Commit Graph

5566 Commits

Author SHA1 Message Date
Nigel Tao 8f4d33b6cc
[go-snappy] reject large inputs to avoid OOM (#5443)
Updates https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32135
2021-03-18 20:03:05 -07:00
Tim Wojtulewicz f92a6cd3f7
zeek: add user to mailing list (#5438) 2021-03-18 11:24:57 -07:00
van Hauser df6dc548a9
remove map size for afl++ (#5433)
* output afl++ setup

* update commit id

* update afl++ commit id

* asan + cmplog fix

* update commit id

* update and enhance afl++

* update afl++ commit id, better run asan options

* fix linter

* add debug_afl script

* Update debug_afl

* Update compile_afl

* fix for karchive

* put debug_afl in the docker container

* asan poison fix

* fix asan settings for zeek

* update afl++ commit id

* fix

* update afl++ commit id

* final touches

* remove map size

* remove old comment

Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2021-03-18 14:49:58 +00:00
Zoltán Fridrich 6f3fc2047e
Update primary contact and CCs for USBGuard project (#5432)
* Update primary contact and CCs for USBGuard project

* Update project.yaml

Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2021-03-18 07:46:19 -07:00
jonathanmetzman ccea7f4ad9
[base-clang] Reduce base-clang size by deleting unneeded binaries+libraries (#5282)
Delete unneeded LLVM tools, clang libraries and testing tools.

This reduces the image size from 1.71 GB to 901 MB.
It may be possible to improve on this by deleting some LLVM
libraries though I don't know which ones we should delete
because AFL++ might use some).

Related https://github.com/google/oss-fuzz/issues/5170
2021-03-18 06:38:46 -07:00
Francois Pesce 562e0b906e
Removing myself from this list. (#5428) 2021-03-17 12:58:56 -07:00
jonathanmetzman 62fce2a587
[CIFuzz] Give testcases unique names. (#5424) 2021-03-17 10:21:49 -07:00
Kevin Conner 8038398cb9
Update project.yaml (#5426)
Include email addresses for Brian and myself
2021-03-17 09:50:44 -07:00
AdamKorcz 1494fbd4ea
Added build files for PCL (#4678)
* Added pcl

* Update Dockerfile

Co-authored-by: Abhishek Arya <inferno@chromium.org>
2021-03-17 09:50:21 -07:00
Catena cyber 8b15e28751
Go coverage : use gofuzz tag by default (#5425)
as is done by gofuzz build
2021-03-17 07:42:12 -07:00
Catena cyber e71e49d721
Golang coverage summary updated to version 2.0.1 (#5346) 2021-03-17 06:53:19 -07:00
Fabian Meumertzheim d3d1d4c190
[jackson-dataformats-binary] Initial integration (#5382) 2021-03-17 05:37:08 -07:00
Tadeusz Struk a23d89946d
tpm2-tss: add acl dependency (#5410)
Update docker file and add access control list tool dependency
2021-03-16 16:08:27 -07:00
van Hauser a1135d001e
update afl++ commit id (#5402)
* output afl++ setup

* update commit id

* update afl++ commit id

* asan + cmplog fix

* update commit id

* update and enhance afl++

* update afl++ commit id, better run asan options

* fix linter

* add debug_afl script

* Update debug_afl

* Update compile_afl

* fix for karchive

* put debug_afl in the docker container

* asan poison fix

* fix asan settings for zeek

* update afl++ commit id

* fix

* update afl++ commit id

* final touches

Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2021-03-16 20:05:21 +00:00
Ludvig Michaelsson 6558a1708e
libfido2: add seed for largeblob, hid, and netlink fuzzers (#5406) 2021-03-16 12:59:43 -07:00
priyawadhwa 02da63c0d6
Add cosign project to oss-fuzz (#5415) 2021-03-16 19:54:29 +00:00
Catena cyber 5c174c7e36
Golang coverage: use absolute paths (#5407) 2021-03-16 12:19:02 -07:00
Catena cyber dd40bbdac4
Adds cel-cpp project (#5326)
* Adds cel-cpp project

