Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Search results

Jump to navigation Jump to search

Page title matches

  • '''The User Services Advisory Group (USAG) is formally closed as of 02 October 2012.''' The '''User Services Advisory Group (USAG)''' had representatives from the user communities and from the develo
    10 KB (1,497 words) - 19:32, 24 December 2014
  • #REDIRECT[[Operations Tools Advisory Groups]]
    45 bytes (5 words) - 18:10, 6 August 2014
  • #REDIRECT [[EGI-InSPIRE:User Services Advisory Group]]
    54 bytes (6 words) - 19:32, 24 December 2014

Page text matches

  • #REDIRECT [[EGI-InSPIRE:User Services Advisory Group]]
    54 bytes (6 words) - 19:32, 24 December 2014
  • #REDIRECT [[EGI-InSPIRE:User Services Advisory Group]]
    54 bytes (6 words) - 12:45, 5 June 2015
  • We will draft an advisory, and would appreciate your input to ensure it is complete and correct. The advisory will be located at
    3 KB (529 words) - 15:20, 28 April 2016
  • *[[Operations Tools Advisory Group|Operations Tools Advisory Group]] *[[GGUS Advisory Board|GGUS Advisory Board]]
    1 KB (147 words) - 17:30, 15 April 2015
  • EGI SVG ADVISORY [EGI-SVG-OpenSSL-CVE-2015] Title: EGI SVG Advisory 'Low' RISK - OpenSSL announcement on 3rd December
    1 KB (169 words) - 16:54, 7 December 2015
  • Each group can have medium-term goals that are not immediately achievable. To set up new Interest group please contact operations@egi.eu
    6 KB (805 words) - 13:48, 19 June 2015
  • ...ty Group, which is documented in SVG advisory [[SVG:Advisory-SVG-2012-4073|Advisory-SVG-2012-4073 ]]
    1 KB (195 words) - 12:43, 21 January 2015
  • EGI SVG ADVISORY [EGI-SVG-2014-8580] Title: EGI SVG Advisory 'High' Risk - Dirac does not check CRLs [EGI-SVG-2015-8585]
    2 KB (245 words) - 11:51, 13 October 2015
  • EGI SVG ADVISORY [EGI-SVG-2013-6052] Title: EGI SVG Advisory 'Moderate' RISK - PerfSONAR web interface vulnerabilities
    2 KB (328 words) - 16:02, 5 August 2014
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk vulnerability concerning SLURM CVE-2021-31215 [EGI- This advisory will be placed on the wiki on or after 2021-05-25
    4 KB (515 words) - 17:35, 16 June 2021
  • Title: EGI SVG Advisory [TLP:WHITE] Up to 'HIGH' risk Ansible input validation vulnerability [EGI-S URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-9587
    3 KB (460 words) - 15:52, 1 February 2017
  • Title: EGI SVG ADVISORY [TLP:WHITE] Up to 'HIGH' risk dnsmasq multiple vulnerabilities [EGI-SVG-CVE URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-14491
    4 KB (570 words) - 11:47, 10 October 2017
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] 'Moderate' risk DPM SRM Buffer Overflow [EGI-SVG-2017-13915] advisory as 'AMBER' to allow sites to patch before it is exposed publicly.
    4 KB (579 words) - 16:29, 8 May 2018
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] Up to 'CRITICAL' risk vulnerability concerning SLURM CVE-2018- URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-7033
    3 KB (477 words) - 10:59, 13 April 2018
  • Title: EGI SVG Advisory [TLP:WHITE] LOW risk vulnerability - URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-11839
    3 KB (430 words) - 12:42, 7 August 2017
  • Title: EGI SVG Advisory [TLP:WHITE] 'MODERATE' risk ARC 5.2.1 World Writeable log directory [EGI-S URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-12319
    3 KB (472 words) - 12:37, 7 August 2017
  • EGI CSIRT ADVISORY [EGI-ADV-20100628] This advisory is based on publically available information and
    4 KB (600 words) - 19:48, 26 July 2010
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] 'CRITICAL' risk. https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2018-14311
    4 KB (550 words) - 16:28, 23 May 2018
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] UP TO CRITICAL risk Remote Code execution in JupyterLab and Ju URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2021-32798
    4 KB (619 words) - 18:17, 7 September 2021
  • EGI SVG ADVISORY [EGI-SVG-2013-5890] Title: EGI SVG Advisory 'Critical' RISK - CVMFS root exploit
