P J P <ppan...@redhat.com> writes: > Hello, > > An OOB r/w access issue was reported by Mr Gerben Lubbe(CC'd here). > > The GDB(1) stub protocol supports commands 'm/M' to read & write 'len' > bytes from/to the stub memory area. In that, the 'len' parameter value > supplied by the host gdb(1) is not validated against the local buffer > size. Which in turn could lead to OOB r/w memory access. > > Below is a proposed patch to fix this issue.
How is this related to Kevin's [PATCH] gdbstub: Fix buffer overflows in gdb_handle_packet() Message-Id: <1444721930-5121-1-git-send-email-kw...@redhat.com> ?