Commit Graph

8194 Commits

Author SHA1 Message Date
DavidKorczynski d2dc215658
oracle-py-cx: fix build (#8895)
This is an effort to fix:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51298

Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-10-31 12:26:08 +00:00
AdamKorcz ea3286687f
moby: add more fuzzers (#8889)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-10-31 10:16:30 +00:00
tsdgeos 3e614b76f3
Fix poppler build (#8891) 2022-10-31 10:16:09 +00:00
DavidKorczynski fab92b68ef
libdwarf: fix build (#8888)
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=52842
2022-10-29 16:19:49 -02:00
Daiki AMINAKA 1d20b997c7
Add members in auto_ccs (#8885) 2022-10-28 23:56:06 +01:00
Navidem 165ee30241
Set introspector env variable in compile (#8878) 2022-10-28 12:06:15 -07:00
Anton Popov 2e6e3e3eb4
[clickhouse] Correct email in maintainers contacts (#8876)
A wrong email has been provided for me
2022-10-28 13:06:30 -04:00
Naveen 823073f694
New - Sigstore rekor (#8877)
Fuzzing of Sigstore rekor
cc @bobcallaway
Signed-off-by: naveensrinivasan
<172697+naveensrinivasan@users.noreply.github.com>

Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com>
2022-10-28 13:05:29 -04:00
AdamKorcz 5861582389
[docker] Initial integration (#8882)
This PR is an initial integration of the Moby project which is
essentially Docker.

______________________________________

@thaJeztah Would you like to integrate Moby into OSS-Fuzz? If yes, we
need at least one maintainers email address for the `project.yaml` file.
This emali address will receive bug reports if any issues are found.

Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-10-28 13:04:55 -04:00
DavidKorczynski 02f4fe5ebc
pandas: extend fuzzing (#8884)
Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-10-28 16:14:33 +01:00
Riccardo Schirone 6d0f744cae
olefile: do not fail if tmp file can't be removed (#8883)
Should fix https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49945 .
2022-10-28 14:51:02 +01:00
DavidKorczynski c83e209ea1
pysecsan: add framework for python sanitization (#8480)
Foundations for doing Python sanitization. It's achieved by hooking
Python functions and attributes on Python objects (see the ReDoS example
for this). The Pysan package can be installed with `python3 -m pip
install .` and `python3 -m pip install pysecsan` , so it should be easy
to start deploying this selectively on projects in OSS-Fuzz.

Currently there are sanitizers for
- code injection
- regex dos
- insecure yaml deserialization.

I've included several example targets for code injections, e.g. the
pytorch-lightning example from SystemSan, and ReDoS.

The package on pypi: https://pypi.org/project/pysecsan

Signed-off-by: David Korczynski <david@adalogics.com>
2022-10-28 13:29:47 +01:00
DavidKorczynski 392c45669a
netcdf: fix build (#8881)
Effort to fix:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47295
2022-10-28 02:58:13 +01:00
DavidKorczynski aff680d3e2
libspng: fix build (#8880)
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=52459
2022-10-28 02:20:34 +01:00
Robert Löhning e874146ca5
[infra] Upgrade cmake to latest release (3.24.2) (#8681)
CMake 3.21.1 is known to cause issues when building Qt.
2022-10-27 10:21:10 -04:00
Nikita Mikhaylov 41bfb7cd5a
[clickhouse] Add all the core team as maintainters (#8875)
To have an access to all crashes

