Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Config Based CVE Matching for Linux Kernel

Linux Foundation via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an innovative approach to CVE matching for the Linux kernel in this conference talk. Delve into the limitations of traditional "CPE search" methods used in the embedded Linux industry for identifying security vulnerabilities. Discover how these methods often lead to an excessive number of false positives, particularly when dealing with outdated kernels. Learn about two primary causes of false positives: imprecise CPE information in CVE databases and the reporting of vulnerabilities in code that may not be compiled with specific configurations. Examine a more accurate algorithm that utilizes commit IDs to pinpoint vulnerable version ranges, effectively replacing the classical approach. Gain insights into a novel method that combines multiple techniques to further reduce false positives by approximately 10%. Understand how this improved approach considers the ".config" file to determine whether vulnerable code is actually compiled, resulting in more precise and actionable security assessments for Linux kernel-based products.

Syllabus

Config Based CVE Matching for Linux Kernel - Takuma Kawai, Miraxia Edge Technology Corporation

Taught by

Linux Foundation

Reviews

Start your review of Config Based CVE Matching for Linux Kernel

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.