2022-05-25 16:32:42 +10:00
jonathanmetzman a465bde1f6
Fix trial_build.py (#7752)
1. Make sure we build base images again.
2. Make sure we handle multiple build types properly.
3. Return nonzero on failure.
4. Make a better attempt at introspector builds.
Related: https://github.com/google/oss-fuzz/issues/7726
2022-05-24 17:58:56 -04:00
Navidem c5be869e4e
Add commands to collect branch coverage (#7709)
* Add commands to collect branch coverage

* Add -g flag

* Switch branch coverage option placement

* Set guarding env variable

Co-authored-by: Oliver Chang <oliverchang@users.noreply.github.com>
2022-05-24 16:10:38 +10:00
DavidKorczynski 94b400c520
dask: initial integration (#7688)
* dask: initial integration

* dask: add fuse fuzzer

* update project yaml to match
https://github.com/google/oss-fuzz/pull/7698
2022-05-24 12:06:25 +10:00
psy dd9f2c2778
guice: Initial integration (#7740)
Initial integration
2022-05-23 11:36:41 -05:00
psy 915b5fff5d
jersey: Initial integration (#7739)
Initial integration
2022-05-23 11:36:15 -05:00
DavidKorczynski 6328e74b1e
cel-go: fix libprotobuf-mutator (#7741)
Ref: https://github.com/google/oss-fuzz/issues/7736
2022-05-23 12:32:22 +01:00
Martijn van Beurden a563e10d6c
Fix addition of define (#7738)
In PR #7687 I tried to add a define by adding it to CFLAGS, but that
didn't work without rerunning configure. By adding the define to
config.h, rerunning configure is not necessary
2022-05-23 12:01:28 +01:00
DavidKorczynski 84d255ab00
libprotobuf-mutator projects: fix builds (#7737)
* libprotobuf-mutator projects: fix builds

Ref: https://github.com/google/oss-fuzz/issues/7736

* boringssl: fix libprotobuf-mutator fuzzer

* giflib: fix libprotobuf-mutator fuzzer

* jsoncpp: fix libprotobuf-mutator fuzzer

* xerces-c: fix libprotobuf-mutator fuzzer

* libpng-proto: fix libprotobuf-mutator fuzzer

* giflib: add license header to satisfy CI
2022-05-21 13:34:16 +01:00
DavidKorczynski b76cac640c
dovecot: fix build (#7735)
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47556
2022-05-21 11:56:21 +01:00
Arthur Chan 4a3e0d2079
flask: add vendor ccs (#7728)
flask: add vendor_ccs email

Adding myself as receiver of notifications
2022-05-20 10:42:30 +01:00
psy b00007425f
guava: Initial integration (#7720)
* Initial integration

* Add primary_contact, remove unused imports
2022-05-20 15:36:59 +10:00
Oliver Chang 4407c1246e
Fix trial_build for coverage and introspector builds. (#7727)
Fixes #7726.
2022-05-20 05:04:15 +00:00
Oliver Chang 54be28b8fb fix line endings 2022-05-20 14:03:37 +10:00
DavidKorczynski 72e3e07411
libgit2: fix build (#7721)
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46031
2022-05-19 22:01:54 +01:00
DavidKorczynski 8d0f7ef8d4
infra: reduce length of line to fix CI (#7722)
* infra: reduce length of line to fix CI

* update indentation
2022-05-19 13:31:55 -05:00
DavidKorczynski eb7c59645b
bad_example: make fuzz-introspector work and fix build (#7706)
* bad_example: make fuzz-introspector work and fix build

Makes fuzz-introspector work with the bad_example project. This was
brought up as an issue on the fuzz-introspector repo.

Ref: https://github.com/ossf/fuzz-introspector/issues/257

* Add license to satisfy OSS-Fuzz

* add license to build.sh
2022-05-19 10:12:54 +01:00
Ben Fortuna 09afdf8c16
ical4j project integration (#7556)
Create project.yaml
2022-05-17 13:16:04 -05:00
DavidKorczynski 7794106856
infra: fix python coverage (#7711)
The current implementation will append rather than overwrite
coverage_wrapper.py which holds the coverage stub. The effect of the
appending is that the coverage_wrapper.py will include X amount of
coverage stubs when a project has X amount of fuzzers. We just need a
single coverage stub at the top of each fuzzer. This ensure we only add
a single coverage stub.
2022-05-17 11:51:54 +10:00
jonathanmetzman f582894cec
Add jadamcrain as primary contact to opendnp3
Fixes: https://github.com/google/oss-fuzz/issues/7714
2022-05-16 12:46:47 -04:00
chris-liddell fd772dcbb5
Fix 47322: Build failure - use latest freetype release (#7713) 2022-05-16 13:02:23 +01:00
DavidKorczynski 30ff7961ad
flask: fix flask_cors coverage (#7710)
We must ensure proper thread exit in coverage mode. We do this by
counting how many seeds are left.
2022-05-14 12:47:46 +01:00
Maksim Kita d994defa3b
ClickHouse update contacts (#7702) 2022-05-13 11:13:29 -04:00
DavidKorczynski 634691947c
wazuh: fix build (#7705)
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47414
2022-05-13 10:28:09 +01:00