Commit Graph

3096 Commits

Author SHA1 Message Date
Nick Terrell fb7075b1ed [zstd] Move downloading seed corpora to build.sh (#2331)
I just added a new fuzzer, `zstd_frame_info`, and want to be able to add new
fuzzers without submitting a pull request to oss-fuzz. This change uses zstd's
Makefile to download the corpora. Now I can add a new fuzzer to zstd and it will
automatically get built and download the seed corpus in oss-fuzz.
2019-04-17 21:42:41 -07:00
Guido Vranken 7bdfb2b7d8 Cryptofuzz (differential crypto fuzzing) (#2273)
* Add cryptofuzz

* [cryptofuzz] Specify sanitizers

* [cryptofuzz] Actually disable assembly in second OpenSSL build

* [cryptofuzz] Add BoringSSL

* [cryptofuzz] Enable MemorySanitizer builds

* [cryptofuzz] Fix OpenSSL build

* [cryptofuzz] Add LibreSSL target

* [cryptofuzz] Don't build LibreSSL if MemorySanitizer is enabled

* [cryptofuzz] Adapt build script to latest cryptofuzz code

* [cryptofuzz] Force rebuild of OpenSSL

* [cryptofuzz] Comment and move to Dockerfile OpenSSL's commit lock

* [cryptofuzz] BoringSSL, LibreSSL: only build libcrypto.a for faster builds

* [cryptofuzz] Replace -lFuzzingEngine -> $LIB_FUZZING_ENGINE for compatibility with OSS-Fuzz' new build setup

* [cryptofuzz] Add README.md
2019-04-17 20:33:50 -07:00
Alex Gaynor 7b8971290d [graphicsmagick] Added --time flag to clone (#2333)
This will give us more information if the clone fails (which it does sometimes, probably due to sourceforge infra issues)
2019-04-17 14:21:54 -07:00
Leandro A. F. Pereira c416a8007b [lwan] Use HTTP dictionary to speed up fuzzing (#2329) 2019-04-17 08:28:57 -07:00
tsdgeos 0221e8b030 [kimageformats] Split fuzzer into 9 fuzzers (#2327)
oss-fuzz devels say this is optimal
2019-04-16 15:40:48 -07:00
jonathanmetzman 53c09d30f6
Update patch to fix build and migrate to -fsanitize=fuzzer (#2324)
Update skia.diff to fix build breakage.
Also, use $LIB_FUZZING_ENGINE instead of -lFuzzingEngine to start using -fsanitize=fuzzer
2019-04-16 11:52:23 -07:00
tsdgeos d2f7690886 [karchive] New project: karchive (#2318) 2019-04-15 14:20:24 -07:00
Max Moroz 4fba752cc3 [libxslt] Update project.yaml: replace Chromium owner in auto_cc. 2019-04-15 11:08:34 -07:00
Nick Wellnhofer 8af165e494 [libxslt] Start with integration (#2320)
Integrate the first fuzz targets from libxslt.
2019-04-15 10:27:43 -07:00
Alex Gaynor 7c05d15480 [libical] Make sure to do an apt update before apt install (#2319) 2019-04-15 10:11:25 -07:00
jonathanmetzman ae9398deef
Change LIB_FUZZING_ENGINE to -fsanitize=fuzzer in libFuzzer builds (#2312) 2019-04-15 10:05:02 -07:00
Max Moroz 8b34fd89d2
[infra] Revert the recent clang roll to fix some builds (#2315). (#2316) 2019-04-12 09:14:09 -07:00
jonathanmetzman 97eca89ed9
Build clang so that it can compile targets with `-fsanitize=fuzzer` (#2311)
Build clang so that it can compile targets with -fsanitize=fuzzer
without adding any runtime dependencies.
2019-04-11 09:51:19 -07:00
Nick Terrell 3eaad4f3e2 [zstd] Add fuzzers and cc emails (#2309)
* [zstd] Add seed corpora for two new fuzzers

* [zstd] Add two more emails to cc list

It is helpful to add in the corporate email so we don't miss bugs.
2019-04-10 13:35:20 -07:00
tsdgeos 36005daba0 libical: Fix undefined sanitizer not building (#2308)
The cmake option for disabling shared libs was not the correct one
and the compilation was getting confused
2019-04-10 11:23:34 -07:00
Damien Miller 2b49be2eaa Updates for OpenSSH fuzzing (#2306)
* Enable experimental XMSS keys for fuzzing

* Enable auth options fuzzer
2019-04-10 13:31:45 +10:00
Leandro A. F. Pereira 935e25b1ff [lwan] Add fuzzing targets for Lwan (#2302) 2019-04-09 13:54:01 -07:00
Abhishek Arya c4fe1fef9e
Disable UBSan for libical (#2298) 2019-04-09 11:46:33 -07:00
tsdgeos e445a90d94 Add libical (#2298) 2019-04-09 11:23:05 -07:00
Paul Dreik 676071636c Libtorrent take2 (#2299)
* switch to another fuzzer repo aimed to be merged upstream

* update email addresses

checked with arvid, he approved adding his address

* [libtorrent] improve building

 - use ninja
 - don't build tests
 - respect CXXFLAGS when building boost
 - less verbose output when downloading

* create initial corpus zip files from git

this makes it much easier to add and remove
both fuzzers and corpus upstream and make
sure they work well.
2019-04-09 11:22:07 -07:00
Kostya Serebryany 08af8b64ad
[libpng-proto] remove stale comment 2019-04-09 11:01:58 -07:00
Kostya Serebryany 663d09feb2
[libpng-proto] add asan back 2019-04-09 10:57:09 -07:00
Abhishek Arya 2e3212d8f0
Revert "Remove mbed TLS fuzzer (#2278)" (#2304)
This reverts commit cce2ed4d23.
2019-04-09 09:07:55 -07:00
Max Moroz 946d0603ba
[infra] Enabling DataFlow build configuration (#1632). (#2292)
* [infra] Enabling DataFlow build configuration (#1632).

