Re: A vulnerability of WindowsGuestDrivers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

Thank you for reaching out.

Please send the report to me. 

But to be clear on the indicated path  - kvm-guest-drivers-windows/NetKVM/DebugTools/VirtioConsoleSimulation/ - this is not part of the actual production code or part of the code that runs in kernel. It is a legacy simulator that was used to debug virtio library and it’s code loosely based on virtio-lib, outdated and not used in production.
Please send the report anyway so I could evaluate if it related to existing production code as well..


Thank you vey much,
Yan Vugenfirer.

> On Aug 4, 2015, at 10:05 AM, security <security@xxxxxxxxxxxxxxxxxxx> wrote:
> 
> Hi team,
>   One of our whitehats has just reported an vulnerability to us. It is an
> integer overflow problem of KVM WindowsGuestDrivers of VirtIO (Path:
> kvm-guest-drivers-windows/NetKVM/DebugTools/VirtioConsoleSimulation/).
>   We don't know where to report this vulnerability to, so could you tell us
> how and to whom can we report it. Thanks!
> Best regards.
> Aliyun-Yundun-Xianzhi (http://xianzhi.aliyun.com/)
> 
> --
> To unsubscribe from this list: send the line "unsubscribe kvm" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux