From mboxrd@z Thu Jan 1 00:00:00 1970 From: "security" Subject: A vulnerability of WindowsGuestDrivers Date: Tue, 4 Aug 2015 15:05:50 +0800 Message-ID: <004b01d0ce83$feadb920$fc092b60$@service.alibaba.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: Return-path: Received: from smtpcm9-215.freemail.mail.aliyun.com ([115.124.19.15]:57400 "EHLO smtpcm9-215.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753825AbbHDHFy (ORCPT ); Tue, 4 Aug 2015 03:05:54 -0400 Content-Language: zh-cn Sender: kvm-owner@vger.kernel.org List-ID: Hi team, One of our whitehats has just reported an vulnerability to us. It is an integer overflow problem of KVM WindowsGuestDrivers of VirtIO (Path: kvm-guest-drivers-windows/NetKVM/DebugTools/VirtioConsoleSimulation/). We don't know where to report this vulnerability to, so could you tell us how and to whom can we report it. Thanks! Best regards. Aliyun-Yundun-Xianzhi (http://xianzhi.aliyun.com/)