# Fuzzing DNG SDK This fuzzer is intented to do a varian analysis of the issue reported in b/156261521. Here is a list of some CVEs previously discovered in DNG SDK: * CVE-2020-9589 * CVE-2020-9590 * CVE-2020-9620 * CVE-2020-9621 * CVE-2020-9622 * CVE-2020-9623 * CVE-2020-9624 * CVE-2020-9625 * CVE-2020-9626 * CVE-2020-9627 * CVE-2020-9628 * CVE-2020-9629 ## Building & running the fuzz target: Android device It is recommended to set rss limit to higher values (such as 4096) when running the fuzzer to avoid frequent OOM libFuzzer crashes. ```sh $ source build/envsetup.sh $ lunch aosp_arm64-eng $ SANITIZE_TARGET=hwaddress make dng_parser_fuzzer $ adb sync data $ adb shell /data/fuzz/arm64/dng_parser_fuzzer/dng_parser_fuzzer \ $ -rss_limit=4096 \ $ /data/fuzz/arm64/dng_parser_fuzzer/corpus ``` ## Building & running the fuzz target: Host ```sh $ source build/envsetup.sh $ lunch aosp_x86_64-eng $ SANITIZE_HOST=address make dng_parser_fuzzer $ LD_LIBRARY_PATH=$ANDROID_HOST_OUT/fuzz/x86_64/lib/ \ $ $ANDROID_HOST_OUT/fuzz/x86_64/dng_parser_fuzzer/dng_parser_fuzzer \ $ -rss_limit_mb=4096 \ $ $ANDROID_HOST_OUT/fuzz/x86_64/dng_parser_fuzzer/corpus/ ```