Document control
Procedure reviews
The following table is updated after every review of this procedure.
Table of contents
Overview
The EGI Software Vulnerability issue handling procedure is described in EGI Documents: EGI CSIRT Operational Procedure for Compromised Certificates and Central Security Emergency suspension.
Definitions
Please refer to the EGI Glossary for the definitions of the terms used in this procedure.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", “MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119.