* Copy all data flow scripts from the libFuzzer repo.
2019-04-09 07:25:14 -07:00
Oliver Chang 5c5a10a16d
Update project.yaml 2019-04-09 10:47:13 +10:00
Matt Morehouse 6c3880cfd5 [llvm] Remove proto fuzzers. (#2301)
Proto fuzzers are slow and haven't found bugs in a long time.  Their
builds are also hard to maintain since they build in a different
configuration than any of the LLVM build bots.
2019-04-08 12:30:36 -07:00
Guido Vranken eb2795c830 [bignum-fuzzer] Fix OpenSSL build (#2296) 2019-04-06 07:28:40 -07:00
Sebastian Rasmussen 7fa021dfbe [mupdf] Update to latest version of API provided by MuPDF. (#2294) 2019-04-05 12:16:43 -07:00
Mihai Maruseac 922ea7c8fe [TensorFlow] Ensure we're always using a valid Bazel (#2293)
* Determine Bazel version from configure.py script

* Install Bazel at the version from configure.py

* Don't downgrade Bazel on Dockerfile

* Make sure we were able to install proper Bazel

* Comment update
2019-04-04 23:35:11 -07:00
Max Moroz 2eaa543f82 [zlib] Fix build.sh to overwrite seed corpus symlinks. 2019-04-04 12:54:37 -07:00
jonathanmetzman 6625401871
Fix build breakage caused by unnecessary AFL testing (#2291)
Don't test compilation with afl-clang and afl-fuzz
2019-04-04 07:11:40 -07:00
Mihai Maruseac 2fa5eca226 [tensorflow] Update Bazel version and check that it is compatible (#2288)
* Update Bazel to 0.24.0

* Always run ./configure
2019-04-03 09:57:58 -07:00
Oliver Chang 23a5f44b29
Address comments from https://github.com/google/oss-fuzz/pull/2285. (#2287) 2019-04-03 15:29:23 +11:00
Paul Dreik 7b3ebc2abb [libtorrent] add address for google account (#2286)
see https://github.com/google/oss-fuzz/issues/2261#issuecomment-479085906
2019-04-02 09:53:51 -07:00
Oliver Chang 994900ab47
Fix builds status script (#2285)
Get a batch of the last 2000 builds, and filter on those ourselves
instead of calling the cloudbuild API to filter for us. The cloudbuild
API filtering API does not work with our number of builds.

Fixes #2263
2019-04-02 12:00:55 +08:00
Oliver Chang 7bf55a11df
Use a single tag for builds. (#2284)
Filtering on multiple tags doesn't seem to work.
2019-04-02 08:19:58 +08:00
Kevin Lubick a1315ef31e [skia] fix build after rename (#2283) 2019-04-01 13:31:15 -07:00
Stanislav Malyshev 795aa42757 Use libonig5 - this will enable mbstring regex limits (#2282) 2019-04-01 12:29:42 -07:00
Paul Dreik b858b0036d Libtorrent (#2268)
* [boost] add fuzzers for boost property tree parsers

* [boost] fix missing files in Docker copy command

* add libtorrent

* set email address, clone depth 10

* remove templated text
2019-04-01 11:31:16 -07:00
Guido Vranken 8594957c7e [libsrtp] Enable MemorySanitizer builds (#2271) 2019-04-01 09:15:52 -07:00
Guido Vranken b3b4a5c3a3 [tesseract-ocr] Add fuzzer that processes 512x512 images (#2279) 2019-04-01 09:15:21 -07:00
Guido Vranken cce2ed4d23 Remove mbed TLS fuzzer (#2278) 2019-03-31 22:49:35 -07:00
Konstantin Varlamov 927922aadf Fix Firestore build by adding missing build dependencies (#2280)
* Add missing build dependencies

* Update cc list
2019-04-01 08:37:28 +08:00
Alexander Alekhin b27c51dee4 [opencv] update build scripts (#2276)
- disable building of tests/apps (not used for fuzzing)
- unlock using local source checkout: https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md#reproduce-using-local-source-checkout
  * $SRC - fuzzers sources
  * $SRC/opencv - opencv sources
  * $WORK/build-$SANITIZER - build directory
2019-04-01 08:37:01 +08:00
Max Moroz 497cd398d0 [infra] Fix code coverage builder script (regressed after #2264). 2019-03-31 11:33:07 -07:00
Joachim Bauch e09485feab [lzma] Add LZMA SDK (#2267)
* Add LZMA SDK

* Use email of Igor Pavlov as primary contact and add more sanitizers.
2019-03-31 11:24:39 -07:00
tsdgeos 5f2ed9d550 [kimageformats] Include ora and kra handlers (#2277)
This pulls karchive that pulls, ecm and libzip and libzip pulls zlib
2019-03-31 11:04:40 -07:00
Daniel Marjamäki 080a64aca0 change WORKDIR (#2275) 2019-03-30 07:54:24 -07:00
Daniel Marjamäki 94e1e96a99 tweak cppcheck. moved fuzzer client to main cppcheck repo. (#2274) 2019-03-29 15:32:47 -07:00
Marc-Andre Lureau dfd9d777a8 libtpms: update my email address (#2272)
Use the canonical form, this may help with oss-fuzz.com access.

Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
2019-03-28 11:19:05 -07:00