Browse Source

Oss-fuzz integration

- fix a buffer overflow in ucd_tolower leading to failure when
compiling with address sanitizer
- force the use of C++ compiler for espeak-ng
- adding a malloc to have a null-terminated string in the fuzz target
- setting (but not overwriting) ESPEAK_DATA_PATH environment
variable inside the fuzz target
master
Philippe Antoine 4 years ago
parent
commit
24bfbcfeca
3 changed files with 8 additions and 2 deletions
  1. 1
    0
      Makefile.am
  2. 1
    1
      src/ucd-tools/src/case.c
  3. 6
    1
      tests/ssml-fuzzer.c

+ 1
- 0
Makefile.am View File

@@ -222,6 +222,7 @@ endif

src_espeak_ng_LDADD = src/libespeak-ng.la ${PCAUDIOLIB_LIBS}
src_espeak_ng_SOURCES = src/espeak-ng.c
nodist_EXTRA_src_espeak_ng_SOURCES = force-cxx-linking.cxx

##### tests:


+ 1
- 1
src/ucd-tools/src/case.c View File

@@ -2841,7 +2841,7 @@ codepoint_t ucd_tolower(codepoint_t c)
{
int begin = 0;
int end = sizeof(case_conversion_data)/sizeof(case_conversion_data[0]);
while (begin <= end)
while (begin < end)
{
int pos = (begin + end) / 2;
const struct case_conversion_entry *item = (case_conversion_data + pos);

+ 6
- 1
tests/ssml-fuzzer.c View File

@@ -39,14 +39,19 @@ static int SynthCallback(short *wav, int numsamples, espeak_EVENT *events) {
extern int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size);
extern int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
if (!initialized) {
setenv("ESPEAK_DATA_PATH",".",0);
espeak_Initialize(AUDIO_OUTPUT_SYNCHRONOUS, 0, NULL, 0);
espeak_SetSynthCallback(SynthCallback);
initialized = 1;
}

int synth_flags = espeakCHARS_UTF8 | espeakPHONEMES | espeakSSML;
espeak_Synth((char*) data, size + 1, 0, POS_CHARACTER, 0,
char *str = malloc(size+1);
memcpy(str, data, size);
str[size] = 0;
espeak_Synth((char*) str, size + 1, 0, POS_CHARACTER, 0,
synth_flags, NULL, NULL);
free(str);

return 0;
}

Loading…
Cancel
Save