-
-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OSS-Fuzz integration #3961
Comments
SGTM |
Works for me, I’d be one getting security issues. I’ve got a google account, but don’t receive email there. I’d prefer notifications go to the address on my GitHub profile. |
We can add two e-mail addresses for you: the one on your Github profile at which you receive e-mail notifications, and the one linked to your Google account, which you can use to login to the OSS-Fuzz dashboard at https://oss-fuzz.com/ I'm having a little trouble compiling Pillow with custom CFLAGS, which will be necessary for OSS-Fuzz integration. Would you mind commenting on how I might get the following to work? CC=clang CXX=clang++ CFLAGS="-fsanitize=fuzzer-no-link" CXXFLAGS="-fsanitize=fuzzer-no-link" LDSHARED=clang ./setup.py build_ext --inplace |
This does build with the flags OMM (mojave), but linking fails because of python's symbols being missing. (there's a little futzing to make zlib show up. )
I'd like to note that we generally are not worried about C-level DOS/vulnerabilities that are only accessible by running python code, as if someone is able to execute arbitrary python, then you've already lost. OTOH, if someone can trigger it by loading a malformed image, that's certainly something of interest. |
Both the vulnerabilities I've found are accessed via p = ImageFile.Parser()
p.feed(crafted_input) One bug is in Python the other in C. Where do you want me to report them? |
Please report vulnerabilities via Tidelift: This'll be the first through Tidelift, let's see how it goes. |
I've reported my findings to Tidelift. |
google/oss-fuzz#2626 is the OSS-Fuzz PR. |
When will you publish fixes for the bugs I submitted? |
There has been progress in this, and we now have proposed fixes. Regarding the contacts for the fuzzer - https://github.com/google/oss-fuzz/pull/2626/files#diff-66735c16e062a5a5015a4e200966c2adR2 - I would think that we should also cc someone at Pillow? |
As noted in #4123, the fixes have been published as part of Pillow 6.2.0. |
Who would we like to be listed as contact e-mail addresses for the fuzzer? google/oss-fuzz#2626 (comment) |
I'm going to suggest security@python-pillow.org, as per #3543 (comment) |
google/oss-fuzz#2626 (comment)
|
The fuzzer has now been merged. |
I've determined that security@python-pillow.org is not linked to a Google account. |
I've written a fuzzer for Pillow. It is compatible with Google OSS-Fuzz.
ImageFile.Parser()
. Should I report these in the issue tracker, or via Tidelift?Also pinging @kcc @Dor1s in case they want to object against Pillow integration into OSS-Fuzz.
The text was updated successfully, but these errors were encountered: