{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":63809205,"defaultBranch":"master","name":"oss-fuzz","ownerLogin":"google","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2016-07-20T19:39:50.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/1342004?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1717693722.0","currentOid":""},"activityList":{"items":[{"before":"96b6ae4d14970ead0fe4a6bd2c3c0ecdc5541ecd","after":"7f915006751d37347078beb0040fb41c0d2a3436","ref":"refs/heads/master","pushedAt":"2024-06-16T03:41:39.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"[cups] minimize building script (#12072)\n\nRemove build.sh and change Dockerfile. The build script location fits\r\nthe upstream file organization in `OpenPrinting/fuzzing`.\r\n\r\nSigned-off-by: TTFISH ","shortMessageHtmlLink":"[cups] minimize building script (#12072)"}},{"before":"aa0dba641cb81070221554e0d2ed4f97aa46db35","after":"96b6ae4d14970ead0fe4a6bd2c3c0ecdc5541ecd","ref":"refs/heads/master","pushedAt":"2024-06-15T11:30:28.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"circl: Update CIRCL contact emails. (#12068)\n\nUpdate CIRCL contact emails.","shortMessageHtmlLink":"circl: Update CIRCL contact emails. (#12068)"}},{"before":"2f43db564cae35b1a8a78970df2f408e58d6bf89","after":"aa0dba641cb81070221554e0d2ed4f97aa46db35","ref":"refs/heads/master","pushedAt":"2024-06-14T01:56:50.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"Allow timeout and OOMs options in GH Action (#12003) (#12049)\n\nWith disabled option `report-oom` in GH Action Github reports a warning:\r\n\r\n\"Unexpected input(s) 'report_ooms', valid inputs are ['entryPoint',\r\n'args', 'language', 'fuzz-seconds', 'dry-run', 'sanitizer', 'mode',\r\n'github-token', 'storage-repo', 'storage-repo-branch',\r\n'storage-repo-branch-coverage', 'report-unreproducible-crashes',\r\n'minimize-crashes', 'parallel-fuzzing', 'output-sarif']\".\r\n\r\nThe patch follows up commit a7c524dca08b (\"Fix doc timeouts and ooms and\r\nallow these options in GH Action (#12003)\").","shortMessageHtmlLink":"Allow timeout and OOMs options in GH Action (#12003) (#12049)"}},{"before":"73df2a8a85c3895491ddb42f9fb391ab08fbdb65","after":"2f43db564cae35b1a8a78970df2f408e58d6bf89","ref":"refs/heads/master","pushedAt":"2024-06-13T18:54:38.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"bitcoin-core: Add I2P dictionary (#12071)","shortMessageHtmlLink":"bitcoin-core: Add I2P dictionary (#12071)"}},{"before":"d1983ebcb86f5a48232378b38a64d51c1a1ad3db","after":"73df2a8a85c3895491ddb42f9fb391ab08fbdb65","ref":"refs/heads/master","pushedAt":"2024-06-13T18:15:47.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"Fix unintended uint8 to int promotion bug in ms-tpm-20-ref harness code (#12044)\n\nSigned-off-by: Tamas K Lengyel ","shortMessageHtmlLink":"Fix unintended uint8 to int promotion bug in ms-tpm-20-ref harness co…"}},{"before":"a6fbdc39032f7d32d7eda61c45b3cb42d919141e","after":"d1983ebcb86f5a48232378b38a64d51c1a1ad3db","ref":"refs/heads/master","pushedAt":"2024-06-13T18:15:03.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"[scapy] poke Packet.summary() (#12050)\n\nIt's kind of a follow-up to https://github.com/secdev/scapy/pull/4381\r\nans should help to catch issues like that going forward.\r\n\r\n@gpotter2 @guedou @p-l- could you take a look?\r\n\r\n(I think ideally it would be nice to move the fuzz target to the scapy\r\nrepository where it could be changed and reviewed without having to open\r\nPRs here)","shortMessageHtmlLink":"[scapy] poke Packet.summary() (#12050)"}},{"before":"e4643b64b3af4932bff23bb87afdfbac2a301969","after":"a6fbdc39032f7d32d7eda61c45b3cb42d919141e","ref":"refs/heads/master","pushedAt":"2024-06-13T18:13:12.