Update git submodules

* Update platform/external/oss-fuzz from branch 'master'
  to ebda00b748d458bf970296cfe04e470a6139e581
  - Upgrade oss-fuzz to fd15c6d57aa13667af2521daf6167a2d8cd2ecb7
    
    Test: make
    Change-Id: Ib2733efe65798b72a56aa5db61992b878b4c6be1
    
  - Add XNU (SockFuzzer) (#6583)
    
    
  - nDPI: add some missing (optional) dependencies (#6581)
    
    Enable fuzzing of QUIC traffic.
  - Run multiple jobs/workers by setting env vars (#5924)
    
    * Run multiple jobs/workers by setting env vars
    
    ```bash
    $ infra/base-images/all.sh
    $ python3 infra/helper.py run_fuzzer -e N_JOBS=4 -e N_WORKERS=4 --engine $ENGINE $PROJECT_NAME $FUZZ_TARGET
    ```
    
    * Switched from N_JOBS/WORKERS to FUZZER_EXTRA_ARGS
    
    * Added hashicorp/hcl/hclsyntax fuzzers
    
    * Getting rid of FUZZER_EXTRA_ARGS
  - profraw: move from golang to python (#6565)
    
    
  - libreoffice: move dep installation to a script in libreoffice git (#6569)
    
    so can automatically update it as needed without churn at oss-fuzz side
  - [php] Enable tracing-jit fuzzer (#6580)
    
    This complements the function-jit fuzzer and tests the default
    JIT configuration.
  - Update requirements.txt (#6574)
    
    
  - opensips: add more CCs (#6578)
    
    
  - opensips: add another fuzzer (#6577)
    
    
  - [cifuzz] Improve handling of coverage builds. (#6573)
    
    Don't delete unaffected fuzzers and don't do bad build check.
  - opensips: add maintainer (#6575)
    
    
  - [php] Disable mbstring fuzzer (#6572)
    
    The mbstring fuzzer is really a fuzzer for the oniguruma library
    through the PHP mbregex extension. This was important at the time
    as the upstream oniguruma project did not have fuzzing and we were
    bundling the library (and thus responsible for security backports).
    
    Nowadays we no longer bundle this library and the upstream project
    does their own fuzzing, including integration with oss-fuzz:
    https://github.com/google/oss-fuzz/tree/master/projects/oniguruma
    
    I haven't really done anything with reports from this fuzzer in a
    long time, as issues get addressed upstream. As such, I think it's
    safe to drop it on the PHP side.
  - [pulumi] Initial integration (#5895)
    
    
  - opensips: initial integration. (#6420)
    
    * opensips: initial integration.
    
    * opensips: include primary contact
  - tint: add SPIRV-Tools fuzzers (#6515)
    
    * tint: add SPIRV-Tools fuzzers
    
    * Fix script.
    
    * Move to release builds.
    
    * Reduce the number of targets that are built in CI.
  - postgresql: fix build (#6570)
    
    * postgresql: fix build
    
    * update PostgresMain params
    
    * use PostgresSingle following updates in postgres
    
    * postgresql tmp fix
    
    * fix build
  - GDAL: add access to new developer (#6567)
    
    
  - varnish: fix build (#6568)
    
    
  - poppler: Use a newer glib (#6566)
    
    
  - Use FreeRADIUS project's member's gmail addresses for autz (#6564)
    
    
  - Suricata sancov (#6555)
    
    * Improves suricata corpus for one target
    
    * suricata: use now sancov-module
    
    * Better rust flags for suricata
  - [cifuzz][helper] Fix error message for nonexistent external project (#6558)
    
    Say path doesn't exist instead of the last directory in path.
    
    Fixes: https://github.com/google/oss-fuzz/issues/6528
  - Fix CIFuzz coverage generation. (#6523)
    
    Also clean up the external action definitions:
    - Set default values for the storage repo branches.
    - Remove storage repo options from build_fuzzers.
  - [cifuzz] Use javascript actions library for uploading artifacts (#6552)
    
    Delete our python implementation which appears buggy and will be annoying to maintain.
    Fixes: https://github.com/google/oss-fuzz/issues/6526
  - [cifuzz][prow] Support docker in docker to support prow. (#6556)
    
    
  - clusterfuzzlite: Upload builds after bad build check. (#6531)
    
    Fixes: #6525
    Depends on: #6530
  - ClusterFuzzLite: Install nodejs in cifuzz-base. (#6534)
    
    We will use this to upload artifacts in the future.
  - rust coverage: fix binary ids padding (#6551)
    
    
  - [infra] Add different messages depending on bisection type (#6547)
    
    A printed message after bisection should be different depending on the bisection type
  - Fix false positive result due to floating point divide by zero (which is not a bug). (#6549)
    
    
  - rocksdb: fix build (#6546)
    
    
  - dnsmasq: fix fuzzer and build (#6545)
    
    
  - sudoers: set optimization flag in LDFLAGS for the object size sanitizer (#6544)
    
    Sudo does not link executables using CFLAGS, only LDFLAGS.
    When building with UBSan, the compiler warns that the object size
    sanitizer has no effect at -O0 but is explicitly enabled.
  - [clusterfuzzlite] Keep unaffected fuzzers when uploading a build. (#6530)
    
    Otherwise incomplete builds may be uploaded.
    Fixes: https://github.com/google/oss-fuzz/issues/6529
    Related: https://github.com/google/oss-fuzz/issues/6525
  - [clusterfuzzlite] Include shebang line when generating project. (#6532)
    
    Fixes: #6527
  - suricata: default rules in out directory (#6540)
    
    * suricata: default rules in out directory
    
    to be used as config by a dedicated target
    
    * Adding a corpus and a dictionary to the next suricata fuzz target
  - protobuf-java: update contact information (#6542)
    
    This makes kfm@google.com the primary contact and allows access for some
    more protobuf team members.
  - update tendermint/tendermint project file (#6541)
    
    
  - [infra] Add block listed target name logic from ClusterFuzz (#6538)
    
    * [infra] Add block listed target name logic from ClusterFuzz
  - Done (#6536)
    
    
  - build(deps): bump nokogiri from 1.12.2 to 1.12.5 in /docs (#6535)
    
    Bumps [nokogiri](https://github.com/sparklemotion/nokogiri) from 1.12.2 to 1.12.5.
    - [Release notes](https://github.com/sparklemotion/nokogiri/releases)
    - [Changelog](https://github.com/sparklemotion/nokogiri/blob/main/CHANGELOG.md)
    - [Commits](https://github.com/sparklemotion/nokogiri/compare/v1.12.2...v1.12.5)
    
    ---
    updated-dependencies:
    - dependency-name: nokogiri
      dependency-type: indirect
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
  - Add ddiproietto@google.com to CC (#6533)
    
    
  - Fix for rust and swift coverages (#6517)
    
    * coverage: introduces llvm-cov-rel
    
    Cf https://github.com/google/oss-fuzz/issues/6268
    
    Latest clang-14 and clang-13 used by rust or swift have a slightly
    different profraw file format
    
    llvm-cov-rel is tool that will update the profraw file produced
    by clang-13 to one readable by clang-14 llvm-cov tools
    
    * Suricata as a rust project
    
    * rust coverage: remaps every rust subdirectory in fuzz
    
    So that projects not using default fuzz_targets subdir
    get the good remap, and hence the good coverage report
  - [bls-signatures] Enable additional operations (#6522)
    
    
  - binutils: fix build (#6520)
    
    
  - Undefined name: import sys for line 33 (#6519)
    
    
  - Update project.yaml
  - mupdf: fix build (#6518)
    
    
  - django: fix build (#6516)
    
    
  - Add lpak to cc list for python oss-fuzz bugs (#6417)
    
    
  - Use libClusterFuzz for reproduction. (#6495)
    
    Fixes #6326.
  - [systemd] turn MSAn on (#6514)
    
    Apparently the dependencies aren't used at runtime by the
    fuzz targets so it seems it should be safe to bring MSAn back.
    I'd keep https://github.com/systemd/systemd/issues/20542 open though
    (at least until the dependencies are either linked properly or
    maybe even removed somehow).
  - cpython3: switch to base-builder (#6475)
    
    
  - libreoffice: add dbf seed collection (#6505)
    
    
  - [lldb-eval] Fix build failure after upgrade to Ubuntu 20.04 (#6511)
    
    
  - grant raphael.gomes@octobus.net access to Mercurial (#6509)
    
    
  - add missing main_repo field for Mercurial (#6510)
    
    
  - [zxing] Skip very large images (#6504)
    
    
  - [php] Add function-jit fuzzer (#6507)
    
    
  - spdk: simplify build (#6503)
    
    
  - libavif: install nasm as a Linux package (#6502)
    
    Install nasm as a Linux package rather than download and build it from
    source code. This is what projects/dav1d/Dockerfile does.
  - spirv-tools: enable msan (#6500)
    
    
  - opensc: Add Veronika to the project (#6499)
    
    
  - ujson: fix build (#6498)
    
    
  - libavif: run dav1d_oss_fuzz.sh to build dav1d (#6494)
    
    Run dav1d_oss_fuzz.sh instead of dav1d.cmd to build dav1d.
    dav1d_oss_fuzz.sh is a copy of dav1d.cmd, with the only difference being
    that it applies a patch to the dav1d source tree to work around a bug in
    Meson's symbols_have_underscore_prefix() function when oss-fuzz
    specifies -fprofile-instr-generate in CFLAGS in the coverage build.
    
    Part 2 of the fix for https://crbug.com/oss-fuzz/38512.
  - Helper fixes for external projects. (#6458)
    
    - Add ":v1" suffix to Dockerfile template.
    - Support relative paths for external project directories.
  - Copy libc++ to /usr/local/lib instead of /usr/lib (#6493)
    
    
  - monero: fix build (#6492)
    
    * monero: fix build
    
    * monero: install unbound from source to avoid nettle reference
  - dnsmasq: fix patch and build (#6491)
    
    
  - [cryptofuzz] Temporarily disable NSS (#6485)
    
    
  - bitcoin-core: Temp workaround for UBSan build failure (#6465)
    
    
  - [PostgreSQL] Fix in FuzzerInitialize (Postgres commit b406478b87e2234c0be4ca4105eee3bb466a646b). (#6470)
    
    
  - install pkg-config and libssl-dev (#6490)
    
    
  - gnutls: Use default focal image (#6473) (#6479)
    
    The gnutls build should be fixed with:
    https://gitlab.com/gnutls/gnutls/-/commit/c3137e17356c798ea4c9327a37c0693a500571ae
  - wget: upgrade to latest base builder (#6488)
    
    * wget: upgrade build to latest base builder
    
    * dont add old script
    
    * wget: cleanup build
  - wget2: upgrade build to latest base builder (#6483)
    
    * wget2: upgrade build to latest base builder
    
    * cleanup build
    
    * wget2: simplify build
    
    * wget2: cleanup build
    
    * wget2: last cleanup (hopefully)
    
    * wget2: cleanup build
  - [etcd] Fix build (#6486)
    
    
  - nettle: Avoid calling realpath on non-existing path (#6484)
    
    This is a fix-up of commit f369375419035b9a8cbb2a488a76b78525e2978c.
    During simplification I misused realpath: after a clean checkout,
    PREFIX/lib would not exist yet and thus realpath fails.
  - libphonenumber: upgrade build to base builder (#6480)
    
    * libphonenumber: upgrade build to base builder
    
    * libphonenumber: fix typo
    
    * clean up libphonenumber build
    
    * libphonenumber: minor cleanup
    
    * libphonenumber: last fix
  - nettle: Use default focal image (#6482)
    
    * nettle: Use fixed --libdir
    
    When building with autoconf 2.69 in Ubuntu 20.04, the build script
    fails to detect the library installation location:
    
      + export LIBNETTLE_A_PATH=
      + LIBNETTLE_A_PATH=
      ++ realpath ../nettle-with-libgmp-install/lib/libhogweed.a
      realpath: ../nettle-with-libgmp-install/lib/libhogweed.a: No such file or directory
    
    Instead of guessing where the static libraries are installed, this
    patch makes it always installed in the same location.
    
    * nettle: Use default focal image
  - libtheora, wolfmqtt: switch to new basebuilder (#6481)
    
    * libtheora: switch to new basebuilder
    
    * wolfmqtt: switch to new basebuilder
  - thrift: upgrade build to latest base builder (#6478)
    
    
  - [GDAL] Use Ubuntu 20.04 base-builder image (#6476)
    
    I've committed changes into GDAL master that make it build with the
    20.04 base-builder image
    
    refs #6291
    Fixes coverage build failure of https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38508
  - pcl: switch basebuilder to latest. (#6477)
    
    
  - tesseract-ocr: fix build for latest base builder (#6474)
    
    * tesseract-ocr: fix build for latest base builder
    
    * tesseract-ocr: download data
  - [skia] Use fuzzer constraints (#6462)
    
    
  - gstreamer: fix build to work with latest base builder (#6472)
    
    
  - infra: Only pull images corresponding to project language (#6459)
    
    infra/helper.py build_image foobar should, when asked to pull base
    images, only pull the generic images as well as the base-builder for the
    language declared in foobar.
  - Use uninstrumented spirv-as for corpus prep (#6466)
    
    * Use uninstrumented spirv-as for corpus prep
    
    Using an instrumented version of spirv-as for corpus preparation is very
    slow, and can also lead to issues where a bug in spirv-as gets picked up
    by instrumentation and causes corpus preparation to fail when we would
    rather it succeeded despite the bug.
    
    * Disable msan
    
    Disabling msan for now so that fuzzing using other sanitizers can
    proceed.
  - openweave: fix build to work with latest base builder (#6463)
    
    * openweave: fix build to work with latest base builder
    
    * openweave: deploy true fix
    
    * openweave: cleanup
  - libass: release library memory on shutdown (#6469)
    
    AddressSanitizer/LeakSanitizer has begun to report partial leaks
    due to the library being initialized but never finalized. It's not
    clear why only part of the memory is reported and why this hasn't
    happened before now, but this is a somewhat legitimate report,
    so add finalization calls to release all memory.
    
    The libFuzzer API provides no shutdown cleanup hook,
    so use a static variable with a C++ destructor.
    
    Fixes https://github.com/google/oss-fuzz/issues/6440.
    
    Add the required copyright header while we are at it.
    This code appeared in https://github.com/google/oss-fuzz/pull/34
    together with all the other files that do have the copyright header,
    and this license seems to have been already required at the time,
    so this should not constitute a licensing change.
  - qemu: Simplify build script (#6468)
    
    
  - Use uninstrumented spirv-as for corpus prep (#6467)
    
    To avoid sanitizer errors during corpus prepraration (and also to speed
    it up) this change build an uninstrumented version of spirv-as.
  - Update reproducing.md (#6464)
    
    Some bugs (specially ones related to integer and pointer overflows) are architecture-specific (32/64 bit builds). Add a hint about it.
  - libreoffice: update builds deps (#6461)
    
    
  - Add a cloudbuild.yaml for building CIFuzz base images. (#6457)
    
    
  - [etcd] Initial integration (#5953)
    
    * [etcd] Initial integration
    
    * Add ReadAll() to fuzzer
    
    * Change wording
    
    * Add maintainer email
  - [gVisor] Initial integration (#5772)
    
    
  - janus-gateway: disable memory sanitizer (#6460)
    
    
  - proxygen: fix build for new base builder (#6456)
    
    * proxygen: fix build for new base builder
    
    * proxygen: cleanup double-conversion installation
    
    * proxygen: speedup build
  - Tag all base images with :v1. (#6436)
    
    To guard against major/breaking image migrations in the future.
    
    Part of #6324.
  - [helper] Use base-runner to check if fuzzer exists. (#6453)
    
    Fixes: https://github.com/google/oss-fuzz/issues/6452
  - mdbtools: switch to new base builder (#6454)
    
    
  - [bls-signatures] Update CC list (#6451)
    
    
  - kamailio: update maintainer (#6450)
    
    
  - assimp: switch to new base builder (#6448)
    
    
  - hermes: upgrade to new base builder (#6447)
    
    
  - osquery: switch to ubuntu 20.04 build (#6446)
    
    * osquery: switch to ubuntu20.04 build
    
    * openquery: cleanup fix
    
    * osquery: reomve whitespace
  - Update libClusterFuzz. (#6445)
    
    
  - openvpn: fix build (#6444)
    
    
  - CFLite: Fix corpus pruning for git store. (#6434)
    
    Fixes #6376.
  - libarchive: fix xenial build to latest base (#6441)
    
    * libarchive: fix xenial build to latest base
    
    * libarchive: switch to cmake build
  - wasm3: switch to base builder (#6442)
    
    
  - doc: add light guidance on bug fixing (#6431)
    
    * doc: add lightweight guidance on bug fixing.
    
    * doc: fix typo and whitespace.
  - [skia] Make swiftshader build less noisy (#6433)
    
    
  - bitcoin-core: Re-enable schnorr_fun (#6430)
    
    
  - kamailio: add maintainer email (#6437)
    
    
  - lighttpd: update build.sh objs (#6435)
    
    
  - Updates patch for mysql 8.26 (#6309)
    
    * Updates patch for mysql 8.26
    
    * fixup
    
    * fixup cmake fuzzing build for mysql
    
    * Disable honggfuzz for mysql
  - swift: no explicit linker (#6429)
    
    ld.gold is default and works better than ld
  - bitcoin-core: Fix build hack to work with clang-14 (#6426)
    
    
  - doc: explicitly mention dynamic and static linking of fuzzers (#6428)
    
    * doc: explicitly mention static and dynamic linking of fuzzers.
    
    * doc: add comma.
  - Use libClusterFuzz for CIFuzz fuzzing and pruning. (#6375)
    
    Part of #6326.
  - [bls-signatures] Fix build (#6424)
    
    
  - libass: fix build, upgrade Ubuntu, update contacts (#6423)
    
    * libass: update contact list
    
    One contact is retired; another is currently inactive.
    
    * libass: don't build HarfBuzz tests
    
    They won't be used, so this just wastes resources.
    
    * libass: upgrade to Ubuntu 20.04
    
    The build failures on 20.04 were due to explicit listing
    of static library dependencies, which have changed on 20.04:
    png12 was replaced by png16, fontconfig was missing -luuid,
    and png needed -lz to follow it, not precede.
    
    Replace the explicit -l list by $(pkg-config --static --libs).
    However, -lm must be filtered out as it causes linker errors:
      > undefined reference to `_dl_x86_cpu_features'
    
    While we are at it, Ubuntu 20.04 comes with new-enough FriBidi,
    so we can stop building it.
    
    It also has new-enough HarfBuzz, but it depends on libgraphite2,
    which lacks a static library in the system package, and dynamically
    linking against a system library does not work in OSS-Fuzz
    as the shared object will not exist in the run-time environment.
    
    Reorder the dependencies alphabetically for consistency.
  - Netcdf: adds zlib dependency (#6421)
    
    
  - Roll Clang to clang 14 (945cde8b6a4579406886d08f803b632e00f0b1ec) (#6362)
    
    * Fix clang roll
    
    * Disable dataflow where it breaks
  - Samba builds now expect Ubuntu 20.04 (#6419)
    
    Per #6302 and https://github.com/google/oss-fuzz/issues/6301#issuecomment-911705365 Samba needed, and now did upgrade the build scripts to run on Ubuntu 20.04.
    
    See https://github.com/samba-team/samba/commit/4366c3bb71fe9c083dedeae8798547b64a64d2b4
  - fluent-bit: add project maintainer (#6418)
    
    
  - doc: use lang-specific base-builder images (#6415)
    
    
  - Copy dictionaries over to help steer fuzzing. (#6414)
    
    
  - varnish: Patch the build system (#6412)
    
    * varnish: Drop the downstream build system patch
    
    I made sure future changes upstream would less likely break OSS-Fuzz
    builds by adding an explicit --enable-oss-fuzz configure option.
    
    * varnish: Reduce build parallelism
    
    The partial build performed seems to be subject to races with 32 CPUs.
    
    * varnish: This is a C project, not C++
    
    Not sure how much this matters, it may change environment variables set
    during the build with for example CFLAGS instead of CXXFLAGS. Or it
    might just be for statistics reasons? Anyway, this is a C project.
  - qemu: add default fuzzing options (#6411)
    
    Close fds, and disable leak detection
    
    Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
  - dav1d: add major contributors to auto_ccs (#6410)
    
    
  - kimageformats needs C++17 now (#6409)
    
    
  - [base-builder-new] Remove some overlooked files. (#6389)
    
    
  - [zxing] Fix build by using base-builder-jvm (#6408)
    
    
  - dng_sdk: initial integration. (#6012)
    
    * dng_sdk: initial integration.
    
    * prettify build script.
    
    * dng_sdk: add anton as contact.
    
    * dng_sdk: add seeds.
  - Remove wwweiwang@google.com from the cc list (#6407)
    
    
  - Zydis: Enable assertions during fuzzing (#6404)
    
    Related PR in Zydis: https://github.com/zyantific/zycore-c/pull/29
  - grpc-swift needs zlib (#6402)
    
    * grpc-swift needs zlib
    
    * swift: do not use CFLAGS for coverage
  - [RawSpeed] Reenable errneously disabled MSan build (#6401)
    
    I was not notified about that change, which i believe to be errneous.
    The fuzzers built here do *not* link to *any* outside libraries.
    
    Refs. https://github.com/google/oss-fuzz/pull/6281
    Refs. https://github.com/google/oss-fuzz/issues/6294
  - tint: re-enable honggfuzz (#6400)
    
    Now that the CMake files for int have been fixed, so that when
    LIB_FUZZING_ENGINE is set, it is used as the sole way of specifying
    fuzzer-related linker flags, the honggfuzz engine should work. This
    change reverts the project to use the default set of fuzzing engines,
    which includes honggfuzz.
  - Doc: adds swift to the list of languages supporting coverage (#6398)
    
    
  - [cryptofuzz] Fix build (#6397)
    
    
  - tint: pass LIB_FUZZING_ENGINE more elegantly (#6388)
    
    The LIB_FUZZING_ENGINE environment variable is now passed to tint's
    CMake command as an option, rather than having the environment variable
    be queried in the project's CMake files.
  - gdbm: switch to master branch (#6395)
    
    
  - spirv-tools: re-enable honggfuzz (#6392)
    
    Now that the CMake files for spirv-tools have been fixed, so that when
    LIB_FUZZING_ENGINE is set, it is used as the sole way of specifying
    fuzzer-related linker flags, the honggfuzz engine should work. This
    change reverts the project to use the default set of fuzzing engines,
    which includes honggfuzz.
  - gdbm: change primary contact (#6394)
    
    * gdbm: change primary contact
    
    * fix formatting of auto_ccs
  - spirv-tools: re-enable honggfuzz (#6391)
    
    Now that the CMake files for spirv-tools have been fixed, so that when
    LIB_FUZZING_ENGINE is set, it is used as the sole way of specifying
    fuzzer-related linker flags, the honggfuzz engine should work. This
    change reverts the project to use the default set of fuzzing engines,
    which includes honggfuzz.
  - spirv-tools: pass LIB_FUZZING_ENGINE more elegantly (#6390)
    
    The LIB_FUZZING_ENGINE environment variable is now passed to the CMake
    command of spirv-tools as an option, rather than having the environment
    variable be queried in the project's CMake files.
  - Swift ideal integration (#6312)
    
    * Helper flags for swift compilation
    
    * Documentation for swift project integration
    
    * Adds swift to the languages with coverage
    
    * Only thread sanitizer is supported
    
    * Fixes swift coverage target compilation
    
    * fixup flags facotring
    
    * swift: run on new ubuntu
    
    * fixup
    
    * swift: right copy for symbolizer
  - Fixes ecc-diff-fuzzer with new base-builder (#6383)
    
    * Fixes ecc-diff-fuzzer with new base-builder
    
    Needing both rust and golang
    
    * Move suricata to base-builder-rust
    
    As it uses both C and rust
  - kamailio: updated build script for new fuzzer. (#6387)
    
    
  - cairo: fix build (#6386)
    
    * cairo: fix build.
    
    * cairo: install gperf packet to fix undefined build.
  - resiprocate: fix build. (#6384)
    
    
  - Fix i386 build uploading.
    Don't upload to x86_64 bucket.
    
    Fixes: https://github.com/google/oss-fuzz/issues/6382
    
  - Add corpora to the spirv-tools project (#6381)
    
    Adds corpora of SPIR-V binary and assembly shaders to the spirv-tools
    project, based on shaders in the SPIRV-Tools and tint repositories.
  - Disable honggfuzz from the tint build (#6377)
    
    Currently there are errors building with honggfuzz. This may be because
    the tint fuzz targets are not correctly configured - the tint build
    system does not use the LIB_FUZZING_ENGINE environment variable and
    instead hard codes various fuzzer flags. This will be fixed in due
    course, but disabling honggfuzz for now to get the OSS-Fuzz build
    working.
  - Remove accidentally committed file (#6380)
    
    
  - Add additional pidgin developers so they can help (#6373)
    
    
  - [language builders] Get rid of base-builder-new (#6361)
    
    Build all C/C++ projects in an image without rust, java,
    atheris (python), or go.
  - Update CC list for spirv-tools (#6372)
    
    
  - [libssh2][python3-libraries][django] Run apt-get update (#6371)
    
    Not doing this relies on the base-builder image running apt-get
    update "recently" and is a bad assumption.
  - Fix go coverage builds (#6369)
    
    * Fix go coverage builds.
    
    * Fix
  - gdbm: initial integration (#6258)
    
    * gdbm: initial integration
    
    * gdbm: add main_repo attribute.
    
    * gdbm: Add Dockerfile and build.sh
    
    * gdbm: move seed generation and runcom script to upstream
    
    * gdbm: remove blank lines
  - done (#6368)
    
    
  - Fix go coverage build regression. (#6367)
    
    * Fix go coverage build regression.
    
    * Fix CI List.
    
    * Proper fix.
    
    * Revert one fix.
  - sound-open-firmware: add more CCs (#6366)
    
    Adding more people to help fix bugs
  - [skia] Fix build after Swiftshader update (#6358)
    
    
  - libreoffice: upgrade cairo (#6365)
    
    
  - [NFC][Ubuntu upgrade] Remove base-sanitizer-libs-builder (#6364)
    
    Functionality was already removed. This is basically dead code right now.
    Related: #6180
  - [languages] Handle language builders in cifuzz and build_and_push_test_images. (#6359)
    
    
  - [base-builder-new] Fix issues (#6363)
    
    Include cargo and compile_go_fuzzer.
  - update Shuduo's email address (#6360)
    
    
  - Update auto-cc for spirv-tools (#6357)
    
    Adds the Radial team to the auto-cc list.
  - tor: Use default focal image (#6356)
    
    
  - net-snmp: Simplify the build scripts (#6231)
    
    Use the Net-SNMP continuous integration script ci/install.sh to install
    development packages. Use the Net-SNMP script ci/build.sh to compile the
    Net-SNMP source code.
  - [base-builder-rust] Make install_rust.sh executable. (#6354)
    
    
  - [infra][rust] Split out rust projects to their own builder image (#6352)
    
    
  - qemu: add Mauro to the auto_ccs (#6353)
    
    Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
  - [infra][python] Split out python projects to their own builder. (#6341)
    
    
  - [go][infra] Create base-builder-go and use it to build go projects. (#6335)
    
    Also, update base-builder-new to copy everything base-builder does
  - [infra][jvm] Split out JVM projects to their own builder. (#6336)
    
    
  - [cifuzz] Install docker for focal. (#6339)
    
    
  - [bls-signatures] Enable Fp2 math (#6351)
    
    This enables and tests some additional math functions
  - [zxing] Enable AWT headless mode (#6350)
    
    Fixes issues with native AWT library loading.
  - [ClickHouse] Enable coverage for memory and address sanitizer (#6348)
    
    * Done
    
    * done
    
    * better
  - apache-httpd: make patches inline. (#6349)
    
    
  - Done (#6347)
    
    
  - [bitcoin-core] Fix build (#6344)
    
    * [bitcoin-core] Fix build
    
    * [bitcoin-core] Add libsecp256k1 w20-p8 target
    
    * [bitcoin-core] Fix
  - Add new C library for subsequent fuzz testing (#6346)
    
    Also cleans up old cmake configure options
    
    Signed-off-by: Kimball Thurston <kdt3rd@gmail.com>
  - [libvips] Upgrade to Ubuntu 20.04 (#6345)
    
    - Use libbrotli from system.
    - Build libjxl without sjpeg support.
    - Link fuzzers against libmount and libblkid (needed by libgio).
    - Sort and remove duplicated apt-get packages.
  - tdengine: initial integration. (#5675)
    
    * tdengine: initial integration.
    
    * tdengine: fix build following upstream email.
  - [zxing] Initial Integration (#6057)
    
    
  - Initial project file for SPIR-V Tools fuzzing (#6330)
    
    * Add SPIR-V Tools fuzzer targets
    
    Adds fuzzer targets for the SPIR-V Tools project.
    
    * Disable honggfuzz, as it was failing in the CI.
  - rustls: update maintainer (#6325)
    
    
  - Add fuzz targets for tint (#6331)
    
    Adds fuzz targets for the SPIR-V reader of the tint project.
  - Change the primary contact for the ClickHouse project (#6343)
    
    
  - [bls-signatures] Add target for size-optimized blst (#6342)
    
    
  - [base-builder-new] Fix compile script. (#6340)
    
    In https://github.com/google/oss-fuzz/pull/6322 compile was synced
    with the version in base-builder. However, base-builder's compile
    assumes that rust and go are installed. This change makes it possible
    to run compile without those installed.
  - [infra] Do precompiles first before copying other scripts. (#6337)
    
    This means we don't need to rebuild AFL++ and honggfuzz when
    iteratively working on scripts.
  - Add one more maintainer to ClickHouse project (#6334)
    
    hq.zero.iq@gmail.com - Ilya Yatsishin
  - [base-images] Pin base-builder-swift instead of base-builder-new
    to fix breakage.
    
    This is intended to fix the same breakage as
    https://github.com/google/oss-fuzz/pull/6327. But this fix does
    not prevent us from creating new language builder images that do
    not use xenial.
    
    Related: #6180
    
  - [libreoffice] reenable msan (experimentally) after Ubuntu upgrade (#6333)
    
    check_build on new baseline, i.e.
    
    python infra/helper.py build_image libreoffice
    python infra/helper.py build_fuzzers --sanitizer memory libreoffice
    python infra/helper.py check_build --sanitizer memory libreoffice
  - Fix exception in request_coverage_build. (#6328)
    
    
  - Remove no longer needed build workarounds (#6329)
    
    * Revert xenial workaround in speex (no longer needed)
    
    This reverts commit 84c9dd3600e2c348aaca78b2717067412fea8323.
    
    * Revert xenial opus workaround (no longer needed)
    
    This reverts commit 7cc0561aad415673f3ca3f15bfd240c75584849e.
    
    * Remove ffmpeg build workaround for nasm
    
    * Remove build workaround for dav1d
    
    * Remove libavif build workaround
    
    * Remove p11-kit build workaround
    
    * Remove postgis build workaround
  - Pin base-builder-new to xenial. (#6327)
    
    Build is currently breaking
  - rust coverage : only wrap cargo fuzz build (#6307)
    
    Project image-rs uses cargo fuzz list
  - Fix exception in build. (#6323)
    
    Have build_project.Project() take in project.yaml contents and parse
    that.
  - [Ubuntu upgrade] Copy files from base-builder/ to base-builder-new/ (#6322)
    
    Two of these changes that are important for the Ubuntu upgrade are
    the changes to "compile" and write_labels.py"
  - libreoffice: default Ubuntu 20.04 gperf is new enough to use (#6321)
    
    
  - apache-httpd: fix patch for hitting assert. (#6320)
    
    
  - libigl: fix build. (#6319)
    
    
  - Updated a list of maintainers and enable all the sanitizers (#6299)
    
    * first
    
    * Update project.yaml
    
    * Enable all sanitizers
    
    * Enable coverage with sanitizers
    
    * Update project.yaml
    
    * Update build.sh
  - Fix gnupg patch (#6316)
    
    * Fix gnupg patch
    
    * Moved from xenial to focal
  - [cifuzz] Fix bug caused by Ubuntu upgrade. (#6318)
    
    * [cifuzz] Fix bug caused by Ubuntu upgrade.
    systemd-detect-virt isn't being found.
    
    * fix
  - libreoffice: update builds deps (#6315)
    
    
  - [cifuzz] Handle upgrade to Ubuntu 20.04 (#6249)
    
    Handle upgrade to Ubuntu 20.04
    
    1. Don't do any special handling for MSAN anymore. It isn't needed.
    2. Don't do any special handling for msan-libs-builder it doesn't
    exist anymore.
    
    Related: https://github.com/google/oss-fuzz/issues/6180
  - Reland [Ubuntu upgrade] Fix projects so they don't break with upgrade (#6313)
    
    This reverts commit 878c32419cdf89457d1f1be616d4896fc2586160.
    
    Related: #6180
  - [Ubuntu upgrade] Upgrade images to Ubuntu 20.04 (#6305)
    
    Related: #6180.
  - Solidity: Upgrade evmone from 0.4.0 to v0.8.2 (#6207)
    
    
  - [Ubuntu upgrade][infra] Remove deploy for msan-build (#6314)
    
    Related: #6180
  - Do not use ld for coverage for thrift (#6310)
    
    
  - Do not let freeradius reset CFLAGS (#6311)
    
    so as to get coverage
  - Specify cargo build target for ecc-diff-fuzzer (#6308)
    
    cf https://github.com/google/oss-fuzz/issues/3469#issuecomment-630854977
  - Revert "[Ubuntu upgrade] Fix projects so they don't break with upgrade. (#6304)" (#6306)
    
    This reverts commit 5549d804b3640462549401597cfef382911b3933.
  - [Ubuntu upgrade] Fix projects so they don't break with upgrade. (#6304)
    
    Fix projects so they don't break with upgrade.
    These fixes are likely not backwards compatible and will fail on
    Ubuntu 16.04.
    Related: #6180
  - [Ubuntu upgrade] Disable MSAN in projects that will have false positives. (#6303)
    
    Do this based mostly on instrumented_libraries and more tests.
    
    Related: #6180
  - [build][infra] Improve build functions. (#6296)
    
    Important functional changes involve mostly improvements to
    the command line scripts (this doesn't affect the build infra, only
    local use):
    
    1. Make sure scripts use the same builder as builds requested by infra, otherwise builds
    will be very slow and will fail for larger projects.
    2. Allow users to specify --test-images to use base images with suffix "-testing"
    3. Allow script users to specify --parallel for parallel builds.
    4. Allow script users to specify --testing so that builds are uploaded to testing buckets.
    5. Allow script users to specify --branch so that builds use specified branch instead of master.
    6. Clone oss-fuzz with depth 1 for improved speed and space usage.
    7. Use logging instead of writing to stderr or print.
    8. Allow scripts to accept multiple projects.
    9. Allow script to keep executing after failure to get build steps.
    10. Change scripts to use python3.
    11. Tag more so builds are easier to query.
    12. Log the gcb page for each build.
    
    Other changes include major refactoring:
    
    1. Don't construct image names from scratch using format strings each time they are used.
    Provide a helper function for this.
    2. Provide a helper function,  get_env instead of constructing the env from scratch each time.
    3. Move compile step into its own function: get_compile_step.
    4. Move upload steps into their own helper function get_upload_steps.
    5. Don't misuse the name image_project when we really mean cloud project.
    6. Move cleanup step into its own helper function: get_cleanup_step.
    7. Exit with returncode of main function from build_project.
    8. Add unittests for build_project.
    9. Make request_build share run_build code with build_project.
    10. Use proper spacing in comments.
    11. Test builds other than libfuzzer-ASAN-x86_64. Test other sanitizers, fuzzers and architectures
    12. Make build_and_run_coverage share more code with build_project.
    13. Move tests for build_and_run_coverage_test.py out of requst_coverage_test.py into their own file.
    14. Use single quotes for strings.
    15. Store state for a build in Build object instead of passing it everywhere.
    16. Don't abuse project_yaml dict for storing project state. Use a Project object instead.
    17. Better variable naming.
    18. Use more classes instead of passing around arguments.
    19. Use more f-strings.
    20. Make scripts share main function.
    21. Begin comments with uppercase and end with period.
    22. Don't import functions or classes as dictated by style guide.
    23. Share more test code in test_utils
    
    Related: #6180.
  - [Ubuntu upgrade] Pin projects that fail on coverage (#6300)
    
    Some of these seem to timeout, unclear if this is a fluke.
    Can upgrade these later.
    
    Related #6180
  - [Ubuntu upgrade] Remove support for prebuilt MSAN libraries. (#6280)
    
    This is done in anticipation of the upgrade to Ubuntu 20.04 which wont support this.
    We'll do this first so we can handle any breakages caused by this step before needing to handle breakages
    caused by the upgrade. However, there shouldn't be any breakages due to #6281, but there may be some projects
    we overlooked.
    The only exception to this is libcxx.
    Related: #6180.
  - [Ubuntu upgrade][NFC] Improve message for swift projects. (#6292)
    
    Related: #6180.
  - [Ubuntu upgrade] Disable MSAN where it doesn't support on Ubuntu 20.04 (#6281)
    
    These projects were tested and it was found that their use
    of MSAN does not work on Ubuntu 20.04. Therefore their use of
    MSAN is being disabled.
    
    Related: #6180
  - [Ubuntu upgrade] Pin projects to Xenial where fuzzer build fails. (#6293)
    
    This does not include coverage build failures.
    Related: #6180.
  - mdbtools: Disable silent rules when configuring (#6295)
    
    
  - [Ubuntu upgrade][infra] Fix issue with write_labels.py (#6290)
    
    /usr/bin/python3 doesn't exist and isn't pythonic. Change shebang
    to "/usr/bin/env python3"
    
    Related: #6180
  - [Ubuntu upgade][lldb-eval] Install python to partially fix build (#6289)
    
    There are still other issues preventing lldb-eval from building.
    Related: #6180 
  - Enable ClickHouse (#6255)
    
    * done
    
    * Fix build
    
    * Fix build
    
    * Fix build
    
    * fix build
    
    * Fix build
    
    * Disable undefined sanitizer
  - apache-httpd: add preq parser fuzzer. (#6287)
    
    * apache-httpd: preq parser fuzzer.
    
    * apache-httpd: fix styling.
  - docs: remove minijail doc. (#6285)
    
    
  - apache-httpd: add request fuzzer. (#6282)
    
    
  - [Ubuntu upgrade][rnp] Make build work on Ubuntu 20.04. (#6278)
    
    Copy all versions of the libjson shared object and install python
    instead of python-minimal.
    
    Related #6180.
  - [Ubuntu upgrade][glib] Make build work after 20.04 upgrade. (#6275)
    
    Related: #6180.
  - [Ubuntu upgrade][myanmar-tools] Explicitly link against libunwind. (#6277)
    
    This prevent build from breaking when builder is upgraded to
    Ubuntu 20.04.
    
    Related: #6180.
  - [Ubuntu upgrade][libspectre] Disable dataflow builds. (#6274)
    
    They aren't really supported anymore and they break in
    Ubuntu 20.04.
    Related: #6180.
  - [Ubuntu Upgrade] Raise threshold MSAN calls in for bad build check. (#6272)
    
    Raise the threshold as honggfuzz builds in focal seem to have more
    calls.
    Related: #6180.
  - [Ubuntu upgrade][cairo] Install libtool and autotools-dev (#6273)
    
    Do this explicitly to prevent breakage when builder is upgraded
    to Ubuntu 20.04.
    
    Related: #6180
  - add swift (#6270)
    
    Signed-off-by: Asra Ali <asraa@google.com>
  - [Ubuntu Upgrade] Pin swift projects to specific image.
    
    This will prevent the builds from breaking when we do the upgrade.
    Some of the issues I encountered were:
    1. Installing no longer existing packages libstdc++-5-dev
    2. Patch failing when I upgraded swift version (I think old version
    doesn't work on focal).
    
    Related: https://github.com/google/oss-fuzz/issues/6180
    
    Right now this change is an NFC because base-builder-swift isn't
    even being updated at the moment (see #6269)
    
  - [qt] Use own README as help_url (#6267)
    
    It includes a link to the default page so no information will be lost.
  - libreoffice: enable msan experimentally (#6266)
    
    
  - Fix coverage command and misc fixes (#6262)
    
    
  - Update with actual repository (#6265)
    
    The old repository is not there anymore (or not publically accessible)
  - Enable SK_DEBUG when fuzzing SkSL. (#6263)
    
    * Enable assertions for SkSL testing.
    
    * Enable assertions for SkSL testing.
  - [Ubuntu upgrade] Install python in projects that need it: oak, cel-cpp (#6261)
    
    When base-builder upgrades to 20.04, python wont be in and
    base-builder these projects will fail unless they install it.
    Until then, this change should be a noop.
    
    Related: #6180
  - clib: fix build and avoid detecting leaks (#6260)
    
    
  - libusb: fix build and fuzzer. (#6259)
    
    
  - hyperium: fix build. (#6257)
    
    
  - linkerd2-proxy: fix build. (#6254)
    
    
  - Install python in projects that depend on it. (#6251)
    
    When we upgrade to 20.04, python wont be in base-builder and
    these projects will fail unless they install it.
    Until then, this change should be a noop.
    
    Related: #6180
  - Dont use apt for installing things, it isn't meant for scripts. (#6252)
    
    
  - [ubuntu upgrade] Dont install ninja (#6253)
    
    ninja-build is the intended package name. ninja-build isn't actually
    needed for this project anyway.
    ninja is not the build tool and isn't available in Ubuntu 20.04.
    Removing this to prevent breakage.
    Related: #6180
  - [ffmpeg] Prepare for upgrade to Ubuntu 20.04 (#6250)
    
    install libdrm-dev.
    
    Don't rely on cd accepting multiple arguments.
    This behavior doesn't work in Ubuntu 20.04.
    Related: #6180
  - [Ubuntu Upgrade][docs] Say need to build msan deps manually (#6238)
    
    * [Ubuntu Upgrade] Upgrade msan parts to reflect new reality.
    
    All dependencies must be built with MSAN by the project.
    OSS-Fuzz will not be providing any instrumented libraries.
    
    Related: https://github.com/google/oss-fuzz/issues/6180
  - [infra] Add a script for building all base-images with "-testing" (#6248)
    
    suffix and pushing them to gcr.io/oss-fuzz-base.
    
    This is useful for testing changes to images.
    I used it to test changes I made for #6180.
    This does not support msan as that image is being removed.
    
    Also lint.
  - Disable clickhouse. (#6246)
    
    I merged https://github.com/google/oss-fuzz/pull/6244
    too quickly. Clickhouse fails to build.
    Disable temporarily to prevent exceptions since
    clickhouse is new
  - minor cflite build integration docs changes. (#6240)
    
    - Minor clarification about this using OSS-Fuzz's build chain. Be
      consistent about calling this part OSS-Fuzz (rather than
      ClusterFuzzLite), since that's what the image name says.
    
    - Add project.yaml documentation.
    
    - Refer to OSS-Fuzz's guide for efficient fuzzing.
    
    Related: #6196
  - New base builder without lang specific installation + swift base (#5986)
    
    Removes unnecessary stuff in base-builder image to create a base-builder-new, and then adds a base-builder-swift on top of this that swift projects can use (without JVM/Go/etc fuzzing).
  - Resurrect ClickHouse fuzzing  (#6244)
    
    
  - Improve pygment's fuzzer (#6212)
    
    
  - add upstream author Peter Dimov to cc (#6243)
    
    
  - nginx: fix fuzzer to avoid NULL-deref (#6242)
    
    * nginx: fix fuzzer to avoid NULL-deref
    
    * dont modifify libsndfile.
  - libvips: add imagequant and cgif dependencies (#6241)
    
    Build libvips without test and tools subdirs as these are
    not directly fuzz tested.
  - net-snmp: Reenable MIB-II and IF-MIB (#6239)
    
    Recently the IF-MIB implementation on the Net-SNMP master branch became
    dependent on libnl-route-3. An unfortunate side effect is that this broke
    the build of the fuzz tests. Add the pkg-config package such that the
    configure script can detect libnl-route-3 and reenable MIB-II and IF-MIB.
  - [selinux] move the fuzz target and build script upstream (#6026)
    
    to make it easier to reproduce and fix bugs locally
  - Add Exiv2 (#6186)
    
    * Add Exiv2.
    
    * Remove sanitizer flags so that OSS-Fuzz can insert its own.
    
    * Using the fuzzer to create the seed corpus doesn't work with AFL.
    
    * Only use libFuzzer
    
    * Don't add files over 20KB to the corpus.
    
    * Use ${LIB_FUZZING_ENGINE} when building the fuzz target.
  - Don't upload builds in run_fuzzers. (#6151)
    
    The current way adds a lot of ordering assumptions, and doesn't fit too
    well with parallel batch fuzzing either. Add a "upload-build" boolean action
    input that can be added to "build_fuzzers" to upload latest builds
    instead.
    
    Builds are now uploaded by commit hash, rather than a fixed "latest" name.
    ClusterFuzzLite's download_latest_build will check the last 3 commits and download the
    first available build by git hash.
  - libreoffice: disable afl fuzzer (#6234)
    
    see https://github.com/google/oss-fuzz/issues/6233 for rationale
  - [libecc] Fix SHAKE digest (#6232)
    
    See https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37229 for technical discussion.
  - Fix harfbuzz fuzzer build. (#6230)
    
    test/shaping was renamed to test/shape.
  - net-snmp: fix build. (#6229)
    
    
  - Clarify language in continuous_integration.md (#6227)
    
    Clarify AND (not OR) for situations when crashes are reported
  - Update fuzzers to new Atheris version (#6060)
    
    * Update fuzzers to new Atheris version
    
    * Pin new atheris version
    
    * Change = to ==
    
    * Change path where Atheris fuzzers ld_preload from
    
    * Update hypothesis fuzzer to work with new atheris
    
    * Set version to 2.0.1
    
    * Switch to Atheris 2.0.4
    
    * Correct spelling of pygments_fuzzer decorator
    
    * instrument yaml_reader
    
    * Change to latest Atheris
    
    * Set atheris version to 2.0.6
  - Update bazel.md (#6228)
    
    Fix typo (though --> through)
  - nginx: add maintainer (#6225)
    
    
  - multiple projects: cleanup stale accounts. (#6224)
    
    * multiple projects: cleanup stale accounts.
    
    * dont disable postgresql for now.
  - apache-httpd: update contact (#6223)
    
    
  - nginx: request access (#6104)
    
    * nginx: request access
    
    I would like to submit fuzzers to nginx and in this context having the coverage information from clusterfuzz would be great.
    
    * nginx: add main_repo field
  - fix build error ("/out" used instead of "$OUT") (#6221)
    
    
  - Update the `oss-fuzz` build instructions for ProFTPD, to match changes in the project's build. (#6220)
    
    
  - clone libreoffice from git.libreoffice.org instead of anongit.freedesktop.org (#6216)
    
    as the latter has become unreliable and is regularly unavailable
    
    and drop some dependencies we no longer need
  - [bls-signatures] Fix build and support more operations (#6218)
    
    * [bls-signatures] Fix build and support more operations
    
    * [bls-signatures] Fix 32 bit build
  - Switched upb to Bazel for fuzzing. (#6219)
    
    * Switched upb to Bazel for fuzzing.
    
    As of https://github.com/protocolbuffers/upb/pull/405 Bazel
    now supports cc_fuzz_test() for its fuzzing target.
    
    * Updated WORKDIR in Dockerfile.
  - [libecc] Upgrade to latest version (#6217)
    
    
  - [boost.json] initial submission (#5998)
    
    * initial attempt at fuzzing boost json with oss-fuzz
    
    * use the boost super project master branch
    
    * add mp11 to the list of checked out submodules
    
    * remove leftover copy paste code
    
    * use the boost json develop branch
    
    * add vinnie
    
    * add dmitry
  - Build HDF5 1.12.1 for matio (#6018)
    
    
  - Fix reproducing timeout to match clusterfuzz
  - projects: add celestiaorg/smt (#6134)
    
    This project is an implementation of Sparse Merkle tree, which will be
    used by Celestia, Cosmos SDK, ... and maybe other blockchain ecosystem.
    We want to make sure the code is fuzzed to catch highly impacted bug as
    soon as possible.
    
    See:
     - https://github.com/celestiaorg
     - https://docs.cosmos.network/v0.42/
  - [wuffs] Build C++ fuzzers too, not just C ones (#6211)
    
    
  - H3: Update for functions returning error codes (#6214)
    
    * H3: Update for functions returning error codes
    
    * Read H3 index directly from uint8_t data, not string
    
    * remove new_str
    
    * Fix pointer/int type confusion
    
    * Revert h3NeighborRotations change that is not in master yet
    
    * Fix h3NeighborRotations (again)
  - [wolfssl] Update auto_ccs and disable AFL (#6204)
    
    
  - [infra][tests][NFC] Change mocked function prefix from "mocked_" to "mock_" (#6198)
    
    Also rename mock_ functions to have impl suffix so we can use mock_ in place of mocked_
  - [frr] Change CC email (#6209)
    
    Signed-off-by: Quentin Young <qlyoung@nvidia.com>
  - harfbuzz moved the sample fonts from 'shaping' to 'shape' (#6208)
    
    
  - update libreoffice build dependencies (#6206)
    
    
  - wasmtime: install a newer version of OCaml (#6205)
    
    * wasmtime: install a newer version of OCaml
    
    * Update Dockerfile
    
    * wasmtime: move environment setup to build.sh
  - [helper] Change logging from error to info (#6200)
    
    
  - [infra] Enable Jazzer support for UBSan C++ features (#6202)
    
    Jazzer now links in the UBSan C++ runtime and thus support the vptr
    and function sanitizer settings.
  - Update auto_ccs of opensk project (#6197)
    
    
  - Don't use nginx' internal memory allocator (#6199)
    
    * Don't use nginx' internal memory allocator
    
    See http://nginx.org/en/docs/dev/development_guide.html#debug_memory for details.
    
    * Fix the build.
  - wasmtime: provide OCaml packages for build (#6193)
    
    * wasmtime: provide OCaml packages for build
    
    In order to build the WebAssembly spec interpreter, these packages are needed.
    
    * wasmtime: remove ocamlbuild as a dependency
    
    The oss-fuzz-base image is using Ubuntu 16.04.7 and the `ocaml-nox` package at this version contains `ocamlbuild`.
  - tpm2-tss updates (#6195)
    
    * tpm2-tss: update version of tpm simulator
    
    Getting tpm simulator is failing occasionally [1].
    Updating simulator version to the lastet might help it.
    
    [1] https://oss-fuzz-build-logs.storage.googleapis.com/log-66fdad5b-1f63-4bc2-8a0e-876201912036.txt
    
    Signed-off-by: Tadeusz Struk <tstruk@gmail.com>
    
    * tpm2-tss: update outdated contact list
    
    Signed-off-by: Tadeusz Struk <tstruk@gmail.com>
    
    * tpm2-tss: add main_repo section
    
    Signed-off-by: Tadeusz Struk <tstruk@gmail.com>
  - [cifuzz] Add pruning task (#6188)
    
    Fixes: #6064
  - [infra][build] Switch to f-strings. (#6182)
    
    
  - [presubmit][NFC] Use descriptive tone in docstrings (#6192)
    
    
  - [freetype2] Remove CC address (#6190)
    
    Project member email address no longer exists.
  - Fuzz develop branch instead of stable (#6191)
    
    
  - adding new contacts for reports (#6189)
    
    
  - [clamav] Fix build (#6187)
    
    The instructions for building libclamav-only dependencies changed.
    
    The clamav_deps collection is now used for all clamav dependencies.
    
    A) We don't need to waste resources building dependencies used only
       by clamav programs.
    B) The ncurses static build seems to be failing on this image, which
       is why the build is broken/needs fixing.
  - [jbig2dec] Limit allocator to common memory use, avoiding timeouts (#6184)
    
    The JBIG2 format allows for ridiculously large images (4G x 4G
    pixels!), which means that jbig2dec may use an enormous amount of
    memory when it tries to decode them. OSS-fuzz currently restricts test
    cases to 2.5Gbyte of memory per run, so the jbig2dec fuzzer
    implemented a custom allocator to limit jbig2dec's memory usage to
    1Gbyte. When the custom allocator runs out of memory jbig2dec
    indicates an error, frees its resources and returns.
    
    Limiting memory usage to 1Gbyte, below OSS-fuzz's limit of 2.5Gbyte,
    eliminated the entire class of false positive OSS-fuzz issues
    concerning out of memory situations. These were false positives in the
    sense that a program using jbig2dec is in control of how much memory
    jbig2dec uses, but the program must implement a custom jbig2dec
    allocator and limit it to the desired amount of memory.
    
    Another class of false positive OSS-fuzz issues remain; issues where
    the image data still takes more than 25 seconds to process, causing an
    OSS-fuzz timeout. These cases use less than 1Gbyte of memory, but
    processing that amount of data may still take a long time. Since
    processing time and data size are related, a program may limit the
    amount of memory allotted to jbigdec's custom allocator to something
    less than 1Gbyte to reduce processing time.
    
    Running through a set of real world JBIG2 images shows that no more
    than 20MByte is used to decode any of them and none take more then 25
    seconds to decode on a desktop machine. To eliminate the class of
    false positive OSS-fuzz timeout issues the fuzzer will now limit the
    amount of memory to 32Mbyte with the hope that their processing time
    will be reduced below 25 seconds.
    
    Of course OSS-fuzz may still detect issues where jbig2dec gets caught
    in an endless loop (or the processing time is long for a reason other
    than data size). These are the issues we want OSS-fuzz to identify and
    get fixed, since the parameters causing those timeouts are not in
    control by a program using jbig2dec.
  - [infra] Upgrade cmake to latest release (3.21.1) (#6185)
    
    Qt now requires 3.20 or higher.
  - shrink the build dependencies that fuzzing libreoffice needs (#6183)
    
    
  - [cifuzz][nfc] Switch log info to log error (#6178)
    
    
  - net-snmp: fix build following upstream changes (#6177)
    
    * net-snmp: change location of fuzzers upstream.
    
    * remove tmp checkout.
  - Bump jinja2 from 2.10 to 2.11.3 in /infra/ci (#6172)
    
    Bumps [jinja2](https://github.com/pallets/jinja) from 2.10 to 2.11.3.
    - [Release notes](https://github.com/pallets/jinja/releases)
    - [Changelog](https://github.com/pallets/jinja/blob/main/CHANGES.rst)
    - [Commits](https://github.com/pallets/jinja/compare/2.10...2.11.3)
    
    ---
    updated-dependencies:
    - dependency-name: jinja2
      dependency-type: direct:production
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
  - apache-httpd: fix str size issue. (#6176)
    
    
  - [cifuzz] Speculative fix for issue with seed corpus/backup corpus (#6175)
    
    This should fix #6173
  - [cifuzz] Add  feedback for bad build check (#6174)
    
    
  - [cifuzz] Fuzz in cifuzz-base (#6142)
    
    Fixes: #5926
  - [ClusterFuzzLite][docs] Start writing docs (#6165)
    
    I started writing some important docs, such as overview, build_integration, and running_clusterfuzzlite. However, most important docs are still TODO.
    This PR at least adds a skeleton for those docs.
  - infra: add coverage sanitizer option (#6171)
    
    * infra: add coverage sanitizer option
    
    * fix lint
  - Fix bleach's build (#6169)
    
    Mozilla renamed the `master` branch `main`.
  - Reinstall jekyll deps to update kramdown version in Gemfile.lock (#6168)
    
    
  - [presubmit][NFC] Fix copyright line
  - [infra][NFC] Use one source of truth for engines, languages etc. (#6163)
    
    Do this only where it makes sense. For example, since CIFuzz doesn't
    support dataflow, maintain a separate source of truth.
  - [CIFuzz] Force external to use .clusterfuzzlite for build integrations. (#6167)
    
    
  - [CIFuzz][NFC] Add function for setting env vars in docker command. (#6162)
    
    
  - apache-httpd: new fuzzers and more targets. (#6166)
    
    
  - bitcoin: remove i386 HAVE_BUILTIN_MUL_OVERFLOW workaround (#6140)
    
    This should no-longer be necessary now that
    https://github.com/bitcoin/bitcoin/pull/21882 has been merged upstream.
  - [CIFuzz][helper] Fix external project support and add tests. (#6161)
    
    
  - [docs][NFC] Don't rely on deprecated flag to silence warning. (#6164)
    
    
  - Fix Tor build issue related to OpenSSL's use of lib64 (#6160)
    
    The openssl build process now puts objects into lib64, even if it
    wasn't told to do so.  Tor's crufty old library detection code
    didn't handle that.
  - [CIFuzz] Add support for external projects to helper.py (#6141)
    
    Add support to helper.py for external projects for all subcommands except `download_corpora`.
    External users just need to specify `build_integration_path`, `project_src_path` and `external`.
    
    Also do a big refactor to pass a project object as part of args instead of a string containing the name of the project or its
    path.
    Related: #6125
  - [docs] Enable AWT headless mode in Java guide (#6155)
    
    Fixes https://github.com/google/oss-fuzz/pull/6105#issuecomment-887950308.
  - [cifuzz] Only grab github-specific env vars on github (#6150)
    
    This removes need for non-OSS-Fuzz users to fake using OSS-Fuzz.
    
    Fixes: #6129
  - [infra][NFC] Use "testcase" instead of test_case for consistency. (#6159)
    
    
  - [cifuzz][NFC] Move default configs to config_utils.py (#6157)
    
    
  - [cifuzz][NFC] Move Workspace to workspace_utils. (#6158)
    
    In hindsight, it doesn't have a lot to do with the rest of
    config_utils. And config_utils is getting crowded.
  - [cifuzz] Add basic end-to-end tests. (#6139)
    
    This test doesn't really do diffing or affected fuzzers properly.
    Nor does it check the workspace for existence of certain things, nor
    does check the filesystem for proof things happened. It is still
    a WIP.
    
  - [helper] Switch from print to log (#6149)
    
    
  - libcacard: Update list of NSS libraries needed for build (#6154)
    
    
  - cras: Update project metadata (#6153)
    
    Changes:
    - Change primary_contact
    - Update auto_ccs to the latest
    - Increase builds per day to 2
  - [cifuzz] Create validate method on BaseConfig (#6135)
    
    * [cifuzz] Create validate method on BaseConfig
    
    Use it to validate that either OSS_FUZZ_PROJECT_NAME
    or BUILD_INTEGRATION_PATH is set.
    Also use it to validate that workspace is set
    (rather than duplicate code).
    Add tests.
    
    * Use env var hack to bypass valdiation
    
    * fix
    
    * fix
    
    * fmt
    
    * fix
    
    * tmp
    
    * fix
  - [frr] Add additional CC emails (#6148)
    
    
  - [containerd] Fix build (#6145)
    
    
  - Fix project OpenSK (#6146)
    
    Code coverage was disabled, making the overall workflow failing.
    Also adds all the fuzzing targets the project provides.
  - adding commons-geometry to Apache Commons project files (#6144)
    
    
  - apache-httpd: initial integration (#6044)
    
    * apache-httpd: initial integration with PoC fuzzers.
    
    * updated project with apache emails and added more fuzzing. More to come
    
    * use trunks of apache projects.
    
    * fix build.
    
    * updated build to enable pool debugging.
  - [cifuzz] Don't delete base-runner (#6143)
    
    We shouldn't delete it, because we need to use it again.
    This saves about 13 seconds per run.
    Fixes: #5982
  - Handle CI fuzz builds from events other than push or pull_request. (#6055)
    
    Don't try to find unaffected fuzzers by diffing against a base commit as
    they don't exist in those contexts.
    
    For #6053.
  - net-snmp: migrate fuzzers upstream. (#6113)
    
    * net-snmp: migrate fuzzers upstream.
    
    * fix correct upstream link.
  - [CIFuzz] Allow users to specify if unreproducible crashes are reported (#6138)
    
    
  - [NFC][cifuzz] Improve env var handling. (#6137)
    
    Also delete useless TODOs.
  - [CIFuzz] Change behavior of PROJECT_SRC_PATH to be clearer. (#6136)
    
    Don't assume that path is relative to workspace if it is not absolute.
    Only make this assumption on GitHub where it will always be true.
    Also, add tests.
  - [cifuzz] Implement get_files_covered_by_target for external users (#6132)
    
    This should mostly complete support for affected fuzzers for external users.
    This implementation is still imperfect however. 
    It relies on the name of the repo being the same as the name of the directory in $SRC/ that the repo is checked out in
    (i.e. repo must be checked out in $SRC/$REPO_NAME).
  - [CIFuzz] Don't overwrite the repo in external builds. (#6131)
    
    Fixes: #6119
    
    Also add more tests for continuous_integration module.
  - [h2o] add nalramli@fastly.com to project (#6124)
    
    
  - [CIFuzz][NFC] Add tests for config_utils and do some minor refactoring (#6128)
    
    
  - [CIFuzz][NFC] Fix some comments. (#6130)
    
    
  - [cifuzz][NFC] Make changes suggested in #6118 (#6127)
    
    
  - Granting krajshiva@google.com Envoy fuzz tests access. (#6123)
    
    Signed-off-by: Adi Suissa-Peleg <adip@google.com>
  - update libreoffice build deps (#6121)
    
    
  - Adds an email to capnproto project (#6122)
    
    
  - [NFC][cifuzz] Move Workspace from docker into config_utils. (#6117)
    
    It doesn't really fit into docker.
  - [CIFuzz] Add script to run cifuzz (#6118)
    
    This can be used by non-github users.
    Related: #6100
  - Remove JDK dependency not available on ClusterFuzz (#6105)
    
    While installing `libxext-dev` in `base-runner` makes it available for local fuzzing via `infra/helper.py run_fuzzer`, it is not installed in the image used by ClusterFuzz to run fuzz targets. ​Fuzz targets that rely on any JDK system dependency rather have to install it manually using the method described in https://google.github.io/oss-fuzz/further-reading/fuzzer-environment/#runtime-dependencies. 
    
    By removing this package from `base-runner`, a failure to do so will already be detected via a local `check_build` rather than only during fuzzer execution on ClusterFuzz.
  - [cifuzz] Get rid of MANUAL_SRC_PATH (#6120)
    
    
  - Adds frr project (#5749)
    
    * Adds frr project
    
    * Removing auto_ccs for frr
    
    * Copy libpcre2 for frr
    
    * hacky removal of libpcre dependency
    
    * disables afl for frr
    
    * Adds ccs to frr
  - tidy-html5: add more extensive fuzzing suite.  (#6116)
    
    * tidy-html5: add more extensive fuzzing suite.
    
    * tidy-html5: cleanup general fuzzer.
    
    * we need a few more bytes than the size of the array.
  - Add a Git backed filestore. (#6088)
    
    - Add storage-repo, storage-repo-branch, and
      storage-repo-branch-coverage fields to the actions, to indicate that
      the Git filestore should be used.
    - The CI provided filestore is still used for crashes and builds.
    - Replace generic Filestore.upload_directory with typed upload methods
      which matches the download methods.
    - Rename upload_latest_build to upload_build to make it more generic.
    - Make artifact name prefixes an implementation detail of the store.
    
    For #6052.
  - rdkit: fix build (#6114)
    
    
  - update h2o/project.yml to add github:gfx (#6112)
    
    
  - [net-snmp] Split and improve snmp_octet_fuzzer (#6111)
    
    * [net-snmp] Include <unistd.h> for getpid()
    
    * [net-snmp] Split and improve snmp_octet_fuzzer
    
    Split snmp_octet_fuzzer into one fuzzer per function to make bug reports
    easier to interpret. See also commit ded876646013 ("net-snmp: add two new
    fuzzers and simplify build script. (#6091)")
  - [libxml2] [libxslt] Remove myself as contact (#6090)
    
    I'm not involved in these projects anymore.
  - [go-redis] Fix coverage build (#6109)
    
    
  - [nats] Fix coverage build (#6108)
    
    
  - [apache-commons] Run fuzzers in headless mode (#6107)
    
    Running the fuzzers in headless mode works around missing dependencies
    for the full Java AWT libraries. It is likely that the commons-imaging
    only uses features available in headless mode, in which case this would
    be a complete fix for the fuzzer startup crashes observed on
    ClusterFuzz.
  - [cifuzz] Fix last commit pushed to master
    
  - [cifuzz][github_actions] Create methods/functions for uploading without tar
    
    This can be useful for artifacts we want to upload that we know
    do not need to be tarred, such as crashes. It's important not
    to tar these because they will need to be viewed by users.
    
  - projects/tendermint: add additional maintainer (#6103)
    
    
  - [containerd] Move buildscipt upstream (#6102)
    
    
  - net-snmp: add two new fuzzers and simplify build script. (#6091)
    
    Signed-off-by: David Korczynski <david@adalogics.com>
  - [cryptofuzz] Fix build, disable SymCrypt (#6099)
    
    
  - Add external actions. (#6086)
    
    This will be used for testing and can be moved elsewhere later.
  - [CIFuzz] Fix build uploading. (#6096)
    
    Previously, the downloaded build was uploaded instead of the new build.
    This regression was introduced when the big workspace change was made.
    Also, add more logging.
  - [NFC][cifuzz] Add tests for github actions. (#6094)
    
    To avoid issues like #6087 before they land.
  - [cifuzz][NFC] Use f-strings instead of format function (#6095)
    
    
  - [cifuzz] Fix corpus usage in coverage reports (#6093)
    
    Fixes #6089
  - Fix typo (#6087)
    
    
  - Fix open62541 build (#6085)
    
    * Fix open62541 build
    
    Use a Debug build instead of RelWithDebSymbols.
    
    * Disable honggfuzz for open62541
  - opensk: initial integration. (#5355)
    
    * opensk: initial integration.
    
    * fix up project.yaml in opensk.
    
    * Fix opensk build.
    
    * Updated build.sh
    
    * updated project yaml.
    
    * enable coverage.
    
    * disable coverage.
  - [CIFuzz] Add cifuzz- prefix to all artifacts (#6084)
    
    This will prevent conflicts with other artifacts in the repo.
  - [CIFuzz] Fix bug in tar_directory (#6083)
    
    We need to split the archive_path
  - [NFC][infra][build] Move test data to test_data directory. (#6081)
    
    Do this for consistency.
  - [CIFuzz] Support uploading coverage reports (#6078)
    
    
  - [NFC][cifuzz] Delete debug code and improve naming (#6082)
    
    
  - [infra][build] Reset HOME using env instead of bash. (#6079)
    
    Followup on #6069.
  - sql-parser: add maintainer (#6080)
    
    
  - Make oss-fuzz-project-name optional. (#6071)
    
    Also rename code uses from `project_name` to `oss_fuzz_project_name`, to
    be more explicit, and use it to determine whether or not we're running
    an OSS-Fuzz project or not.
    
    For external fuzzing #6051.
    
    
  - [CIFuzz][Coverage] Make coverage reports world readable (#6077)
    
    This is needed to upload coverage reports.
    Related: #6054
  - [CIFuzz][ClusterFuzzLite] Prepare to support coverage reports for external users (#6074)
    
    1. Make coverage script accept an env var that controls where the generated report is written to. Use this in generate_coverage_report.
    2. Rename CoverageGetter to OSSFuzzCoverage
    3. Make affected_fuzz_targets get coverage object from clusterfuzz_deployment.
    4. Add stubbed FilesystemCoverage class that will be used by non-OSS-Fuzz users.
    5. Make ClusterFuzzLite able to return coverage object by downloading old coverage report and returning a FilesystemCoverage object.
    6. Add stub to ClusterFuzzLite for uploading coverage.
    
    Related: #6054
  - fluent-bit: deploy simple fuzz hook in build (#6075)
    
    Signed-off-by: David Korczynski <david@adalogics.com>
  - Fix misspelling of Implementation (#6073)
    
    
  - [infra][build] Set HOME=/root on GCB when doing fuzzer builds. (#6069)
    
    [infra][build] Set HOME=/root on GCB when doing fuzzer builds.
    GCB passes HOME as env var to the docker container. It sets
    HOME to /builder/home which is persisted accross builds.
    This issue causes build breakages in
    https://github.com/google/oss-fuzz/issues/6035
    and possibly https://github.com/google/oss-fuzz/issues/5317.
    Perhaps more insidiuosly it can cause fuzzers to be built with
    the wrong instrumentation.
  - improve fluent-bit build. (#6072)
    
    
  - [infra][myanmar-tools] Fix myanmar-tools temporarily (#6068)
    
    * [infra][myanmar-tools] Fix myanmar-tools temporarily
    
    Workaround state being preserved in build containers.
    
    * fix license header
  - [lldb-eval] Disable leak reports (#6067)
    
    
  - [wolfssl] Build with support for streaming ed25519/448 (#6063)
    
    
  - Pin atheris version (#6062)
    
    
  - [wolfssl] Build SP math fuzzer with support for ECC point addition (#6061)
    
    
  - net-snmp: two new fuzzers and request access to project (#6058)
    
    
  - Fix upload_corpus call arguments for batch fuzzing. (#6050)
    
    
  - tidy-html5: fix breaking build. (#6059)
    
    
  - varnish: Migration to pcre2 (#6027)
    
    * varnish: Migration to pcre2
    
    See https://github.com/varnishcache/varnish-cache/pull/3635
    
    * varnish: Static linking to pcre2
    
    * varnish: Only build the fuzzer
    
    Static linking of pcre2 fails the libvarnishapi build, not needed by
    the ESI fuzzer. That's also less time wasted building irrelevant
    components. We can figure out why libvarnishapi fails to build in
    this environment later.
    
    * varnish: Missing build step
  - Update project.yaml (#6049)
    
    
  - Update h3 contact email to gmail (#6047)
    
    
  - Update h3 contact email (#6043)
    
    It doesn't seem to be possible to log in and view reports without the contact email being associated with a Google account. I'm replacing my email address with a Gmail one, and adding another H3 contributor's Gmail email address as well (he's subscribed to the list that receives reports but also could not login.)
    
    Please let me know if my understanding of how reports are made visible to some email addresses is not correct. Thanks!
  - [libecc] Enable elliptic curve point operations (#6042)
    
    
  - tor: Fix libevent build by installing pkg-config (#6041)
    
    It appears that libevent now requires pkg-config, which was not
    previously installed from Tor's Dockerfile.  This change adds
    pkg-config.
    
    Adding this dependency should resolve oss-fuzz issue 36048
    (https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36048)
  - update libreoffice build deps (#6036)
    
    
  - Change Apache Commons primary from @bodewig to @jvz (#6040)
    
    
  - workaround for #6037 (#6039)
    
    * enhance afl++ performance
    
    * update afl++, higher chance for cmplog
    
    * workaround for afl++ ctx+cmplog issues
  - refine openvpn build script. (#6038)
    
    
  - Set the tidy-html5 OSS-Fuzz contact info to @balthisar (#6029)
    
    As per https://github.com/htacg/tidy-html5/issues/788#issuecomment-877266838
  - Bump addressable from 2.7.0 to 2.8.0 in /docs (#6031)
    
    Bumps [addressable](https://github.com/sporkmonger/addressable) from 2.7.0 to 2.8.0.
    - [Release notes](https://github.com/sporkmonger/addressable/releases)
    - [Changelog](https://github.com/sporkmonger/addressable/blob/main/CHANGELOG.md)
    - [Commits](https://github.com/sporkmonger/addressable/compare/addressable-2.7.0...addressable-2.8.0)
    
    ---
    updated-dependencies:
    - dependency-name: addressable
      dependency-type: indirect
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
  - libevent: add missing pkg-config to fix the build (#6032)
    
    
  - [poco] Fix broken build (#6033)
    
    
  - Update project.yaml (#6028)
    
    Remove me as a subscriber, I'm no longer actively working on the Hermes project
  - [wolfssl] Several improvements (#6025)
    
    * [wolfssl] Several improvements
    
    - Build additional target (normal math)
    - More cross-pollination (import from Botan and other wolfSSL corpora)
    
    * [wolfssl] Fix normal math 32 bit build
  - [stb] update Dockerfile for CIFuzz (#6023)
    
    * [stb] update Dockerfile for CIFuzz
    
    * [stb] keep the old build script working
  - [relic] Enable elliptic curve point operations (#6021)
    
    
  - openvpn: fix coverage. (#6020)
    
    
  - openvpn: add fuzz_crypto (#6016)
    
    
  - Updating the primary contact for jsoup to me (#6015)
    
    (I'm the jsoup lead)
  - Correct my email address in the openssh cc list. (#6010)
    
    
  - Add lldb vs lldb-eval fuzz target (#6013)
    
    
  - [skia] Remove users from auto_ccs (#6011)
    
    
  - [qt] Add CC (#6009)
    
    
  - Revert "Bring back build status page fix until quota issues are resolved. (#5997)" (#6008)
    
    This reverts commit e10f1658fa914aed20a865f7d6d781ec007c3baa.
  - update afl++, abuse better cmplog performance (#6006)
    
    * enhance afl++ performance
    
    * update afl++, higher chance for cmplog
  - openvpn: improve route fuzzer. (#6004)
    
    
  - Fix H3 build (#6003)
    
    
  - [infra] Do not close file descriptors also for JVM (#6002)
    
    Keeps the JVM coverage libFuzzer args in sync with the change in https://github.com/google/oss-fuzz/pull/5999.
  - [wolfssl] Import corpora from other projects (#6001)
    
    
  - projects/tendermint: change tendermint email to interchain.io (#6000)
    
    While at it, also add @tessr and @tychoish to cc list, as the primary
    contact is an email group, not individual Google Account.
  - do not close file descriptors in coverage runs. (#5999)
    
    
  - Bring back build status page fix until quota issues are resolved. (#5997)
    
    
  - dnsmasq: new fuzzing set up and fuzzers. (#5996)
    
    * dnsmasq: new fuzzing set up and fuzzers.
    
    * remove old util fuzzer from dockerfile.
  - [bitcoin-core] Updates to libsecp256k1 Cryptofuzz build (#5991)
    
    
  - [simdjson] enable msan (#5992)
    
    * update the homepage
    
    * add memory sanitizer
  - [h3] Initial integration (#5616)
    
    
  - [wolfssl] Enable more Cryptofuzz operations (#5990)
    
    
  - [libigl] Initial integration (#5708)
    
    * [libigl] Initial integration
    
    * Addd maintainer
  - [build/infra] Build engines in alphabetical order. (#5987)
    
    * [build/infra] Build engines in alphabetical order.
    
    Previously, a project fuzz targets were usually built in the order:
    libfuzzer, afl, honggfuzz. This can bias results if one is looking
    at which engine finds bugs first.
    
    * fix tests
    
    * lnt
  - Add CIFuzz external entrypoint for cifuzz base (#5906)
    
    This is an entrypoint for CIFuzz users that can't build two docker images
    (e.g. prow users).
    Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
  - [CIFuzz] Don't make everything a subdirectory of /out (#5970)
    
    Use different subdirectories of workspace for builds, old builds, coverage reports, corpora and artifacts/testscases.
  - openvpn: new fuzzers (#5985)
    
    * openvpn: add first take on forward fuzzer.
    
    * updated the forward fuzzer.
    
    * Add a certificate verification fuzzer.
    
    * update packet_id fuzzer.
    
    * fix max length we us for buffer creation.
  - istio: Move build script upstream (#5980)
    
    
  - Add mtakayama to h2o project (#5984)
    
    
  - [h2o] Add options for http3 fuzzer (#5983)
    
    Now that h2o merged a new fuzzer for http3 (https://github.com/h2o/h2o/pull/2696)
    this commit adds options for running http3 fuzzer.
  - infra: Remove unused import from update_build_status (#5981)
    
    In this commit https://github.com/google/oss-fuzz/commit/0370821e3944a938775f45b3631a7aecf68ed138 the use of the `time` import was removed. This causes the CI to complain about `infra/build/functions/update_build_status.py:21:0: W0611: Unused import time (unused-import)` here https://github.com/google/oss-fuzz/pull/5980/checks?check_run_id=2941631092
  - Revert rate limits in update_build_status.
  - openvpn: three new fuzzers and improved proxy fuzzer (#5979)
    
    * add list fuzzer
    
    * add header file inclusion order.
    
    * added an mroute fuzzer.
    
    * add packet id fuzzer.
    
    * refactor list, mroute and packet_id fuzzers.
    
    * set it up so fgets always returns a string with an ASCII char.
    
    * refactor build script.
    
    * hook fopen and fclose in builtin_console.
  - [knot-dns] add missing corpora to $OUT (#5978)
    
    
  - [tendermint] Add project (#5907)
    
    
  - [infra] Add support for rules_fuzzing's java_fuzz_test macro (#5960)
    
    * [infra] Add support for rules_fuzzing's java_fuzz_test macro
    
    * [infra] Update bazelisk for rolling release support
    
    * [infra] Fix C++ stdlib mixing for uninstrumented Bazel targets
    
    The build script for Bazel rules_fuzzing tests did not set the C++
    stdlib for uninstrumented C++ binaries, which thus use the system
    libstdc++ instead of the libc++ built from source.
    
    * [rules_fuzzing] Add test project for rules_fuzzing's java_fuzz_test
  - openvpn: new fuzzer and refactoring to make all fuzzers c instead of cpp (#5977)
    
    * refactor to have C-based fuzzers instead of C. Also adds route fuzzer.
    
    * remove cpp fuzzers.
    
    * refactor route fuzzer.
    
    * Fix route fuzzer and add options file.
    
    * minor refactoring.
    
    * fix leak in route fuzzer. This should also be fixed upstream.
    
    * minor cleanup.
  - poppler: fix lcms build (#5976)
    
    
  - libvips: ensure lcms dependency runs autogen (#5975)
    
    
  - Update update_build_status.py
  - Update update_build_status.py
  - Update update_build_status.py
  - sound-open-firmware: add additional CCs (#5974)
    
    Add Liam, Harsha and Sathya
  - Update update_build_status.py
  - Update update_build_status.py
  - Update update_build_status.py
  - Update update_build_status.py
  - Update update_build_status.py
  - Update update_build_status.py
  - Update update_build_status.py
  - Decrease number of build logs to avoid rate limits. (#5973)
    
    
  - Update update_build_status.py
  - Update update_build_status.py
  - Reduce memory requirement in cloud functions to 2gb
  - dav1d: remove dead email from vendor_ccs (#5972)
    
    Monorail seems to to detect that the email address bounces and deletes
    the CC but something re-adds it regularly.
  - Update update_build_status.py
  - [cryptofuzz] Add Noble libraries (#5966)
    
    
  - Openvpn: improve proxy fuzzer and fuzzing infrastructure (#5971)
    
    * openvpn: improve buffer fuzzer.
    
    * Improve state of openvpn fuzzing, the proxy fuzzer in particular.
  - Reduce build status workers to see if quota issue resolve.
  - [CIFuzz][ClusterFuzzLite] Implement batch fuzzing (#5963)
    
     [ClusterFuzzLite] Support use of github actions as a filestore
  - Try fix for memory exceeded (#5969)
    
    * Try fix for memory exceeded
    
    Should fix https://github.com/google/oss-fuzz/issues/5968
    
    * Update deploy.sh
  - openvpn: improve buffer fuzzer. (#5965)
    
    
  - [nginx] memory leak fix (#5964)
    
    * nginx: fix memleaks in fuzzer.
    
    * simply fix.
  - [infra][jvm] Fix UBSan C++ builds (#5961)
    
    
  - [java-example] Disable project (#5962)
    
    Coverage builds succeed and every expected finding has been found.
  - [CIFuzz] Add coverage report generation. (#5937)
    
    Also:
    1. Support coverage builds.
    2. Add an integration test for coverage builds and reports.
    3. Refactor docker code so that there is less duplication in getting arguments for docker run, in particular when handling container (production) vs no container (testing).
    4. Rename coverage.py to get_coverage_report.
    5. Add tests for untested functions in docker.py
    6. Add a test for get_fuzz_target_runner.
  - [java-example] Build native library in subdirectory (#5959)
    
    Top-level executables are taken to be fuzz targets by the coverage
    script.
  - Fix kcodecs build (#5955)
    
    New kcodecs requires C++17, we need a newer gperf able of generating C++17
    compliant code
  - [bitcoin-core] libsecp256k1: Compare against schnorr_fun, implement ECDH (#5958)
    
    
  - Adds cc people to netcdf (#5957)
    
    
  - [CI] Switch to google-github-actions/setup-gcloud (#5956)
    
    GoogleCloudPlatform/github-actions/setup-gcloud is deprecated.
  - [bitcoin-core] Enable libsecp256k1 Schnorr signature fuzzing (#5920)
    
    
  - [CIFuzz] Implement filestore based on github artifacts (#5943)
    
    Implement filestore based on github actions' artifacts feature.
    This uses the github api and the github actions API.
    Also fix imports in github_actions_toolkit library that were broken by move to third_party directory.
  - Removed zlib1g-dev installation (#5950)
    
    Co-authored-by: Andrew Murray <radarhere@users.noreply.github.com>
  - ci: Fix get_changed_files_output (#5944)
    
    * ci: Fix get_changed_files_output
    
    * Update project_tests.yml
    
    * ci: Fix presubmit checks
    
    * ci: Use fetch-depth:0 instead of --unshallow
  - [lldb-eval] Upgrade to LLVM-12 and enable undefined sanitizer (#5952)
    
    * Upgrade to LLVM-12 and enable undefined sanitizer (#1)
    
    * Upgrade to LLVM-12
    * Enable undefined sanitizer
    
    * Fix missing scope
  - Freeradius ssl1.1 (#5951)
    
    * Uses openssl 1.1 for freeradius
    
    * only latest openssl
    
    * do not rlib openssl
  - [cryptofuzz] Update mpdecimal to version 2.5.1 (#5679)
    
    * [bignum-fuzzer] Update mpdecimal to version 2.5.1
    
    * [cryptofuzz] Update mpdecimal to version 2.5.1
    
    * Revert bignum-fuzzer changes.
  - [bignum-fuzzer] Update mpdecimal to version 2.5.1 (#5678)
    
    
  - Update radare2 build scripts and corpus repository (#5649)
    
    Co-authored-by: pancake <pancake@nopcode.org>
  - Fix code coverage regression. (#5949)
    
    Hardcode commit hash for chromium code coverage script, till
    revert happens.
    Fixes #5934
  - [infra][jvm] Provide jazzer_driver_with_sanitizer for coverage builds (#5948)
    
    Previously, JVM coverage builds for projects with native dependencies would fail: https://oss-fuzz-build-logs.storage.googleapis.com/log-9b66fe39-7e33-4058-812a-c9c52f32e0ea.txt
  - [dragonfly] Fix build (#5947)
    
    
  - [hugo] Fix build (#5946)
    
    
  - [CIFuzz] Improve fuzz_target.py (#5929)
    
    * [CIFuzz] Clean up fuzz_target.py
    1. Use CORPUS_DIR env var to set corpus so that corpus can be saved.
    2. Clean up is_crash_novel.
    
    * fix
    
    * consistency
    
    * improve logging messages, remove over-cautious check
    
    * fix tests
    
    * fix tests
    
    * Make sure corpus path is mapped
  - Adds netcdf project (#5389)
    
    * Adds netcdf project
    
    * Force use of static lib
    
    * Try to build with static libraries
    
    * fixu
    
    * no hdf5 static curl
    
    * fixup no curl
    
    * Remove patch merged upstream
    
    * Update project.yaml
    
    Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
  - [CIFuzz][NFC] Put integration test decorator on class instead of test methods (#5936)
    
    
  - [CIFuzz] Add python port of github's actions/toolkit nodejs library (#5932)
    
    
  - Add my gmail address (#5942)
    
    
  - xmlsec: fix build. (#5941)
    
    
  - jsonnet: fix build (#5938)
    
    * jsonnet: fix build.
    
    * remove verbose logging.
  - libtpms: fix build. (#5939)
    
    
  - [CIFuzz][NFC] Replace format strings with f-strings. (#5933)
    
    Also replace % formatting.
  - [CIFuzz] Allow run_fuzzers to use a preexisting corpus. (#5928)
    
    * [CIFuzz] Allow run_fuzzers to use a preexisting corpus.
    
    Also improve comment in cifuzz-base/Dockerfile.
    
    * improve comment
    
    * Fix run_fuzzers
    Add --cache option to helper.py's build_image command which
    uses the docker image cache when building and use this in
    ci/build.py.
    Change build_image_impl's argument no_cache to cache for clarity.
    Eliminate default argument cache in build_fuzzers_impl since no users
    use it.
  - gnutls: Fix dockerfile and libtasn clone to work with new versioning. (#5931)
    
    
  - [lldb-eval] Copy libs by "value" (#5930)
    
    An attempt to resolve coverage build issue #5909
  - Change quickjs repository for ecc-diff-fuzzer (#5927)
    
    
  - Update project.yaml (#5925)
    
    
  - disable fuzzers that wont work with coverage. (#5922)
    
    
  - cel-cpp: fix build (#5921)
    
    Signed-off-by: Kuat Yessenov <kuat@google.com>
  - qemu: manually build glib (#5919)
    
    * qemu: manually build glib
    
    QEMU builds are failing [1]:
    "Step #4: ERROR: glib-2.56 gthread-2.0 is required to compile QEMU"
    
    The version of glib shipped with Ubuntu 18.04 is too old. While we wait
    on [2], take some inspiration from poppler [3], and build glib ourselves.
    
    [1] https://oss-fuzz-build-logs.storage.googleapis.com/log-2a22b4e2-d7b7-4695-a4dd-25d8d8407704.txt
    [2] https://github.com/google/oss-fuzz/issues/5697
    [3] https://github.com/google/oss-fuzz/blob/a44547d8d6f78ad7ce02323ecc33382a1d628e39/projects/poppler/build.sh#L70
    
    Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
    
    * qemu: add license header to build.sh
    
    Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
  - openvpn: initial integration (#5902)
    
    * openvpn initial integration.
    
    * fix leak
    
    * fix leak.
    
    * fixup maintainer email.
  - dnsmasq: initial integration. (#5900)
    
    * dnsmasq: initial integration.
    
    * fuzz rfc1035 parts and add maintainer email.
    
    * updated fuzzer.
  -  [CIFuzz] Refactor HTTP code and use a newer python. (#5842)
    
    * Move to http_utils
    
    * Update dockerfiles
    
    * Dont install python3 from apt if we copy it into image
    
    * fix
    
    * fmt
    
    * Add missing
  - enhance afl++ performance (#5916)
    
    
  - [wolfssl] Build sp-math-all, sp-math-all-8bit targets with support for negative numbers (#5917)
    
    
  - powerdns: Better handling of missing corpus directories (#5915)
    
    New fuzzing targets and their corpus directories are not always added
    to old branches, since the new features are usually not backported.
    We still would like to be able to keep CI-fuzz enabled on these branches,
    so we need to properly handle missing directories.
  - [infra][base-builder] Clarify error messages in `compile` (#5912)
    
    @jonathanmetzman
  - Make hjd primary Perfetto contact (#5911)
    
    
  - libjxl: make the fuzzer corpus generation step quiet (#5913)
    
    fuzzer_corpus generators emits two lines per test case generated and the
    following zip command emits another line for each generated test case.
    
    This patch makes both commands quiet which facilitates spotting error
    messages.
  - [java-example] Fix UBSan options (#5910)
    
    The JVM needs to register custom SEGV handlers.
  - [infra][jvm] Add Jazzer UBSan support (#5898)
    
    * [infra][jvm] Add Jazzer UBSan support
    
    * [java-example] Reenable and plant UB
    
    * [docs] Mention support for Java UBSan in docs
    
    Also adds a link to the java-example build.sh to the docs.
  - poppler: Fix build (#5901)
    
    released pango wants to download harfbuzz from a branch name that no
    longer exists, so use git pango
  - libvips: Remove invalid CC email address (#5894)
    
    
  - [FFmpeg] Improve HEVC seeds (#5896)
    
    * [FFmpeg] Fix typo in hevc seed corpus archieve
    
    Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
    
    * [FFmpeg] add 80mb additional HEVC seeds
    
    Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
  - Fixes leak in freeradius patch for target (#5893)
    
    
  - [kimageformats] use newer libaom and libavif (#5892)
    
    
  - Fixes freeradius build using OUT env variable (#5887)
    
    
  - docs: CIFuzz requires a project to be cloned with git (#5886)
    
    
  - Adds rust image-rs project (#5872)
    
    
  - Disable golang snappy project (#5882)
    
    
  - Uses git clone instead of go get for gonids (#5881)
    
    So that CIFuzz works
    As it looks for the main repo in $SRC
  - Fuzz develop instead of breaking (#5883)
    
    
  - Make wget invocations less verbose (#5884)
    
    Remove `--show-progress` option for `wget` invocations. In OSS-Fuzz logs every progress update is logged as a separate line, so the build log is looooooooong.
  - Update README.md
  - Update index.md
  - Update README.md
  - Update README.md
  - Adds project freeradius (#5809)
    
    * Adds projext freeradius
    
    * Remove unused fuzzing engines
  - go: compiles projects without go.mod from their directory (#5878)
    
    
  - Updating ASA contacts for OSS Fuzz reports (#5875)
    
    * Update contacts
    
    Update vendor contacts
    
    * Adding new contacts to new_branch
    
    Co-authored-by: DavidKorczynski <david@adalogics.com>
  - [s2geometry] Initial integration (#5783)
    
    
  - [simd] Initial integration (#5797)
    
    
  - [poco] Add exception to fuzzer (#5835)
    
    
  - [pidgin] Initial integration (#5871)
    
    * [teleport] Initial integration
    
    * Minor update to run tests again
    
    * [pidgin] Initial integration
    
    * Refactoring
    
    * add a utils fuzzer.
    
    * fix fuzzer name.
    
    * extend utils fuzzer.
    
    * further extend utils fuzzer.
    
    * updated the pidgin utils fuzzer.
    
    * add my email to the proejct list.
    
    * Improve xml fuzzer
    
    * Clean up
    
    * update utils fuzzer to target more markup functions.
    
    * use latest version of pidgin.
    
    * updated the build script.
    
    Co-authored-by: davkor <david@adalogics.com>
  - Update rust_lang.md
  - Docs: update rust documentation (#5877)
    
    * added initial description for writing rust fuzzers.
    
    * updated rust docs.
  - libjxl: New JPEG XL library project. (#5876)
    
    libjxl is the reference implementation encoder and decoder for JPEG XL.
    This patch adds the main decoder fuzzer (djxl_fuzzer) and a few other
    fuzzers for internal parts of the decoder.
    
    There's no encoder fuzzer support.
  - oak - Removed unused commands (#5874)
    
    
  - Adds openweave project (#5534)
    
    * Adds openweave project
  - Adds varnish project for real (#5810)
    
    * Adds varnish project for real
  - infra: show RUSTFLAGS as well (#5867)
    
    It should make it easier to see where all the rustc flags
    come from. RUSTFLAGS along with `cargo fuzz build --verbose` should
    help to track down weird issues like https://github.com/google/oss-fuzz/pull/5865#issuecomment-852685588
    
    It's a follow-up to ecf3d384fb0b62069
  - Remove reference to Eigen internal header. (#5852)
    
    It's unnecessary, and internal headers are subject to change without notice.
  - bloaty: Try to fix build failure (#5868)
    
    
  - Small change in script to build test corpus for Sleuthkit fuzz targets (#5866)
    
    
  - Pistache: initial integration (#5793)
    
    * pistache: initial integration.
    
    * updated license header.
    
    * Updated the pistache set up
    
    * Updated setup to use meson instead of cmake.
    
    * updated dockerfile to reflect upstream merge.
    
    * use the actual real link.
    
    * Set up email list for pistache.
    
    * Fuzzer is now upstream.
  - libaom: use upstream dict file (#5864)
    
    this was transferred from this project in:
    3b1ff98b1 add examples/av1_dec_fuzzer.dict
  - [FFmpeg] remove libXfixes (#5863)
    
    Fixes build (which apparently failed due to incompatibility of unneeded distro
    packages being mixed with unneeded git packages)
    
    Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
  - [lldb-eval] Initial integration (#5831)
    
    * [lldb-eval] Initial integration
    
    * Update project.yaml
    
    * Add missing license headers
    
    * Update Dockerfile
    
    * Update build.sh
    
    * Update project.yaml
    
    * Use prebuilt LLVM, Clang and LLDB libraries
    
    Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
  - [blackfriday] Initial integration (#5856)
    
    
  - [infra][jvm] Don't override jvm_args in coverage builds (#5862)
    
    Specify --additional_jvm_args instead of --jvm_args so that custom
    target JVM args (e.g. --enable-preview) are preserved in coverage runs.
  - [llhttp] initial integration. (#5850)
    
    * llhttp: initial integration.
  - speex: Try to fix build (#5861)
    
    
  - opus: Try to fix build issue (#5860)
    
    
  - libyang: fuzzed branch was renamed (#5859)
    
    
  - Revert "bitcoin-core: Run zip in parallel" (#5858)
    
    
  - Disable afl for gnupg (#5854)
    
    
  - remove unused boost workaround (#5849)
    
    
  - update envoy auto_ccs (#5851)
    
    Signed-off-by: Asra Ali <asraa@google.com>
  - Install libssl-dev for Oak (#5853)
    
    
  - libvips: remove libjxl patch merged upstream (#5847)
    
    + update libjxl's git location.
  - install missing python package. (#5848)
    
    
  - [CIFuzz][fuzz_target] Prepare for ClusterFuzzLite (#5845)
    
    Return the path to the corpus in FuzzResult.
    Also, refactor is_reportable: move code testing crash novelty
    into its own method.
  - [CIFuzz] Refactor in preparation for filestore (#5841)
    
    1. Moving the _create_config and create_config functions from build_fuzzers_test.py and run_fuzzers_test.py into test_helpers.py (which is now part of cifuzz instead of infra) and share code between them.
    2. Rename artifacts_dir to crashes_dir in run_fuzzers.py. "artifacts" is ambiguous.
    3. Make some small changes to pytest.ini to improve debugging.
  - [CIFuzz][NFC] Add skeleton for ClusterFuzzLite and Filestore (#5843)
    
    
  - [caddy] enable coverage builds (#5814)
    
    
  - Grant pcrao and tyxia access to Envoy fuzzing. (#5846)
    
    Signed-off-by: Kevin Baichoo <kbaichoo@google.com>
  - [bitcoin-core] Cryptofuzz build fixes (#5827)
    
    * [bitcoin-core] Cryptofuzz build fixes
    
    * [bitcoin-core] Make build_cryptofuzz.sh executable
  - [presubmit] Add option to skip slow build tests. (#5844)
    
    
  - [libecc] Enable ECRDSA (#5840)
    
    
  - infra: stop patching llvm-symbolizer (#5839)
    
    * infra: stop patching llvm-symbolizer
    
    to prevent it from failing to start up with
    ```
    NEW_FUNC[1/1]: llvm-symbolizer: symbol lookup error: /tmp/not-out/instrumented_libraries/lib/x86_64-linux-gnu/libz.so.1: undefined symbol: __msan_va_arg_overflow_size_tls
    ==45==WARNING: external symbolizer didn't start up correctly!
    ```
    
    Closes https://github.com/google/oss-fuzz/issues/5349
    
    * infra: reformat patch_build.py with yapf
    
    to make the presubmit check happy
  - [wolfssl] Several updates (#5837)
    
    - Enable streaming AES GCM
    - Enable bignum calculations with negative numbers
  - [presubmit] Add check to ensure dataflow is specified properly. (#5833)
    
    Also remove dataflow from projects where it was removed improperly
    or added improperly.
  - [civetweb] Disable DFSAN builds. (#5834)
    
    DFSAN builds are failing, causing ClusterFuzz exceptions.
    DFSAN isn't really supported right now anyway.
  - [infra] File-level coverage for JVM projects (#5822)
    
    
  - [infra] File-level coverage for JVM projects (#5822)
    
    * Exclude Jazzer classes from coverage reports
    
    * Generate file-level coverage data for Java
    
    Adds per-file coverage information to llvm-cov style *.json files for
    Java targets.
    
    This provides full CI Fuzz support for "jvm" projects.
  - [infra] fix handling Go's SIV in coverage santizer (#5813)
    
    
  - Build Wasm modules (#5830)
    
    
  - [fribidi] Add fribidi-fuzzer (#5829)
    
    
  - [docs] Mention JVM & Go coverage support (#5826)
    
    
  - [CIFuzz] Support non-github action CI for external projects (#5824)
    
    This is incomplete for a few reasons.
    1. It probably can't diff properly.
    2. It assumes the project source should be put in /src/$PROJECT_NAME.
  - Use upstream targets for grpc-swift (#5825)
    
    
  - afl++: increase forkserver timeout (#5784)
    
    
  - [infra] Allow shell script targets for all languages (#5802)
    
    For proper support of Bazel's runfiles tree, a shell script wrapper is
    also needed for C++ targets, see
    https://github.com/bazelbuild/rules_fuzzing/pull/149.
    
    This commit allows shell script fuzz targets for all languages. This
    also helps to consolidate the various fuzz target checks in OSS-Fuzz
    by removing a dependence on fuzzing_language.
  - [juju] Initial integration (#5395)
    
    
  - [poco] Initial integration (#4736)
    
    
  - [spdk] Initial integration (#4904)
    
    
  - Add altimin to CC (#5823)
    
    
  - [tailscale] Initial integration (#5614)
    
    
  - [containerd] Initial integration (#4839)
    
    
  - [clamav] Fix build after libxml2 cmake change (#5820)
    
    I updated ClamAV's Mussels recipe for libxml2 to the new 2.9.12 release
    and to use CMake instead of the old build system. It seems the new CMake
    build system installs the headers under <prefix>/include/libxml2 though.
    
    This commit accounts for the header path change.
  - [libidn] Fix build (#5818)
    
    
  - gnupg: Try to fix build issues (#5817)
    
    * gnupg: Re-generate fuzzgnupg.diff
    
    * gnupg: Use automake from future
  - [libpsl] Fix build (#5816)
    
    
  - Fix wget build (#5379)
    
    
  - bitcoin-core: Build with msan (#5815)
    
    * bitcoin-core: Add missing newline at end of file build.sh
    
    * bitcoin-core: Run zip in parallel
    
    * bitcoin-core: Build with msan
  - [kryo] Initial integration (#5762)
    
    
  - [sqlalchemy] Initial integration (#5740)
    
    
  - [protobuf-java] Initial integration (#5766)
    
    Based on protobuf-c.
  - tcmalloc: initial integration. (#5787)
    
    
  - Bump nokogiri from 1.11.1 to 1.11.5 in /docs (#5806)
    
    Bumps [nokogiri](https://github.com/sparklemotion/nokogiri) from 1.11.1 to 1.11.5.
    - [Release notes](https://github.com/sparklemotion/nokogiri/releases)
    - [Changelog](https://github.com/sparklemotion/nokogiri/blob/main/CHANGELOG.md)
    - [Commits](https://github.com/sparklemotion/nokogiri/compare/v1.11.1...v1.11.5)
    
    Signed-off-by: dependabot[bot] <support@github.com>
    
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
  - Update new_project_guide.md (#5805)
    
    * Update new_project_guide.md
    
    Rewrite instructions under "Temporarily disabling code instrumentation during builds" section for greater clarity.
    
    * Update new_project_guide.md
  - Add spice-usbredir integration (#5440)
    
    usbredir is a protocol for transporting USB traffic to and from a single
    USB device across a communication channel, e.g. a TCP connection. It's
    used in the QEMU virtual machine emulator.
    
    Signed-off-by: Michael Hanselmann <public@hansmi.ch>
  - Install protobuf compile for project Oak (#5807)
    
    
  - [bitcoin-core] Add differential cryptography fuzzer (#5717)
    
    * [bitcoin-core] Support AFL builds
    
    * [bitcoin-core] Add differential cryptography fuzzer
    
    * [bitcoin-core] Update secp256k1 build procedure
    
    * [bitcoin-core] Build libsecp256k1 without schnorrsig support
    
    * [bitcoin-core] Cryptofuzz: Build 3 versions of libsecp256k1
  - cel-go: remove irrelevant panic/assert in target (#5799)
    
    
  - [vlc] Initial integration (#5598)
    
    * [vlc] Initial integration
    
    * Small fixes
    
    * update packages.
    
    * Compile existing fuzzers.
    
    * updated setup to work with static builds.
    
    * Cleanup.
    
    * no more string fuzzer.
    
    * typo.
    
    * updated the project yaml.
    
    Co-authored-by: davkor <david@adalogics.com>
  - Add maintainers email address (#5795)
    
    
  - [systemd] use pip3 to install jinja2 (#5796)
    
    It turns out that the system version of jinja2 is visible to the build
    script.
    
    From https://github.com/systemd/systemd/pull/19630#issuecomment-842983177:
    > On OSS-Fuzz (and CIFuzz) the latest version of Python is built from
    > scratch in the base-builder image. /usr/lib/python3/dist-packages
    > (where python3-jinja2 is installed by apt-get) isn't included in
    > PYTHONPATH there:
    >
    > ['', '/usr/local/lib/python38.zip', '/usr/local/lib/python3.8', '/usr/local/lib/python3.8/lib-dynload', '/usr/local/lib/python3.8/site-packages']
  - fast-dds: use upstream without patch (#5794)
    
    
  - [infra] Make mount location configurable in build_fuzzers (#5744)
    
    Exposing the mount location for local sources to a command-line
    argument makes it possible to reproduce findings with local source
    even for umbrella projects with WORKDIR $SRC/.
  - Right copy for rust std lib for coverage (#5791)
    
    
  - Update another e-mail address for espeak-ng (#5790)
    
    Confirmed via https://bugs.chromium.org/u/valdis.vitolins@gmail.com/ that this is not an alias.
    /cc @valdisvi
  - [h2o] add Hajime Fujita (#5789)
    
    Hajime is working on expanding our fuzzers for h2o
  - Use Google accounts for espeak-ng email (#5786)
    
    Apparently, aliases to Google accounts do not work, even when they
    are registered with Google and can be used to log in on Google sites.
  - protoreflect contact: change to gmail account (#5785)
    
    
  - [infra][jvm] Create per-target summary.json (#5778)
    
    
  - Geos: use github if main git server is failing (#5781)
    
    
  - cel-go: relax assertion in fuzz target (#5782)
    
    
  - [systemd]: pull in jinja2 (#5779)
    
    For https://github.com/systemd/systemd/pull/19630:
    m4 is being replaced by jinja2. Let's pull in both until the dust settles.
  - Rust coverage: copy stdlib to the referenced directory (#5776)
    
    using rustc commit-hash version
  - Update project.yaml
  - [infra] Make `targets_list` detect JVM/Python targets (#5775)
    
    * [infra] Make `targets_list` detect JVM/Python targets
    
    `targets_list` should not detect `jazzer_driver` and `jazzer_driver_asan` as fuzz targets, but should consider shell scripts that contain `LLVMFuzzerTestOneInput`.
    
    @inferno-chromium This should fix https://github.com/google/oss-fuzz/pull/5770#issuecomment-841851786.
    
    * Fix
  - [znc] Initial integration (#5748)
    
    
  - samba: add David Mulder to auto_ccs (#5771)
    
    * samba: add David Mulder to auto_ccs
    
    * samba: add main_repo
  - [muduo] Initial integration (#5714)
    
    
  - unicode-rs: initial integration. (#5413)
    
    * unicode-rs: initial integration.
    
    * added an additional project to unicode-rs.
    
    * refined unicode-rs integration.
    
    * Updated the build script.
  - sql-parser: initial integration (#5276)
    
    * initial integration of sql-parser.
    
    * fuzzer simplification.
    
    * Updated sql-parse following maintainers accept.
    
    * nit
  - [infra] Run JVM coverage builds (#5770)
    
    
  - poppler: Fix build (#5769)
    
    
  - [bls-signatures] Build mcl with ubsan (#5765)
    
    
  - Fix coverage script issues (#5764)
    
    Make sure to install MarkupSafe==0.23 instead of >=0.23 which breaks.
    Probably the solution is to upgrade Jinja upstream.
    Fixes #5763
  - Adds people to the javaparser project (#5760)
    
    
  - zeek: add extra configure option (#5671)
    
    * zeek: add extra configure option
    
    * zeek: Disable afl-fuzz
  - Duckdb: initial integration (#5686)
    
    
  - [jsoup] initial integration (#5720)
    
    
  - [cfengine] Initial integration (#5496)
    
    
  - caddy: add new project (#5624)
    
    
  - Remove antlr deps (#5701)
    
    * Remove antlr deps
    
    * Update boost location.
  - [infra] Verify JVM coverage builds in the CI (#5752)
    
    
  - [dgraph] Initial integration (#5394)
    
    
  - [javaparser] Initial Integration (#5525)
    
    
  - [protoreflect] Initial integration (#5652)
    
    
  - [cel-go] Initial integration (#5667)
    
    
  - [infra] Fix base-runner build (#5756)
    
    Builds of base-runner fail as the Chromium coverage helper script has a
    transitive dependency on MarkupSafe, which as of version 2.0 requires
    additional python packaging tools to be installed.
    
    This commit installs python3-setuptools and wheels, which fixes the
    build.
  - [all] Make fuzz targets world executable (#5751)
    
    Making fuzz targets only user executable as the root user makes them
    non-executable outside the container, e.g. in the oss-fuzz/build/ dir.
  - NJS: contact email addresses changed. (#5753)
    
    * NJS: contact email addresses changed.
    
    Current addresses are no longer linked to Google account.
    
    * NJS: newline removed.
  - NJS: added main_repo value. (#5755)
    
    
  - httplib2: fix build. (#5754)
    
    
  - Adds grpc-swift project (#5630)
    
    
  - Update accepting_new_projects.md (#5750)
    
    Fix formatting in new project submission guidelines
  - [infra] Fix java coverage (#5747)
    
    * Filter non-fuzz target binaries in coverage script
    
    * Filter non-fuzz target binaries in helper.py
    
    * Fix fuzz target executable bit check in helper.py
    
    Python and JVM fuzz target executables created via the docs template
    set the exectuable via `chmod u+x` as the root user, which means that
    os.access checks in infra/helper.py don't see the exectuable bit if
    not run as root locally.
    
    With this commit, the check now looks for any of the three exectuable
    bits.
  - [wavpack] fix issue #34149 (new configure script requires gettext) (#5746)
    
    
  - Add Java coverage support (#5733)
    
    Coverage is collected by running the fuzz targets with the JaCoCo agent
    in Jazzer's no instrumentation mode.
    
    Since JaCoCo does not support llvm-cov style coverage reports, a simple
    Python helper creates it using the information contained in the JaCoCo
    XML report.
    
    As the Java build process does not maintain a mapping between source
    files and build artifacts and JaCoCo needs to be passed the root folder
    of the package tree, we use the Maven directory layout convention to
    heuristically detect these roots.
  - Enable fuzz testing of Rust code for project Oak (#5719)
    
    
  - Granting kbaichoo@google.com Envoy fuzz tests access (#5734)
    
    Signed-off-by: Adi Suissa-Peleg <adip@google.com>
  - [FFmpeg] Add small seed corpus for HEVC (#5737)
    
    * [FFmpeg] Add small seed corpus for HEVC
    
    Currently the HEVC coverage is relativly poor, this should improve it
    
    Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
    
    * [FFmpeg] Fix typo
    
    Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
  - Change contact emails for espeak-ng (#5742)
    
    
  - [FFmpeg] Only build first 2 targets of each kind for CI (#5741)
    
    Based-on: 0da70e1c01e9f14d0792e0d7b64c433cdc2dbbaf
    Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
  - [libecc] Enable ECGDSA (#5743)
    
    
  - bitcoin-core: Only compile one fuzz target when OSS_FUZZ_CI (#5738)
    
    
  - [bls-signatures] Enable more operations (#5739)
    
    
  - oatpp: cleanup project. (#5735)
    
    Fuzzer has been merged upstream
  - libpg_query: clean up following upstream merge. (#5736)
    
    
  - image-png: use buf_independent.rs fuzzer from upstream (#5724)
    
    
  - cleanup oss-fuzz. (#5732)
    
    rustls: clean up artifacts from oss-fuzz
  - [infra] Set OSS_FUZZ_CI=1 in CI so build scripts can know (#5731)
    
    This will help bitcoin use CI to verify the build works, because
    the last step is trivial (so testing not really needed) but will
    fill up the disk.
  - bitcoin-core: Unlock all fuzz targets (#5730)
    
    * bitcoin-core: Unlock all fuzz targets
    
    * bitcoin-core: Avoid out-of-disk in the CI
  - updated email for oatpp. (#5728)
    
    
  - bitcoin-core: Fix coverage build (#5718)
    
    * bitcoin-core: Cleanup build.sh
    
    * bitcoin-core: Fix coverage report
  - mtail: Fuzz target renamed (#5727)
    
    Upstream is renaming the path in https://github.com/google/mtail/pull/515
  - Adds project espeak-ng (#5543)
    
    * Adds project espeak-ng
    
    * Remove patch merged upstream
    
    * Disable leaking speech player
    
    * Restrict to working configs
  - [bls-signatures] Enable UBSAN,MSAN builds, more BLS operations (#5722)
    
    
  - projects/golang: add Cuong Manh Le as a Go maintainer (#5721)
    
    * add Cuong Manh Le as a Go maintainer 
  - libpg_query: initial integration. (#5687)
    
    * libpg_query: initial integration.
  - [bitcoin-core] Support AFL builds (#5716)
    
    
  - oatpp: initial integration. (#5689)
    
    * oatpp: initial integration.
  - Added libfwevt and libodraw to libyal project configuration (#5712)
    
    
  - Update Googlers in auto_ccs (#5711)
    
    
  - bitcoin-core: Add i386 (#5709)
    
    
  - docs: Fix syntax error typo (#5710)
    
    
  - [libvips] build against lcms/libspng, fix AVIF/JXL fuzzer (#5707)
    
    * libvips: add lcms and libspng as dependencies
    
    * libvips: fix AVIF fuzzer
    
    - Ensure libheif is able to detect the headers provided by libaom.
    - Disable the build of dynamic modules.
    
    * libvips: fix JXL fuzzer
  - libheif: ensure libaom can be found (#5706)
    
    
  - bitcoin-core: Add honggfuzz support (#5703)
    
    
  - Update Boost download location in all projects (try 2) (#5705)
    
    bintray is deprecated now
  - doc: Explain fuzzing_engines (#5704)
    
    Also fix some dead links
  - Add projects/bitcoin-core (#5699)
    
    
  - Use bazel generic script for opencensus (#5700)
    
    
  - Bump rexml from 3.2.4 to 3.2.5 in /docs (#5696)
    
    Bumps [rexml](https://github.com/ruby/rexml) from 3.2.4 to 3.2.5.
    - [Release notes](https://github.com/ruby/rexml/releases)
    - [Changelog](https://github.com/ruby/rexml/blob/master/NEWS.md)
    - [Commits](https://github.com/ruby/rexml/compare/v3.2.4...v3.2.5)
    
    Signed-off-by: dependabot[bot] <support@github.com>
    
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
  - Added libvshadow to libyal project configuration (#5698)
    
    
  - powerdns: Augment corpus with TXT records and Proxy Protocol payloads (#5694)
    
    
  - Revert "[lxc] turn off AFL for now (#5685)" (#5693)
    
    This reverts commit 181b3575afc392c704ae3be02baf0c4b8150cd87.
    
    The issue was fixed in https://github.com/google/oss-fuzz/pull/5691
  - fix afl++ for pie targets (#5691)
    
    * output afl++ setup
    
    * update commit id
    
    * update afl++ commit id
    
    * asan + cmplog fix
    
    * update commit id
    
    * update and enhance afl++
    
    * update afl++ commit id, better run asan options
    
    * fix linter
    
    * add debug_afl script
    
    * Update debug_afl
    
    * Update compile_afl
    
    * fix for karchive
    
    * put debug_afl in the docker container
    
    * asan poison fix
    
    * fix asan settings for zeek
    
    * update afl++ commit id
    
    * fix
    
    * update afl++ commit id
    
    * final touches
    
    * remove map size
    
    * remove old comment
    
    * llvm 13 fix
    
    * enhance documentation
    
    * fix capstone build.sh
    
    * update doc
    
    * add afl++ ctx-2 coverage option
    
    * set to 30% chance for ctx-2
    
    * fix afl++ pie targets
    
    * gracefuly fail for qemu hook
    
    Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
  - [php] Fix i386 build (#5692)
    
    It is now necessary to specify the --build architecture for -m32
    builds, otherwise we'll end up using x64 assembly files.
  - [lxc] turn off AFL for now (#5685)
    
    It seems LXC is failing to compile with AFL with
    ```
    ../../src/lxc/storage -pthread -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++ -Wl,--as-needed -Wl,--gc-sections -Wl,-z -Wl,relro -Wl,-z -Wl,now -pie -Wl,-fuse-ld=gold -o fuzz-lxc-define-load fuzz_lxc_define_load-fuzz-lxc-define-load.o  ../lxc/.libs/liblxc.a /usr/lib/libFuzzingEngine.a -lpthread -pthread
    Step #32: /usr/bin/ld: /usr/lib/libFuzzingEngine.a(aflpp_driver.o): relocation R_X86_64_32 against `.rodata.str1.1' can not be used when making a shared object; recompile with -fPIC
    Step #32: /usr/lib/libFuzzingEngine.a: error adding symbols: Bad value
    Step #32: clang-12: [0;1;31merror: [0m[1mlinker command failed with exit code 1 (use -v to see invocation)[0m
    Step #32: make[3]: *** [fuzz-lxc-config-read] Error 1
    ```
    
    Apparently aflpp tends to misdetect compiler/linker features 30% (70%?)
    of the time: https://github.com/google/oss-fuzz/issues/4280#issuecomment-829733181
  - Adds bazel project opencensus-cpp (#5533)
    
    * Adds bazel project opencensus-cpp
    
    * Fix address
  - gpac: remove fuzzer as it is not upstream. (#5690)
    
    
  - [graphicsmagick] no https for this repo :-( (#5688)
    
    
  - Add myself for the rustls project (#5684)
    
    I'm a collaborator on the rustls project and would like to be informed.
  - Changes to build test corpus for Sleuthkit fuzz targets (#5682)
    
    
  - libvips: add libjxl (JPEG-XL) as a dependency (#5673)
    
    
  - [bls-signatures] Use repository master branch (#5674)
    
    * [bls-signatures] Use repository master branch
    
    I merged the BLS functionality into the Cryptofuzz master branch.
    Future development will occur there.
    
    * [bls-signatures] Update Boost download location
  - Added APFS fls fuzzer for SleuthKit project (#5672)
    
    
  - cras: Add rust source soft links for coverage build (#5670)
    
    Fix build failures:
    ```
    error: /out/src/rate_estimator.rs: No such file or directory
    warning: The file '/src/rate_estimator.rs' isn't covered.
    error: /out/src/rate_estimator_bindings.rs: No such file or directory
    warning: The file '/src/rate_estimator_bindings.rs' isn't covered.
    ```
    
    Bug: crbug/oss-fuzz/31910
    Test: {build_fuzzer, coverage} commands in infra/helper.py for cras
  - go-ethereum: add maintainer (#5669)
    
    * go-ethereum: add maintainer
    
    * go-ethereum: add maintainer
  - Fix linkerd2 build. (#5668)
    
    
  - [golang] Add fuzzer (#5659)
    
    
  - Use autotools for capnproto (#5664)
    
    
  - [skia] Add API Triangulation fuzzer (#5657)
    
    
  - hyperium: update project.yaml (#5656)
    
    * Update project.yaml for hyperium
  - [bls-signatures] Scope operations (#5663)
    
    
  - [bls-signatures] Add more e-mails (#5662)
    
    
  - add peter's google account to apache commons (#5661)
    
    
  - [bls-signatures] Initial integration (#5641)
    
    
  - Use the 2.x branch of Mbed TLS (#5636)
    
    The default branch of https://github.com/ARMmbed/mbedtls is about to
    change to point to the work on the next major release (3.0). We expect
    frequent API changes during that time. Switch fuzzers to run on the
    stable major version of Mbed TLS (2.x) during the transition period.
    
    Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
  - Disable java-example (#5653)
    
    `java-example` has produced all the expected findings and there are now sufficiently many Java projects with status badges that build failures caused by issues with Jazzer would be noticed quickly.
  - Fix tinyxml2 build for fast-dds (#5654)
    
    
  - Revert "[CIFuzz] End fuzzing docker processes properly (#5473)" (#5651)
    
    * Revert "[CIFuzz] End fuzzing docker processes properly (#5473)"
    
    This reverts commit c9b3d057b0e66e4e239ee2a10bae9da4fdbfd4f6.
    This commit causes CIFuzz to hang.
  - Set rpath on js binary to properly resolve included libraries on runner (#5646)
    
    
  - hyperium: initial integration (#5330)
    
    * initial integration of hyperium http.
    
    * Updated the hyperium http project.
    
    * Updated the Dockerfile for hyperium-http.
    
    * Updated the hyperium fuzzer.
    
    * Add another hyperium repo.
    
    * Renamed hyperium folder.
    
    * update build script.
    
    * complete integration following upstream merges.
    
    * complete project yaml.
    
    * Updated the build script.
    
    * switched contacts.
  - [helper] Fix build_image --pull and refactor (#5642)
    
    Fix behavior of build_image --pull (Fixes #5640)
    
    Also refactor helper.py:
    
    1. Change behavior of functions so that most return True on success and False on failure.
    2. Only main will return 1 on failure and 0 on success now. Previous behavior was very error prone.
    3. Rename _get_output_dir to _get_out_dir.
    4. Make function docstrings use descriptive tense.
    5. Make helper.py print help when no argument is specified.
  - projects/cosmos-sdk: add cuong and emmanuel as maintainers (#5648)
    
    
  - cleaned up linkerd2 build. (#5647)
    
    
  - prost: initial integration. (#5404)
    
    
  - Fix typos and one link (#5645)
    
    * Fix link to Jenkins
    
    * Typos
    
    * Fix builder, not jenkins.
    
    Co-authored-by: Abhishek Arya <inferno@chromium.org>
  - phashmap: initial integration (#5542)
    
    * phashmap: initial integration.
    
    * phaspmap: retab.
    
    * fix presubmit.
    
    * Fixup phmap.
  - Add missing Java AWT dependency (#5644)
    
    The library libXext.so.6 is required by some Java AWT classes even in
    headless environments.
    
    This fixes a crash in apache-commons:
    https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33489
  - Remove huisu from and add yunqingwang to auto_ccs (#5643)
    
    
  - Adds geos project (#5387)
    
    * Adds geos project
    
    * Improves fuzz target
    
    * Only enables libfuzzer
    
    * All engines for geos
  - Use cosmos-sdk oss fuzz build script (#5638)
    
    
  - [apache-commons] Initial integration (#5633)
    
    Adds fuzzers for Imaging and Compress.
  - Add cosmos-sdk project (#5631)
    
    
  - wazuh: initial integration. (#5576)
    
    * wazuh: initial integration. Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.
  - Adds go json-patch project (#5627)
    
    
  - Add new Perfetto team member (#5635)
    
    
  - linkerd2-proxy: generalise build script (#5625)
    
    * linkerd2-proxy generalise build script to arbitrary amount of fuzzers.
    
    * minor fix.
  - [CRAS] Fix build error (#5634)
    
    Install vim to get `xxd` for source generation.
    
    BUG=oss-fuzz:33362
  - Disables werror for binutils (#5628)
    
    
  - flate2rs initial integration. (#5599)
    
    * flate2rs initial integration.
  - Adds swift-nio project (#5566)
    
    
  - [CIFuzz] Ensure we don't through exception if we can't stop container (#5622)
    
    It's probably fine to run another one, so just do that.
    Also increase the amount of time we will wait to 5 seconds.
    Fixes https://github.com/google/oss-fuzz/issues/5621
  - [libecc] Add project libecc (#5613)
    
    
  - Add new projects: grpc-httpjson-transcoding, http_pattern_matcher (#5427)
    
    * Add new projects: grpc-httpjson-transcoding, http_pattern_matcher
    
    Signed-off-by: Teju Nareddy <nareddyt@google.com>
  - postgresql: fix build (#5618)
    
    * postgresql: fix patch.
    
    * enable afl
    
    * Fix afl build.
    
    * Fix build.sh.
  - build_image with pull should pull all images. (#5620)
    
    * build_image with pull should pull all images.
    
    right now, build_image with pull only pulled the build image,
    and not the runner image. this led to
    https://github.com/google/oss-fuzz/issues/5480
    so, pull all images to match pull_images functionality.
    
    * address review comment.
  - removing libchewing (#5619)
    
    
  - use further optimisations on envoy fuzzers. (#5615)
    
    
  - [golang] Added 2 fuzzers (#5437)
    
    * [golang] Added 2 fuzzers
    
    * Change fuzzer to call exported targets
    
    * Added fuzzer
  - [golang] Add maintainer (#5617)
    
    * [golang] Add maintainer
    
    * Update project.yaml
    
    Co-authored-by: Abhishek Arya <inferno@chromium.org>
  - Uses upstream repository fuzz targets for swift-protobuf (#5612)
    
    
  - [draco][AFL] Disable AFL builds to stop ClusterFuzz exceptions (#5611)
    
    All draco builds have been broken since December.
    This means that the old AFL builds are still running on ClusterFuzz.
    This is causing exceptions because the old AFL builds don't work
    with the ClusterFuzz code which assumes AFL++.
    Fixes #5610
  - [postgresql] Remove AFL fuzzing engine. (#5607)
    
    Build never succeeded and causes ClusterFuzz exceptions.
  - Suricata with pcre2 (#5606)
    
    * Builds pcre2 dependency for Suricata
    
    * Update Dockerfile
    
    Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
  - [proftpd] Initial integration (#5173)
    
    
  - Adds swift-protobuf project (#5493)
    
    * Adds swift-protobuf project
    
    * Support swift language
    
    * Fuzz target improvements
    
    * No test for fuzz package
    
    * fixup comments
    
    * rename to binary
    
    * symbolizer
  - Install necessary packages for cosign (#5605)
    
    
  - [CIFuzz] fix bug (#5602)
    
    Signed-off-by: Asra Ali <asraa@google.com>
  - [CIFuzz] End fuzzing docker processes properly (#5473)
    
    They only right way to do this properly seems to be using docker's container id file with docker stop.
    Fixes #5423
  - Revert "[systemd] roll back to meson-0.56.2 (#5199)" (#5601)
    
    Now that https://github.com/mesonbuild/meson/issues/8345 is closed,
    it should be safe to keep rolling forward.
    
    This reverts commit ac290e7ed7b600c685d3d6b455b58fda122b88b0.
  - cilium: Update contact emails (#5600)
    
    * cilium: Update contact emails
    
    This adds three Cilium maintainers and updates one maintainer's email
    address to match the Google Account email. Previously an alternative
    email was used, which did not give access to the ClusterFuzz dashboard.
    
    * cilium: Add main_repo
  - [java-example] Trigger new native finding (#5597)
    
    Java native libraries should now be fuzzed correctly, but the current crash is still reported as flaky due to the multiple fixes required to make it work.
    
    This commit should trigger a clean new finding.
  - Suricata more targets (#5596)
    
    * Adds per-protocol targets to suricata
    
    * fixup msan
  - protobuf-c: fix build (#5595)
    
    Fix fuzzer build after upstream changes.
  - linkerd2-proxy: initial integration (#5547)
    
    * initial integration of linkerd2-proxy.
    
    * updated linkerd2-proxy following upstream merge.
    
    * whitespace to trigger CI.
  - update libreoffice build-dependency cache (#5588)
    
    
  - [wasm3] Initial integration (#5573)
    
    
  - Enable generated dict in AFL++ (#5591)
    
    This was accidently disabled.
  - libvips: remove no-longer-used giflib dependency (#5590)
    
    
  - Adds ubsan for capnproto (#5589)
    
    
  - [relic] Activate AES encryption/decryption (#5587)
    
    
  - Store triage party image in oss-fuzz-base repo (#5584)
    
    
  - [golang] Refactor build (#5581)
    
    
  - Don't build parts of gdb when testing binutils (#5583)
    
    gdb sources have been reorganised.  Disable more directories when
    building the binutils fuzzers.
  - Fix issue 32760: binutils: Fuzzing build failure (#5582)
    
    Upstream changed over to using stdbool.h.  s/TRUE/true/
  - retry sequentially if multiprocessing do_bad_build_check detects fail… (#5578)
    
    * retry sequentially if multiprocessing do_bad_build_check detects failures
    
    https://github.com/google/oss-fuzz/issues/5441
    
    The error seen in the build log is:
    
    Whoops, the target binary crashed suddenly, before receiving any input
    from the fuzzer!
    
    suggesting that the fuzzer crashed before it got to do anything.
    Debugging locally what I tend to see is that
    
    a) in src/afl-forkserver.c afl_fsrv_start the read_s32_timed call
    returns 0 and that triggers kill(fsrv->fsrv_pid, fsrv->kill_signal);
    (SIGKILL)
    b) read_s32_timed returns 0 because *stop_soon_p is non-zero at
    restart_read:
    c) *stop_soon_p becomes non-zero in handle_stop_sig of
    src/afl-fuzz-init.c due to receiving SIGINT
    d) that SIGINT is sent by the timeout script used in bad_build_check so
    it is that "outer" timeout process which is sending SIGINT which then
    triggers afl-forkserver's internal SIGKILL to kill the process
    
    I get improved results if I retry the killed off fuzzers sequentially
    
    * Remove unneeded semicolons to fix presubmit
    
    Co-authored-by: Abhishek Arya <inferno@chromium.org>
  - Add a maintainer to the Hermes OSS Fuzz project (#5579)
    
    OSS Fuzz tends to mostly find bugs in the parser, which is mostly worked on by @avp and @Huxpro.
  - Delete unneeded files from cargo-fuzz install (100MB) (#5571)
    
    
  - quick-xml: initial integration (#5416)
    
    * quick-xml: initial integration.
    
    * Updated the quick-xml fuzz target.
    
    * quick-xml fix project email and license
  - Refactor tidb build (#5577)
    
    
  - Move build.sh, dictionary creation in to Pillow (#5522)
    
    
  - [jackson-dataformat-xml] Initial integration (#5551)
    
    
  - Adds project tinyobjloader (#5488)
    
    * Adds project tinyobjloader
    
    * Remove patch as it was merged upstream
    
    * cmake shouldn't be needed.
    
    Co-authored-by: Abhishek Arya <inferno@chromium.org>
  - [mupdf] Copy fuzzer glue code to dir outside of git repo (#5504)
    
    This makes it easier to build the fuzzer using a locally checked
    out git repo without having to manually copy the fuzzer glue code
    into the locally checked out git repo first.
  - Switch the cel-cpp project to the new Bazel build script. This reduces the build.sh file to a single line. (#5549)
    
    
  - [libjpeg-turbo] Remove unneeded pkg in Dockerfile (#5574)
    
    Installing the i386 libstdc++ SDK was part of a failed effort to fix the
    i386 fuzz targets.  They have been fixed in a different way.
  - Upgrade oss-fuzz to 947169dc86572e121c3e138f366a9f39ac6266ae am: f3764d0712 am: 1117028736 am: 235e96b2f8
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1662261
    
    Change-Id: Ib7b7a79b38e1261c1d5fb4ccb1a5dfd106588996
    
  - Upgrade oss-fuzz to 947169dc86572e121c3e138f366a9f39ac6266ae am: f3764d0712 am: 1117028736
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1662261
    
    Change-Id: I8526ccfaeb10e35f986e2e8cc24c66e965584281
    
  - Upgrade oss-fuzz to 947169dc86572e121c3e138f366a9f39ac6266ae am: f3764d0712
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1662261
    
    Change-Id: I18045be87879187bbbe56998975665b475a99c13
    
  - [libjpeg-turbo] Use new fuzzers in project repo (#5537)
    
    - Eliminate unnecessary packages from Docker image (Autotools has not
      been required since libjpeg-turbo 1.5.x.)
    
    - Obtain seed corpora from a new Git repository maintained by The
      libjpeg-turbo Project.  (This new repo contains the old corpora from
      https://lcamtuf.coredump.cx, with duplicates removed, and some new
      corpora curated from historical libjpeg-turbo bug reports.)
    
    - Remove build.sh.  (The libjpeg-turbo Project is now maintaining its
      own build script in order to facilitate the future creation of new
      fuzz targets.)
    
    - Remove fuzz target source code.  (The libjpeg-turbo Project is now
      maintaining its own fuzz targets with better code coverage.)
    
    - Update the project home page in project.yaml.
    
    - Change the project language to C in project.yaml.  (The new fuzz
      targets are written in pure C rather than C++, since libjpeg-turbo is
      a C-only project.)
  - [janet] Fix janet (#5569)
    
    
  - afl++: add CTX-2 coverage option (#5567)
    
    
  - Add config and deploy script for triage party (#5557)
    
    
  - Fix (#5564)
    
    
  - boost: fix build. (#5565)
    
    * boost: fix build.
    
    * Add header to fuzzer.
  - envoy: optimise fuzzers (#5556)
    
    * envoy: cleanup instrumentation.
    
    * Added descriptions to the instrumentation.
  - Disables afl for dart project (#5568)
    
    
  - assimp: fix build. (#5560)
    
    
  - [automerger skipped] Mark ab/7061308 as merged in stage. am: e29700b9ee -s ours am: cabb96cd6c -s ours
    
    am skip reason: Change-Id Id6a0ead2a48cd6518fac56099d220309d1e8fef0 with SHA-1 087770cd2b is in history
    
    Original change: undetermined
    
    MUST ONLY BE SUBMITTED BY AUTOMERGER
    
    Change-Id: I1527b2edca430db106625dd890a4f10388dfe3ca
    
  - [automerger skipped] Mark ab/7061308 as merged in stage. am: e29700b9ee -s ours
    
    am skip reason: Change-Id Id6a0ead2a48cd6518fac56099d220309d1e8fef0 with SHA-1 087770cd2b is in history
    
    Original change: undetermined
    
    MUST ONLY BE SUBMITTED BY AUTOMERGER
    
    Change-Id: If23db488517fbc83f15e2cce48bc3580c05bdca9
    
  - [LSC] Add LOCAL_LICENSE_KINDS to external/oss-fuzz am: f80a2e3985 am: d603835068 am: 6f59e773df
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1588584
    
    MUST ONLY BE SUBMITTED BY AUTOMERGER
    
    Change-Id: I11da3ea08175f12221fee0f55f9a7fa0e4210bbe
    
  - [LSC] Add LOCAL_LICENSE_KINDS to external/oss-fuzz am: f80a2e3985 am: d603835068
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1588584
    
    MUST ONLY BE SUBMITTED BY AUTOMERGER
    
    Change-Id: Id4002db4c8e9b0f0c15a036b4d87e8510a65d729
    
  - Upgrade oss-fuzz to 0e6b81c81b415bb584c8d7595264480fa5a7de84 am: 8e067b0fed am: a5111e1896 am: efc08c8119
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1582211
    
    MUST ONLY BE SUBMITTED BY AUTOMERGER
    
    Change-Id: I570ededdb032fe7978c0b9fae0faaec543164ebd
    
  - Upgrade oss-fuzz to 0e6b81c81b415bb584c8d7595264480fa5a7de84 am: 8e067b0fed am: a5111e1896
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1582211
    
    MUST ONLY BE SUBMITTED BY AUTOMERGER
    
    Change-Id: If6b1e9505014b423c0f5de7b329be2357194ed77
    
  - Upgrade oss-fuzz to e4a2de5fab58f8fa35f8c04980b8893aecc53372 am: f5a34a69b7 am: 7bc641ddd0 am: b2bd548a17
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1577363
    
    MUST ONLY BE SUBMITTED BY AUTOMERGER
    
    Change-Id: Icd455df6f8dd108c544ffadb25e41d92ed2d038e
    
  - Upgrade oss-fuzz to e4a2de5fab58f8fa35f8c04980b8893aecc53372 am: f5a34a69b7 am: 7bc641ddd0
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1577363
    
    MUST ONLY BE SUBMITTED BY AUTOMERGER
    
    Change-Id: I95f283d2579d35e3098fc56c7de187106e0f8d7e
    
  - Fix license_type. Contains GPL am: 240b84716f am: dc7e1b437d am: 39875fadbe
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1556394
    
    MUST ONLY BE SUBMITTED BY AUTOMERGER
    
    Change-Id: I61137013052f58cbcbe7110c9641fcd0688b9b4f
    
  - Fix license_type. Contains GPL am: 240b84716f am: dc7e1b437d
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1556394
    
    MUST ONLY BE SUBMITTED BY AUTOMERGER
    
    Change-Id: I3fcdc9cb3d1835df2ff2da7e701805402212c656
    
  - Upgrade oss-fuzz to 167aec47bf047e3b3ccf01c5e4e3030144e86eea am: f53e07789e am: 98d051431a am: a0a2c3368f
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1541458
    
    MUST ONLY BE SUBMITTED BY AUTOMERGER
    
    Change-Id: I841fc9f7fcf00a068ec6c56d0038a414bfcb2019
    
  - Upgrade oss-fuzz to 167aec47bf047e3b3ccf01c5e4e3030144e86eea am: f53e07789e am: 98d051431a
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1541458
    
    MUST ONLY BE SUBMITTED BY AUTOMERGER
    
    Change-Id: I8e2d935e045b425ecf3d7ba8763464e742527df4
    
  - Merge "Add componentid for fuzzer" am: cbe9b39069 am: 7695f06955 am: 087770cd2b
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1498178
    
    MUST ONLY BE SUBMITTED BY AUTOMERGER
    
    Change-Id: I6f54702c032d6546f2102540901f0ba1e8b0cbe2
    
  - Upgrade oss-fuzz to 3ef6ac2f1712e5f206520798606cb9ea677e056f am: 2cfee66977 am: 3494da7ecb am: bf6e63110f
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1514883
    
    Change-Id: I2f1798a023d9c852f4b07279c07b1eb875a1f08b
    
  - Mark ab/6881855 as merged am: 9e3ae4638a am: cb1894bff4
    
    Original change: https://googleplex-android-review.googlesource.com/c/platform/external/oss-fuzz/+/13110950
    
    Change-Id: Ieab39b6222801fbced2ecb8830808cd107a84ac9
    
  - Merge "Enable fuzzer for libldac" am: 1a55fd45f1 am: c63aae4166 am: 064939b01b am: fcaf6c60d5
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1495877
    
    Change-Id: I8fc825bd6f33ea7ac1fc7989fc3325db7a5fc31d
    
  - Upgrade oss-fuzz to 0c8e9162eb4a263ed113d7777b20bf3ac8a49ae9 am: 8657159af5 am: 37e78e271c am: 7928fac04a am: 8e94a18b13
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1479538
    
    Change-Id: Idd5e6b75de0168801e69eba803e74f9fba0503cb
    
  - [automerger skipped] Skip ab/6749736 in stage. am: 431b4615b7 -s ours am: 578f3a11c7 -s ours am: c4b064c8e4 -s ours
    
    am skip reason: Change-Id Id610f54d276b1a5377404fbe432055ff77746d0c with SHA-1 1ef9af4592 is in history
    
    Original change: https://googleplex-android-review.googlesource.com/c/platform/external/oss-fuzz/+/12797355
    
    Change-Id: I347887da3cc91e5cfc9fbf09129543d4f317eb2c
    
  - Upgrade oss-fuzz to 7033ab69e6bd2c25b1adcbdd39e72f9e02f4d459 am: 1e8197c84c am: 3e4ccccd17 am: 42fbc10277 am: 8a08f4bbc6 am: b0bee7503c
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1423811
    
    Change-Id: I1e30d6264802478aa6c6e6bea6b96dbaef7a01f4
    
  - [automerger skipped] Mark Android R (rvc-dev-plus-aosp-without-vendor@6692709) as merged am: b6955ca3e9 -s ours am: 7eeecfa7fa -s ours am: a26b79426a -s ours am: cdc4741917 -s ours
    
    am skip reason: Change-Id I4e93fcb0f9087e497b5a5fd0bf44073d99850e49 with SHA-1 7334a6ca11 is in history
    
    Original change: https://googleplex-android-review.googlesource.com/c/platform/external/oss-fuzz/+/12469871
    
    Change-Id: I002935f38d77ae4cd69d1ef6c44698ea189b9294
    
  - Upgrade oss-fuzz to e0a94e1a0924a1e2460f5de5abad9ee6b5acad7d am: 3ca8729c54 am: 6882c22b3d am: 8c23b5255a am: 97473948d2 am: 42dc083f6b
    
    Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1395749
    
    Change-Id: Ibe681149491c0753cc70ed750be4d504a0a764a3
    
  - Upgrade oss-fuzz to 4e241e814080eac62a106931214cbd17275182cc am: 61804fe0f0 am: 8c011a1095 am: 7334a6ca11 am: 1ef9af4592 am: 7d8bab9f58
    
    Original change: undetermined
    
    Change-Id: I3a71ccea1764e02f6432fcd8d80453e2ec55763b
    
  - Upgrade oss-fuzz to 982ddca0351851891e55093717dbe8b76404b382 am: cbda9eb122 am: e4ac2ea97c am: 9cc53e06a2 am: bcc26106b9 am: fc57fd7977
    
    Change-Id: I9c7e0e0e2fd8bd91cbde93987e942cca3bfb2a06
    
  - [automerger skipped] DO NOT MERGE - Empty merge qt-qpr1-dev-plus-aosp into stag-aosp-master am: 4e1dbe97a9 -s ours am: 85331f76de am: bf4cfb5d22 am: 22d372464b -s ours
    
    am skip reason: subject contains skip directive
    
    Change-Id: I444d1ab104b3ab885f70002a8ddb15364f332fd5
    
  - Upgrade oss-fuzz to 5d818ce22143bb5b3a9728b63a8290772e46eba4 am: bdf5e4e7e2 am: 051218ca29 am: ca6efcea75 am: 149eff423d am: 265e961d23
    
    Change-Id: I91bd4eef0a3fa235138a039956c6b9645807da66
    
  - Remove redundant NOTICE symbolic link. am: 08a505b99b am: 6b9df98a6c am: d3d31a8446 am: 2c60758446 am: e1ade1bd4e
    
    Change-Id: Ic4f71846a71394f9edbcecbb1a3dca47861f65ca
    
  - [automerger skipped] DO NOT MERGE - Empty merge qt-qpr1-dev-plus-aosp@6304901 into stag-aosp-master am: ed4ab2e674 -s ours am: 475ab148eb am: c5d416cb17 am: bffd3854e1 -s ours
    
    am skip reason: subject contains skip directive
    
    Change-Id: Iaf7f9f541975a5123ec1c10d8ffe4d6dd94602c4
    
  - Upgrade oss-fuzz to 4231987eeef499cabbbe18a2bf284a90446780a4 am: 711ef9554f am: 0d80d30b2b am: b29c860203 am: 1212193705 am: 0575de0d6b
    
    Change-Id: If33f76a9bd676e641d2e74357cca34b3d5795947
    
1 file changed