Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 17 May 2013 08:46:19 +0200
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2013-1962 libvirt: DoS (max count of open
 files exhaustion) due sockets leak in the storage pool

On Thu, May 16, 2013 at 08:20:00PM +0200, Agostino Sarubbo wrote:
> On Thursday 16 May 2013 16:50:13 Petr Matousek wrote:
> > References:
> > https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1962
> 
> Please do not point to a link with the CVE. If for any weird reason the cve 
> will be rejected or so,  the link will be invalid. Please point to the bug 
> number instead.

Makes complete sense, even though we usually keep aliases even for
rejected CVEs in our bugzilla. 

This was more of an copy&paste overlook than anything else as I usually
send non-alias bug ids.

Thanks,
-- 
Petr Matousek / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.