Age | Commit message (Collapse) | Author | |
---|---|---|---|
2021-04-03 | Snap for 7256110 from 75c8dcf71ca8652f671b4ca5fea780a558c86e08 to sc-d1-releaseandroid-12.0.0_r7android-12.0.0_r6android-12.0.0_r5android-12.0.0_r4android-12.0.0_r15android-12.0.0_r14android-12.0.0_r13android-12.0.0_r12android12-d1-s6-releaseandroid12-d1-s5-releaseandroid12-d1-s4-releaseandroid12-d1-s3-releaseandroid12-d1-s2-releaseandroid12-d1-s1-releaseandroid12-d1-release | android-build-team Robot | |
Change-Id: Iebe8b2ff0050db7f231492bb4ab8088f1495c87f | |||
2021-04-02 | Upgrade oss-fuzz to 947169dc86572e121c3e138f366a9f39ac6266ae am: f3764d0712 ↵android-12.1.0_r9android-12.1.0_r8android-12.1.0_r7android-12.1.0_r26android-12.1.0_r25android-12.1.0_r24android-12.1.0_r23android-12.1.0_r22android-12.1.0_r21android-12.1.0_r20android-12.1.0_r19android-12.1.0_r18android-12.1.0_r17android-12.1.0_r16android-12.1.0_r15android-12.1.0_r14android-12.1.0_r13android-12.1.0_r12android-12.1.0_r11android-12.1.0_r10android-12.0.0_r32android-12.0.0_r29android-12.0.0_r28android-12.0.0_r27android-12.0.0_r26android-12.0.0_r21android-12.0.0_r20android-12.0.0_r19android-12.0.0_r18android-12.0.0_r16android12L-devandroid12L-d2-s8-releaseandroid12L-d2-s7-releaseandroid12L-d2-s6-releaseandroid12L-d2-s5-releaseandroid12L-d2-s4-releaseandroid12L-d2-s3-releaseandroid12L-d2-s2-releaseandroid12L-d2-s1-releaseandroid12L-d2-releaseandroid12-qpr3-s7-releaseandroid12-qpr3-s6-releaseandroid12-qpr3-s5-releaseandroid12-qpr3-s4-releaseandroid12-qpr3-s3-releaseandroid12-qpr3-s2-releaseandroid12-qpr3-s1-releaseandroid12-qpr3-releaseandroid12-qpr1-releaseandroid12-qpr1-d-s3-releaseandroid12-qpr1-d-s2-releaseandroid12-qpr1-d-s1-releaseandroid12-qpr1-d-releaseandroid12-dev | Elliott Hughes | |
am: 1117028736 am: 235e96b2f8 Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1662261 Change-Id: Ib7b7a79b38e1261c1d5fb4ccb1a5dfd106588996 | |||
2021-04-02 | Upgrade oss-fuzz to 947169dc86572e121c3e138f366a9f39ac6266ae am: f3764d0712 ↵ | Elliott Hughes | |
am: 1117028736 Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1662261 Change-Id: I8526ccfaeb10e35f986e2e8cc24c66e965584281 | |||
2021-04-02 | Upgrade oss-fuzz to 947169dc86572e121c3e138f366a9f39ac6266ae am: f3764d0712android-s-beta-5android-s-beta-4android-s-beta-3android-s-beta-5android-s-beta-4 | Elliott Hughes | |
Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1662261 Change-Id: I18045be87879187bbbe56998975665b475a99c13 | |||
2021-04-01 | Upgrade oss-fuzz to 947169dc86572e121c3e138f366a9f39ac6266aeandroid-s-beta-2android-s-beta-1 | Elliott Hughes | |
Test: make Change-Id: I236ee3c6ec56da682c1fb018727089b10e4f5dda | |||
2021-04-01 | [java-example] Speculative fix for JVM segfault crashes (#5554) | Fabian Meumertzheim | |
The JVM uses custom SIGSEGV handlers, which leads to fuzzer crashes on ClusterFuzz when running with ASAN likely due to the allow_user_segv_handler=1 default on the platform. | |||
2021-04-01 | [kamailio] Update project.yaml (#5553) | DavidKorczynski | |
add maintainer email | |||
2021-04-01 | pillow: trying to fix build. (#5552) | DavidKorczynski | |
2021-03-31 | rustls: initial integration. (#5332) | DavidKorczynski | |
2021-03-31 | kamailio: initial integration (#5279) | DavidKorczynski | |
2021-03-31 | httparse: Initial integration (#5331) | DavidKorczynski | |
2021-03-31 | [lotus] Fix coverage build (#5544) | AdamKorcz | |
2021-03-31 | Update the Bazel project integration guide to capture the new simpler tool. ↵ | Stefan Bucur | |
(#5550) * Update the Bazel project integration guide to capture the new simpler tool. * Update bazel.md Co-authored-by: Abhishek Arya <inferno@chromium.org> | |||
2021-03-31 | Implement the Bazel building recipe as a stand-alone script that can be ↵ | Stefan Bucur | |
invoked from build.sh. (#5548) | |||
2021-03-31 | Adds project fast-dds (#5487) | Catena cyber | |
2021-03-31 | [grpc-gateway] Fix coverage build (#5545) | AdamKorcz | |
2021-03-31 | [capnproto] Initial integration (#5202) | Catena cyber | |
2021-03-31 | [thrift] Initial integration (#5264) | Catena cyber | |
2021-03-31 | [mupdf] Improve custom allocator (#5505) | Sebastian Rasmussen | |
Previously the allocator handled small pointer values incorrectly and prevented multiple executions (unexpectedly used when OSS-fuzz uses LSAN to look for memory leaks). | |||
2021-03-31 | [hugo] Fix build (#5538) | AdamKorcz | |
2021-03-31 | [dart] initial integration (#5515) | Catena cyber | |
2021-03-31 | [tinygltf] initial project integration (#5535) | Catena cyber | |
2021-03-31 | [CIFuzz] Print crash stacktraces no matter what (#5474) | jonathanmetzman | |
Even if we don't want to report them, print the stacktrace. Related: https://github.com/google/oss-fuzz/issues/5461 | |||
2021-03-31 | [lxc] move the build script and fuzz target upstream (#5514) | Evgeny Vereshchagin | |
Now that https://github.com/lxc/lxc/pull/3733 is merged, it should be safe to point OSS-Fuzz to the lxc repository. | |||
2021-03-31 | Fix minor typo in docs (#5540) | AdamKorcz | |
2021-03-30 | Adds project openbabel (#5492) | Catena cyber | |
* Adds project openbabel * fixup target merged upstream | |||
2021-03-29 | [wasmtime] Tweak member e-mail (#5532) | Andrew Brown | |
2021-03-29 | [wasmtime] add another member e-mail (#5517) | Andrew Brown | |
2021-03-29 | [skia] Add Region Op fuzzer (#5527) | Kevin Lubick | |
2021-03-29 | Suricata pcap-aware target (#5528) | Catena cyber | |
* Adds structure-aware target for suricata * Remove rustc wrapper for suricata now that https://github.com/rust-lang/rust/issues/82144 got fixed * Remove suricata rust workarounds for coverage Now that https://github.com/rust-lang/rust/issues/82144 got fixed | |||
2021-03-29 | Fix build failure in unbound (#5529) | Abhishek Arya | |
Fixes #5513 | |||
2021-03-28 | the fuzz directory was moved to nom's repository (#5523) | Geoffroy Couprie | |
2021-03-28 | Added libpff and libmodi to libyal project configuration (#5520) | Joachim Metz | |
2021-03-26 | [libjpeg-turbo] Fix build with libjpeg-turbo 2.1.x (#5519) | DRC | |
libjpeg-turbo 2.1 now requires NASM 2.13 or later or YASM 1.2.0 or later. Since the Docker image is based on Ubuntu 16.04, NASM 2.13 isn't available, so the easiest workaround is to use YASM instead. Fixes #4931 | |||
2021-03-26 | Update wasmtime config to use new x86-64 backend. (#5518) | Chris Fallin | |
In bytecodealliance/rfcs#10, we have outlined a process by which we're switching to a new compiler backend by default. The first step in this process is to switch our fuzzing targets to use the new backend and wait for any issues. This PR adds the Cargo feature that enables the new backend in all fuzzing targets. | |||
2021-03-25 | Bump pyyaml from 5.2 to 5.4 in /infra/build/functions (#5512) | dependabot[bot] | |
