All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20200604173410.21074-1-f4bug@amsat.org>

diff --git a/a/1.txt b/N1/1.txt
index d970806..d15f308 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -36,4 +36,26 @@ index 3c06a0ac6d..0ced3b5e14 100644
              sd->data_start = addr;
              sd->data_offset = 0;
 -- 
-2.21.3
\ No newline at end of file
+2.21.3
+
+-- 
+You received this bug notification because you are a member of qemu-
+devel-ml, which is subscribed to QEMU.
+https://bugs.launchpad.net/bugs/1880822
+
+Title:
+  CVE-2020-13253 QEMU: sd: OOB access could crash the guest resulting in
+  DoS
+
+Status in QEMU:
+  Confirmed
+
+Bug description:
+  An out-of-bounds read access issue was found in the SD Memory Card
+  emulator of the QEMU. It occurs while performing block write commands
+  via sdhci_write(), if a guest user has sent 'address' which is OOB of
+  's->wp_groups'. A guest user/process may use this flaw to crash the
+  QEMU process resulting in DoS.
+
+To manage notifications about this bug go to:
+https://bugs.launchpad.net/qemu/+bug/1880822/+subscriptions
\ No newline at end of file
diff --git a/a/content_digest b/N1/content_digest
index 570c8d9..ab22137 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,23 +1,17 @@
 [
-  "From\0Philippe Mathieu-Daud\303\251 <f4bug\@amsat.org>\0"
+  "ref\000159056340380.1780.3709038768569765525.malonedeb\@chaenomeles.canonical.com\0"
 ]
 [
-  "Subject\0[PATCH] hw/sd/sdcard: Verify CMD24 (Block Write) address is valid\0"
+  "From\0Philippe Mathieu-Daud\303\251 <1880822\@bugs.launchpad.net>\0"
 ]
 [
-  "Date\0Thu,  4 Jun 2020 19:34:10 +0200\0"
+  "Subject\0[Bug 1880822] [PATCH] hw/sd/sdcard: Verify CMD24 (Block Write) address is valid\0"
 ]
 [
-  "To\0qemu-devel\@nongnu.org\0"
+  "Date\0Thu, 04 Jun 2020 17:34:10 -0000\0"
 ]
 [
-  "Cc\0Peter Maydell <peter.maydell\@linaro.org>",
-  " Prasad J Pandit <pjp\@fedoraproject.org>",
-  " Alexander Bulekov <alxndr\@bu.edu>",
-  " Philippe Mathieu-Daud\303\251 <f4bug\@amsat.org>",
-  " 1880822\@bugs.launchpad.net",
-  " Paolo Bonzini <pbonzini\@redhat.com>",
-  " Philippe Mathieu-Daud\303\251 <philmd\@redhat.com>\0"
+  "To\0qemu-devel\@nongnu.org\0"
 ]
 [
   "\0000:1\0"
@@ -64,7 +58,29 @@
   "             sd->data_start = addr;\n",
   "             sd->data_offset = 0;\n",
   "-- \n",
-  "2.21.3"
+  "2.21.3\n",
+  "\n",
+  "-- \n",
+  "You received this bug notification because you are a member of qemu-\n",
+  "devel-ml, which is subscribed to QEMU.\n",
+  "https://bugs.launchpad.net/bugs/1880822\n",
+  "\n",
+  "Title:\n",
+  "  CVE-2020-13253 QEMU: sd: OOB access could crash the guest resulting in\n",
+  "  DoS\n",
+  "\n",
+  "Status in QEMU:\n",
+  "  Confirmed\n",
+  "\n",
+  "Bug description:\n",
+  "  An out-of-bounds read access issue was found in the SD Memory Card\n",
+  "  emulator of the QEMU. It occurs while performing block write commands\n",
+  "  via sdhci_write(), if a guest user has sent 'address' which is OOB of\n",
+  "  's->wp_groups'. A guest user/process may use this flaw to crash the\n",
+  "  QEMU process resulting in DoS.\n",
+  "\n",
+  "To manage notifications about this bug go to:\n",
+  "https://bugs.launchpad.net/qemu/+bug/1880822/+subscriptions"
 ]
 
-91d200982320534c593299eb2a252844e25fab32f0c30a1b1abdd02d69e1801a
+4760512de630afb777e72a0f183b86ee325f518074ed983725383fd07016c052

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.