Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Difference between revisions of "SVG:Advisories"

From EGIWiki
Jump to navigation Jump to search
(Deprecate and redirect page)
Tag: Replaced
 
(117 intermediate revisions by 5 users not shown)
Line 1: Line 1:
{{svg-header}}
{{DeprecatedAndMovedTo|new_location=https://advisories.egi.eu/}}
 
 
All advisories which are disclosed publicly by SVG are placed on this wiki.
 
A guide to the risk categories is available at  [[SVG:Notes On Risk | Notes On Risk]]
 
 
{| {{egi-table}}
!Date !! Title !! Contents/Link !! Risk !!  Status !!
 
|-
|  2018-01-23 || CPU speculative execution vulnerabilities (Meltdown and Spectre) ||  [[SVG:Advisory-SVG-CVE-2017-5753  | Advisory-SVG-CVE-2017-5753 ]] || Critical || Ongoing ||
|-
 
|-
|  2017-12-07 || Various Intel Vulnerabilities ||  [[SVG:Advisory-SVG-CVE-2017-5712  | Advisory-SVG-CVE-2017-5712 ]] || (Alert) || Fixed ||
|-
 
|-
|  2017-11-02 || SLURM privilege escalation vulnerability  ||  [[SVG:Advisory-SVG-CVE-2017-15566  | Advisory-SVG-CVE-2017-15566 ]] || Critical || Fixed ||
|-
 
|-
|  2017-11-02 || Tomcat remote execution vulnerability in non-standard configurations  ||  [[SVG:Advisory-SVG-CVE-2017-12615  | Advisory-SVG-CVE-2017-12615 ]] || (Alert) || Fixed ||
|-
 
 
|-
|  2017-10-27 || Kernel exploit affecting small number of configurations ||  [[SVG:Advisory-SVG-CVE-2017-7184  | Advisory-SVG-CVE-2017-7184 ]] || Up to critical || Fixed ||
|-
 
 
|-
|  2017-10-10 || dnsmasq multiple vulnerabilities ||  [[SVG:Advisory-SVG-CVE-2017-14491  | Advisory-SVG-CVE-2017-14491]] || Up to High || Fixed ||
|-
 
|-
|  2017-10-10 || Apache Struts vulnerabilities ||  [[SVG:Advisory-SVG-CVE-2017-12611  | Advisory-SVG-CVE-2017-12611]] || (Information) || Fixed ||
|-
 
|-
|  2017-10-10 || VMware Out-of-bounds write vulnerability in SVGA ||  [[SVG:Advisory-SVG-CVE-2017-4924  | Advisory-SVG-CVE-2017-4924    ]] || (Alert) || Fixed ||
|-
 
|-
|  2017-09-28 || Linux kernel local root vulnerability ||  [[SVG:Advisory-SVG-CVE-2017-1000253  | Advisory-SVG-CVE-2017-1000253    ]] || High || Fixed ||
|-
 
|-
|  2017-09-22 || Various Xen CVEs ||  [[SVG:Advisory-SVG-CVE-2017-8903  | Advisory-SVG-CVE-2017-8903    ]] || (Alert) || Fixed ||
|-
 
|-
|  2017-08-22 || XROOTD potential for remote code execution ||  [[SVG:Advisory-SVG-2017-12728  | Advisory-SVG-2017-12728  ]] || Low || Fixed ||
|-
 
 
|-
| 2015-08-24 updated 2015-09-10, 2017-08-22 || Old dCache "gridftp door" re-introduced  ||  [[SVG:Advisory-SVG-2015-9323  | Advisory-SVG-2015-9323  ]] || Moderate || Fixed ||
|-
 
 
|-
| 2017-08-07 || VOMS Admin allows VO membership requests from users without a certificate  ||  [[SVG:Advisory-SVG-2016-11839  | Advisory-SVG-2016-11839  ]] || Low || Fixed ||
|-
 
|-
| 2017-08-07 || ARC 5.2.1 World Writeable log directory ||  [[SVG:Advisory-SVG-2017-12319  | Advisory-SVG-2017-12319  ]] || Moderate|| Fixed ||
|-
 
 
|-
| 2017-03-20 updated 2017-03-27, 2017-07-04  ||  Vulnerability concerning VOMS Admin    ||  [[SVG:Advisory-SVG-2017-12543  | Advisory-SVG-2017-12543  ]] || Critical || Fixed ||
|-
 
|-
| 2017-06-21 updated 2017-07-11  || Stack clash memory allocation vulnerability  ||  [[SVG:Advisory-SVG-CVE-2017-1000364  | Advisory-SVG-CVE-2017-1000364  ]] || High || Fixed ||
|-
 
 
|-
| 2017-06-06  || NSS out of bounds write flaw  ||  [[SVG:Advisory-SVG-CVE-2017-5461  | Advisory-SVG-CVE-2017-5461  ]] || High || Fixed ||
|-
 
 
|-
| 2017-06-06  ||  sudo local root vulnerability  ||  [[SVG:Advisory-SVG-CVE-2017-1000367  | Advisory-SVG-CVE-2017-1000367  ]] || Moderate || Fixed ||
|-
 
 
|-
| 2017-03-24 updated 2017-06-01  || canl-c impersonation vulnerability  ||  [[SVG:Advisory-SVG-2017-12276  | Advisory-SVG-2017-12276  ]] || High || Fixed ||
|-
 