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"[wamr] Don't mirror issues on the github repo (#12069)\n\nSigned-off-by: liang.he@intel.com ","shortMessageHtmlLink":"[wamr] Don't mirror issues on the github repo (#12069)"}},{"before":"83f38e71b3c19e45d486a03dcf71a81de89d258d","after":"e4643b64b3af4932bff23bb87afdfbac2a301969","ref":"refs/heads/master","pushedAt":"2024-06-11T21:50:52.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"Add to Fontations auto-cc list (#12051)\n\nWe got our first issue (hooray!) and it made me realize I didn't add\r\nenough auto ccs.","shortMessageHtmlLink":"Add to Fontations auto-cc list (#12051)"}},{"before":"2d32108e213f2703847d1a00469c990025143786","after":"83f38e71b3c19e45d486a03dcf71a81de89d258d","ref":"refs/heads/master","pushedAt":"2024-06-10T17:13:05.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"[cups] Migrate harness to upstream OpenPrinting project (#12036)\n\nThe OpenPrinting project under the Linux Foundation has initiated the\r\n[OpenPrinting fuzzing](https://github.com/OpenPrinting/fuzzing)\r\nrepository to officially maintain OSS-Fuzz testing tasks. This PR\r\nincludes following updates:\r\n\r\n1. Migration of the existing CUPS fuzzing harness to the upstream\r\nOpenPrinting/fuzzing project.\r\n2. Updated of CUPS mailing contact list and configuration setting.\r\n\r\nAll harness building related changes has been locally tested and\r\nverified.\r\n\r\nWe deeply appreciate the contributions from @pkillarjun for his initial\r\nintegration of the CUPS project into OSS-Fuzz and his support during\r\nthis migration. However, OpenPrinting has decided to move the corpus,\r\nfuzzing harnesses, and build scripts into the repository under its\r\norganisation and maintainance. In addition, the bug reports will be\r\nfirstly processed by OpenPrinting's security team and not by the initial\r\ncontributor, who is not part of the organisation. These two measures\r\nwill minimise the security risks and still maintaining the ability of\r\nopen source fellows to participate in the development.\r\n\r\nCC @tillkamppeter @iosifache\r\n\r\n---------\r\n\r\nSigned-off-by: TTFISH ","shortMessageHtmlLink":"[cups] Migrate harness to upstream OpenPrinting project (#12036)"}},{"before":"18964d7293a4ab89109feba43598476e5500c973","after":"2d32108e213f2703847d1a00469c990025143786","ref":"refs/heads/master","pushedAt":"2024-06-10T09:52:46.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"[lxml] Fix Pyinstaller Bundling Error & Add More Graceful Handling for Shallow Errors (#12031)\n\n#### In the Fuzz Harnesses\r\n\r\nAdds additional handling for shallow errors that prematurely halt fuzzer\r\nruns.\r\n\r\n#### In `build.sh`\r\n\r\nFixes an issue preventing Pyinstaller from properly bundling\r\n`lxml.isoschematron`. The issue fixed here can be seen in the build logs\r\n(e.g, [the most recent\r\none](https://oss-fuzz-build-logs.storage.googleapis.com/log-c5377ff0-29ca-4541-bda2-1159016ec4a6.txt))\r\nby `grep`ing for the string `Failed to collect submodules`\r\n\r\n---\r\n\r\nMore details about these changes can be found in their respective commit\r\nmessages.","shortMessageHtmlLink":"[lxml] Fix Pyinstaller Bundling Error & Add More Graceful Handling fo…"}},{"before":"8a7d08eaa7dc1aa9a73108d430b38cf5ea90258d","after":"18964d7293a4ab89109feba43598476e5500c973","ref":"refs/heads/master","pushedAt":"2024-06-10T09:49:34.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"use `apt` boost package to build libtorrent (#12040)\n\nas newer compilers have deprecated some features used by old boost.