Co-authored-by: Nikolay Degterinsky <43110995+evillique@users.noreply.github.com>
2022-10-27 09:15:19 -04:00
jonathanmetzman 998791514d
Get rid of :introspector images. Build introspector in main images (#8868)
Actually install introspector in every image.
Don't do extra introspector build steps.
Fixes https://github.com/google/oss-fuzz/issues/8625
2022-10-27 08:27:12 -04:00
DavidKorczynski 50cd792748
bluez: avoid hci_commandtostr (#8874)
Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-10-27 12:24:57 +00:00
jonathanmetzman 421a866ea7
[build-infra] bad build check using --privileged,--cap-add=all to enable netdriver (#8871)
May fix https://github.com/google/oss-fuzz/issues/8601
2022-10-27 08:19:21 -04:00
jonathanmetzman ce2a5a2903
[aflplusplus] Remove 32 MB from image size by deleting .git (#8869) 2022-10-27 12:48:12 +11:00
jonathanmetzman 16fb6232dc
Fix introspector trial builds (#8867) 2022-10-26 19:38:31 -04:00
jonathanmetzman bc02fd0c63
Don't use centipede's install script (#8870)
We can't simply autoremove the packages it installs and it adds 500 MB
to the image size.
Install the only dependency we don't already have libssl-dev since it is very small anyway.
2022-10-26 18:52:22 -04:00
jonathanmetzman 86279540ba
Reduce size of instrospector install by 70 MB (#8862) 2022-10-26 21:00:17 +00:00
James Lucas c3bf252abd
redis-rs: update maintainer contact info (#8852) 2022-10-26 16:01:34 -04:00
jonathanmetzman 474411cbb0
[base-runner] Fix build so that go layer isn't saved. (#8861) 2022-10-26 15:59:09 -04:00
vargen f83e9eea26
Fixing fuzzing build failure. Server can handle multiple connections now (#8866) 2022-10-26 13:36:33 -04:00
Adam Bacchus c6c104307d
updating yaml files to remove old vendor_ccs, add new ones, and alphabetize (#8855) 2022-10-26 13:13:24 -04:00
Adam Bacchus f599c59c7f
Update project.yaml CCs (#8853)
Removing old vendor_ccs, adding new ones, and alphabetizing the list.
2022-10-26 09:23:05 -04:00
Dongge Liu a65aaec1bc
[Rolling out Centipede] Project 11 - 20 (#8802)
Continuing #8801.

The third round of rolling out `Centipede`, which contains the following
10 projects (some are not from within Google):

1. `bloaty`,
2. `double-conversion`,
3. `zopfli`,
4. `guetzli`,
5. `jsonnet`,
6. `astc-encoder`,
7. `piex`,
8. `wuffs`,
9. `arrow`,
10. `myanmar-tools`.

Projects are selected because they are `C++` projects.
2022-10-26 16:59:54 +11:00
Navidem f5e748bb84
Test OSS-Fuzz with introspector images [DO NOT MERGE] (#8628) 2022-10-25 16:31:04 -07:00
Daiki AMINAKA b19ed08052
Add fuzzing case (#8863)
Add test
2022-10-25 18:48:06 -04:00
jonathanmetzman b41080b8f2
Improve fuzz introspector documentation. (#8859)
Fix grammar, wording, and make it clearer what fuzz introspetor offers.

(make changes suggested in https://github.com/google/oss-fuzz/pull/8800)
2022-10-25 15:58:11 -04:00
Yulong Zhang 699f487180
Adding myself to view libraw issues (#8856)
Per https://github.com/LibRaw/LibRaw/issues/496, I need to directly view
libraw issues and aid the maintainer to figure out how to repro.
2022-10-25 15:05:45 -04:00
Steven Wirsz 19615278de
filename and file descriptor fuzz drivers to hit I/O in bzlib.c (#8858)
With the addition of these 2 fuzz drivers, all valid functions in BZIP2
should be covered
2022-10-25 15:05:29 -04:00
Nikita Mikhaylov 14c3e36bd8
[clickhouse] Fix fuzzing build failures (#8838) 2022-10-25 14:17:16 -04:00
Roman Wagner 3fb73157ba
[jsoup] add email to project.yaml (#8857) 2022-10-25 14:12:09 -04:00
Donny/강동윤 6285d7cce0
swc: Initial integration (#8847)
Hi. I'm the creator of the swc project. It stands for speedy web
compiler.