 
 
|-
| 2017-04-07 updated 2017-06-01  || OpenStack Vulnerable Configuration problem  ||  [[SVG:Advisory-SVG-2017-12680  | Advisory-SVG-2017-12680  ]] ||  || (Check) ||
|-
 
 
|-
| 2017-06-01  || Qemu and Xen guest escape issues CVE-2016-9603 and others  ||  [[SVG:Advisory-SVG-CVE-2016-9603 | Advisory-SVG-CVE-2016-9603 ]] || Up to High || Fixed ||
|-
 
 
 
|-
| 2017-05-17  || Intel AMT  Vulnerability  ||  [[SVG:Advisory-SVG-CVE-2017-5689 | Advisory-SVG-CVE-2017-5689 ]] ||  || (Check) ||
|-
 
|-
| 2017-03-09 updated 2017-04-27  || Linux Kernel (n_hdlc module) privilege escalation vulnerability  ||  [[SVG:Advisory-SVG-CVE-2017-2636 | Advisory-SVG-CVE-2017-2636 ]] || High || Fixed  ||
|-
 
 
 
|-
| 2017-02-28  || Linux Kernel (DCCP module) privilege escalation vulnerability  ||  [[SVG:Advisory-SVG-CVE-2017-6074 | Advisory-SVG-CVE-2017-6074 ]] || High || Fixed  ||
|-
 
 
|-
| 2017-02-17  || Singularity container escape vulnerability ||  [[SVG:Advisory-SVG-2017-12381 | Advisory-SVG-2017-12381 ]] || Up to High || Fixed  ||
|-
 
 
|-
| 2017-02-13  || Attacks on Hadoop installations - check configuration  ||  [[SVG:Advisory-SVG-2017-12931 | Advisory-SVG-2017-12931 ]] ||  || (Check) ||
|-
 
 
|-
| 2017-02-01  || Ansible input validation vulnerability  ||  [[SVG:Advisory-SVG-CVE-2016-9587 | Advisory-SVG-CVE-2016-9587 ]] || Up to High || Fixed ||
|-
 
 
|-
| 2016-11-10 updated 2016-12-14, 2017-01-13 || Linux kernel vulnerability    ||  [[SVG:Advisory-SVG-CVE-2016-7117 | Advisory-SVG-CVE-2016-7117 ]] || High || Fixed ||
|-
 
 
|-
| 2017-01-11 ||  OpenStack Nova Metadata leak -sites should check  ||  [[SVG:Advisory-SVG-2016-12231 | Advisory-SVG-2016-12231 ]] ||  || (check) ||
|-
 
|-
| 2017-01-10 ||  SLURM vulnerability CVE-2016-10030  ||  [[SVG:Advisory-SVG-CVE-2016-10030 | Advisory-SVG-CVE-2016-10030 ]] || High || Fixed ||
|-
 
 
|}
 
EGI SVG produces advisories according to the [https://documents.egi.eu/document/3145  EGI Software Vulnerability Issue Handling Process ], which was revised in 2017 and approved by the EGI OMB in November 2017.
 
Earlier Advisories:  [[SVG:Advisories-SVG-2017 | Advisories from 2017]]
 
Earlier Advisories:  [[SVG:Advisories-SVG-2016 | Advisories from 2016]]
 
Earlier Advisories:  [[SVG:Advisories-SVG-2014-2015 | Advisories from 2014 and 2015 ]]
 
In the past (up to the end of 2015) CSIRT also issued general alerts at https://wiki.egi.eu/wiki/EGI_CSIRT:Alerts
and EGI SVG advisories primarily concerned gLite Middleware. 
 
Earlier Advisories: [[SVG:Advisories-SVG-2011-2013 | Advisories from 2011 to 2013 ]]
 
 
 
Advisories from prior to 2011 [https://archive.gridpp.ac.uk/gsvg/advisories/ Gridpp Advisories Archive]

Latest revision as of 15:15, 24 June 2022

Alert.png This article is Deprecated and has been moved to https://advisories.egi.eu/.