I can't answer for all the "tainted" checks on coverity, but the ones I'm patching seem reasonable.
Quick example
num = tvb_get_ntohl(...)
for (i = 0; i < num; i++) { }
Nothing is going to crash in wireshark, but if a tainted packet contains 0xFFFFFFFF, why should we loop with this value, until we overcome the boudaries? The value is clearly wrong. My idea of patch is to check this value against a max, and stop the current call if the check fails.
Currently there are 160 tainted checks open in coverity. How can we be sure that all of them are unuseful, hence we disable the check? What about look at them, and maybe mark some them as false positive?