aboutsummaryrefslogtreecommitdiff
path: root/projects/libtiff
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2018-04-11 08:37:33 +0800
committerjonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>2018-04-10 17:37:33 -0700
commit3dd226d31bd585e1d87c892527239040ea775032 (patch)
tree81e07ad8c02e6856cf7fd724c540883e55116900 /projects/libtiff
parent603b7bb818e1266e793cc5a95e98f02a237360f2 (diff)
downloadoss-fuzz-3dd226d31bd585e1d87c892527239040ea775032.tar.gz
libtiff support (#1311)
Add Initial libtiff fuzzer
Diffstat (limited to 'projects/libtiff')
-rw-r--r--projects/libtiff/Dockerfile26
-rwxr-xr-xprojects/libtiff/build.sh47
-rw-r--r--projects/libtiff/project.yaml8
-rw-r--r--projects/libtiff/tiff_read_rgba_fuzzer.cc67
4 files changed, 148 insertions, 0 deletions
diff --git a/projects/libtiff/Dockerfile b/projects/libtiff/Dockerfile
new file mode 100644
index 000000000..2b5c4f03d
--- /dev/null
+++ b/projects/libtiff/Dockerfile
@@ -0,0 +1,26 @@
+# Copyright 2018 Google Inc.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+################################################################################
+
+FROM gcr.io/oss-fuzz-base/base-builder
+MAINTAINER paul.l.kehrer@gmail.com
+RUN apt-get update && apt-get install -y make autoconf automake libtool cmake nasm
+RUN git clone --depth 1 https://gitlab.com/libtiff/libtiff
+RUN git clone --depth 1 https://github.com/madler/zlib
+RUN git clone --depth 1 https://github.com/libjpeg-turbo/libjpeg-turbo
+ADD http://lcamtuf.coredump.cx/afl/demo/afl_testcases.tgz afl_testcases.tgz
+ADD https://raw.githubusercontent.com/mcarpenter/afl/master/dictionaries/tiff.dict tiff.dict
+WORKDIR libtiff
+COPY build.sh tiff_read_rgba_fuzzer.cc $SRC/
diff --git a/projects/libtiff/build.sh b/projects/libtiff/build.sh
new file mode 100755
index 000000000..487b4572c
--- /dev/null
+++ b/projects/libtiff/build.sh
@@ -0,0 +1,47 @@
+#!/bin/bash -eu
+# Copyright 2018 Google Inc.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+################################################################################
+
+
+# build zlib
+pushd "$SRC/zlib"
+./configure --static --prefix="$WORK"
+make -j$(nproc) CFLAGS="$CFLAGS -fPIC"
+make install
+popd
+
+# Build libjpeg-turbo
+pushd "$SRC/libjpeg-turbo"
+cmake . -DCMAKE_INSTALL_PREFIX=$WORK -DENABLE_STATIC=on -DENABLE_SHARED=off
+make -j$(nproc)
+make install
+popd
+
+cmake . -DCMAKE_INSTALL_PREFIX=$WORK -DBUILD_SHARED_LIBS=off
+make -j$(nproc)
+make install
+
+$CXX $CXXFLAGS -std=c++11 -I$WORK/include \
+ $SRC/tiff_read_rgba_fuzzer.cc -o $OUT/tiff_read_rgba_fuzzer \
+ -lFuzzingEngine $WORK/lib/libtiffxx.a $WORK/lib/libtiff.a $WORK/lib/libz.a $WORK/lib/libjpeg.a
+
+mkdir afl_testcases
+(cd afl_testcases; tar xf "$SRC/afl_testcases.tgz")
+mkdir tif
+find afl_testcases -type f -name '*.tif' -exec mv -n {} tif/ \;
+zip -rj tif.zip tif/
+cp tif.zip "$OUT/tiff_read_rgba_fuzzer_seed_corpus.zip"
+cp "$SRC/tiff.dict" "$OUT/tiff_read_rgba_fuzzer.dict"
diff --git a/projects/libtiff/project.yaml b/projects/libtiff/project.yaml
new file mode 100644
index 000000000..1150a0b62
--- /dev/null
+++ b/projects/libtiff/project.yaml
@@ -0,0 +1,8 @@
+homepage: "http://www.libtiff.org"
+primary_contact: "even.rouault@gmail.com"
+auto_ccs:
+ - paul.l.kehrer@gmail.com
+sanitizers:
+ - address
+ - memory
+ - undefined
diff --git a/projects/libtiff/tiff_read_rgba_fuzzer.cc b/projects/libtiff/tiff_read_rgba_fuzzer.cc
new file mode 100644
index 000000000..e19481f4e
--- /dev/null
+++ b/projects/libtiff/tiff_read_rgba_fuzzer.cc
@@ -0,0 +1,67 @@
+#include <cstdint>
+#include <sstream>
+#include <tiffio.h>
+#include <tiffio.hxx>
+
+
+/* stolen from tiffiop.h, which is a private header so we can't just include it */
+/* safe multiply returns either the multiplied value or 0 if it overflowed */
+#define __TIFFSafeMultiply(t,v,m) ((((t)(m) != (t)0) && (((t)(((v)*(m))/(m))) == (t)(v))) ? (t)((v)*(m)) : (t)0)
+
+const tmsize_t MAX_SIZE = 500000000;
+
+extern "C" void handle_error(const char *unused, const char *unused2, va_list unused3) {
+ return;
+}
+
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
+ TIFFSetErrorHandler(handle_error);
+ TIFFSetWarningHandler(handle_error);
+ std::istringstream s(std::string(Data,Data+Size));
+ TIFF* tif = TIFFStreamOpen("MemTIFF", &s);
+ if (!tif) {
+ return 0;
+ }
+ uint32 w, h;
+ size_t npixels;
+ uint32* raster;
+
+ TIFFGetField(tif, TIFFTAG_IMAGEWIDTH, &w);
+ TIFFGetField(tif, TIFFTAG_IMAGELENGTH, &h);
+ /* don't continue if image has negative size or the file size is ludicrous */
+ if (TIFFTileSize(tif) > MAX_SIZE || w <=0 || h <= 0) {
+ TIFFClose(tif);
+ return 0;
+ }
+ tmsize_t bufsize = __TIFFSafeMultiply(tmsize_t, TIFFTileSize(tif), 4);
+ /* don't continue if the buffer size greater than the max allowed by the fuzzer */
+ if (bufsize > MAX_SIZE || bufsize == 0) {
+ TIFFClose(tif);
+ return 0;
+ }
+ /* another hack to work around an OOM in tif_fax3.c */
+ uint32 tilewidth = 0;
+ uint32 imagewidth = 0;
+ TIFFGetField(tif, TIFFTAG_TILEWIDTH, &tilewidth);
+ TIFFGetField(tif, TIFFTAG_IMAGEWIDTH, &imagewidth);
+ tilewidth = __TIFFSafeMultiply(uint32, tilewidth, 2);
+ imagewidth = __TIFFSafeMultiply(uint32, imagewidth, 2);
+ if (tilewidth * 2 > MAX_SIZE || imagewidth * 2 > MAX_SIZE || tilewidth == 0 || imagewidth == 0) {
+ TIFFClose(tif);
+ return 0;
+ }
+ npixels = w * h;
+ uint32 size = __TIFFSafeMultiply(uint32, w, h);
+ if (size > MAX_SIZE || size == 0) {
+ TIFFClose(tif);
+ return 0;
+ }
+ raster = (uint32*) _TIFFmalloc(npixels * sizeof (uint32));
+ if (raster != NULL) {
+ TIFFReadRGBAImage(tif, w, h, raster, 0);
+ _TIFFfree(raster);
+ }
+ TIFFClose(tif);
+
+ return 0;
+}