P J P <[email protected]> writes: > Hello, > > An OOB r/w access issue was reported by Mr Gerben Lubbe(CC'd here). > > The GDB(1) stub protocol supports commands 'm/M' to read & write 'len' > bytes from/to the stub memory area. In that, the 'len' parameter value > supplied by the host gdb(1) is not validated against the local buffer > size. Which in turn could lead to OOB r/w memory access. > > Below is a proposed patch to fix this issue.
How is this related to Kevin's [PATCH] gdbstub: Fix buffer overflows in gdb_handle_packet() Message-Id: <[email protected]> ?
