Releases: MrEx-Right/Radon
Releases · MrEx-Right/Radon
v1.0.3-beta: The POSIX Purge & IPC Lockdown
v1.0.3-beta: The POSIX Purge & IPC Lockdown
🚀 Features & Optimizations
- Professional CLI Experience: Eradicated the default, unpolished command-line help interfaces. Both the Go Orchestrator (
radon) and the C Compiler Wrapper (radon-cc) now feature custom, highly detailed, Matrix-style terminal usage menus (-h/--help) that clearly define arguments, default paths, and practical examples.
🐛 Bug Fixes
- POSIX Signal Translation: Fixed a critical flaw where the Go Orchestrator was receiving raw
waitpiddata and misinterpreting target crashes. The Fork Server now correctly extracts signals via standard POSIX macros (WIFSIGNALED,WTERMSIG) and forwards standardized exit codes (e.g.,139forSIGSEGV), ensuring 100% accurate crash triage. - IPC Pipe Leak / Zombie FD Lockdown: Patched a severe stability vulnerability in the Fork Server. The fuzzer's communication pipes (
FORKSRV_CTRL_FD,FORKSRV_STATUS_FD) are now strictly closed within the child process beforeexecvis called. This prevents vulnerable target applications from hijacking or crashing the Fuzzer's internal nervous system. - Trampoline False-Positive Elimination: Toughened the
radon-ccassembly injection logic to prevent catastrophicSIGILLcrashes. The tracer now strictly requires a colon (:) to confirm label definitions and utilizes an expanded blacklist to ignore non-executable labels like.LFE(Function End) and.LC(String Constants). - Zombie SHM Leak (IPC_RMID): Resolved a stealthy memory leak where detached 64KB shared memory segments were not being destroyed by the OS. Explicitly defined and enforced the
IPC_RMIDcommand during the teardown sequence to guarantee absolute memory reclamation. - Runtime Panic Prevention: Fixed a fatal bug in the Go Orchestrator where calling
flag.Parse()prematurely caused runtime panics when attempting to allocate the Fork Server engine path. The execution sequence is now strictly ordered.
v1.0.2-beta: The Great Stabilizer & Red Zone Rescue
v1.0.2-beta: The Great Stabilizer & Red Zone Rescue
🚀 Features & Optimizations
- Thread-Safe Corpus Orchestration: Overhauled the Go Orchestrator's memory model. Implemented strict
sync.Mutexlocking mechanisms between the high-speed fuzzing loop and the TUI dashboard, eliminating fatal Goroutine data races and ensuring UI stability at maximum exec/s. - Dynamic Path Resolution: Eradicated hardcoded execution paths across the codebase. The Orchestrator and Compiler now support dynamic routing via CLI arguments and environment variables, allowing Radon to be executed seamlessly from any directory structure.
🐛 Bug Fixes
- System V ABI Red Zone Protection: Fixed a critical flaw in
radon-ccwhere injected assembly trampolines clobbered the target's 128-byte Red Zone. Stack pointers are now safely shifted, preventing the tracer from corrupting local variables and causing false-positiveSIGSEGVcrashes. - Catastrophic SHM Leak Resolved: Patched a severe memory leak in
main.gowhere fatal execution errors bypassed thedefercleanup routines. The 64KB Shared Memory coverage map is now strictly detached and destroyed upon failure, preventing OS-level RAM exhaustion. - Blind I/O Redirection: Corrected the initialization sequence in
fork-server.c. Target payload descriptors are now verified before routingstdout/stderrto/dev/null, ensuring that payload loading failures are properly logged to the Orchestrator instead of failing silently. - Trampoline PRNG Collisions: Fixed an issue in the compiler wrapper where parallel compilations occurring within the same second generated identical basic block IDs. The random seed is now strictly XOR'd with the Process ID (
time(NULL) ^ getpid()) to guarantee globally unique edge mapping.
v1.0.1-beta: Havoc Engine Unleashed & SSD Savior
v1.0.1-beta: Havoc Engine Unleashed & SSD Savior
🚀 Features & Optimizations
- Havoc Mutator Upgrade: The core mutation engine has been completely rewritten. Replaced the basic bit-flipper with a high-performance Havoc engine featuring mutation stacking, magic number injection, block overwrites, and block swapping.
- RAM Disk (tmpfs) I/O Pipeline: Migrated payload generation and reading from traditional disk storage to
/dev/shm. This eliminates SSD wear and tear and significantly boosts execution speed by operating entirely in RAM.
🐛 Bug Fixes
- Compiler Register Clobbering: Fixed a critical issue in
radon-ccwhere injected assembly coverage trampolines clobbered the%rcxregister, leading to false-positive Segmentation Faults in target binaries. - Fork Server STDIN Routing: Resolved a bug in
fork-server.cwhere target processes would hang indefinitely. Mutated payloads are now properly routed into the target'sSTDINdescriptor.