Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 27 Mar 2013 17:17:08 -0400
From: Corey Bryant <coreyb@...ux.vnet.ibm.com>
To: Solar Designer <solar@...nwall.com>
CC: kernel-hardening@...ts.openwall.com, oss-security@...ts.openwall.com
Subject: Re: Re: Security vulnerability tools


On 03/27/2013 04:12 PM, Solar Designer wrote:
> Hi,
>
> Guys, can we continue this thread on oss-security only, please?  It is a
> topic for oss-security, but less so for kernel-hardening.  Anyone on
> kernel-hardening who is interested in this topic should join oss-security.
>
> Just drop kernel-hardening from further replies.
>

Sure, sorry about that.  I am interested in tools that are applicable to 
the kernel too though, if that changes anything.

> On Wed, Mar 27, 2013 at 03:54:04PM -0400, Corey Bryant wrote:
>> I'll plan on updating http://oss-security.openwall.org/wiki/tools with
>> anything it doesn't already have.
>
> Yes, please!
>
>> Clang
>> -----
>> Static analysis tool for C/C++
>
> Clang and very recent GCC also have dynamic "sanitizers":
>
> http://clang.llvm.org/docs/AddressSanitizer.html
> http://clang.llvm.org/docs/ThreadSanitizer.html
> http://clang.llvm.org/docs/MemorySanitizer.html

Great, thanks!

>
> Thanks,
>
> Alexander
>
>

-- 
Regards,
Corey Bryant

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.