https://swc.rs

SWC is used by some famous open-source projects like next.js, Parcel
(v2), and Deno.
Lots of web developers use SWC indirectly via those open-source
projects, and lots of web developers use `@swc/core` directly.
These users include ByteDance, Tencent, Shopify, Discord, Slack, and
vscode
2022-10-25 14:11:41 -04:00
Tomas Tauber 248734bb2d
pest: added an additional grammar fuzzer target (#8849) 2022-10-25 10:54:10 -04:00
dependabot[bot] 3682b65805
build(deps): bump nokogiri from 1.13.8 to 1.13.9 in /docs (#8827)
Bumps [nokogiri](https://github.com/sparklemotion/nokogiri) from 1.13.8
to 1.13.9.
<details>
<summary>Release notes</summary>
<p><em>Sourced from <a
href="https://github.com/sparklemotion/nokogiri/releases">nokogiri's
releases</a>.</em></p>
<blockquote>
<h2>1.13.9 / 2022-10-18</h2>
<h3>Security</h3>
<ul>
<li>[CRuby] Vendored libxml2 is updated to address <a
href="https://nvd.nist.gov/vuln/detail/CVE-2022-2309">CVE-2022-2309</a>,
<a
href="https://nvd.nist.gov/vuln/detail/CVE-2022-40304">CVE-2022-40304</a>,
and <a
href="https://nvd.nist.gov/vuln/detail/CVE-2022-40303">CVE-2022-40303</a>.
See <a
href="https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2qc6-mcvw-92cw">GHSA-2qc6-mcvw-92cw</a>
for more information.</li>
<li>[CRuby] Vendored zlib is updated to address <a
href="https://ubuntu.com/security/CVE-2022-37434">CVE-2022-37434</a>.
Nokogiri was not affected by this vulnerability, but this version of
zlib was being flagged up by some vulnerability scanners, see <a
href="https://github-redirect.dependabot.com/sparklemotion/nokogiri/issues/2626">#2626</a>
for more information.</li>
</ul>
<h3>Dependencies</h3>
<ul>
<li>[CRuby] Vendored libxml2 is updated to <a
href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.3">v2.10.3</a>
from v2.9.14.</li>
<li>[CRuby] Vendored libxslt is updated to <a
href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.37">v1.1.37</a>
from v1.1.35.</li>
<li>[CRuby] Vendored zlib is updated from 1.2.12 to 1.2.13. (See <a
href="https://github.com/sparklemotion/nokogiri/blob/v1.13.x/LICENSE-DEPENDENCIES.md#platform-releases">LICENSE-DEPENDENCIES.md</a>
for details on which packages redistribute this library.)</li>
</ul>
<h3>Fixed</h3>
<ul>
<li>[CRuby] <code>Nokogiri::XML::Namespace</code> objects, when
compacted, update their internal struct's reference to the Ruby object
wrapper. Previously, with GC compaction enabled, a segmentation fault
was possible after compaction was triggered. [<a
href="https://github-redirect.dependabot.com/sparklemotion/nokogiri/issues/2658">#2658</a>]
(Thanks, <a
href="https://github.com/eightbitraptor"><code>@​eightbitraptor</code></a>
and <a
href="https://github.com/peterzhu2118"><code>@​peterzhu2118</code></a>!)</li>
<li>[CRuby] <code>Document#remove_namespaces!</code> now defers freeing
the underlying <code>xmlNs</code> struct until the <code>Document</code>
is GCed. Previously, maintaining a reference to a <code>Namespace</code>
object that was removed in this way could lead to a segfault. [<a
href="https://github-redirect.dependabot.com/sparklemotion/nokogiri/issues/2658">#2658</a>]</li>
</ul>
<hr />
<p>sha256 checksums:</p>