Bumps [pyyaml](https://github.com/yaml/pyyaml) from 5.2 to 5.4. - [Release notes](https://github.com/yaml/pyyaml/releases) - [Changelog](https://github.com/yaml/pyyaml/blob/master/CHANGES) - [Commits](https://github.com/yaml/pyyaml/compare/5.2...5.4) Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> | |||
2021-03-25 | Bump pyyaml from 5.3.1 to 5.4 in /infra/ci (#5511) | dependabot[bot] | |
Bumps [pyyaml](https://github.com/yaml/pyyaml) from 5.3.1 to 5.4. - [Release notes](https://github.com/yaml/pyyaml/releases) - [Changelog](https://github.com/yaml/pyyaml/blob/master/CHANGES) - [Commits](https://github.com/yaml/pyyaml/compare/5.3.1...5.4) Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> | |||
2021-03-25 | projects/lxc: update mail addresses (#5510) | Christian Brauner | |
The other two mail addresses are aliases and so we can't use them to access oss-fuzz. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> | |||
2021-03-25 | Clarify in the new project guide that pull_images may be needed for coverage ↵ | Stefan Bucur | |
runs. (#5506) | |||
2021-03-25 | [ghostscript] Make stderr quiet to avoid excessive output. (#5502) | Sebastian Rasmussen | |
2021-03-25 | [lxc] initial integration (#5498) | Evgeny Vereshchagin | |
2021-03-25 | [jbig2dec] Improve custom allocator (#5503) | Sebastian Rasmussen | |
Previously the allocator handled small pointer values incorrectly and prevented multiple executions (unexpectedly used when OSS-fuzz uses LSAN to look for memory leaks). More over there were cases where too large allocations were not caught and the allocator needlessly kept track of peak allocation statistics. | |||
2021-03-25 | [ghostscript] Copy fuzzer glue code to dir outside of git repo (#5501) | Sebastian Rasmussen | |
This makes it easier to build the fuzzer using a locally checked out git repo without having to manually copy the fuzzer glue code into the locally checked out git repo first. | |||
2021-03-25 | [relic] Various improvements (#5500) | Guido Vranken | |
- Enable i386 fuzzing - Enable more operations (Digest, HMAC, KDF_X963, ECC_ValidatePubkey) - Scope the calc operations in order to spend less time trying to run calculations not supported by relic - Compile Botan module in oracle mode: makes it more likely to find discrepancies | |||
2021-03-25 | use the fuzz directory from nom's repository (#5499) | Geoffroy Couprie | |
added in https://github.com/Geal/nom/commit/0a499cd123cca25bd48d243c0109147c7627f155 | |||
2021-03-25 | [wuffs] Don't build with -std=c99 (#5497) | Nigel Tao | |
MAP_ANONYMOUS, getpagesize and strnlen do not mix with c99. Updates #32432 "wuffs: Fuzzing build failure" | |||
2021-03-24 | Only remove `external/org_tensorflow` if it exists (#5494) | Mihai Maruseac | |
This should fix coverage build broken again today. It seems that a recent change in TF toolchains removed the creation of `org_tensorflow` but it is likely that this change will be rolled back in the future. Hence, to keep OSSFuzz working, we conditionally remove this symlink. | |||
2021-03-24 | qemu: disable honggfuzz fuzzing (#5489) | Alexander Bulekov | |
We don't do any internal tests using honggfuzz, and our code is highly unlikely to work with honggfuzz in the current shape. All of the true-positive bugs seem to be libfuzzer bugs. Lets disable honggfuzz, to avoid wasting resources. We will try to get afl++ working, before taking another look at honggfuzz. Signed-off-by: Alexander Bulekov <alxndr@bu.edu> | |||
2021-03-24 | [vitess] Add maintainer (#5490) | AdamKorcz | |
2021-03-24 | libfido2: change location of fuzz corpora (#5486) | pedro martelletto | |