Skip to content

Commit 464d0ee

Browse files
author
Salar Nosrati-Ershad
committed
remove all "<", ">" before and after urls
1 parent 6693a7e commit 464d0ee

File tree

19 files changed

+19
-19
lines changed

19 files changed

+19
-19
lines changed

cve_bin_tool/checkers/avahi.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class AvahiChecker(Checker):
1616
r"avahi_free",
1717
r"avahi_strerror",
1818
# Alternate optional contains patterns,
19-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
19+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2020
# r"avahi_string_list_free",
2121
# r"libavahi-common.so.3",
2222
]

cve_bin_tool/checkers/bash.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class BashChecker(Checker):
1616
r"save_bash_input: buffer already exists for new fd %d",
1717
r"cannot allocate new file descriptor for bash input from fd %d",
1818
# Alternate optional contains patterns,
19-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
19+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2020
# r"bash manual page for the complete specification.",
2121
# r"bash_execute_unix_command: cannot find keymap for command",
2222
]

cve_bin_tool/checkers/bind.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class BindChecker(Checker):
1616
r"bind9_check_key",
1717
r"bind9_check_namedconf",
1818
# Alternate optional contains patterns,
19-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
19+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2020
# r"/bind9.xsl",
2121
]
2222
FILENAME_PATTERNS = [r"named"]

cve_bin_tool/checkers/busybox.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class BusyboxChecker(Checker):
1616
r"BusyBox is a multi-call binary that combines many common Unix",
1717
r"link to busybox for each function they wish to use and BusyBox",
1818
# Alternate optional contains patterns,
19-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
19+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2020
# r"BusyBox is copyrighted by many authors between 1998-2015.",
2121
]
2222
FILENAME_PATTERNS = [r"busybox"]

cve_bin_tool/checkers/bzip2.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class Bzip2Checker(Checker):
1616
r"bzip2recover ([0-9]+\.[0-9]+\.[0-9]+): extracts blocks from damaged .bz2 files.",
1717
r"%s: BZ_MAX_HANDLED_BLOCKS in bzip2recover.c, and recompile.",
1818
# Alternate optional contains patterns,
19-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
19+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2020
# r"in the bzip2-1.0.6 source distribution.", # present only .rpm
2121
]
2222
FILENAME_PATTERNS = [r"bzip2"]

cve_bin_tool/checkers/cups.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ class CupsChecker(Checker):
1717
r"No limit for CUPS-Get-Document defined in policy %s and no suitable template found.",
1818
r"\*%%%%%%%% Created by the CUPS PPD Compiler CUPS v([0-9]+\.[0-9]+\.[0-9]+)"
1919
# Alternate optional contains patterns,
20-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
20+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2121
# r"Unable to edit cupsd.conf files larger than 1MB",
2222
# r"The web interface is currently disabled. Run \"cupsctl WebInterface=yes\" to enable it.",
2323
# r"cupsdAddSubscription: Reached MaxSubscriptions %d \(count=%d\)",

cve_bin_tool/checkers/curl.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ class CurlChecker(Checker):
2121
r"Dump libcurl equivalent code of this command line",
2222
r"a specified protocol is unsupported by libcurl",
2323
# Alternate optional contains patterns,
24-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
24+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2525
# r"curl failed to verify the legitimacy of the server and therefore could not",
2626
# r"error retrieving curl library information",
2727
# r"ignoring --proxy-capath, not supported by libcurl",

cve_bin_tool/checkers/dbus.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ class DbusChecker(Checker):
1717
r"dbus_connection_get_adt_audit_session_data",
1818
r"dbus_connection_set_dispatch_status_function",
1919
# Alternate optional contains patterns,
20-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
20+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2121
# r"dbus_connection_set_max_received_unix_fds",
2222
# r"dbus_connection_set_windows_user_function",
2323
# r"_dbus_connection_get_linux_security_label",

cve_bin_tool/checkers/dnsmasq.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class DnsmasqChecker(Checker):
1414
CONTAINS_PATTERNS = [
1515
r"Dnsmasq is free software, and you are welcome to redistribute it",
1616
# Alternate optional contains patterns,
17-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
17+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
1818
# r"Allow access only to files owned by the user running dnsmasq\.",
1919
# r"Display dnsmasq version and copyright information\.",
2020
]

cve_bin_tool/checkers/dovecot.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class DovecotChecker(Checker):
1616
r"BUG: Authentication client %u requested invalid authentication mechanism %s \(DOVECOT-TOKEN required\)",
1717
r"DOVECOT_SRAND is not available in non-debug builds",
1818
# Alternate optional contains patterns,
19-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
19+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2020
# r"Dovecot is already running with PID %s \(read from %s\)",
2121
# r"Dovecot is already running\? Socket already exists: %s",
2222
# r"Must be started by dovecot master process",

cve_bin_tool/checkers/freeradius.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class FreeradiusChecker(Checker):
1616
r"Application and libfreeradius-server magic number (commit) mismatch. application: %lx library: %lx",
1717
r"Application and libfreeradius-server magic number (prefix) mismatch. application: %x library: %x",
1818
# Alternate optional contains patterns,
19-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
19+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2020
# r"Application and libfreeradius-server magic number (version) mismatch. application: %lx library: %lx",
2121
# r"FreeRADIUS Version ([0-9]+\.[0-9]+\.[0-9]+), for host aarch64-redhat-linux-gnu",
2222
]

cve_bin_tool/checkers/gcc.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ class GccChecker(Checker):
1717
r"Do not predefine system-specific and GCC-specific macros\.",
1818
r"Dump detailed information on GCC's internal representation of source code locations\.",
1919
# Alternate optional contains patterns,
20-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
20+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2121
# r"GCC is not configured to support %s as offload target",
2222
# r"IPA lattices after constant propagation, before gcc_unreachable:",
2323
# r"Record gcc command line switches in DWARF DW_AT_producer\.",

cve_bin_tool/checkers/gnupg.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ class GnupgChecker(Checker):
1515
r"# \(Use \"gpg --import-ownertrust\" to restore them\)",
1616
r"Comment: Use \"gpg --dearmor\" for unpacking",
1717
# Alternate optional contains patterns,
18-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
18+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
1919
# r"standalone revocation - use \"gpg --import\" to apply",
2020
# r"you can update your preferences with: gpg --edit-key %s updpref save",
2121
]

cve_bin_tool/checkers/hdf5.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class Hdf5Checker(Checker):
1616
r"### HDF5 metadata cache trace file version 1 ###",
1717
r"%s'HDF5_DISABLE_VERSION_CHECK' environment variable is set to %d, application will",
1818
# Alternate optional contains patterns,
19-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
19+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2020
# r"The HDF5 header files used to compile this application do not match",
2121
# r"The HDF5 library version information are not consistent in its source code.",
2222
# r"This can happen when an application was compiled by one version of HDF5 but",

cve_bin_tool/checkers/irssi.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class IrssiChecker(Checker):
1616
r"Configuration file was modified since irssi was last started - do you want to overwrite the possible changes\?",
1717
r"# The real text formats that irssi uses are the ones you can find with",
1818
# Alternate optional contains patterns,
19-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
19+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2020
# r"# %%s : must be second - use Irssi; use Irssi::Irc; etc\.\.",
2121
# r"# When irssi expands the templates in \"format\", the final string would be:",
2222
# r"# When irssi sees this kind of text, it goes to find \"name\" from abstracts",

cve_bin_tool/checkers/liblas.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ class LiblasChecker(Checker):
1515
r"N5boost6detail17sp_counted_impl_pIN6liblas5PointEEE",
1616
r"detail::liblas::read_n<T> input stream is not readable",
1717
# Alternate optional contains patterns,
18-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
18+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
1919
# r"N5boost6detail17sp_counted_impl_pIN6liblas6detail10ReaderImplEEE",
2020
# r"liblas::detail::ReadeVLRData_str: array index out of range",
2121
]

cve_bin_tool/checkers/libsndfile.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class LibsndfileChecker(Checker):
1616
r"No error defined for this error number. This is a bug in libsndfile.",
1717
r"NULL SF_INFO pointer passed to libsndfile.",
1818
# Alternate optional contains patterns,
19-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
19+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2020
# r"MATLAB 5.0 MAT-file, written by libsndfile-(\d+\.\d+\.\d+),",
2121
]
2222
FILENAME_PATTERNS = [r"libsndfile.so"]

cve_bin_tool/checkers/varnish.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class VarnishChecker(Checker):
1414
r"\(pthread_create\(&v->tp, \(\(void \*\)0\), varnish_thread, v\)\) == 0",
1515
r"\(pthread_create\(&v->tp_vsl, \(\(void \*\)0\), varnishlog_thread, v\)\) == 0",
1616
# Alternate optional contains patterns,
17-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
17+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
1818
# r"Clients that do not support gzip will have their Accept-Encoding header removed\. For more information on how gzip is implemented please see the chapter on gzip in the Varnish reference\.",
1919
]
2020
FILENAME_PATTERNS = [r"varnish"]

cve_bin_tool/checkers/zsh.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ class ZshChecker(Checker):
1919
r"zsh: sure you want to delete all %d files in",
2020
r"zsh: sure you want to delete all the files in",
2121
# Alternate optional contains patterns,
22-
# see <https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script> for more details
22+
# see https://github.com/intel/cve-bin-tool/tree/main/cve_bin_tool/checkers#helper-script for more details
2323
# r"--version show zsh version number, then exit",
2424
# r"zsh: sure you want to delete more than %d files in",
2525
# r"zsh: sure you want to delete the only file in",

0 commit comments

Comments
 (0)