diff for duplicates of <20200604173410.21074-1-f4bug@amsat.org>
diff --git a/a/1.txt b/N1/1.txt
index d970806..d15f308 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -36,4 +36,26 @@ index 3c06a0ac6d..0ced3b5e14 100644
sd->data_start = addr;
sd->data_offset = 0;
--
-2.21.3
\ No newline at end of file
+2.21.3
+
+--
+You received this bug notification because you are a member of qemu-
+devel-ml, which is subscribed to QEMU.
+https://bugs.launchpad.net/bugs/1880822
+
+Title:
+ CVE-2020-13253 QEMU: sd: OOB access could crash the guest resulting in
+ DoS
+
+Status in QEMU:
+ Confirmed
+
+Bug description:
+ An out-of-bounds read access issue was found in the SD Memory Card
+ emulator of the QEMU. It occurs while performing block write commands
+ via sdhci_write(), if a guest user has sent 'address' which is OOB of
+ 's->wp_groups'. A guest user/process may use this flaw to crash the
+ QEMU process resulting in DoS.
+
+To manage notifications about this bug go to:
+https://bugs.launchpad.net/qemu/+bug/1880822/+subscriptions
\ No newline at end of file
diff --git a/a/content_digest b/N1/content_digest
index 570c8d9..ab22137 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,23 +1,17 @@
[
- "From\0Philippe Mathieu-Daud\303\251 <f4bug\@amsat.org>\0"
+ "ref\000159056340380.1780.3709038768569765525.malonedeb\@chaenomeles.canonical.com\0"
]
[
- "Subject\0[PATCH] hw/sd/sdcard: Verify CMD24 (Block Write) address is valid\0"
+ "From\0Philippe Mathieu-Daud\303\251 <1880822\@bugs.launchpad.net>\0"
]
[
- "Date\0Thu, 4 Jun 2020 19:34:10 +0200\0"
+ "Subject\0[Bug 1880822] [PATCH] hw/sd/sdcard: Verify CMD24 (Block Write) address is valid\0"
]
[
- "To\0qemu-devel\@nongnu.org\0"
+ "Date\0Thu, 04 Jun 2020 17:34:10 -0000\0"
]
[
- "Cc\0Peter Maydell <peter.maydell\@linaro.org>",
- " Prasad J Pandit <pjp\@fedoraproject.org>",
- " Alexander Bulekov <alxndr\@bu.edu>",
- " Philippe Mathieu-Daud\303\251 <f4bug\@amsat.org>",
- " 1880822\@bugs.launchpad.net",
- " Paolo Bonzini <pbonzini\@redhat.com>",
- " Philippe Mathieu-Daud\303\251 <philmd\@redhat.com>\0"
+ "To\0qemu-devel\@nongnu.org\0"
]
[
"\0000:1\0"
@@ -64,7 +58,29 @@
" sd->data_start = addr;\n",
" sd->data_offset = 0;\n",
"-- \n",
- "2.21.3"
+ "2.21.3\n",
+ "\n",
+ "-- \n",
+ "You received this bug notification because you are a member of qemu-\n",
+ "devel-ml, which is subscribed to QEMU.\n",
+ "https://bugs.launchpad.net/bugs/1880822\n",
+ "\n",
+ "Title:\n",
+ " CVE-2020-13253 QEMU: sd: OOB access could crash the guest resulting in\n",
+ " DoS\n",
+ "\n",
+ "Status in QEMU:\n",
+ " Confirmed\n",
+ "\n",
+ "Bug description:\n",
+ " An out-of-bounds read access issue was found in the SD Memory Card\n",
+ " emulator of the QEMU. It occurs while performing block write commands\n",
+ " via sdhci_write(), if a guest user has sent 'address' which is OOB of\n",
+ " 's->wp_groups'. A guest user/process may use this flaw to crash the\n",
+ " QEMU process resulting in DoS.\n",
+ "\n",
+ "To manage notifications about this bug go to:\n",
+ "https://bugs.launchpad.net/qemu/+bug/1880822/+subscriptions"
]
-91d200982320534c593299eb2a252844e25fab32f0c30a1b1abdd02d69e1801a
+4760512de630afb777e72a0f183b86ee325f518074ed983725383fd07016c052
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.