\r\nSpecifically:\r\n\r\n```\r\n/src/boost/boost/container_hash/hash.hpp:131:33: error: no template named 'unary_function' in namespace 'std'; did you mean '__unary_function'?\r\n 131 | struct hash_base : std::unary_function {};\r\n | ~~~~~^~~~~~~~~~~~~~\r\n | __unary_function\r\n```","shortMessageHtmlLink":"use apt boost package to build libtorrent (#12040)"}},{"before":"e43cf762fb3437e6aae1ab4cf9297c304daa26d0","after":"8a7d08eaa7dc1aa9a73108d430b38cf5ea90258d","ref":"refs/heads/master","pushedAt":"2024-06-10T09:48:17.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"[wamr] Remove WORKDIR (#12043)\n\nto make sure *build.sh* can locate source code directory\r\n\r\nPlus, add a few debug info\r\n\r\nSigned-off-by: liang.he@intel.com ","shortMessageHtmlLink":"[wamr] Remove WORKDIR (#12043)"}},{"before":"9249f93bd2f75e7cdaa57ba3321d6285e31487bf","after":"e43cf762fb3437e6aae1ab4cf9297c304daa26d0","ref":"refs/heads/master","pushedAt":"2024-06-07T19:45:22.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"Initial Project Skeleton pikepdf (#12035)\n\npikepdf is a Python library allowing creation, manipulation and repair\r\nof PDFs. It provides a Pythonic wrapper around the C++ PDF content\r\ntransformation library, QPDF. It is used by over 3800 repositories and\r\n90 packages. Most notably, OCRmyPDF (12,400+ stars) uses pikepdf to\r\ngraft OCR text layers onto existing PDFs, to examine the contents of\r\ninput PDFs, and to optimize PDFs. Additionally, PDFArranger (3000+\r\nstars) depends on pikepdf and is a Python application that provides a\r\ngraphical user interface to rotate, crop and rearrange PDFs. It is\r\nimportant that fuzzing be integrarted into pikepdf as the domino effect\r\nof a high or critical vulnerability in pikepdf would cause numerous\r\nother open source software products to be vulnerable as well.\r\n\r\nApproval from the upstream maintainer can be found here:\r\nhttps://github.com/pikepdf/pikepdf/issues/587","shortMessageHtmlLink":"Initial Project Skeleton pikepdf (#12035)"}},{"before":"a7c524dca08b3d21ef060e42443362019415d5cc","after":"9249f93bd2f75e7cdaa57ba3321d6285e31487bf","ref":"refs/heads/master","pushedAt":"2024-06-07T19:44:39.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"[wamr] update the working directory (#12039)\n\nfix issue 69490\r\n\r\nSigned-off-by: liang.he@intel.com ","shortMessageHtmlLink":"[wamr] update the working directory (#12039)"}},{"before":"ec400c9bcb629c189d1ddd67ca1ed93bbaa6d27f","after":"a7c524dca08b3d21ef060e42443362019415d5cc","ref":"refs/heads/master","pushedAt":"2024-06-07T19:44:29.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"Fix doc timeouts and ooms and allow these options in GH Action (#12003)\n\n#11723","shortMessageHtmlLink":"Fix doc timeouts and ooms and allow these options in GH Action (#12003)"}},{"before":"85c18b6dab6af1dfd9e90bf34fa040b8355e3adf","after":"ec400c9bcb629c189d1ddd67ca1ed93bbaa6d27f","ref":"refs/heads/master","pushedAt":"2024-06-07T11:12:54.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"pacemaker: fix broken build (#12037)\n\nI am getting errors when building Pacemaker locally. This should fix it.\r\n\r\nSigned-off-by: Adam Korczynski ","shortMessageHtmlLink":"pacemaker: fix broken build (#12037)"}},{"before":"ba4e91c86f082d1afa431d18b5d30c90cbd04d31","after":null,"ref":"refs/heads/fix-pacemaker-5","pushedAt":"2024-06-06T17:56:09.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"AdamKorcz","name":null,"path":"/AdamKorcz","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/44787359?s=80&v=4"}},{"before":"fa8e451d07b369dc430cc261196d09f1a261be86","after":"85c18b6dab6af1dfd9e90bf34fa040b8355e3adf","ref":"refs/heads/master","pushedAt":"2024-06-06T17:56:09.