<pre><code>9b69829561d30c4461ea803baeaf3460e8b145cff7a26ce397119577a4083a02
nokogiri-1.13.9-aarch64-linux.gem
e76ebb4b7b2e02c72b2d1541289f8b0679fb5984867cf199d89b8ef485764956
nokogiri-1.13.9-arm64-darwin.gem
15bae7d08bddeaa898d8e3f558723300137c26a2dc2632a1f89c8574c4467165
nokogiri-1.13.9-java.gem
f6a1dbc7229184357f3129503530af73cc59ceba4932c700a458a561edbe04b9
nokogiri-1.13.9-x64-mingw-ucrt.gem
36d935d799baa4dc488024f71881ff0bc8b172cecdfc54781169c40ec02cbdb3
nokogiri-1.13.9-x64-mingw32.gem
ebaf82aa9a11b8fafb67873d19ee48efb565040f04c898cdce8ca0cd53ff1a12
nokogiri-1.13.9-x86-linux.gem
11789a2a11b28bc028ee111f23311461104d8c4468d5b901ab7536b282504154
nokogiri-1.13.9-x86-mingw32.gem
01830e1646803ff91c0fe94bc768ff40082c6de8cfa563dafd01b3f7d5f9d795
nokogiri-1.13.9-x86_64-darwin.gem
8e93b8adec22958013799c8690d81c2cdf8a90b6f6e8150ab22e11895844d781
nokogiri-1.13.9-x86_64-linux.gem
96f37c1baf0234d3ae54c2c89aef7220d4a8a1b03d2675ff7723565b0a095531
nokogiri-1.13.9.gem
</code></pre>
</blockquote>
</details>
<details>
<summary>Changelog</summary>
<p><em>Sourced from <a
href="https://github.com/sparklemotion/nokogiri/blob/main/CHANGELOG.md">nokogiri's
changelog</a>.</em></p>
<blockquote>
<h2>1.13.9 / 2022-10-18</h2>
<h3>Security</h3>
<ul>
<li>[CRuby] Vendored libxml2 is updated to address <a
href="https://nvd.nist.gov/vuln/detail/CVE-2022-2309">CVE-2022-2309</a>,
<a
href="https://nvd.nist.gov/vuln/detail/CVE-2022-40304">CVE-2022-40304</a>,
and <a
href="https://nvd.nist.gov/vuln/detail/CVE-2022-40303">CVE-2022-40303</a>.
See <a
href="https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2qc6-mcvw-92cw">GHSA-2qc6-mcvw-92cw</a>
for more information.</li>
<li>[CRuby] Vendored zlib is updated to address <a
href="https://ubuntu.com/security/CVE-2022-37434">CVE-2022-37434</a>.
Nokogiri was not affected by this vulnerability, but this version of
zlib was being flagged up by some vulnerability scanners, see <a
href="https://github-redirect.dependabot.com/sparklemotion/nokogiri/issues/2626">#2626</a>
for more information.</li>
</ul>
<h3>Dependencies</h3>
<ul>
<li>[CRuby] Vendored libxml2 is updated to <a
href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.3">v2.10.3</a>
from v2.9.14.</li>
<li>[CRuby] Vendored libxslt is updated to <a
href="https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.37">v1.1.37</a>
from v1.1.35.</li>
<li>[CRuby] Vendored zlib is updated from 1.2.12 to 1.2.13. (See <a
href="https://github.com/sparklemotion/nokogiri/blob/v1.13.x/LICENSE-DEPENDENCIES.md#platform-releases">LICENSE-DEPENDENCIES.md</a>
for details on which packages redistribute this library.)</li>
</ul>
<h3>Fixed</h3>
<ul>
<li>[CRuby] <code>Nokogiri::XML::Namespace</code> objects, when
compacted, update their internal struct's reference to the Ruby object
wrapper. Previously, with GC compaction enabled, a segmentation fault
was possible after compaction was triggered. [<a
href="https://github-redirect.dependabot.com/sparklemotion/nokogiri/issues/2658">#2658</a>]
(Thanks, <a
href="https://github.com/eightbitraptor"><code>@​eightbitraptor</code></a>
and <a
href="https://github.com/peterzhu2118"><code>@​peterzhu2118</code></a>!)</li>
<li>[CRuby] <code>Document#remove_namespaces!</code> now defers freeing
the underlying <code>xmlNs</code> struct until the <code>Document</code>
is GCed. Previously, maintaining a reference to a <code>Namespace</code>
object that was removed in this way could lead to a segfault. [<a
href="https://github-redirect.dependabot.com/sparklemotion/nokogiri/issues/2658">#2658</a>]</li>
</ul>
</blockquote>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="897759cc25"><code>897759c</code></a>
version bump to v1.13.9</li>
<li><a
href="aeb1ac3283"><code>aeb1ac3</code></a>
doc: update CHANGELOG</li>
<li><a
href="c663e4905a"><code>c663e49</code></a>
Merge pull request <a
href="https://github-redirect.dependabot.com/sparklemotion/nokogiri/issues/2671">#2671</a>
from sparklemotion/flavorjones-update-zlib-1.2.13_v1...</li>
<li><a
href="212e07da28"><code>212e07d</code></a>
ext: hack to cross-compile zlib v1.2.13 on darwin</li>
<li><a
href="76dbc8c5be"><code>76dbc8c</code></a>
dep: update zlib to v1.2.13</li>
<li><a
href="24e3a9c414"><code>24e3a9c</code></a>
doc: update CHANGELOG</li>
<li><a
href="4db3b4daa9"><code>4db3b4d</code></a>
Merge pull request <a
href="https://github-redirect.dependabot.com/sparklemotion/nokogiri/issues/2668">#2668</a>
from sparklemotion/flavorjones-namespace-scopes-comp...</li>
<li><a
href="73d73d6e43"><code>73d73d6</code></a>
fix: Document#remove_namespaces! use-after-free bug</li>
<li><a
href="5f58b34724"><code>5f58b34</code></a>
fix: namespace nodes behave properly when compacted</li>
<li><a
href="b08a8586c7"><code>b08a858</code></a>
test: repro namespace_scopes compaction issue</li>
<li>Additional commits viewable in <a
href="https://github.com/sparklemotion/nokogiri/compare/v1.13.8...v1.13.9">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=nokogiri&package-manager=bundler&previous-version=1.13.8&new-version=1.13.9)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after
your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge
and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot close` will close this PR and stop Dependabot recreating
it. You can achieve the same result by closing it manually
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)
- `@dependabot use these labels` will set the current labels as the
default for future PRs for this repo and language
- `@dependabot use these reviewers` will set the current reviewers as
the default for future PRs for this repo and language
- `@dependabot use these assignees` will set the current assignees as
the default for future PRs for this repo and language
- `@dependabot use this milestone` will set the current milestone as the
default for future PRs for this repo and language

You can disable automated security fix PRs for this repo from the
[Security Alerts
page](https://github.com/google/oss-fuzz/network/alerts).

</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-10-24 17:01:50 -04:00
DavidKorczynski 2aa465be3d
bluez: extend fuzzing (#8844)
Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-10-24 18:47:10 +01:00
AdamKorcz 69801795c0
jackson-databind: improve fuzzer (#8843)
Refactor calls to readValues.
Add more configuration.

Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-10-24 18:04:36 +01:00
AdamKorcz ec9caad55e
golang: refactor encoding fuzzer (#8841)
Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-10-24 14:00:27 +01:00
AdamKorcz 3b00bffdb7
jackson-databind: fix false positive (#8840)
Fixes false positive that was reported due to insufficient checks in
subtype validator in fuzzer.

Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-10-24 02:54:10 +01:00
Dongge Liu c1d744d540
[Rolling out Centipede] Project 6 - 10 (#8801)
Continuing #8690.

Given that `Centipede` passed CI tests of the 5 projects in #8690, we
will gradually roll it out to let more real-world fuzzing targets
benefit from it.
The second round contains the following 5 projects, **some of which are
not from Google** (unlike round 1):

1. `skcms`,
2. `abseil-cpp`,
3. `alembic`,
4. `arduinojson`,
5. `aspell`.

Projects are selected because:
1. They are `C++` projects.

There will be another round (of 10 projects) as soon as we can confirm
that Centipede works fine in this round.
2022-10-24 09:35:41 +11:00
tsdgeos 4195b68795
kimageformarts/karchive: Fix build (#8836)
To build translations we need more qt stuff, so just delete translations
2022-10-23 21:26:42 +01:00
Kevin Backhouse 0bf7af4a60
Use the install_dependencies.sh script from the exiv2 repo (#8835)
Call exiv2's `install_dependencies.sh` script rather than using a
hard-coded list of packages. This should make the build less fragile
when we add new dependencies to exiv2. (Example:
https://github.com/Exiv2/exiv2/pull/2381.)
2022-10-22 00:16:52 +01:00
Bo Chen c9fdcd72f4
cloud-hypervisor: Add new fuzzer (#8833)
New fuzzer is added for virtio-iommu.

Signed-off-by: Bo Chen <chen.bo@intel.com>

Signed-off-by: Bo Chen <chen.bo@intel.com>
2022-10-21 18:51:51 +01:00
AdamKorcz dfdbbb9335
jackson-databind: improve fuzzer (#8834)
Adds a few more targets.

Improve formatting of the fuzzer.

Signed-off-by: AdamKorcz <adam@adalogics.com>

Signed-off-by: AdamKorcz <adam@adalogics.com>
2022-10-21 18:51:14 +01:00
Bhargava Shastry b658818f43
solidity: Revert to upstream LPM. (#8706)
Fixes failing build after
https://github.com/google/libprotobuf-mutator/pull/207 was merged and
source branch deleted.
2022-10-21 13:09:08 +00:00
DavidKorczynski f30afbecdf
lcms: expand load fuzzer to write it8 profile (#8831)
Signed-off-by: David Korczynski <david@adalogics.com>

Signed-off-by: David Korczynski <david@adalogics.com>
2022-10-21 11:17:45 +01:00