You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Now that @TristanB22 has compiled our pop paths and reachable data. We should find at least 20 vulns (from here) that appear in our kernel version (5.11) and compare them to see if they appear in popular or reachable (or unreachable?).
The text was updated successfully, but these errors were encountered:
@justyoyo123 is going to take the pop paths data that Tristan's new model generates, and try to automate the vulnerability comparison.
He can scrape the vulnerability database using beautiful soup, and use that in conjunction with the kernel source code to figure out line numbers for vulnerabilities. That list can then be compared with the generated pop paths data for matches.
Now that @TristanB22 has compiled our pop paths and reachable data. We should find at least 20 vulns (from here) that appear in our kernel version (5.11) and compare them to see if they appear in popular or reachable (or unreachable?).
The text was updated successfully, but these errors were encountered: