2018-01-19 07:54:30 +01:00
|
|
|
# SPDX-License-Identifier: LGPL-2.1+
|
|
|
|
#
|
|
|
|
# Copyright 2018 Zbigniew Jędrzejewski-Szmek
|
|
|
|
|
|
|
|
sanitize_address = custom_target(
|
|
|
|
'sanitize-address-fuzzers',
|
|
|
|
output : 'sanitize-address-fuzzers',
|
|
|
|
command : [meson_build_sh,
|
|
|
|
meson.source_root(),
|
|
|
|
'@OUTPUT@',
|
|
|
|
'fuzzers',
|
|
|
|
'-Db_lundef=false -Db_sanitize=address'])
|
|
|
|
|
2018-03-14 14:27:04 +01:00
|
|
|
sanitizers = [['address', sanitize_address]]
|
|
|
|
|
2018-01-19 07:54:30 +01:00
|
|
|
fuzz_regression_tests = '''
|
2018-03-14 14:27:04 +01:00
|
|
|
fuzz-dns-packet/oss-fuzz-5465
|
|
|
|
fuzz-dns-packet/issue-7888
|
2018-03-14 14:31:24 +01:00
|
|
|
fuzz-unit-file/oss-fuzz-6884
|
2018-03-13 12:25:06 +01:00
|
|
|
fuzz-unit-file/oss-fuzz-6885
|
2018-03-13 12:51:08 +01:00
|
|
|
fuzz-unit-file/oss-fuzz-6886
|
2018-03-15 11:42:00 +01:00
|
|
|
fuzz-unit-file/oss-fuzz-6892
|
2018-03-16 12:02:54 +01:00
|
|
|
fuzz-unit-file/oss-fuzz-6897
|
|
|
|
fuzz-unit-file/oss-fuzz-6897-evverx
|
core/load-fragment: reject overly long paths early
No need to go through the specifier_printf() if the path is already too long in
the unexpanded form (since specifiers increase the length of the string in all
practical cases).
In the oss-fuzz test case, valgrind reports:
total heap usage: 179,044 allocs, 179,044 frees, 72,687,755,703 bytes allocated
and the original config file is ~500kb. This isn't really a security issue,
since the config file has to be trusted any way, but just a matter of
preventing accidental resource exhaustion.
https://oss-fuzz.com/v2/issue/4651449704251392/6977
While at it, fix order of arguments in the neighbouring log_syntax() call.
2018-03-19 15:43:35 +01:00
|
|
|
fuzz-unit-file/oss-fuzz-6908
|
|
|
|
fuzz-unit-file/oss-fuzz-6917
|
|
|
|
fuzz-unit-file/oss-fuzz-6977
|
2018-03-19 09:21:02 +01:00
|
|
|
fuzz-unit-file/oss-fuzz-7004
|
2018-05-03 09:57:29 +02:00
|
|
|
fuzz-unit-file/oss-fuzz-8064
|
2018-01-19 07:54:30 +01:00
|
|
|
'''.split()
|