Hello community,

here is the log from the commit of package afl for openSUSE:Factory checked in 
at 2020-12-16 11:00:38
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/afl (Old)
 and      /work/SRC/openSUSE:Factory/.afl.new.2328 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "afl"

Wed Dec 16 11:00:38 2020 rev:55 rq:856003 version:3.0c

Changes:
--------
--- /work/SRC/openSUSE:Factory/afl/afl.changes  2020-09-06 21:39:03.893737822 
+0200
+++ /work/SRC/openSUSE:Factory/.afl.new.2328/afl.changes        2020-12-16 
11:00:40.691581132 +0100
@@ -1,0 +2,65 @@
+Tue Dec 15 09:18:09 UTC 2020 - Marcus Meissner <[email protected]>
+
+- updated to 3.0c
+  - llvm_mode/ and gcc_plugin/ moved to instrumentation/
+  - examples/ renamed to utils/
+  - moved libdislocator, libtokencap and qdbi_mode to utils/
+  - all compilers combined to afl-cc which emulates the previous ones
+  - afl-llvm/gcc-rt.o merged into afl-compiler-rt.o
+  - afl-fuzz
+    - not specifying -M or -S will now auto-set "-S default"
+    - deterministic fuzzing is now disabled by default and can be enabled with
+      -D. It is still enabled by default for -M.
+    - a new seed selection was implemented that uses weighted randoms based on
+      a schedule performance score, which is much better that the previous
+      walk the whole queue approach. Select the old mode with -Z (auto enabled
+      with -M)
+    - Marcel Boehme submitted a patch that improves all AFFast schedules :)
+    - the default schedule is now FAST
+    - memory limits are now disabled by default, set them with -m if required
+    - rpc.statsd support, for stats and charts, by Edznux, thanks a lot!
+    - reading testcases from -i now descends into subdirectories
+    - allow the -x command line option up to 4 times
+    - loaded extras now have a duplication protection
+    - If test cases are too large we do a partial read on the maximum
+      supported size
+    - longer seeds with the same trace information will now be ignored
+      for fuzzing but still be used for splicing
+    - crashing seeds are now not prohibiting a run anymore but are
+      skipped - they are used for splicing, though
+    - update MOpt for expanded havoc modes
+    - setting the env var AFL_NO_AUTODICT will not load an LTO autodictionary
+    - added NO_SPLICING compile option and makefile define
+    - added INTROSPECTION make target that writes all mutations to
+      out/NAME/introspection.txt
+    - print special compile time options used in help output
+    - when using -c cmplog, one of the childs was not killed, fixed
+    - somewhere we broke -n dumb fuzzing, fixed
+    - added afl_custom_describe to the custom mutator API to allow for easy
+      mutation reproduction on crashing inputs
+  - instrumentation
+    - We received an enhanced gcc_plugin module from AdaCore, thank you
+      very much!!
+    - not overriding -Ox or -fno-unroll-loops anymore
+    - we now have our own trace-pc-guard implementation. It is the same as
+      -fsanitize-coverage=trace-pc-guard from llvm 12, but: it is a) inline
+      and b) works from llvm 10.0.1 + onwards :)
+    - new llvm pass: dict2file via AFL_LLVM_DICT2FILE, create afl-fuzz
+      -x dictionary of string comparisons found during compilation
+    - LTO autodict now also collects interesting cmp comparisons,
+      std::string compare + find + ==, bcmp
+    - fix crash in dict2file for integers > 64 bit
+  - custom mutators
+    - added a new custom mutator: symcc -> https://github.com/eurecom-s3/symcc/
+    - added a new custom mutator: libfuzzer that integrates libfuzzer mutations
+    - Our afl++ Grammar-Mutator is now better integrated into custom_mutators/
+    - added INTROSPECTION support for custom modules
+    - python fuzz function was not optional, fixed
+    - some python mutator speed improvements
+  - afl-cmin/afl-cmin.bash now search first in PATH and last in AFL_PATH
+  - unicornafl synced with upstream version 1.02 (fixes, better rust bindings)
+  - renamed AFL_DEBUG_CHILD_OUTPUT to AFL_DEBUG_CHILD
+  - added AFL_CRASH_EXITCODE env variable to treat a child exitcode as crash
+- afl-2.63c-fix-paths.patch refreshed to afl-3.0c-fix-paths.patch
+
+-------------------------------------------------------------------

