|
Message-ID: <515361D4.4040806@linux.vnet.ibm.com> Date: Wed, 27 Mar 2013 17:17:08 -0400 From: Corey Bryant <coreyb@...ux.vnet.ibm.com> To: Solar Designer <solar@...nwall.com> CC: kernel-hardening@...ts.openwall.com, oss-security@...ts.openwall.com Subject: Re: [kernel-hardening] Re: Security vulnerability tools On 03/27/2013 04:12 PM, Solar Designer wrote: > Hi, > > Guys, can we continue this thread on oss-security only, please? It is a > topic for oss-security, but less so for kernel-hardening. Anyone on > kernel-hardening who is interested in this topic should join oss-security. > > Just drop kernel-hardening from further replies. > Sure, sorry about that. I am interested in tools that are applicable to the kernel too though, if that changes anything. > On Wed, Mar 27, 2013 at 03:54:04PM -0400, Corey Bryant wrote: >> I'll plan on updating http://oss-security.openwall.org/wiki/tools with >> anything it doesn't already have. > > Yes, please! > >> Clang >> ----- >> Static analysis tool for C/C++ > > Clang and very recent GCC also have dynamic "sanitizers": > > http://clang.llvm.org/docs/AddressSanitizer.html > http://clang.llvm.org/docs/ThreadSanitizer.html > http://clang.llvm.org/docs/MemorySanitizer.html Great, thanks! > > Thanks, > > Alexander > > -- Regards, Corey Bryant
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.