aosp12/external/dng_sdk/fuzzer
hcl 7be3fd486c init from android-12.1.0_r8 2023-01-09 17:11:35 +08:00
..
seeds/CVE_2020_9589 init from android-12.1.0_r8 2023-01-09 17:11:35 +08:00
Android.bp init from android-12.1.0_r8 2023-01-09 17:11:35 +08:00
README.md init from android-12.1.0_r8 2023-01-09 17:11:35 +08:00
dng_parser_fuzzer.cpp init from android-12.1.0_r8 2023-01-09 17:11:35 +08:00

README.md

Fuzzing DNG SDK

This fuzzer is intented to do a varian analysis of the issue reported in b/156261521.

Here is a list of some CVEs previously discovered in DNG SDK:

  • CVE-2020-9589
  • CVE-2020-9590
  • CVE-2020-9620
  • CVE-2020-9621
  • CVE-2020-9622
  • CVE-2020-9623
  • CVE-2020-9624
  • CVE-2020-9625
  • CVE-2020-9626
  • CVE-2020-9627
  • CVE-2020-9628
  • CVE-2020-9629

Building & running the fuzz target: Android device

It is recommended to set rss limit to higher values (such as 4096) when running the fuzzer to avoid frequent OOM libFuzzer crashes.

$ source build/envsetup.sh
$ lunch aosp_arm64-eng
$ SANITIZE_TARGET=hwaddress make dng_parser_fuzzer
$ adb sync data
$ adb shell /data/fuzz/arm64/dng_parser_fuzzer/dng_parser_fuzzer \
$ -rss_limit=4096 \
$ /data/fuzz/arm64/dng_parser_fuzzer/corpus

Building & running the fuzz target: Host

$ source build/envsetup.sh
$ lunch aosp_x86_64-eng
$ SANITIZE_HOST=address make dng_parser_fuzzer
$ LD_LIBRARY_PATH=$ANDROID_HOST_OUT/fuzz/x86_64/lib/ \
$ $ANDROID_HOST_OUT/fuzz/x86_64/dng_parser_fuzzer/dng_parser_fuzzer \
$ -rss_limit_mb=4096 \
$ $ANDROID_HOST_OUT/fuzz/x86_64/dng_parser_fuzzer/corpus/