SHA256
1
0
forked from pool/afl

Accepting request 436436 from home:pluskalm:branches:devel:tools

- Update to version 2.35b:
  * Fixed a minor cmdline reporting glitch, spotted by Leo Barnes.
  * Fixed a silly bug in libdislocator. Spotted by Johannes Schultz.
- Changes for version 2.34b:
  * Added a note about afl-tmin to technical_details.txt.
  * Added support for AFL_NO_UI, as suggested by Leo Barnes.
- Changes for version 2.33b:
  * Added code to strip -Wl,-z,defs and -Wl,--no-undefined for
    fl-clang-fast, since they interfere with -shared. Spotted and
    iagnosed by Toby Hutton.
  * Added some fuzzing tips for Android.

OBS-URL: https://build.opensuse.org/request/show/436436
OBS-URL: https://build.opensuse.org/package/show/devel:tools/afl?expand=0&rev=70
This commit is contained in:
Martin Pluskal 2016-10-20 18:27:52 +00:00 committed by Git OBS Bridge
parent 2b75b08ec6
commit 788f2cd04f
4 changed files with 33 additions and 8 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:3d08b79e28c2075aec20aa6e6240f9f6fb7af3d29200b498e908f8b3960a7b79
size 828474

3
afl-2.35b.tgz Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:596167527ad7a69cf06dc8143a051eb8b2ee04f159447a3086f6e60ae460bcea
size 829515

View File

@ -1,3 +1,18 @@
-------------------------------------------------------------------
Wed Oct 19 20:05:42 UTC 2016 - mpluskal@suse.com
- Update to version 2.35b:
* Fixed a minor cmdline reporting glitch, spotted by Leo Barnes.
* Fixed a silly bug in libdislocator. Spotted by Johannes Schultz.
- Changes for version 2.34b:
* Added a note about afl-tmin to technical_details.txt.
* Added support for AFL_NO_UI, as suggested by Leo Barnes.
- Changes for version 2.33b:
* Added code to strip -Wl,-z,defs and -Wl,--no-undefined for
fl-clang-fast, since they interfere with -shared. Spotted and
iagnosed by Toby Hutton.
* Added some fuzzing tips for Android.
-------------------------------------------------------------------
Thu Aug 25 12:45:55 UTC 2016 - meissner@suse.com

View File

@ -17,7 +17,7 @@
Name: afl
Version: 2.32b
Version: 2.35b
Release: 0
Summary: American fuzzy lop is a security-oriented fuzzer
License: Apache-2.0
@ -31,9 +31,19 @@ BuildRoot: %{_tmppath}/%{name}-%{version}-build
ExclusiveArch: i586 x86_64
%description
American fuzzy lop is a security-oriented fuzzer that employs a novel type of compile-time instrumentation and genetic algorithms to automatically discover clean, interesting test cases that trigger new internal states in the targeted binary. This substantially improves the functional coverage for the fuzzed code. The compact synthesized corpora produced by the tool are also useful for seeding other, more labor- or resource-intensive testing regimes down the road.
American fuzzy lop is a security-oriented fuzzer that employs a novel type
of compile-time instrumentation and genetic algorithms to automatically
discover clean, interesting test cases that trigger new internal states in
the targeted binary. This substantially improves the functional coverage
for the fuzzed code. The compact synthesized corpora produced by the tool
are also useful for seeding other, more labor- or resource-intensive
testing regimes down the road.
Compared to other instrumented fuzzers, afl-fuzz is designed to be practical: it has modest performance overhead, uses a variety of highly effective fuzzing strategies and effort minimization tricks, requires essentially no configuration, and seamlessly handles complex, real-world use cases - say, common image parsing or file compression libraries.
Compared to other instrumented fuzzers, afl-fuzz is designed to be
practical: it has modest performance overhead, uses a variety of highly
effective fuzzing strategies and effort minimization tricks, requires
essentially no configuration, and seamlessly handles complex, real-world
use cases - say, common image parsing or file compression libraries.
%prep
%setup -q
@ -56,7 +66,7 @@ make %{?_smp_mflags} PREFIX=%{_prefix} LIBEXEC_DIR=%{_libexecdir} DOC_DIR=%{_doc
%dir %{_datadir}/%{name}
%dir %{_datadir}/%{name}/testcases
%{_datadir}/%{name}/testcases/*
%dir /usr/share/afl/dictionaries/
/usr/share/afl/dictionaries/*
%dir %{_datadir}/afl/dictionaries/
%{_datadir}/afl/dictionaries/*
%changelog