Skip to content

Commit 43f93e6

Browse files
author
Salar Nosrati-Ershad
committed
Add link to helper script doc when commented contains patterns in checkers
1 parent 3bb0479 commit 43f93e6

File tree

19 files changed

+38
-0
lines changed

19 files changed

+38
-0
lines changed

cve_bin_tool/checkers/avahi.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ class AvahiChecker(Checker):
1515
CONTAINS_PATTERNS = [
1616
r"avahi_free",
1717
r"avahi_strerror",
18+
# Alternate optional contains patterns,
19+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1820
# r"avahi_string_list_free",
1921
# r"libavahi-common.so.3",
2022
]

cve_bin_tool/checkers/bash.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ class BashChecker(Checker):
1515
CONTAINS_PATTERNS = [
1616
r"save_bash_input: buffer already exists for new fd %d",
1717
r"cannot allocate new file descriptor for bash input from fd %d",
18+
# Alternate optional contains patterns,
19+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1820
# r"bash manual page for the complete specification.",
1921
# r"bash_execute_unix_command: cannot find keymap for command",
2022
]

cve_bin_tool/checkers/bind.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ class BindChecker(Checker):
1515
CONTAINS_PATTERNS = [
1616
r"bind9_check_key",
1717
r"bind9_check_namedconf",
18+
# Alternate optional contains patterns,
19+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1820
# r"/bind9.xsl",
1921
]
2022
FILENAME_PATTERNS = [r"named"]

cve_bin_tool/checkers/busybox.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ class BusyboxChecker(Checker):
1515
CONTAINS_PATTERNS = [
1616
r"BusyBox is a multi-call binary that combines many common Unix",
1717
r"link to busybox for each function they wish to use and BusyBox",
18+
# Alternate optional contains patterns,
19+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1820
# r"BusyBox is copyrighted by many authors between 1998-2015.",
1921
]
2022
FILENAME_PATTERNS = [r"busybox"]

cve_bin_tool/checkers/bzip2.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ class Bzip2Checker(Checker):
1515
CONTAINS_PATTERNS = [
1616
r"bzip2recover ([0-9]+\.[0-9]+\.[0-9]+): extracts blocks from damaged .bz2 files.",
1717
r"%s: BZ_MAX_HANDLED_BLOCKS in bzip2recover.c, and recompile.",
18+
# Alternate optional contains patterns,
19+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1820
# r"in the bzip2-1.0.6 source distribution.", # present only .rpm
1921
]
2022
FILENAME_PATTERNS = [r"bzip2"]

cve_bin_tool/checkers/cups.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ class CupsChecker(Checker):
1616
CONTAINS_PATTERNS = [
1717
r"No limit for CUPS-Get-Document defined in policy %s and no suitable template found.",
1818
r"\*%%%%%%%% Created by the CUPS PPD Compiler CUPS v([0-9]+\.[0-9]+\.[0-9]+)"
19+
# Alternate optional contains patterns,
20+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1921
# r"Unable to edit cupsd.conf files larger than 1MB",
2022
# r"The web interface is currently disabled. Run \"cupsctl WebInterface=yes\" to enable it.",
2123
# r"cupsdAddSubscription: Reached MaxSubscriptions %d \(count=%d\)",

cve_bin_tool/checkers/curl.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ class CurlChecker(Checker):
2020
CONTAINS_PATTERNS = [
2121
r"Dump libcurl equivalent code of this command line",
2222
r"a specified protocol is unsupported by libcurl",
23+
# Alternate optional contains patterns,
24+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
2325
# r"curl failed to verify the legitimacy of the server and therefore could not",
2426
# r"error retrieving curl library information",
2527
# r"ignoring --proxy-capath, not supported by libcurl",

cve_bin_tool/checkers/dbus.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ class DbusChecker(Checker):
1616
CONTAINS_PATTERNS = [
1717
r"dbus_connection_get_adt_audit_session_data",
1818
r"dbus_connection_set_dispatch_status_function",
19+
# Alternate optional contains patterns,
20+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1921
# r"dbus_connection_set_max_received_unix_fds",
2022
# r"dbus_connection_set_windows_user_function",
2123
# r"_dbus_connection_get_linux_security_label",

cve_bin_tool/checkers/dnsmasq.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@
1313
class DnsmasqChecker(Checker):
1414
CONTAINS_PATTERNS = [
1515
r"Dnsmasq is free software, and you are welcome to redistribute it",
16+
# Alternate optional contains patterns,
17+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1618
# r"Allow access only to files owned by the user running dnsmasq\.",
1719
# r"Display dnsmasq version and copyright information\.",
1820
]

cve_bin_tool/checkers/dovecot.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ class DovecotChecker(Checker):
1515
CONTAINS_PATTERNS = [
1616
r"BUG: Authentication client %u requested invalid authentication mechanism %s \(DOVECOT-TOKEN required\)",
1717
r"DOVECOT_SRAND is not available in non-debug builds",
18+
# Alternate optional contains patterns,
19+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1820
# r"Dovecot is already running with PID %s \(read from %s\)",
1921
# r"Dovecot is already running\? Socket already exists: %s",
2022
# r"Must be started by dovecot master process",

