Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 27 Mar 2013 17:17:08 -0400
From: Corey Bryant <coreyb@...ux.vnet.ibm.com>
To: Solar Designer <solar@...nwall.com>
CC: kernel-hardening@...ts.openwall.com, oss-security@...ts.openwall.com
Subject: Re: [kernel-hardening] Re: Security vulnerability tools


On 03/27/2013 04:12 PM, Solar Designer wrote:
> Hi,
>
> Guys, can we continue this thread on oss-security only, please?  It is a
> topic for oss-security, but less so for kernel-hardening.  Anyone on
> kernel-hardening who is interested in this topic should join oss-security.
>
> Just drop kernel-hardening from further replies.
>

Sure, sorry about that.  I am interested in tools that are applicable to 
the kernel too though, if that changes anything.

> On Wed, Mar 27, 2013 at 03:54:04PM -0400, Corey Bryant wrote:
>> I'll plan on updating http://oss-security.openwall.org/wiki/tools with
>> anything it doesn't already have.
>
> Yes, please!
>
>> Clang
>> -----
>> Static analysis tool for C/C++
>
> Clang and very recent GCC also have dynamic "sanitizers":
>
> http://clang.llvm.org/docs/AddressSanitizer.html
> http://clang.llvm.org/docs/ThreadSanitizer.html
> http://clang.llvm.org/docs/MemorySanitizer.html

Great, thanks!

>
> Thanks,
>
> Alexander
>
>

-- 
Regards,
Corey Bryant

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.