Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Difference between revisions of "SVG:Advisories"

From EGIWiki
Jump to navigation Jump to search
(Deprecate and redirect page)
Tag: Replaced
 
(28 intermediate revisions by 3 users not shown)
Line 1: Line 1:
{{svg-header}}
{{DeprecatedAndMovedTo|new_location=https://advisories.egi.eu/}}
 
 
All advisories which are disclosed publicly by SVG are placed on this wiki.
 
All advisories which are disclosed publicly by SVG are subject to the  Creative commons licence
[https://creativecommons.org/licenses/by/4.0/    CC-BY 4.0.] including crediting the EGI  [https://www.egi.eu/  https://www.egi.eu/] Software Vulnerability Group. 
 
A guide to the risk categories is available at  [[SVG:Notes On Risk | Notes On Risk]]
 
SVG also provides information that may be useful to various sites concerning the various
[[SVG:Speculative Execution Vulnerabilities | SVG Speculative execution vulnerabilities ]]
 
 
{| {{egi-table}}
!Date !! Title !! Contents/Link !! Risk !!  Status !!
 
|-
|  2020-09-09  ||  Disk Pool Manager (DPM) logging may contain sensitive information
|| [[SVG:Advisory-SVG-2020-16835 | Advisory-SVG-2020-16835]] || Moderate || Sites to check  ||
|-
 
 
 
|-
|  2020-08-17  ||  Vulnerability in dCache macaroon bearer token validation
|| [[SVG:Advisory-SVG-2020-16806 | Advisory-SVG-2020-16806]] || Low || Fixed  ||
|-
 
|-
|  2020-05-04 updated 2020-06-05 || Remote code execution vulnerabilities in Salt master
|| [[SVG:Advisory-SVG-CVE-2020-11651 | Advisory-SVG-CVE-2020-11651]] || Critical || Fixed  ||
|-
 
|-
|  2020-03-13 updated 2020-04-28, 2020-06-05 || Vulnerability in IBM GPFS file system
|| [[SVG:Advisory-SVG-2020-16274 | Advisory-SVG-2020-16274 ]] || Critical || Fixed  ||
|-
 
|-
|  2020-05-06 updated 2020-05-12 || Singularity and unprivileged user namespaces
|| [[SVG:Advisory-SVG-2020-16648 | Advisory-SVG-2020-16648 ]] || N/A ||  ||
|-
 
 
|-
|  2020-03-23 updated 2020-04-08, 2020-04-16, 2020-04-30|| Vulnerabilities in HTCondor
  || [[SVG:Advisory-SVG-CVE-2019-18823 | Advisory-SVG-CVE-2019-18823 ]] || Moderate || Fixed ||
|-
 
 
|-
|  2020-02-11 updated 2020-04-29|| vulnerabilities concerning Squid
  || [[SVG:Advisory-SVG-2020-16203 | Advisory-SVG-2020-16203 ]] || up to CRITICAL || Fixed ||
|-
 
|-
|  2019-12-19 updated 2020-02-10|| Singularity File Permission Vulnerability
  || [[SVG:Advisory-SVG-CVE-2019-19724| Advisory-SVG-CVE-2019-19724 ]] ||  || Fixed ||
|-
 
 
 
|}
 
EGI SVG produces advisories according to the [https://documents.egi.eu/document/3145  EGI Software Vulnerability Issue Handling Process ], which was revised in 2017 and approved by the EGI OMB in November 2017.
 
Note that SVG is currently working on how to better cope with reducing homogeneity of the infrastructure and handle vulnerabilities related to the EOSC-hub services.
 
Earlier Advisories:  [[SVG:Advisories-SVG-2019 | Advisories from 2019]]
 
Earlier Advisories:  [[SVG:Advisories-SVG-2018 | Advisories from 2018]]
 
Earlier Advisories:  [[SVG:Advisories-SVG-2017 | Advisories from 2017]]
 
Earlier Advisories:  [[SVG:Advisories-SVG-2016 | Advisories from 2016]]
 
Earlier Advisories:  [[SVG:Advisories-SVG-2014-2015 | Advisories from 2014 and 2015 ]]
 
In the past (up to the end of 2015) CSIRT also issued general alerts at https://wiki.egi.eu/wiki/EGI_CSIRT:Alerts
and EGI SVG advisories primarily concerned gLite Middleware. 
 
Earlier Advisories: [[SVG:Advisories-SVG-2011-2013 | Advisories from 2011 to 2013 ]]
 
 
 
Advisories from prior to 2011 [https://archive.gridpp.ac.uk/gsvg/advisories/ Gridpp Advisories Archive]

Latest revision as of 14:15, 24 June 2022

Alert.png This article is Deprecated and has been moved to https://advisories.egi.eu/.