+-- On Tue, 13 Oct 2015, Markus Armbruster wrote --+
| How is this related to Kevin's
| [PATCH] gdbstub: Fix buffer overflows in gdb_handle_packet()
| Message-Id: <1444721930-5121-1-git-send-email-kw...@redhat.com> ?
Oh, didn't know there was already a patch. Yes it fixes the same issues;
Also
P J P writes:
>Hello,
>
> An OOB r/w access issue was reported by Mr Gerben Lubbe(CC'd here).
>
> The GDB(1) stub protocol supports commands 'm/M' to read & write 'len'
> bytes from/to the stub memory area. In that, the 'len' parameter value
> supplied by the host gdb(1) is not validated agai
Hello,
+-- On Tue, 13 Oct 2015, P J P wrote --+
| Below is a proposed patch to fix this issue.
|
| ===
| > From 88edb457a66f8ff96209a1603914171eade0658b Mon Sep 17 00:00:00 2001
| From: Prasad J Pandit
| Date: Mon, 12 Oct 2015 22:56:41 +0530
| Subject: Limit memory r/w length to buffer size
|
Hello,
An OOB r/w access issue was reported by Mr Gerben Lubbe(CC'd here).
The GDB(1) stub protocol supports commands 'm/M' to read & write 'len' bytes
from/to the stub memory area. In that, the 'len' parameter value supplied by
the host gdb(1) is not validated against the local buffer size