cve_bin_tool/checkers/freeradius.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ class FreeradiusChecker(Checker):
1515
CONTAINS_PATTERNS = [
1616
r"Application and libfreeradius-server magic number (commit) mismatch. application: %lx library: %lx",
1717
r"Application and libfreeradius-server magic number (prefix) mismatch. application: %x library: %x",
18+
# Alternate optional contains patterns,
19+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1820
# r"Application and libfreeradius-server magic number (version) mismatch. application: %lx library: %lx",
1921
# r"FreeRADIUS Version ([0-9]+\.[0-9]+\.[0-9]+), for host aarch64-redhat-linux-gnu",
2022
]

cve_bin_tool/checkers/gcc.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ class GccChecker(Checker):
1616
CONTAINS_PATTERNS = [
1717
r"Do not predefine system-specific and GCC-specific macros\.",
1818
r"Dump detailed information on GCC's internal representation of source code locations\.",
19+
# Alternate optional contains patterns,
20+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1921
# r"GCC is not configured to support %s as offload target",
2022
# r"IPA lattices after constant propagation, before gcc_unreachable:",
2123
# r"Record gcc command line switches in DWARF DW_AT_producer\.",

cve_bin_tool/checkers/gnupg.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ class GnupgChecker(Checker):
1414
CONTAINS_PATTERNS = [
1515
r"# \(Use \"gpg --import-ownertrust\" to restore them\)",
1616
r"Comment: Use \"gpg --dearmor\" for unpacking",
17+
# Alternate optional contains patterns,
18+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1719
# r"standalone revocation - use \"gpg --import\" to apply",
1820
# r"you can update your preferences with: gpg --edit-key %s updpref save",
1921
]

cve_bin_tool/checkers/hdf5.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ class Hdf5Checker(Checker):
1515
CONTAINS_PATTERNS = [
1616
r"### HDF5 metadata cache trace file version 1 ###",
1717
r"%s'HDF5_DISABLE_VERSION_CHECK' environment variable is set to %d, application will",
18+
# Alternate optional contains patterns,
19+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1820
# r"The HDF5 header files used to compile this application do not match",
1921
# r"The HDF5 library version information are not consistent in its source code.",
2022
# r"This can happen when an application was compiled by one version of HDF5 but",

cve_bin_tool/checkers/irssi.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ class IrssiChecker(Checker):
1515
CONTAINS_PATTERNS = [
1616
r"Configuration file was modified since irssi was last started - do you want to overwrite the possible changes\?",
1717
r"# The real text formats that irssi uses are the ones you can find with",
18+
# Alternate optional contains patterns,
19+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1820
# r"# %%s : must be second - use Irssi; use Irssi::Irc; etc\.\.",
1921
# r"# When irssi expands the templates in \"format\", the final string would be:",
2022
# r"# When irssi sees this kind of text, it goes to find \"name\" from abstracts",

cve_bin_tool/checkers/liblas.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ class LiblasChecker(Checker):
1414
CONTAINS_PATTERNS = [
1515
r"N5boost6detail17sp_counted_impl_pIN6liblas5PointEEE",
1616
r"detail::liblas::read_n<T> input stream is not readable",
17+
# Alternate optional contains patterns,
18+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1719
# r"N5boost6detail17sp_counted_impl_pIN6liblas6detail10ReaderImplEEE",
1820
# r"liblas::detail::ReadeVLRData_str: array index out of range",
1921
]

cve_bin_tool/checkers/libsndfile.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ class LibsndfileChecker(Checker):
1515
CONTAINS_PATTERNS = [
1616
r"No error defined for this error number. This is a bug in libsndfile.",
1717
r"NULL SF_INFO pointer passed to libsndfile.",
18+
# Alternate optional contains patterns,
19+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1820
# r"MATLAB 5.0 MAT-file, written by libsndfile-(\d+\.\d+\.\d+),",
1921
]
2022
FILENAME_PATTERNS = [r"libsndfile.so"]

cve_bin_tool/checkers/varnish.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ class VarnishChecker(Checker):
1313
CONTAINS_PATTERNS = [
1414
r"\(pthread_create\(&v->tp, \(\(void \*\)0\), varnish_thread, v\)\) == 0",
1515
r"\(pthread_create\(&v->tp_vsl, \(\(void \*\)0\), varnishlog_thread, v\)\) == 0",
16+
# Alternate optional contains patterns,
17+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
1618
# r"Clients that do not support gzip will have their Accept-Encoding header removed\. For more information on how gzip is implemented please see the chapter on gzip in the Varnish reference\.",
1719
]
1820
FILENAME_PATTERNS = [r"varnish"]

cve_bin_tool/checkers/zsh.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,8 @@ class ZshChecker(Checker):
1818
CONTAINS_PATTERNS = [
1919
r"zsh: sure you want to delete all %d files in",
2020
r"zsh: sure you want to delete all the files in",
21+
# Alternate optional contains patterns,
22+
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
2123
# r"--version show zsh version number, then exit",
2224
# r"zsh: sure you want to delete more than %d files in",
2325
# r"zsh: sure you want to delete the only file in",

0 commit comments

Comments
 (0)