-
Notifications
You must be signed in to change notification settings - Fork 2.5k
Description
Our OSS-Fuzz fuzzing effort (https://testing.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html) has located 3 security vulnerabilities in file using the fuzz target we developed.
https://clusterfuzz-external.appspot.com/v2/testcases?job=libfuzzer_asan_file&open=yes
These issue are now filed in security-protected monorail tracker and we'd like to find file developers to take a look at them.
We will CC developers on these issues to give them access to stack traces and reproducer data. For that we'd need an e-mail with associated google account. We will also set up the process to auto-CC these people when we find more issues.
Check out https://github.com/google/oss-fuzz/blob/master/projects/file/project.yaml and we can get your emails setup for easy access to those current testcases.