about summary refs log tree commit diff
diff options
context:
space:
mode:
authorNguyễn Gia Phong <cnx@loang.net>2025-01-29 09:03:33 +0900
committerNguyễn Gia Phong <cnx@loang.net>2025-01-29 09:03:33 +0900
commitfa0ff68e806afd6474abdbd2f20d464bb8cc20b4 (patch)
tree2275cc28c45f18395176a2d9c6d16ab16a6d03a9
parentd5c5949eee317ee57bf9c9c8748d32f2d08f43bc (diff)
downloadloftix-fa0ff68e806afd6474abdbd2f20d464bb8cc20b4.tar.gz
Fix heading levels
-rw-r--r--README.md10
1 files changed, 5 insertions, 5 deletions
diff --git a/README.md b/README.md
index 07f23e6..6d1062e 100644
--- a/README.md
+++ b/README.md
@@ -35,15 +35,15 @@ Then run `guix pull`.
 
 - [python-pacfix]: PAC-learning-based program systhesizer
 
-### Bugs
+## Bugs
 
-#### CVE-2016-9557
+### CVE-2016-9557
 
 [Signed integer overflow in jas_image.c][jasper-d42b238]
 
     guix shell jasper@1.900.19 -- imginfo -f bugs/cve-2016-9557/reproducer
 
-#### CVE-2017-15232
+### CVE-2017-15232
 
 [NULL pointer dereference in quantize_ord_dither function][mozjpeg-268]
 
@@ -54,13 +54,13 @@ Then run `guix pull`.
       djpeg -crop "1x1+16+16" -onepass -dither ordered -dct float -colors 8\
         -targa -grayscale -outfile o bugs/cve-2017-15232/2.jpg
 
-#### CVE-2017-14745
+### CVE-2017-14745
 
 [Integer overflow in elf64-x86-64.c, binutils 2.29.1][sourceware-22148]
 
     guix shell binutils@2.29 -- objdump -d bugs/cve-2017-14745/crash_1
 
-#### CVE-2017-15025
+### CVE-2017-15025
 
 [Divide-by-zero in decode_line_info (dwarf2.c)][sourceware-22186]