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"AdamKorcz","name":null,"path":"/AdamKorcz","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/44787359?s=80&v=4"},"commit":{"message":"pacemaker: fix build (#12033)\n\nSigned-off-by: David Korczynski ","shortMessageHtmlLink":"pacemaker: fix build (#12033)"}},{"before":null,"after":"ba4e91c86f082d1afa431d18b5d30c90cbd04d31","ref":"refs/heads/fix-pacemaker-5","pushedAt":"2024-06-06T17:08:42.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"pacemaker: fix build\n\nSigned-off-by: David Korczynski ","shortMessageHtmlLink":"pacemaker: fix build"}},{"before":"f31d0a5d5d316419d90d1f0e3a22fef77482f59d","after":"fa8e451d07b369dc430cc261196d09f1a261be86","ref":"refs/heads/master","pushedAt":"2024-06-05T19:31:29.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"[libcups] Init integration (#12021)\n\nThe OpenPrinting Team is integrating C-based projects into the OSS-Fuzz\r\nFramework. The maintaining fuzz harnesses locate in OpenPrinting project\r\n[fuzzing](https://github.com/OpenPrinting/fuzzing).\r\n\r\nThis PR contains the initial integration config for OpenPrinting project\r\nlibcups.\r\n\r\nCC: @tillkamppeter @iosifache\r\n\r\n---------\r\n\r\nSigned-off-by: TTFISH ","shortMessageHtmlLink":"[libcups] Init integration (#12021)"}},{"before":"0406dd5676262d69cf534a10191b5af8ece60b1c","after":"f31d0a5d5d316419d90d1f0e3a22fef77482f59d","ref":"refs/heads/master","pushedAt":"2024-06-05T17:52:47.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"Add ms-tpm-20-ref, the Microsoft TPM2 reference implementation (#12030)\n\nSigned-off-by: Tamas K Lengyel \r\n\r\n---------\r\n\r\nSigned-off-by: Tamas K Lengyel ","shortMessageHtmlLink":"Add ms-tpm-20-ref, the Microsoft TPM2 reference implementation (#12030)"}},{"before":"fac55feb21bb7fada110efe31980f88bf6537c9b","after":"0406dd5676262d69cf534a10191b5af8ece60b1c","ref":"refs/heads/master","pushedAt":"2024-06-05T10:47:19.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"[infra] Fix jacoco_report_converter.py (#12026)\n\nThere are 2 bugs in the jacoco_report_converter.py in which the src_file\r\nand src_path are redefined and overwritten in the loop. These bugs cause\r\nboth of them to empty after the first iteration. This makes the\r\nresulting JSON report summary only contain the first filename to\r\nprocess. This has been mentioned in #11966.\r\nThis PR proposes a fix by changing the name of the needed variables.\r\nAlso, this PR adds in a filter to exclude fuzzer classes in the coverage\r\ninformation as they are not part of the projects. The updated script\r\nwill include the coverage information for each class that existed in the\r\nproject source directory (`/out/src`) in the summary tag of the\r\nresulting summary.json report.\r\n\r\nSigned-off-by: Arthur Chan ","shortMessageHtmlLink":"[infra] Fix jacoco_report_converter.py (#12026)"}},{"before":"932892bf9320e3bc794f8bc19f20a4f80ace788f","after":"fac55feb21bb7fada110efe31980f88bf6537c9b","ref":"refs/heads/master","pushedAt":"2024-06-04T19:25:33.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"[wamr] init build.sh and Dockerfile (#11987)\n\nSigned-off-by: lum1n0us ","shortMessageHtmlLink":"[wamr] init build.sh and Dockerfile (#11987)"}},{"before":"61fe71f5c05dec2a14a98b83e10c3182442d8f5b","after":"932892bf9320e3bc794f8bc19f20a4f80ace788f","ref":"refs/heads/master","pushedAt":"2024-06-04T19:24:59.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"[wamr] enable both asan and ubsan (#11989)\n\nSigned-off-by: liang.he@intel.com ","shortMessageHtmlLink":"[wamr] enable both asan and ubsan (#11989)"}},{"before":"4eff3ad85243e8387c05da4eae4684e6d7544e22","after":null,"ref":"refs/heads/dependabot/pip/infra/build/functions/pip-470bac6f44","pushedAt":"2024-06-04T19:22:05.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"}},{"before":"4bffaf8f3ab755f9479a67f5fd0085532e509621","after":"61fe71f5c05dec2a14a98b83e10c3182442d8f5b","ref":"refs/heads/master","pushedAt":"2024-06-04T19:21:29.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"mdbook-i18n-helpers: Initial integration (#11997)\n\n[mdbook-i18n-helpers](https://github.com/google/mdbook-i18n-helpers/) is\r\na plugin for [mdbook](https://rust-lang.github.io/mdBook/) which enables\r\nlocalization support.\r\nAccording to [crates](https://crates.io/crates/mdbook-i18n-helpers), it\r\nwas downloaded ~100k times.\r\n\r\nThe project already defines [several fuzzers within its\r\nrepo](https://github.com/google/mdbook-i18n-helpers/tree/main/fuzz).\r\n\r\nI am one of the maintainers of the project. The main maintainer\r\n@mgeisler approves of this request as can be seen from\r\nhttps://github.com/google/mdbook-i18n-helpers/issues/83.","shortMessageHtmlLink":"mdbook-i18n-helpers: Initial integration (#11997)"}},{"before":"bf60a0acd335ec208f6de9ea5274438b305e9d56","after":"23acb7d9adb7f6b9f81923d9b9776c9a85d31413","ref":"refs/heads/deploy-blog","pushedAt":"2024-06-04T19:20:07.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"Update deploy.sh","shortMessageHtmlLink":"Update deploy.sh"}},{"before":"44abec5d38363614708ec5ee7fddaf48dbd257c2","after":"4bffaf8f3ab755f9479a67f5fd0085532e509621","ref":"refs/heads/master","pushedAt":"2024-06-04T19:18:48.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"infra/presubmit: Use apt-get update before installing (#12008)\n\nOtherwise, this may lead to issues such as\r\nhttps://github.com/google/oss-fuzz/pull/11943#issue-2290477404\r\n\r\nAlso, fix the broken `.zip` test.\r\n\r\n---------\r\n\r\nCo-authored-by: MarcoFalke <6399679+MarcoFalke@users.noreply.github.com>\r\nCo-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>","shortMessageHtmlLink":"infra/presubmit: Use apt-get update before installing (#12008)"}},{"before":"1515519a665756d8a50a6c46abac8b431e5462ef","after":"44abec5d38363614708ec5ee7fddaf48dbd257c2","ref":"refs/heads/master","pushedAt":"2024-06-04T19:15:00.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"First crack at oss-fuzz rigging for fontations (#12011)\n\nTake a first swing at rigging a\r\nhttps://github.com/googlefonts/fontations fuzzer. Setup based on\r\nhttps://google.github.io/oss-fuzz/getting-started/new-project-guide/rust-lang/.\r\nI have never rigged a Rust fuzzer before, advice most appreciated.\r\n\r\nTo increase our odds try to provide a decent corpus of test fonts.\r\n\r\nFor context Google Fonts and Chrome are collaborating to migrate some\r\ntext rendering paths in Chrome to use [skrifa](https://docs.rs/skrifa/)\r\ninstead of FreeType. As with woff2, we view fuzzing prior to shipping as\r\nmandatory. EDIT: one more ref,\r\nhttps://chromestatus.com/feature/5717358869217280.\r\n\r\nStep toward https://github.com/googlefonts/fontations/issues/420.\r\n\r\nThe fuzzer is added to fontations in\r\nhttps://github.com/googlefonts/fontations/pull/917. Best not to merge\r\nthis until that goes in. EDIT: now merged. Minimal function, will extend\r\nuse cases tested over time.","shortMessageHtmlLink":"First crack at oss-fuzz rigging for fontations (#12011)"}},{"before":"b7839236da08e06718b9beffdb19429e3c66fcf5","after":null,"ref":"refs/heads/DavidKorczynski-patch-9","pushedAt":"2024-06-04T10:10:37.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEZnR9_QA","startCursor":null,"endCursor":null}},"title":"Activity · google/oss-fuzz"}