about summary refs log tree commit diff
path: root/README.md
diff options
context:
space:
mode:
authorNguyễn Gia Phong <cnx@loang.net>2025-02-12 23:26:43 +0900
committerNguyễn Gia Phong <cnx@loang.net>2025-02-12 23:26:43 +0900
commit3b1b2f5ee155d69801f4cb7fa0de8fbf2cdd55b7 (patch)
tree3055f7d7d149b3c954fa16096bc62ebf20b644aa /README.md
parentda4e674efd729cb813388c0d3f7d244d4162b168 (diff)
downloadloftix-3b1b2f5ee155d69801f4cb7fa0de8fbf2cdd55b7.tar.gz
March towards REUSE compliance
Diffstat (limited to 'README.md')
-rw-r--r--README.md32
1 files changed, 18 insertions, 14 deletions
diff --git a/README.md b/README.md
index 44e5f04..316e633 100644
--- a/README.md
+++ b/README.md
@@ -42,45 +42,49 @@ Then run `guix pull`.
 
 [potrace: possible heap overflow][redhat-955808]
 
-    guix shell potrace@1.11 -- potrace bugs/cve-2013-7437/1.bmp
-    guix shell potrace@1.11 -- potrace bugs/cve-2013-7437/2.bmp
-    guix shell potrace@1.11 -- potrace bugs/cve-2013-7437/3.bmp
+    guix shell potrace@1.11
+    potrace bugs/cve/2013/7437/1.bmp
+    potrace bugs/cve/2013/7437/2.bmp
 
 ### CVE-2016-9557
 
 [JasPer: signed integer overflow][jasper-d42b238]
 
-    guix shell jasper@1.900.19 -- imginfo -f bugs/cve-2016-9557/reproducer
+    guix shell jasper@1.900.19
+    imginfo -f bugs/cve/2016/9557/signed-int-overflow.jp2
 
 ### CVE-2017-5969
 
 [libxml2: null pointer derefence][oss-sec-20161105-3]
 
-    guix shell libxml2@2.9.4 --\
-      xmllint --recover bugs/cve-2017-5969/reproducer.xml
+    guix shell libxml2@2.9.4
+    xmllint --recover bugs/cve/2017/5969/crash-libxml2-recover.xml
 
 ### CVE-2017-14745
 
 [binutils: integer overflow][sourceware-22148]
 
-    guix shell binutils@2.29 -- objdump -d bugs/cve-2017-14745/crash_1
+    guix shell binutils@2.29
+    objdump -d bugs/cve/2017/14745/crash_1
 
 ### CVE-2017-15025
 
 [binutils: divide-by-zero][sourceware-22186]
 
-    guix shell binutils@2.29 -- nm -l bugs/cve-2017-15025/3899.crashes.bin
+    guix shell binutils@2.29
+    nm -l bugs/cve/2017/15025/3899.crashes.bin
+    nm -l bugs/cve/2017/15025/floatexception.elf
+    objdump -S bugs/cve/2017/15025/floatexception.elf
 
 ### CVE-2017-15232
 
 [libjpeg-turbo: NULL pointer dereference][mozjpeg-268]
 
-    guix shell libjpeg-turbo@1.5.2 --\
-      djpeg -crop "1x1+16+16" -onepass -dither ordered -dct float -colors 8\
-        -targa -grayscale -outfile o bugs/cve-2017-15232/1.jpg
-    guix shell libjpeg-turbo@1.5.2 --\
-      djpeg -crop "1x1+16+16" -onepass -dither ordered -dct float -colors 8\
-        -targa -grayscale -outfile o bugs/cve-2017-15232/2.jpg
+    guix shell libjpeg-turbo@1.5.2
+    djpeg -crop "1x1+16+16" -onepass -dither ordered -dct float -colors 8\
+      -targa -grayscale -outfile o bugs/cve/2017/15232/1.jpg
+    djpeg -crop "1x1+16+16" -onepass -dither ordered -dct float -colors 8\
+      -targa -grayscale -outfile o bugs/cve/2017/15232/2.jpg
 
 [Guix channel]: https://guix.gnu.org/manual/devel/en/html_node/Channels.html
 [AFLRun]: https://trong.loang.net/~cnx/afl++/log?h=run