-
Notifications
You must be signed in to change notification settings - Fork 45
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
conmon fuzz target #233
Comments
This particular fuzz target was not uploaded to OSS-Fuzz (or anywhere else public) -- it was a bit non-timeless and a bit forced into the build system so we decided to leave it out. The main target was |
Quite interesting with containers/conmon#315 (comment) I'll try to dig out the fuzz target and see why we did not catch that. |
Got it. Thanks!
My guess would be that it wasn't linked against |
FWIW as far as I understand |
Before I forget I think https://google.github.io/oss-fuzz/getting-started/new-project-guide/#static-and-dynamic-linking-of-libraries makes it unnecessarily hard to fuzz codebases with external dependencies like Anyway I'd keep this issue open. Rust should eventually help to eliminate some bugs but it would still make sense to fuzz the parser to catch panics, stack overflows and stuff like that. |
I ran into containers/conmon#315 (comment) the other day and then I found https://ostif.org/wp-content/uploads/2022/06/CRI-O-audit-by-ada-logics-chainguard-ostif.pdf where scenarios like that were included in the threat model
and as far as I understand there should be a fuzz target:
@DavidKorczynski I can't seem to find that fuzz target anywhere. Is there any chance you could point me in the right direction?
The text was updated successfully, but these errors were encountered: