lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 11 Apr 2020 07:07:13 +0200 From: Markus Elfring <Markus.Elfring@....de> To: Alexander Popov <alex.popov@...ux.com>, cocci@...teme.lip6.fr, kernel-hardening@...ts.openwall.com Cc: Jann Horn <jannh@...gle.com>, Julia Lawall <Julia.Lawall@...6.fr>, Gilles Muller <Gilles.Muller@...6.fr>, Nicolas Palix <nicolas.palix@...g.fr>, Michal Marek <michal.lkml@...kovi.net>, Kees Cook <keescook@...omium.org>, Hans Verkuil <hverkuil@...all.nl>, Mauro Carvalho Chehab <mchehab@...nel.org>, linux-media@...r.kernel.org, LKML <linux-kernel@...r.kernel.org> Subject: Re: Coccinelle rule for CVE-2019-18683 > Analysing each matching case would take a lot of time. How many efforts would you like to invest in adjusting the situation? Will any more development possibilities picked up to reduce the presentation of false positives by the mentioned source code analysis approach considerably? Regards, Markus
Powered by blists - more mailing lists