public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
* A vulnerability of WindowsGuestDrivers
@ 2015-08-04  7:05 security
  2015-08-04  8:40 ` Petr Matousek
  2015-08-04  9:25 ` Yan Vugenfirer
  0 siblings, 2 replies; 3+ messages in thread
From: security @ 2015-08-04  7:05 UTC (permalink / raw)
  To: kvm

Hi team,
   One of our whitehats has just reported an vulnerability to us. It is an
integer overflow problem of KVM WindowsGuestDrivers of VirtIO (Path:
kvm-guest-drivers-windows/NetKVM/DebugTools/VirtioConsoleSimulation/).
   We don't know where to report this vulnerability to, so could you tell us
how and to whom can we report it. Thanks!
Best regards.
Aliyun-Yundun-Xianzhi (http://xianzhi.aliyun.com/)


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2015-08-04  9:25 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-08-04  7:05 A vulnerability of WindowsGuestDrivers security
2015-08-04  8:40 ` Petr Matousek
2015-08-04  9:25 ` Yan Vugenfirer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox