Commit Graph

4430 Commits

Author SHA1 Message Date
binaryFate eaae983c73
Monero: fix coverage, don't enable asan, add new fuzz test (#4040)
Co-authored-by: binaryFate <binaryfate@users.noreply.github.com>
2020-06-27 15:42:29 -07:00
Abhishek Arya c2df30abb5
Update project.yaml 2020-06-26 20:31:54 -07:00
pierwill cd9ee7ca4c
Add influxdb project for review (#4028)
Co-authored-by: pierwill <pierwill@users.noreply.github.com>
2020-06-26 11:36:10 -07:00
Abhishek Arya ff4f38e772
Fix memory leak in libevent parse_query_fuzzer 2020-06-25 19:39:14 -07:00
Nathan Moinvaziri e32b716754
Added fuzzer for c-blosc2 (#3989) 2020-06-25 16:56:26 -07:00
Evgeny Vereshchagin 25cff8db8e
[util-linux] cover mnt_table_parse_stream (#4032)
* [util-linux] cover mnt_table_parse_stream

Waiting for https://github.com/karelzak/util-linux/pull/1068

* temporarily point OSS-Fuzz to evverx/util-linux

* make sure it can be built with sanitizer=coverage
2020-06-25 15:35:44 -07:00
Ravi Jotwani f8c9eec4cf
E2fsprogs integration (#4006)
* added draco integration files

* wrote build file and Dockerfile for Draco

* split security-research-pocs fuzzer into four

* added project build to build.sh

* added more fuzzers

* fixed sanitizer flags

* removed commented code, combined fuzzers, fized build script

* changed to singular filenames, converted usage of random int to enum, changed buffer name, and fixed build script

* placed test files in memory instead of on disk, added asserts
2020-06-25 11:42:17 -07:00
kabeer27 181812050d
Cloud function for syncing OSS-Fuzz projects (#3538). (#4023)
Integrating the first cloud function i implemented which syncs the project list from github and uploads the list to cloud datastore, which will be used by another cloud function to request builds.

Co-authored-by: Kabeer Seth <kabeerseth@google.com>
2020-06-25 13:41:04 +10:00
FrankGalligan d647392eda
Draco: add more emails (#4030)
* Draco: add more emails

* Fix name mistake
2020-06-24 14:59:50 -07:00
DavidKorczynski bee17f0144
[HAProxy] Added two new contacts for HAProxy fuzzing. (#4029) 2020-06-24 13:51:44 -07:00
Nick Wellnhofer e3c5b941da
[libxml2] Two new fuzz targets (#4022)
* [libxml2] Two new fuzz targets

Enable HTML and XML Schema fuzzers.

* [libxml2] Compile missing source files

* [libxml2] Don't forget to build seed corpora
2020-06-24 13:01:23 -07:00
Zhengdai Hu adc5fcd502
[zetasql] Initial onboarding of ZetaSQL (#4010)
* Add initial onboarding scripts of ZetaSQL for review

* Checkout fuzz target from simple_fuzzer branch

* Enable code coverage report

* Enable only ASAN and MSAN

* Fixed broken tzdata symlink

* Switch to master branch
2020-06-24 12:47:55 -07:00
DavidKorczynski 54d69b6f2d
Updated settings in project yaml so bugs are freely visible. (#4024) 2020-06-23 15:28:42 -07:00
Ravi Jotwani 04f3736d32
Draco fuzz coverage (#3980)
* added draco integration files

* wrote build file and Dockerfile for Draco

* added Apache 2 license header

* changed project maintainer, cleaned up draco_decoder_fuzzer, and set working directory in Dockerfile

* added a couple of fuzzers

* two more targets

* merged from upstream

* build point cloud encoding fuzzer, renamed quantization fuzzers

* added more fuzzers

* moved fuzzers and build script to https://github.com/google/draco, made the build script here execute the new one

Co-authored-by: Ravi Jotwani <rjotwani@google.com>
2020-06-23 12:31:24 -07:00
Yuquan Wang 2fdb520e26
Yuquanw branch (#4019)
* Adding auto-cc to project usrsctp

* Improving fuzzing coverage

* Remove experimental dataflow sanitizer

Co-authored-by: Yuquan Wang <yuquanw@google.com>
2020-06-22 14:47:15 -07:00
Nathan Moinvaziri 351bf4c3c8
Updated c-blosc to use fuzzers in c-blosc repository. (#4018)
Use compat files for seed corpus with new decompress_fuzzer.
2020-06-22 11:32:53 -07:00
Shivam7-1 eedf02164e
Updated rust_lang.md (#4017) 2020-06-22 08:05:20 -07:00
Abhishek Arya e8ffee4077
Update project.yaml 2020-06-22 08:02:59 -07:00
DavidKorczynski 8656b3722c
[Haproxy] Simplify build script and update to latest code (#4000)
* Updated hpack to work with new build.

