|
|
--- |
|
|
layout: default |
|
|
title: Bug fixing guidance |
|
|
nav_order: 6 |
|
|
permalink: /advanced-topics/bug-fixing-guidance |
|
|
--- |
|
|
|
|
|
# Bug fixing guidance |
|
|
{: .no_toc} |
|
|
|
|
|
This page provides brief guidance on how to prioritise and fix bugs reported by |
|
|
OSS-Fuzz. |
|
|
|
|
|
- TOC |
|
|
{:toc} |
|
|
|
|
|
## Threat modelling |
|
|
In general the severity of an issue reported by OSS-Fuzz must be determined |
|
|
relative to the threat model of the project under analysis. Therefore, although |
|
|
the fuzzers OSS-Fuzz makes an effort into determining the severity of the bug |
|
|
the true severity of the bug depends on the threat model of the project. |
|
|
|
|
|
## Bug prioritisation |
|
|
|
|
|
### Security issues |
|
|
These are the top priority of solving. A label is attached to these on |
|
|
the OSS-Fuzz testcase page and you can also search up all of these on monorail |
|
|
using the search pattern `-Bug=security`. |
|
|
|
|
|
Issues of this kind include issues reported by Address Sanitizer, e.g. |
|
|
heap-based buffer overflows, stack-based buffer overflows and use-after-frees. |
|
|
|
|
|
### Functional issues and memory leaks |
|
|
These are issues that in general can tamper with the functionality of the |
|
|
application. The bugs that have highest priority in this case are those that |
|
|
can be easily triggered by an untrusted user of the project. |
|
|
|
|
|
### Timeouts and out-of-memory |
|
|
These are in general the least prioritised issues to solve. |
|
|
|
|
|
### Bug prioritisation of non C/C++ projects |
|
|
Currently there is no prioritisation of bugs in non C/C++ projects. As such, in |
|
|
this scenario it is crucial you do the analysis yourself relative to the threat |
|
|
model of your project. |
|
|
|
|
|
## Non-reproducible bugs |
|
|
OSS-Fuzz will report some bugs that are labeled `Reliably reproduces: NO` and |
|
|
these can be tricky to deal with. A non-reproducible bug is an issue that |
|
|
OSS-Fuzz did indeed discover, however, OSS-Fuzz is unable to reproduce the bug |
|
|
with `python infra/helper.py reproduce`. In general, our suggestion is to do |
|
|
analysis of the bug and determine whether there in fact is an issue. |
|
|
|
|
|
The non-reproducible bugs can be of varying nature. Some of these bugs will be |
|
|
due to some internal state of the target application being manipulated over the |
|
|
cause of several executions of the fuzzer function. This could be several |
|
|
hundreds or even thousands of executions and the bug may not be reproducible by |
|
|
a single fuzzer test-case, however, there is indeed a bug in the application. |
|
|
There are other reasons why bugs may be non-reproducible and in general any |
|
|
non-determinism introduced into the application can have an effect on this. |
|
|
|
|
|
In the case of non-reproducible bugs our advice is to put effort into analysing |
|
|
the potential bug and also assess whether this is due to some internal state |
|
|
that persists between each fuzz run. If that is indeed the case then we also |
|
|
suggest investigating whether the fuzzer can be written such that the internal |
|
|
state in the code will be reset between each fuzz run. |
|
|
|
|
|
## Should all reported issues be solved? |
|
|
It is reported by some project maintainers that fixing timeout issues reported |
|
|
by OSS-Fuzz can increase the complexity of the project’s source code. The |
|
|
result of this is that maintainers put effort into solving a timeout issue and |
|
|
the fix results in additional complexity of the project. The question is |
|
|
whether in a scenario like this if the overall result actually improves the |
|
|
state of the application. |
|
|
|
|
|
In order to answer this question we must assess the issue relative to the |
|
|
threat model. Following the timeout anecdote then some timing issues can have |
|
|
severe security implications. For example, if the timeout issue can cause |
|
|
manipulation of control-flow then the timing issue may be of high security |
|
|
severity. As such, it is difficult to say in the general case whether or not |
|
|
some bugs should not be solved, as it should be analysed and determined on a |
|
|
project-by-project basis. |
|
|
|
|
|
In the event that a bug is reported by OSS-Fuzz that is not relevant to |
|
|
security or reliability of the application then there may still be a point to |
|
|
fixing the bug. For example, if the issue is often run into by the fuzzer then |
|
|
the fuzzer may have difficulty exploring further code in the target, and thus |
|
|
fixing the bug will allow the fuzzer to explore further code. In this case some |
|
|
suggested examples of resolving the issue could be: |
|
|
* Perform a hot-patch that is only applied during fuzzer executions and does |
|
|
not overcomplicate the project’s code. |
|
|
* Patch the code of the fuzzer to avoid the timeout. For example, some fuzzers |
|
|
restrict the size of the input to avoid certain deep recursions or |
|
|
time-intensive loops. |
|
|
* Patch the code in the target despite complicating things. |
|
|
|