mirror of
https://github.com/git/git.git
synced 2025-12-12 20:36:24 +01:00
fuzz: port fuzz-credential-from-url-gently from OSS-Fuzz
Git's fuzz tests are run continuously as part of OSS-Fuzz [1]. Several additional fuzz tests have been contributed directly to OSS-Fuzz; however, these tests are vulnerable to bitrot because they are not built during Git's CI runs, and thus breaking changes are much less likely to be noticed by Git contributors. Port one of these tests back to the Git project: fuzz-credential-from-url-gently This test was originally written by Eric Sesterhenn as part of a security audit of Git [2]. It was then contributed to the OSS-Fuzz repo in commit c58ac4492 (Git fuzzing: uncomment the existing and add new targets. (#11486), 2024-02-21) by Jaroslav Lobačevski. I (Josh Steadmon) have verified with both Eric and Jaroslav that they're OK with moving this test to the Git project. [1] https://github.com/google/oss-fuzz [2] https://ostif.org/wp-content/uploads/2023/01/X41-OSTIF-Gitlab-Git-Security-Audit-20230117-public.pdf Co-authored-by: Jaroslav Lobačevski <jarlob@gmail.com> Co-authored-by: Josh Steadmon <steadmon@google.com> Signed-off-by: Josh Steadmon <steadmon@google.com> Signed-off-by: Taylor Blau <me@ttaylorr.com>
This commit is contained in:
committed by
Taylor Blau
parent
ef8ce8f3d4
commit
966253db75
1
oss-fuzz/.gitignore
vendored
1
oss-fuzz/.gitignore
vendored
@@ -1,5 +1,6 @@
|
||||
fuzz-commit-graph
|
||||
fuzz-config
|
||||
fuzz-credential-from-url-gently
|
||||
fuzz-date
|
||||
fuzz-pack-headers
|
||||
fuzz-pack-idx
|
||||
|
||||
32
oss-fuzz/fuzz-credential-from-url-gently.c
Normal file
32
oss-fuzz/fuzz-credential-from-url-gently.c
Normal file
@@ -0,0 +1,32 @@
|
||||
#include "git-compat-util.h"
|
||||
#include <stddef.h>
|
||||
#include <stdlib.h>
|
||||
#include <stdint.h>
|
||||
#include <string.h>
|
||||
#include <stdio.h>
|
||||
#include "credential.h"
|
||||
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size);
|
||||
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
|
||||
{
|
||||
struct credential c;
|
||||
char *buf;
|
||||
|
||||
buf = malloc(size + 1);
|
||||
if (!buf)
|
||||
return 0;
|
||||
|
||||
memcpy(buf, data, size);
|
||||
buf[size] = 0;
|
||||
|
||||
// start fuzzing
|
||||
credential_init(&c);
|
||||
credential_from_url_gently(&c, buf, 1);
|
||||
|
||||
// cleanup
|
||||
credential_clear(&c);
|
||||
free(buf);
|
||||
|
||||
return 0;
|
||||
}
|
||||
Reference in New Issue
Block a user