aboutsummaryrefslogtreecommitdiffhomepage
path: root/projects
Commit message (Collapse)AuthorAge
* [TSAN] Support TSAN (#5266)Gravatar jonathanmetzman2021-03-02
| | | | We aren't planning on suppoting TSAN on ClusterFuzz. But we can support in CIFuzz since Skia wants it.
* [vitess] Add email contact (#5274)Gravatar AdamKorcz2021-03-02
| | | | | * [teleport] Initial integration * Minor update to run tests again
* [skia] Add api_ddl_threading fuzzing (#5257)Gravatar wjtracey2021-03-02
|
* add arquebus (#5270)Gravatar asraa2021-03-01
| | | Signed-off-by: Asra Ali <asraa@google.com>
* [qt] Use default fuzzing engines again (#5269)Gravatar Robert Löhning2021-03-01
| | | i.e. bring back afl.
* Fixes radon build (#5267)Gravatar Catena cyber2021-03-01
| | | | | | | * Fixes radon build * Fixes lotus build for all fuzz targets * Fixes lotus
* libredwg: no unstable versions (#5259)Gravatar Reini Urban2021-02-28
| | | don't test unstable non-release preR13 paths.
* [cryptofuzz] Update e-mail list (#5263)Gravatar Guido Vranken2021-02-27
|
* libyang: give access to the bug reports (#5260)Gravatar Michal Vasko2021-02-26
| | | Add a gmail account to get access to the detailed reports.
* [jazzer][java-example] Fix native library loading. (#5262)Gravatar jonathanmetzman2021-02-26
| | | | | | | | | | | | | Prior to this change, native library loading failed for two reasons: 1. Loading from current working directory instead of the fuzzer's directory. 2. Using ASAN_OPTIONS=handle_segv=2. Fix these issues by doing the following. 1. Adding the fuzzer's directory to LD_LIBRARY_PATH instead of "." 2. Specifying handle_segv=1 in ASAN_OPTIONS. Related: https://github.com/google/oss-fuzz/issues/5178
* Add HEIF format to kimageformats project (#5261)Gravatar Daniel Novomeský2021-02-26
|
* libyang: initial integration (#5227)Gravatar DavidKorczynski2021-02-26
| | | | | | | | | * initial integration. * Updated the libyang project to reflect upstream set up. * Remove fuzzer that has false positives. * Updated project.yaml.
* libredwg changed the fuzzer source (#5256)Gravatar Reini Urban2021-02-25
|
* Fixes teleport and syzkaller builds (#5254)Gravatar Catena cyber2021-02-25
| | | | | | | * Fixes teleport and syzkaller builds By running go mod vendor after go mod tidy * fixup syzkaller
* w3m: initial integration (#5127)Gravatar DavidKorczynski2021-02-25
|
* Fixes go-quic corpuses build (#5250)Gravatar Catena cyber2021-02-24
| | | | | | | | | * Fixes go-quic corpuses build * fixup * Fixes minify build * Do not generate corpuses for quic-go coverage
* [jazzer] Migrate projects to new void fuzzerTestOneInput (#5251)Gravatar Fabian Meumertzheim2021-02-24
| | | | | | | | | Jazzer has made fuzzerTestOneInput return void instead of boolean. This commit adapts the existing Jazzer fuzz targets to this change. Previously, returning true from a fuzz target would be recorded as a crash. However, since there is no stack trace in that case, such crashes cause issues with deduplication. Additionally, the behavior is easy to replicate with assert or a an if with a throw statement.
* Md4c: Update primary_contact e-mail address (#5249)Gravatar Martin Mitáš2021-02-24
|
* Remove wpk, add artem,pspacek to auto_ccs (#5248)Gravatar Ondřej Surý2021-02-24
|
* md4c: initial integration (#5242)Gravatar DavidKorczynski2021-02-24
| | | | | * initial integration of md4c project. * update project based on upstream changes.
* libiec61850: initial integration (#5225)Gravatar DavidKorczynski2021-02-24
|
* libredwg: initial integration. (#5226)Gravatar DavidKorczynski2021-02-24
| | | | | | | * initial integration. * Updated the project yaml. * Updated projet to reflect upstream changes.
* Fix ecc-diff-fuzzer build with right botan config (#5229)Gravatar Catena cyber2021-02-23
| | | | | | | | | | | * Fix ecc-diff-fuzzer build with right botan config Taken from oss-fuzz botan configure line * another try * Fixes botan build * compile ecc-diff-fuzzer like fixing botan
* Go 1.16 local builds (#5241)Gravatar Catena cyber2021-02-23
| | | | | | | | | | | | | | | | | * Makes vitess build local As it uses vitess.io instead of github * Completes minify project * Completes quic-go * Local build for nats project * Completes ipfs * run go mod tidy after adding go module * Right bash sequence for go mod tidy
* [p11-kit] Use gmail address for the maintainer (#5244)Gravatar Daiki Ueno2021-02-23
|
* Fix git build by ignoring leaks in build.sh (#5240)Gravatar Andrzej Hunt2021-02-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The oss-fuzz git ASAN build fails due to a leak inside git iself: the build script builds a copy of git, and then uses that binary to prepare the corpus - although the git invocation itself succeeds, ASAN causes the script to fail due to the leak: https://oss-fuzz-build-logs.storage.googleapis.com/log-2eee2921-1b3f-4dd8-a902-50474e8fed55.txt This was reproduced locally using: $ python infra/helper.py build_fuzzers --sanitizer address git Disabling leak checking for all invocations of git in the script is enough to avoid this failure, thus fixing the build. The leak itself is being fixed in git in the following commit (which is now in next, hence the build should be fixed by now): https://git.kernel.org/pub/scm/git/git.git/commit/?id=bf4bb9f9f5130a7b299f7810fb87a40cdd1bd8ee However, I still believe we should be disabling leak checking during the build script in this way because: 1. This issue persisted for close to one month before being fixed, and blocking oss-fuzz runs on a leak during the build process for that long seems counter-productive. 2. An alternative would be to use a pre-built copy of git to build the corpus (thus sidestepping ASAN in the first place), but IMHO installing git via the Dockerfile seems more wasteful AND it's unclear if that would have side effects (I'm not sure if the commit-graph format changes between versions).
* [istio] Fix build (#5232)Gravatar AdamKorcz2021-02-22
| | | | | | | | | | | | | | | | | * [teleport] Initial integration * Minor update to run tests again * Fix istio build * Small fix * Experimental fix * Experimental fix * Disable coverage build * Enabled coverage build
* Go 1.16 more fixes (#5239)Gravatar Catena cyber2021-02-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Fixes cilium build * Fixes dragonfly build * Fixes fasthttp build * Fixes fastjson build * golang build: change directory only temporary * Fixes gitea build * Fixes grpc-gateway build * Fixes hugo project build * Fixes ipfs build * Fixes jsonparser build * Fixes kubernetes build * Fixes loki build * Fixes minify build * Fixes nats build * Removes go get from the docs * Fixes quic-go build * Fixes radon build * Fixes syzkaller build * Fixes tidb build * Fixes vitess build
* Add '-fno-sanitize=enum' to CXXFLAGS for unrar (#5238)Gravatar Varun Khaneja2021-02-22
|
* Fixes go coverage build with go 1.16 (#5237)Gravatar Catena cyber2021-02-22
|
* libzmq: enable afl and simplify project.yaml. (#5147)Gravatar DavidKorczynski2021-02-21
|
* zeek: enable afl and simplify project.yaml (#5148)Gravatar DavidKorczynski2021-02-21
| | | | | * zeek: enable afl. * Added whitespace to gtrigger ci.
* dropbear: enable afl and simplify project yaml (#5150)Gravatar DavidKorczynski2021-02-21
| | | | | * dropbear: enable afl and simplify project yaml. * dropbear: fixup project yaml and copyrights.
* postgresql: fix fuzzers + build, and enable AFL. (#5164)Gravatar DavidKorczynski2021-02-21
| | | | | | | * postgresql: fix fuzzers and build, and enable AFL. * postgresql: fix up main repo. * postgresql: fix up the patch for postgresql.
* tesseract-ocr: enable afl and simplify project.yaml. (#5152)Gravatar DavidKorczynski2021-02-21
|
* Go 1.16 build fix with right parentheses (#5228)Gravatar Catena cyber2021-02-21
| | | | | | | | | | | | | * go: right bash condition for changing directory * go-json-iterator: uses git clone So as to copy fuzz target in right directory * go: uses tags when running go list * go-redis: uses git clone and builds local fuzz target * cascadia: uses git clone instead of go get
* Use sudo's new install-fuzzer Makefile target to install fuzzers. (#5224)Gravatar Todd C. Miller2021-02-19
| | | | | This also builds and installs the seed corpus zip files. The --disable-leaks option is implied by --enable-sanitizer and --enable-fuzzer so it is no longer needed either.
* [tarantool] initial integration (#4723) (#4723)Gravatar Sergey Bronnikov2021-02-19
|
* [java-example] Don't assume that fuzzer is run from its directory (#5219)Gravatar Fabian Meumertzheim2021-02-19
| | | | | | The same speculative fix as in #5217. The current working directory "." should have no reason to be in the classpath if it is not equal to "$this_dir", hence it is removed.
* [jazzer] Add java-example project (#5216)Gravatar Fabian Meumertzheim2021-02-18
| | | | | | | | | | | The java-example project does not pull in any external dependencies, but rather consists of three basic Java fuzzers that hit a synthetic bug after a few seconds. The project can be used to verify that ClusterFuzz correctly handles JVM fuzz targets. * ExampleFuzzer fails with an assertion. * ExampleValueProfileFuzzer fails with an exception after a few seconds, but only if running in value profile mode. * ExampleFuzzerNative fails with an ASan report.
* Final afl++ integration (#5191)Gravatar van Hauser2021-02-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | * final afl++ integration * remove afl++ cmplog tests * update afl++ commit id * support rebuild * llvm 13 workaround * apply fix for llvm 13 * fix nits * Fix nits. * Fix name nit. * update commit id * update commit id * update commit id to stable Co-authored-by: Abhishek Arya <inferno@chromium.org>
* [openjpeg] Release cmake build type (#5209)Gravatar Andrea Fioraldi2021-02-18
| | | | | | | Seems that some bugs in openjpeg can be triggered only in release mode. More specifically, I was trying to reproduce https://github.com/uclouvain/openjpeg/issues/1228 using the OSS-Fuzz harness and I failed. I figured out that the bug is indeed reachable by the harness, but can be uncovered only in Release mode, otherwise, an assertion error blocks it. I guess that they use assertions only in Debug mode (WTF) and remove them in Release. So, IMO openjpeg should be fuzzed in Release mode as the configuration used in production is the one relevant for security.
* New project: p11-kit (#5136)Gravatar Daiki Ueno2021-02-18
| | | Co-authored-by: David Cook <divergentdave@gmail.com>
* [json-sanitizer][jazzer] Don't assume that fuzzer is run from its directory ↵Gravatar jonathanmetzman2021-02-18
| | | | | | | | | | | | (#5217) This is a speculative fix for an issue we've seen where the class fails to load. A simpler approach I did not use is cd-ing into $this_dir. I didn't use this approach because it will break things if relative paths are passed to the fuzzer by ClusterFuzz. The other reason that I think could be responsible for the missing class issues is not unpacking the zipfile fully.
* lua: fix auto_ccs email (#5215)Gravatar DavidKorczynski2021-02-18
|
* Change the primary_contact for bs4 (#5212)Gravatar Google AutoFuzz Team2021-02-18
| | | As requested privately by Leonard
* Remove manual denylisting in tensorflow (#5210)Gravatar Amit Patankar2021-02-17
| | | | | | | | | | | * Remove manual denylisting in tensorflow Remove manual denylisting of fuzzing targets using bazel query via tags. * Add a space in the bazel query. * Update the tag we should denylist. * Update the comment.
* [jazzer][json-sanitizer] Add json-sanitizer as the first JVM project (#5186)Gravatar Fabian Meumertzheim2021-02-16
| | | | | | | | | | | | | | | | json-sanitizer uses Maven and has no native dependencies. The build file is loosely divided into two parts. The first part is project-specific, the second one can serve as a template for JVM fuzz targets without native dependencies. The following three fuzz targets are added to OSS-Fuzz and can later be moved into the json-sanitizer tree: * DenylistFuzzer verifies that the output of json-sanitizer never contains certain substrings that can lead to HTML or XML injections. * IdempotenceFuzzer verifies that json-sanitizer is idempotent. * ValidJsonFuzzer verifies that the output of json-sanitizer is valid JSON by passing it into gson.
* sudoers: fuzz targets are now integrated into the build system (#5198)Gravatar Todd C. Miller2021-02-15
| | | | | * use configure options to set the compiler/linker flags * use make to build the actual fuzz targets
* Use upstream repo for go-sqlite3 project (#5203)Gravatar Catena cyber2021-02-15
|