[meta] Implement fuzztest for feature policy parser
Categories
(Core :: DOM: Security, enhancement, P3)
Tracking
()
| Tracking | Status | |
|---|---|---|
| firefox79 | --- | fixed |
People
(Reporter: freddy, Assigned: freddy)
References
Details
(Keywords: meta, sec-other, Whiteboard: [domsecurity-active][post-critsmash-triage][adv-main79-])
Attachments
(1 file)
Updated•7 years ago
|
Updated•7 years ago
|
Comment 1•6 years ago
|
||
The meta keyword is there, the bug doesn't depend on other bugs and there is no activity for 12 months.
:decoder, maybe it's time to close this bug?
Updated•6 years ago
|
Comment 2•6 years ago
|
||
I think this would be a good first fuzzing bug for someone who wants to implement a libFuzzer target. The targeted parser code does not very complicated to I don't expect a lot of bugs to fall out of this, but since it is low effort, it might still be worth trying. I think we should leave this open and find someone who wants to try this.
| Assignee | ||
Comment 3•6 years ago
|
||
| Assignee | ||
Comment 4•6 years ago
|
||
this is still work-in-progress, but I figured I might give it a shot while I'm waiting on this other thing..
| Assignee | ||
Updated•6 years ago
|
| Assignee | ||
Comment 5•6 years ago
|
||
decoder is there anything else needed for fuzzing bugs in particular or can this be checked into central?
Comment 6•6 years ago
|
||
There's a r+ patch which didn't land and no activity in this bug for 2 weeks.
:freddy, could you have a look please?
For more information, please visit auto_nag documentation.
| Assignee | ||
Comment 7•5 years ago
|
||
Waiting for decoder's reply in comment 5
I've ran it locally and didn't find anything. What are the best next steps?
Run longer? Improve fuzzing? WONTFIX?
Comment 8•5 years ago
|
||
I think we can just go ahead and land this and we might be able to scale it in oss-fuzz.
@freddy, if you want to try, you can add it to https://github.com/google/oss-fuzz/tree/master/projects/firefox and send them a PR.
| Assignee | ||
Comment 9•5 years ago
|
||
I'll have a couple of follow-up questions regarding the oss-fuzz work.
Who's maintaining the docker image https://github.com/google/oss-fuzz/blob/master/projects/firefox/Dockerfile#L18, specifically who is <pdknsk@gmail.com>? Do you have a link to a patch or even a doc on how to add new targets here?
Comment 10•5 years ago
|
||
fuzzing target for featurepolicy parser r=decoder
https://hg.mozilla.org/integration/autoland/rev/4992d58d861d746d49b04b78ed268ad6ad0c90eb
Comment 11•5 years ago
|
||
| Assignee | ||
Comment 12•5 years ago
|
||
(In reply to Frederik Braun [:freddy] from comment #9)
I'll have a couple of follow-up questions regarding the oss-fuzz work.
Who's maintaining the docker image https://github.com/google/oss-fuzz/blob/master/projects/firefox/Dockerfile#L18, specifically who is <pdknsk@gmail.com>? Do you have a link to a patch or even a doc on how to add new targets here?
First question is obviously out of curiosity. Second is more important going forward.
Comment 13•5 years ago
|
||
(In reply to Frederik Braun [:freddy] from comment #12)
(In reply to Frederik Braun [:freddy] from comment #9)
I'll have a couple of follow-up questions regarding the oss-fuzz work.
Who's maintaining the docker image https://github.com/google/oss-fuzz/blob/master/projects/firefox/Dockerfile#L18, specifically who is <pdknsk@gmail.com>? Do you have a link to a patch or even a doc on how to add new targets here?First question is obviously out of curiosity. Second is more important going forward.
The usual process is to send a PR to the oss-fuzz repository, previous patches doing so are in the Github history. Adding the target to build.sh should be sufficient at first glance.
The oss-fuzz documentation is here: https://google.github.io/oss-fuzz/
And in particular this part is relevant to check locally that the build process works: https://google.github.io/oss-fuzz/advanced-topics/reproducing/#building-using-docker
Let me know if you hit any problems :)
| Assignee | ||
Comment 14•5 years ago
|
||
| Assignee | ||
Comment 15•5 years ago
|
||
This landed and is now enabled in oss-fuzz. I suppose we can lift security flags from this bug quite soon?
Updated•5 years ago
|
| Assignee | ||
Updated•5 years ago
|
Updated•5 years ago
|
Description
•