commit | 9ea67cbd04e874ba33573f1dc01818cce8e887e8 | [log] [tgz] |
---|---|---|
author | Anestis Bechtsoudis <anestis@census-labs.com> | Wed Dec 28 12:38:23 2016 +0200 |
committer | Anestis Bechtsoudis <anestis@census-labs.com> | Wed Dec 28 12:47:13 2016 +0200 |
tree | 9da68877cb3972b3d2b6fcc73d35dceb6cb3f475 | |
parent | 2ff5da1153233040ecbe32098f3fe6bda2c41492 [diff] |
[SAN] Fix broken exitcode policy The entire exitcode detection strategy was broken since sanitizers’ exitcode flag is global. This effectively means that the last setenv was the one effectively used despite the sanitizer type. This issue doesn’t appear to affect any targets where the SIGABRT signal was monitored since the crash parsing was achieved from ptrace signal backend. There was just a small chance of losing some crashes in case sanitizer runtime lib crashed internally when generating the reports. This commit refactors the entire policy unifying all sanitizers to a single exitcode. Since current logic only supports ASan reports parsing, we don’t need to explicitly identify the sanitizer type since file parsing will early fail due to invalid header. If more report types are added, we might need to add some logic there. Signed-off-by: Anestis Bechtsoudis <anestis@census-labs.com>
Description
A security oriented, feedback-driven, evolutionary, easy-to-use fuzzer with interesting analysis options. See USAGE for details
Code
Requirements
Trophies
The tool has been used to find a few interesting security problems in major software packages; Examples:
Other
This is NOT an official Google product.