Old:
----
  2.68c.tar.gz
  afl-2.63c-fix-paths.patch

New:
----
  3.0c.tar.gz
  afl-3.0c-fix-paths.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ afl.spec ++++++
--- /var/tmp/diff_new_pack.5ugpap/_old  2020-12-16 11:00:41.627582051 +0100
+++ /var/tmp/diff_new_pack.5ugpap/_new  2020-12-16 11:00:41.631582056 +0100
@@ -17,15 +17,16 @@
 
 
 Name:           afl
-Version:        2.68c
+Version:        3.0c
 Release:        0
 Summary:        American fuzzy lop is a security-oriented fuzzer
 License:        Apache-2.0
 URL:            http://lcamtuf.coredump.cx/afl/
 Source:         
https://github.com/vanhauser-thc/AFLplusplus/archive/%{version}.tar.gz
 Source1:        afl-rpmlintrc
-Patch1:         afl-2.63c-fix-paths.patch
+Patch1:         afl-3.0c-fix-paths.patch
 BuildRequires:  gcc-c++
+BuildRequires:  python3-devel
 
 %description
 American fuzzy lop is a security-oriented fuzzer that employs a novel type
@@ -68,9 +69,17 @@
 %dir %{_libexecdir}/%{name}
 %{_libexecdir}/%{name}/%{name}-as
 %{_libexecdir}/%{name}/as
-#{_libexecdir}/%{name}/argvfuzz*.so
-#{_libexecdir}/%{name}/socketfuzz*.so
-#{_libexecdir}/%{name}/libradamsa.so
+%ifarch x86_64 ppc64 ppc64le s390x
+%{_libexecdir}/%{name}/afl-compiler-rt-64.o
+%{_libexecdir}/%{name}/afl-llvm-rt-64.o
+%endif
+%ifarch %ix86
+%{_libexecdir}/%{name}/afl-compiler-rt-32.o
+%{_libexecdir}/%{name}/afl-llvm-rt-32.o
+%endif
+%{_libexecdir}/%{name}/afl-compiler-rt.o
+%{_libexecdir}/%{name}/afl-llvm-rt.o
+%{_libexecdir}/%{name}/dynamic_list.txt
 %dir %{_datadir}/%{name}
 %dir %{_datadir}/%{name}/testcases
 %{_datadir}/%{name}/testcases/*

++++++ 2.68c.tar.gz -> 3.0c.tar.gz ++++++
++++ 80512 lines of diff (skipped)

++++++ afl-2.63c-fix-paths.patch -> afl-3.0c-fix-paths.patch ++++++
--- /work/SRC/openSUSE:Factory/afl/afl-2.63c-fix-paths.patch    2020-09-06 
21:39:03.853737802 +0200
+++ /work/SRC/openSUSE:Factory/.afl.new.2328/afl-3.0c-fix-paths.patch   
2020-12-16 11:00:40.647581089 +0100
@@ -1,7 +1,7 @@
-Index: AFLplusplus-2.68c/GNUmakefile
+Index: AFLplusplus-3.0c/GNUmakefile
 ===================================================================
---- AFLplusplus-2.68c.orig/GNUmakefile
-+++ AFLplusplus-2.68c/GNUmakefile
+--- AFLplusplus-3.0c.orig/GNUmakefile
++++ AFLplusplus-3.0c/GNUmakefile
 @@ -21,8 +21,8 @@ HASH=\#
  
  PREFIX     ?= /usr/local
@@ -11,5 +11,21 @@
 +HELPER_PATH = $(LIBEXEC_DIR)/afl
 +DOC_PATH    = $(DOC_DIR)/afl
  MISC_PATH   = $(PREFIX)/share/afl
- MAN_PATH    = $(PREFIX)/share/man/man8
+ MAN_PATH    = $(PREFIX)/man/man8
+ 
+Index: AFLplusplus-3.0c/GNUmakefile.llvm
+===================================================================
+--- AFLplusplus-3.0c.orig/GNUmakefile.llvm
++++ AFLplusplus-3.0c/GNUmakefile.llvm
+@@ -20,9 +20,9 @@
+ HASH=\#
+ 
+ PREFIX      ?= /usr/local
+-HELPER_PATH ?= $(PREFIX)/lib/afl
++HELPER_PATH ?= $(LIBEXEC_DIR)/afl
+ BIN_PATH    ?= $(PREFIX)/bin
+-DOC_PATH    ?= $(PREFIX)/share/doc/afl
++DOC_PATH    ?= $(DOC_DIR)/afl
+ MISC_PATH   ?= $(PREFIX)/share/afl
+ MAN_PATH    ?= $(PREFIX)/share/man/man8
  
_______________________________________________
openSUSE Commits mailing list -- [email protected]
To unsubscribe, email [email protected]
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: 
https://lists.opensuse.org/archives/list/[email protected]

Reply via email to