Nick Terrell
fb7075b1ed
[zstd] Move downloading seed corpora to build.sh ( #2331 )
...
I just added a new fuzzer, `zstd_frame_info`, and want to be able to add new
fuzzers without submitting a pull request to oss-fuzz. This change uses zstd's
Makefile to download the corpora. Now I can add a new fuzzer to zstd and it will
automatically get built and download the seed corpus in oss-fuzz.
2019-04-17 21:42:41 -07:00
Guido Vranken
7bdfb2b7d8
Cryptofuzz (differential crypto fuzzing) ( #2273 )
...
* Add cryptofuzz
* [cryptofuzz] Specify sanitizers
* [cryptofuzz] Actually disable assembly in second OpenSSL build
* [cryptofuzz] Add BoringSSL
* [cryptofuzz] Enable MemorySanitizer builds
* [cryptofuzz] Fix OpenSSL build
* [cryptofuzz] Add LibreSSL target
* [cryptofuzz] Don't build LibreSSL if MemorySanitizer is enabled
* [cryptofuzz] Adapt build script to latest cryptofuzz code
* [cryptofuzz] Force rebuild of OpenSSL
* [cryptofuzz] Comment and move to Dockerfile OpenSSL's commit lock
* [cryptofuzz] BoringSSL, LibreSSL: only build libcrypto.a for faster builds
* [cryptofuzz] Replace -lFuzzingEngine -> $LIB_FUZZING_ENGINE for compatibility with OSS-Fuzz' new build setup
* [cryptofuzz] Add README.md
2019-04-17 20:33:50 -07:00
Alex Gaynor
7b8971290d
[graphicsmagick] Added --time flag to clone ( #2333 )
...
This will give us more information if the clone fails (which it does sometimes, probably due to sourceforge infra issues)
2019-04-17 14:21:54 -07:00
Leandro A. F. Pereira
c416a8007b
[lwan] Use HTTP dictionary to speed up fuzzing ( #2329 )
2019-04-17 08:28:57 -07:00
tsdgeos
0221e8b030
[kimageformats] Split fuzzer into 9 fuzzers ( #2327 )
...
oss-fuzz devels say this is optimal
2019-04-16 15:40:48 -07:00
jonathanmetzman
53c09d30f6
Update patch to fix build and migrate to -fsanitize=fuzzer ( #2324 )
...
Update skia.diff to fix build breakage.
Also, use $LIB_FUZZING_ENGINE instead of -lFuzzingEngine to start using -fsanitize=fuzzer
2019-04-16 11:52:23 -07:00
tsdgeos
d2f7690886
[karchive] New project: karchive ( #2318 )
2019-04-15 14:20:24 -07:00
Max Moroz
4fba752cc3
[libxslt] Update project.yaml: replace Chromium owner in auto_cc.
2019-04-15 11:08:34 -07:00
Nick Wellnhofer
8af165e494
[libxslt] Start with integration ( #2320 )
...
Integrate the first fuzz targets from libxslt.
2019-04-15 10:27:43 -07:00
Alex Gaynor
7c05d15480
[libical] Make sure to do an apt update before apt install ( #2319 )
2019-04-15 10:11:25 -07:00
jonathanmetzman
ae9398deef
Change LIB_FUZZING_ENGINE to -fsanitize=fuzzer in libFuzzer builds ( #2312 )
2019-04-15 10:05:02 -07:00
Max Moroz
8b34fd89d2
[infra] Revert the recent clang roll to fix some builds ( #2315 ). ( #2316 )
2019-04-12 09:14:09 -07:00
jonathanmetzman
97eca89ed9
Build clang so that it can compile targets with `-fsanitize=fuzzer` ( #2311 )
...
Build clang so that it can compile targets with -fsanitize=fuzzer
without adding any runtime dependencies.
2019-04-11 09:51:19 -07:00
Nick Terrell
3eaad4f3e2
[zstd] Add fuzzers and cc emails ( #2309 )
...