* Required minimium length.
2020-06-22 07:57:33 -07:00
alex da7bb14b96
QEMU: Add fuzz target build scripts (#3935)
* QEMU: Add fuzz target build scripts

Signed-off-by: Alexander Bulekov <alxndr@bu.edu>

* QEMU: Disable AFL and MSan in project.yaml

We can't link against OSS-Fuzz' afl driver as it is not compiled with
-fPIC. Additionally, it appears that we trigger some false-positives
with MemorySanitizer, since we don't instrument all of the libraries.
Disable AFL and MemorySanitizer, for now.

Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
2020-06-21 16:38:41 -07:00
werdnaH 63868cba90
[skia] Remove Options Files with Only max_len Flag (#3987)
* [skia] add svg fuzzer

* [skia] removed options file

* [skia] removed options file

* [skia] removed all options files with only max_len

* delete options

* fixed cp statements

Co-authored-by: Zepeng Hu <zepenghu@google.com>
2020-06-21 16:35:58 -07:00
Felicia Lim be9ec2bcd1
[opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives (#4007)
* [opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives

Without this, a silk_memcpy call could resolve to __memcpy_chk,
which does not have an msan intercept, leading to false use-of-uninitialized-value errors.

* [opus] Consolidate cflags

* [opus] Fix typo
2020-06-21 16:34:41 -07:00
Shivam7-1 50bc1d647c
Updated reproducing.md (#4013) 2020-06-20 08:31:59 -07:00
Shivam7-1 48bd2b6377
Updated continuous_integration.md (#4014) 2020-06-20 08:31:51 -07:00
Robert Löhning 9fd351cb1a
[qt] Test qtsvg (#4012) 2020-06-19 07:53:57 -07:00
Shivam7-1 058247f3d3
Updated ideal_integration.md (#4011) 2020-06-19 07:47:00 -07:00
Shivam7-1 de5c5e69c3
Updated fuzzer_environment.md (#4009) 2020-06-18 08:21:49 -07:00
asraa 9d589a7e86
Add arthur and use less memory (#4001)
Signed-off-by: Asra Ali <asraa@google.com>
2020-06-18 08:20:41 -07:00
Tanuj Garg 98e73d06c2
added auto_cc to json project (#3999) 2020-06-17 13:19:35 -07:00
bungeman ca4277eb5a
[skia] Fix coverage build to use Ninja. (#4005)
The other builds were moved to Ninja, this one needs to be as well.

Bug: oss-fuzz:23438
2020-06-17 12:50:25 -07:00
jonathanmetzman cac6118315
[cifuzz] Temporary fix for sanitizer validation. (#3997)
Temporary fix for sanitizer validation.

Our sanitizer validation is hacky and isn't using pyyaml to actually
parse the project.yaml file. Temporarily work around #3996 by not
validating sanitizers if no sanitizers are specified in project.yaml.
2020-06-17 10:32:42 -07:00
Mihai Maruseac 8603f6a6cd
Enable more fuzzing for TensorFlow (#4004)
* Link against `libc++` with proper config in `.bazelrc`

* Add support for `undefined` build, link against proper `clang_rt` library

* Don't rsync in verbose mode.

