Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 16 May 2013 20:20 +0200
From: Agostino Sarubbo <ago@...too.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2013-1962 libvirt: DoS (max count of open files exhaustion) due sockets leak in the storage pool

On Thursday 16 May 2013 16:50:13 Petr Matousek wrote:
> References:
> https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1962

Please do not point to a link with the CVE. If for any weird reason the cve 
will be rejected or so,  the link will be invalid. Please point to the bug 
number instead.

Thanks
-- 
Agostino Sarubbo
Gentoo Linux Developer

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.