* Fixup copy targets

* Disable not working sanitizers

* Fixup target try catch

* Adds ccs people to cel-cpp

* Remove unnneeded bazel download

* Use bazel magic

* Disable UBSAN for cel-cpp

* removing unneeded nit
2021-03-16 10:02:22 -07:00
Idan Horowitz 2caa666499
serenity: Add myself to the mailing list (#5409) 2021-03-16 14:01:36 +00:00
Catena cyber 8c5e3f437e
Adds golang snappy project (#5351) 2021-03-16 06:33:58 -07:00
Fabian Meumertzheim cf274aba46
[jackson-core] Initial integration (#5396) 2021-03-16 06:24:31 -07:00
Kimball Thurston c903d51b15
remove library after merge (#5405)
OpenEXR 3.0, and the main branch, has accepted a PR to merge libIexMath
into libIex, to lower dependencies. Remove it from the list of libraries
and further sort by dependency order

Signed-off-by: Kimball Thurston <kdt3rd@gmail.com>
2021-03-16 05:53:48 -07:00
AdamKorcz 3dfcdfa0b2
[runc] Move fuzzers upstream (#5390)
* [runc] Move fuzzers upstream

* Experimental fix

* Revert
2021-03-15 09:44:11 -07:00
jonathanmetzman 5ca736fe00
[CIFuzz] Fix issue deleting corpus (#5391)
Sometimes deleting the corpus in free_disk_if_needed exceptions.
Pass ignore_errors=True to fix this.
Related: #5383
2021-03-15 16:20:13 +00:00
Catena cyber 92cea13c5d
Rust coverage : do not trigger debug assertions (#5385) 2021-03-14 15:53:16 -07:00
Catena cyber b000f70a7a
Golang coverage: build binary instead of bash script (#5377) 2021-03-14 08:29:13 -07:00
DavidKorczynski 2f9dd0753f
image-png: initial integration (#5329)
* initial integration of rust image-png.

* Updated the image-png so it compiles.

* Updated image-png to work with maintainer email.

* Add another maintainer to project yaml.

* Minor update to trigger CI.
2021-03-12 20:40:56 -08:00
DavidKorczynski 8a9bb70905
spotify-json: initial integration. (#5014)
* spotify json: initial integration.

* Updated the spotify-json library to reflect upstream fuzzer merge.
2021-03-12 20:40:50 -08:00
DavidKorczynski a9240f097f
json5format initial integration (#5354)
* json5format initial integration

* Updated the dockerfile for json5format.
2021-03-12 20:40:33 -08:00
Fabian Meumertzheim d108b02e95
[fastjson2] Initial integration of alibaba/fastjson (#5373) 2021-03-12 20:36:22 -08:00
Catena cyber be203e38a5
More generic target directory for rust coverage (#5366)
* More generic target directory for rust coverage

* Rust coverage cargo does not change PATH
2021-03-12 08:52:54 -08:00
DavidKorczynski 98e30c07a0
Update project.yaml (#5375) 2021-03-12 08:52:18 -08:00
jonathanmetzman 3465403f30
[CIFuzz] Add functionality to save diskspace (#5342)
* [CIFuzz] Add functionality to save diskspace.

Add a LOW_DISK_SPACE env/config var. When this is specified
(always true for Github actions) run_fuzzers will delete
base-builder and the project builder image before fuzzing.
After it finishes fuzzing with a target, it will also
delete the targets, its seed corpus and its corpus.

Related: #4879
2021-03-12 07:27:07 -08:00
Oliver Chang 5a00fd347e
Modify deadline text to disclose immediately after fix is released. (#5323) 2021-03-12 09:34:56 +11:00
Christian Holler (:decoder) a15ab02cc4
[firefox/spidermonkey] Remove cargo wrapper in /usr/local/bin to fix builds (#5369) 2021-03-11 12:48:11 -08:00
Nathan Moinvaziri a0fb9a91ba
[c-blosc2] Link shared libraries with lld for -fno-semantic-interposition support. (#5360) 2021-03-10 18:20:38 -08:00
Ilya Lipnitskiy a6a541e583
protobuf-c: fix coverage builds, use latest code (#5363)
* protobuf-c: fix coverage builds, ignore protobuf results

No need to include Google Protobuf library coverage results, since we
are testing protobuf-c.

* protobuf-c: use pkg-config for dependency resolution

* protobuf-c: use next branch to check latest code

master is not the latest branch in the protobuf-c repo. Run fuzzer on
the next branch, which is the development branch for the next release.