* Support `undefined` and `memory` sanitizers

* Support more fuzzers than just `libfuzzer`.
2020-06-17 10:10:29 -07:00
Arshdeep Singh 094e3fdd68
Added auto-cc to lodepng project (#4002) 2020-06-17 07:15:22 -07:00
Yuquan Wang 7980fdb381
Adding auto-cc to project usrsctp (#3998)
Co-authored-by: Yuquan Wang <yuquanw@google.com>
2020-06-16 11:19:33 -07:00
Evgeny Vereshchagin cce70171d4
docs: guard curly braces with {% raw %} .. {% endraw %} (#3994)
Just a follow-up to https://github.com/google/oss-fuzz/pull/3984 that
should address https://github.com/google/oss-fuzz/pull/3984#discussion_r440951881.
According to https://jekyllrb.com/docs/liquid/tags/#code-snippet-highlighting,
another option would be to add `render_with_liquid: false` in your front matter to
disable Liquid entirely for a particular document.
2020-06-16 09:43:53 -07:00
Jonathan Foote bfa11be2f9
Explicitly define sanitizer support (#3995)
The oss-fuzz documentation states that listing supported sanitizers in a project's yaml [is optional](https://google.github.io/oss-fuzz/getting-started/new-project-guide/#sanitizers). It appears that CIFuzz requires supported sanitizers to be included in this file ([ref](26e8d7c772/infra/cifuzz/cifuzz.py (L508-L529))). I believe this causes the CIFuzz Github Action to fail for projects that have not listed support for address sanitizer explicitly in their respective project YAML.

This PR explicitly defines support for asan and ubsan with a goal of fixing h2o's CIFuzz build
2020-06-16 09:18:02 -07:00
Evgeny Vereshchagin d9c7f893f3
[docs] switch to a matrix in the "sanitizer" example (#3984)
This was discussed in https://github.com/google/oss-fuzz/pull/3969#discussion_r439145136
2020-06-16 08:24:48 -07:00
Arshdeep Singh e4420e001d
Added Seed Corpus and Dictionary for lodepng Library (#3986)
* Added Corpus and Dictionary for lodepng Library

* Added Dict download link in DockerFile for lodepng
2020-06-16 07:43:08 -07:00
DavidKorczynski 1d2ada9309
Disabled leak check in xpdf. (#3992) 2020-06-16 07:07:37 -07:00
Nikias Bassen 1ee643d324
libplist: Update for new release (#3993) 2020-06-16 07:07:03 -07:00
Augie Fackler 2c4dc1be41
mercurial: move fuzzing build to Python 3 (#3571)
This got a bit messy as a change, but it's basically all that topic. I
had to go squint at python3-libraries to figure out the modern
incantation for getting python3 to build under the fuzzer, but victory
is mine and this is probably substantially cleaner.
2020-06-15 15:38:10 -07:00
Jamie Pinheiro ed3ed5552b
Fix array bounds (#3990)
Co-authored-by: Jamie Pinheiro <pinheirojamie@google.com>
2020-06-15 12:47:40 -07:00
Mihai Maruseac 7a059f4355
Cleanup build script, fix tensorflow build (#3952)
* Need to manually install numpy now as it is used in the toolchain

* Handle review

* Remove bazel install since we install bazelisk

* Force symlink python3 -> python

* Refactor build script

* Remove `-stdlib=libc++` as that causes link errors

* Remove `identity_fuzz` as it results in a huge fuzzer. Will work on reducing size and then enable back

* Copy fuzzer to `$OUT`, not move

* Handle coverage support
2020-06-15 09:38:48 -07:00
kabeer27 c06528180b
[abseil-cpp] Initial Integration (#3958)
Co-authored-by: Kabeer Seth <kabeerseth@google.com>
2020-06-15 13:20:25 +10:00
Ingo Berg 7c42471826
Update build.sh (#3985)
Disabled divide by zero sanitation for muparser (https://github.com/google/oss-fuzz/issues/3968#issuecomment-643373346)
2020-06-14 13:46:18 -07:00
tsdgeos 0afde6a4a9
anongit.kde.org is gone, use invent.kde.org (#3983) 2020-06-13 09:30:27 -07:00
DavidKorczynski bd4b131ced
[xdfp] one more fuzzer (#3981)
* Added new fuzzer to xpdf.

* Updated sanitizers.

* Limit sanitizer to address as this is the only one that allows us to fuzz the pdf core parser.

* Disable logging and go further into the API.
2020-06-13 08:13:26 -07:00
Abhishek Arya bf38231a78
Update README.md 2020-06-12 16:03:41 -07:00
Abhishek Arya 9abf69c93d
Update README.md 2020-06-12 16:03:07 -07:00
Abhishek Arya 1106855b6a
Update index.md 2020-06-12 16:02:41 -07:00