Replies: 2 comments 2 replies
-
Hi @dloebl, yes, we do that for the mosaicing fuzzer, but you're right it's a long way from being comprehensive. |
Beta Was this translation helpful? Give feedback.
2 replies
-
We do have some coverage for this through sharp, see for example: The only caveat is that fuzzing is done on the prebuilt binaries without any sanitizers. Nevertheless, it was able to catch GHSA-33qp-9pq7-9584. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
The recent improvements to the fuzzers made me think about the general way libvips is fuzzed by OSS-Fuzz.
It looks like that some parameters aren't really covered by the fuzzing targets. For example, the
page
orn
argument are never passed to thewebpload
orgifload
. This also applies to the saver (eg. a differentQ
forjpegsave
).Ideally, the input data would be encoded in such a way that all arguments can be combined. I'm not really sure how to achieve this, since the inputs are essentially just images (at least as of now). For cgif I made the API parameters part of the fuzzer input data (dloebl/cgif#45). However, I'm not sure if that approach is viable for libvips.
Varying the arguments of loaders and savers should lead to better fuzzing coverage.
Beta Was this translation helpful? Give feedback.
All reactions