Hi,

Thank you for reaching out.

Please send the report to me. 

But to be clear on the indicated path  - 
kvm-guest-drivers-windows/NetKVM/DebugTools/VirtioConsoleSimulation/ - this is 
not part of the actual production code or part of the code that runs in kernel. 
It is a legacy simulator that was used to debug virtio library and it’s code 
loosely based on virtio-lib, outdated and not used in production.
Please send the report anyway so I could evaluate if it related to existing 
production code as well..


Thank you vey much,
Yan Vugenfirer.

> On Aug 4, 2015, at 10:05 AM, security <[email protected]> wrote:
> 
> Hi team,
>   One of our whitehats has just reported an vulnerability to us. It is an
> integer overflow problem of KVM WindowsGuestDrivers of VirtIO (Path:
> kvm-guest-drivers-windows/NetKVM/DebugTools/VirtioConsoleSimulation/).
>   We don't know where to report this vulnerability to, so could you tell us
> how and to whom can we report it. Thanks!
> Best regards.
> Aliyun-Yundun-Xianzhi (http://xianzhi.aliyun.com/)
> 
> --
> To unsubscribe from this list: send the line "unsubscribe kvm" in
> the body of a message to [email protected]
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to