* [zstd] Add seed corpora for two new fuzzers
* [zstd] Add two more emails to cc list
It is helpful to add in the corporate email so we don't miss bugs.
2019-04-10 13:35:20 -07:00
tsdgeos
36005daba0
libical: Fix undefined sanitizer not building ( #2308 )
...
The cmake option for disabling shared libs was not the correct one
and the compilation was getting confused
2019-04-10 11:23:34 -07:00
Damien Miller
2b49be2eaa
Updates for OpenSSH fuzzing ( #2306 )
...
* Enable experimental XMSS keys for fuzzing
* Enable auth options fuzzer
2019-04-10 13:31:45 +10:00
Leandro A. F. Pereira
935e25b1ff
[lwan] Add fuzzing targets for Lwan ( #2302 )
2019-04-09 13:54:01 -07:00
Abhishek Arya
c4fe1fef9e
Disable UBSan for libical ( #2298 )
2019-04-09 11:46:33 -07:00
tsdgeos
e445a90d94
Add libical ( #2298 )
2019-04-09 11:23:05 -07:00
Paul Dreik
676071636c
Libtorrent take2 ( #2299 )
...
* switch to another fuzzer repo aimed to be merged upstream
* update email addresses
checked with arvid, he approved adding his address
* [libtorrent] improve building
- use ninja
- don't build tests
- respect CXXFLAGS when building boost
- less verbose output when downloading
* create initial corpus zip files from git
this makes it much easier to add and remove
both fuzzers and corpus upstream and make
sure they work well.
2019-04-09 11:22:07 -07:00
Kostya Serebryany
08af8b64ad
[libpng-proto] remove stale comment
2019-04-09 11:01:58 -07:00
Kostya Serebryany
663d09feb2
[libpng-proto] add asan back
2019-04-09 10:57:09 -07:00
Abhishek Arya
2e3212d8f0
Revert "Remove mbed TLS fuzzer ( #2278 )" ( #2304 )
...
This reverts commit cce2ed4d23
.
2019-04-09 09:07:55 -07:00
Max Moroz
946d0603ba
[infra] Enabling DataFlow build configuration ( #1632 ). ( #2292 )
...
* [infra] Enabling DataFlow build configuration (#1632 ).
* Copy all data flow scripts from the libFuzzer repo.
2019-04-09 07:25:14 -07:00
Oliver Chang
5c5a10a16d
Update project.yaml
2019-04-09 10:47:13 +10:00
Matt Morehouse
6c3880cfd5
[llvm] Remove proto fuzzers. ( #2301 )
...
Proto fuzzers are slow and haven't found bugs in a long time. Their
builds are also hard to maintain since they build in a different
configuration than any of the LLVM build bots.
2019-04-08 12:30:36 -07:00
Guido Vranken
eb2795c830
[bignum-fuzzer] Fix OpenSSL build ( #2296 )
2019-04-06 07:28:40 -07:00
Sebastian Rasmussen
7fa021dfbe
[mupdf] Update to latest version of API provided by MuPDF. ( #2294 )
2019-04-05 12:16:43 -07:00
Mihai Maruseac
922ea7c8fe
[TensorFlow] Ensure we're always using a valid Bazel ( #2293 )
...
* Determine Bazel version from configure.py script
* Install Bazel at the version from configure.py
* Don't downgrade Bazel on Dockerfile
* Make sure we were able to install proper Bazel
* Comment update
2019-04-04 23:35:11 -07:00
Max Moroz
2eaa543f82
[zlib] Fix build.sh to overwrite seed corpus symlinks.
2019-04-04 12:54:37 -07:00
jonathanmetzman
6625401871
Fix build breakage caused by unnecessary AFL testing ( #2291 )
...
Don't test compilation with afl-clang and afl-fuzz
2019-04-04 07:11:40 -07:00
Mihai Maruseac
2fa5eca226
[tensorflow] Update Bazel version and check that it is compatible ( #2288 )
...
* Update Bazel to 0.24.0
* Always run ./configure
2019-04-03 09:57:58 -07:00
Oliver Chang
23a5f44b29
Address comments from https://github.com/google/oss-fuzz/pull/2285 . ( #2287 )
2019-04-03 15:29:23 +11:00
Paul Dreik
7b3ebc2abb
[libtorrent] add address for google account ( #2286 )
...
see https://github.com/google/oss-fuzz/issues/2261#issuecomment-479085906
2019-04-02 09:53:51 -07:00
Oliver Chang
994900ab47
Fix builds status script ( #2285 )
...
Get a batch of the last 2000 builds, and filter on those ourselves
instead of calling the cloudbuild API to filter for us. The cloudbuild
API filtering API does not work with our number of builds.
Fixes #2263
2019-04-02 12:00:55 +08:00
Oliver Chang
7bf55a11df
Use a single tag for builds. ( #2284 )
...
Filtering on multiple tags doesn't seem to work.
2019-04-02 08:19:58 +08:00
Kevin Lubick
a1315ef31e
[skia] fix build after rename ( #2283 )
2019-04-01 13:31:15 -07:00
Stanislav Malyshev
795aa42757
Use libonig5 - this will enable mbstring regex limits ( #2282 )
2019-04-01 12:29:42 -07:00
Paul Dreik
b858b0036d
Libtorrent ( #2268 )
...
* [boost] add fuzzers for boost property tree parsers
* [boost] fix missing files in Docker copy command
* add libtorrent
* set email address, clone depth 10
* remove templated text
2019-04-01 11:31:16 -07:00
Guido Vranken
8594957c7e
[libsrtp] Enable MemorySanitizer builds ( #2271 )
2019-04-01 09:15:52 -07:00
Guido Vranken
b3b4a5c3a3
[tesseract-ocr] Add fuzzer that processes 512x512 images ( #2279 )
2019-04-01 09:15:21 -07:00
Guido Vranken
cce2ed4d23
Remove mbed TLS fuzzer ( #2278 )
2019-03-31 22:49:35 -07:00
Konstantin Varlamov
927922aadf
Fix Firestore build by adding missing build dependencies ( #2280 )
...
* Add missing build dependencies
* Update cc list
2019-04-01 08:37:28 +08:00
Alexander Alekhin
b27c51dee4
[opencv] update build scripts ( #2276 )
...
- disable building of tests/apps (not used for fuzzing)
- unlock using local source checkout: https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md#reproduce-using-local-source-checkout
* $SRC - fuzzers sources
* $SRC/opencv - opencv sources
* $WORK/build-$SANITIZER - build directory
2019-04-01 08:37:01 +08:00
Max Moroz
497cd398d0
[infra] Fix code coverage builder script (regressed after #2264 ).
2019-03-31 11:33:07 -07:00
Joachim Bauch
e09485feab
[lzma] Add LZMA SDK ( #2267 )
...
* Add LZMA SDK
* Use email of Igor Pavlov as primary contact and add more sanitizers.
2019-03-31 11:24:39 -07:00
tsdgeos
5f2ed9d550
[kimageformats] Include ora and kra handlers ( #2277 )
...
This pulls karchive that pulls, ecm and libzip and libzip pulls zlib
2019-03-31 11:04:40 -07:00
Daniel Marjamäki
080a64aca0
change WORKDIR ( #2275 )
2019-03-30 07:54:24 -07:00
Daniel Marjamäki
94e1e96a99
tweak cppcheck. moved fuzzer client to main cppcheck repo. ( #2274 )
2019-03-29 15:32:47 -07:00
Marc-Andre Lureau
dfd9d777a8
libtpms: update my email address ( #2272 )
...
Use the canonical form, this may help with oss-fuzz.com access.
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2019-03-28 11:19:05 -07:00