about summary refs log tree commit diff
diff options
context:
space:
mode:
-rw-r--r--REUSE.toml3
-rw-r--r--bugs/README.md30
2 files changed, 18 insertions, 15 deletions
diff --git a/REUSE.toml b/REUSE.toml
index 3ee17c3..96cd1f6 100644
--- a/REUSE.toml
+++ b/REUSE.toml
@@ -16,6 +16,7 @@ SPDX-FileCopyrightText = '2013 Stefan Cornelius'
 [[annotations]]
 path = 'bugs/cve/2016/9557/signed-int-overflow.jp2'
 SPDX-FileCopyrightText = '2016 Agostino Sarubbo'
+SPDX-License-Identifier = 'CC0-1.0'
 
 [[annotations]]
 path = 'bugs/cve/2017/5969/crash-libxml2-recover.xml'
@@ -34,10 +35,12 @@ SPDX-FileCopyrightText = '2017 Junchao Luan'
 [[annotations]]
 path = 'bugs/cve/2017/15020/reproducer'
 SPDX-FileCopyrightText = '2017 Agostino Sarubbo'
+SPDX-License-Identifier = 'CC0-1.0'
 
 [[annotations]]
 path = 'bugs/cve/2017/15025/3899.crashes.bin'
 SPDX-FileCopyrightText = '2017 Agostino Sarubbo'
+SPDX-License-Identifier = 'CC0-1.0'
 
 [[annotations]]
 path = 'bugs/cve/2017/15025/floatexception.elf'
diff --git a/bugs/README.md b/bugs/README.md
index 74003aa..4827049 100644
--- a/bugs/README.md
+++ b/bugs/README.md
@@ -5,36 +5,36 @@
 - CVE-2017-6965: [heap buffer overflow][sourceware-21137]
 
       guix shell binutils@2.27
-      readelf -w bugs/cve/2017/6965/bug_3
+      readelf -w cve/2017/6965/bug_3
 
 - CVE-2017-14745: [integer overflow][sourceware-22148]
 
       guix shell binutils@2.29
-      objdump -d bugs/cve/2017/14745/crash_1
+      objdump -d cve/2017/14745/crash_1
 
 - CVE-2017-15020: [heap buffer overflow][sourceware-22202]
 
       guix shell binutils@2.29
-      nm -l bugs/cve/2017/15020/reproducer
+      nm -l cve/2017/15020/reproducer
 
 - CVE-2017-15025: [divide-by-zero][sourceware-22186]
 
       guix shell binutils@2.29
-      nm -l bugs/cve/2017/15025/3899.crashes.bin
-      nm -l bugs/cve/2017/15025/floatexception.elf
-      objdump -S bugs/cve/2017/15025/floatexception.elf
+      nm -l cve/2017/15025/3899.crashes.bin
+      nm -l cve/2017/15025/floatexception.elf
+      objdump -S cve/2017/15025/floatexception.elf
 
 - CVE-2019-9077: [heap buffer overflow][sourceware-24243]
 
       guix shell binutils@2.32
-      readelf -a bugs/cve/2019/9077/hbo2
+      readelf -a cve/2019/9077/hbo2
 
 ## JasPer
 
-- CVE-2016-9557: [signed integer overflow][jasper-d42b238]
+- CVE-2016-9557: [signed integer overflow][jasper-67]
 
       guix shell jasper@1.900.19
-      imginfo -f bugs/cve/2016/9557/signed-int-overflow.jp2
+      imginfo -f cve/2016/9557/signed-int-overflow.jp2
 
 ## libjpeg-turbo
 
@@ -42,26 +42,26 @@
 
       guix shell libjpeg-turbo@1.5.2
       djpeg -crop "1x1+16+16" -onepass -dither ordered -dct float -colors 8\
-        -targa -grayscale -outfile o bugs/cve/2017/15232/1.jpg
+        -targa -grayscale -outfile o cve/2017/15232/1.jpg
       djpeg -crop "1x1+16+16" -onepass -dither ordered -dct float -colors 8\
-        -targa -grayscale -outfile o bugs/cve/2017/15232/2.jpg
+        -targa -grayscale -outfile o cve/2017/15232/2.jpg
 
 ## libxml2
 
 - CVE-2017-5969: [null pointer derefence][oss-sec-20161105-3]
 
       guix shell libxml2@2.9.4
-      xmllint --recover bugs/cve/2017/5969/crash-libxml2-recover.xml
+      xmllint --recover cve/2017/5969/crash-libxml2-recover.xml
 
 ## potrace
 
 - CVE-2013-7437: [possible heap overflow][redhat-955808]
 
       guix shell potrace@1.11
-      potrace bugs/cve/2013/7437/1.bmp
-      potrace bugs/cve/2013/7437/2.bmp
+      potrace cve/2013/7437/1.bmp
+      potrace cve/2013/7437/2.bmp
 
-[jasper-d42b238]: https://blogs.gentoo.org/ago/2016/11/19/jasper-signed-integer-overflow-in-jas_image-c
+[jasper-67]: https://github.com/jasper-software/jasper/issues/67
 [mozjpeg-268]: https://github.com/mozilla/mozjpeg/issues/268
 [oss-sec-20161105-3]: https://www.openwall.com/lists/oss-security/2016/11/05/3
 [redhat-955808]: https://bugzilla.redhat.com/show_bug.cgi?id=955808