diff options
| author | Nguyễn Gia Phong <cnx@loang.net> | 2025-01-29 09:03:33 +0900 |
|---|---|---|
| committer | Nguyễn Gia Phong <cnx@loang.net> | 2025-01-29 09:03:33 +0900 |
| commit | fa0ff68e806afd6474abdbd2f20d464bb8cc20b4 (patch) | |
| tree | 2275cc28c45f18395176a2d9c6d16ab16a6d03a9 | |
| parent | d5c5949eee317ee57bf9c9c8748d32f2d08f43bc (diff) | |
| download | loftix-fa0ff68e806afd6474abdbd2f20d464bb8cc20b4.tar.gz | |
Fix heading levels
| -rw-r--r-- | README.md | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/README.md b/README.md index 07f23e6..6d1062e 100644 --- a/README.md +++ b/README.md @@ -35,15 +35,15 @@ Then run `guix pull`. - [python-pacfix]: PAC-learning-based program systhesizer -### Bugs +## Bugs -#### CVE-2016-9557 +### CVE-2016-9557 [Signed integer overflow in jas_image.c][jasper-d42b238] guix shell jasper@1.900.19 -- imginfo -f bugs/cve-2016-9557/reproducer -#### CVE-2017-15232 +### CVE-2017-15232 [NULL pointer dereference in quantize_ord_dither function][mozjpeg-268] @@ -54,13 +54,13 @@ Then run `guix pull`. djpeg -crop "1x1+16+16" -onepass -dither ordered -dct float -colors 8\ -targa -grayscale -outfile o bugs/cve-2017-15232/2.jpg -#### CVE-2017-14745 +### CVE-2017-14745 [Integer overflow in elf64-x86-64.c, binutils 2.29.1][sourceware-22148] guix shell binutils@2.29 -- objdump -d bugs/cve-2017-14745/crash_1 -#### CVE-2017-15025 +### CVE-2017-15025 [Divide-by-zero in decode_line_info (dwarf2.c)][sourceware-22186] |
