Hi, Thank you for reaching out. Please send the report to me. But to be clear on the indicated path - kvm-guest-drivers-windows/NetKVM/DebugTools/VirtioConsoleSimulation/ - this is not part of the actual production code or part of the code that runs in kernel. It is a legacy simulator that was used to debug virtio library and it’s code loosely based on virtio-lib, outdated and not used in production. Please send the report anyway so I could evaluate if it related to existing production code as well.. Thank you vey much, Yan Vugenfirer. > On Aug 4, 2015, at 10:05 AM, security <security@xxxxxxxxxxxxxxxxxxx> wrote: > > Hi team, > One of our whitehats has just reported an vulnerability to us. It is an > integer overflow problem of KVM WindowsGuestDrivers of VirtIO (Path: > kvm-guest-drivers-windows/NetKVM/DebugTools/VirtioConsoleSimulation/). > We don't know where to report this vulnerability to, so could you tell us > how and to whom can we report it. Thanks! > Best regards. > Aliyun-Yundun-Xianzhi (http://xianzhi.aliyun.com/) > > -- > To unsubscribe from this list: send the line "unsubscribe kvm" in > the body of a message to majordomo@xxxxxxxxxxxxxxx > More majordomo info at http://vger.kernel.org/majordomo-info.html -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html