* protobuf-c: add myself to CC list
2021-03-10 18:20:25 -08:00
Joe Drago 53ab36954f
[libavif] Fix corpus to have proper av1C property associations (#5364)
Related: https://github.com/AOMediaCodec/libavif/pull/537

Co-authored-by: Joe Drago <jdrago@netflix.com>
2021-03-10 18:19:34 -08:00
Tadeusz Struk 7371b1b1ed
Update project.yaml (#5365) 2021-03-10 18:18:49 -08:00
Seth Vargo 3a879b729a
Improve Actions hygiene (#5361)
👋 hello there! I'm a fellow Googler who works on projects that leverage GitHub Actions for CI/CD. Recently I noticed a large increase in our queue time, and I've tracked it down to the [limit of 180 concurrent jobs](https://docs.github.com/en/actions/reference/usage-limits-billing-and-administration) for an organization. To help be better citizens, I'm proposing changes across a few repositories that will reduce GitHub Actions hours and consumption. I hope these changes are reasonable and I'm happy to talk through them in more detail.

- Only run GitHub Actions for pushes and PRs against the main branch of the repository. If your team uses a forking model, this change will not affect you. If your team pushes branches to the repository directly, this changes actions to only run against the primary branches or if you open a Pull Request against a primary branch.

- For long-running jobs (especially tests), I added the "Cancel previous" workflow. This is very helpful to prevent a large queue backlog when you are doing rapid development and pushing multiple commits. Without this, GitHub Actions' default behavior is to run all actions on all commits.

There are other changes you could make, depending on your project (but I'm not an expert):

- If you have tests that should only run when a subset of code changes, consider gating your workflow to particular file paths. For example, we have some jobs that do Terraform linting, but [they only run when Terraform files are changed](c4f59fee71/.github/workflows/terraform.yml (L3-L11)).

Hopefully these changes are not too controversial and also hopefully you can see how this would reduce actions consumption to be good citizens to fellow Googlers. If you have any questions, feel free to respond here or ping me on chat. Thank you!
2021-03-10 18:14:23 -08:00
Catena cyber 9ba8907637
Use more RUSTFLAGS for Suricata (#5352)
* Use more RUSTFLAGS for Suricata

Taken from libra and cargo fuzz

* rustflags only for asan
2021-03-10 13:28:48 -08:00
Fabian Meumertzheim 3a227bd77d
[json-sanitizer] Add severity markup (#5350)
Annotates the findings of the various json-sanitizer fuzzers with
severities as follows:

* XSS: High
* Comment injection: Medium
* Invalid JSON: Low
* Failure to be idempotent: Not a security issue
* Undeclared exceptions: Not a security issue

This commit takes advantage of the support for severity markers in stack
traces introduced in https://github.com/google/clusterfuzz/pull/2270.
2021-03-10 13:28:02 -08:00
Abhishek Arya 53e9531551
Don't rpath patch llvm-symbolizer. (#5357)
Should fix https://github.com/google/oss-fuzz/issues/5349
2021-03-10 12:24:57 -08:00
Abhishek Arya 90b3d55f36
Fix unzip regression on base-runner. (#5356)
* Fix unzip regression on base-runner.

* Dont rpath patch llvm-symbolizer.

Should fix https://github.com/google/oss-fuzz/issues/5349

* Revert "Dont rpath patch llvm-symbolizer."

This reverts commit fdd881dea2.
2021-03-10 10:46:58 -08:00
Kaviraj 0598d4ff3f
Include Loki team for the notification email (#5359) 2021-03-10 07:44:03 -08:00
AdamKorcz f55e27bd11
[vitess] Add maintainers (#5358) 2021-03-10 07:43:51 -08:00
jonathanmetzman 0475bfa16a
[base-builder] Remove unnecessary python files (58 MB) (#5348)
Related: #5170
2021-03-09 18:30:31 -08:00
Tyson Smith 876b84445f
[cairo] Add vendor_ccs (#5347) 2021-03-09 13:29:35 -08:00
Catena cyber 632f5ec0cb
Rust coverage : source remap after changing dir (#5345) 2021-03-09 20:57:46 +00:00
Lunny Xiao 88c36c0a89
Allow security team of Gitea to access the issues (#5338)
And once the security team members changed, we have to send new PR to change this.
2021-03-09 12:08:57 -08:00