    3 KB (445 words) - 12:42, 26 September 2013
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] MODERATE risk - Cache Poisoning Squid Vulnerabilities [EGI-SV URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2020-16840
    5 KB (704 words) - 15:38, 16 September 2020
  • Title: EGI SVG 'ADVISORY' **UPDATE 2** [TLP:WHITE] 'CRITICAL' risk processor vulnerabilities - Meltd This advisory is under constant revision, links to detailed public information
    4 KB (609 words) - 13:03, 2 February 2018
  • Title: EGI SVG Advisory [TLP:WHITE] 'LOW' risk - XROOTD potential for remote code execution [EGI-S URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-12728
    3 KB (464 words) - 16:03, 22 August 2017
  • Title: EGI SVG Advisory [TLP:WHITE] 'HIGH' risk Xen vulnerability CVE-2016-9379, URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-9379
    3 KB (452 words) - 16:16, 6 December 2016
  • Title: EGI SVG Advisory [TLP:WHITE] Up to 'High' risk - Singularity container escape vulnerability URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-12381
    4 KB (509 words) - 14:24, 23 February 2017
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] MODERATE risk - Disk Pool Manager (DPM) logging may contain se URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2020-16835
    4 KB (580 words) - 16:36, 7 September 2020
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk. URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-1002105
    3 KB (481 words) - 12:52, 6 December 2018
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE ] LOW risk vulnerability in dCache xrootd protocol implementati URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2019-16022
    4 KB (569 words) - 13:37, 9 December 2019
  • Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] CRITICAL risk DPM vulnerability allowing file delet When the advisory was sent to sites, it additionally referred to RedHat 6 and its derivatives
    4 KB (645 words) - 16:05, 23 March 2021
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk vulnerability in Singularity 2.3.2 This advisory will be placed on the wiki on or after 2018-03-19
    4 KB (558 words) - 16:19, 19 March 2018
  • EGI SVG ADVISORY [EGI-SVG-2015-8464] Title: EGI SVG Advisory 'Low' RISK Buffer overflow vulnerability in XRootD client [EGI-SVG-2015-846
    2 KB (259 words) - 11:18, 13 May 2015
  • Title: EGI SVG Advisory [TLP:WHITE] Moderate risk - OpenStack sites VM Management permissions - che ...ing OpenStack have been found to use the default configuration where every group
    3 KB (429 words) - 15:58, 28 April 2016
  • Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] HIGH risk - Squid Vulnerability [EGI-SVG-2021-1724 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2021-17247
    5 KB (732 words) - 10:49, 3 June 2021
  • Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] HIGH risk - Squid Vulnerability [EGI-SVG-2021-1724 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2021-17247
    5 KB (732 words) - 10:51, 3 June 2021
  • Title: EGI SVG Advisory [TLP:WHITE] 'HIGH' risk SLURM vulnerability CVE-2016-10030 [EGI-SVG-CVE-201 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-10030
    3 KB (474 words) - 11:09, 11 January 2017
  • Title: EGI SVG Advisory [TLP:WHITE] 'High' Risk Arbitrary file overwrite vulnerability in WebAppDIR URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-11033
    2 KB (338 words) - 10:42, 8 June 2016
  • Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] 'CRITICAL' risk runc malicious container escape aff From the Red Hat advisory: This vulnerability is mitigated by the use of SELinux in targeted enforcin
    5 KB (675 words) - 15:05, 1 March 2019
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] Singularity - file overwrite vulnerability [EGI-SVG-CVE-2020-1 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2020-15229
    4 KB (596 words) - 12:36, 21 October 2020
  • ...<ticket No> concerning <title of issue> to the EGI Software Vulnerability Group. ...d you are the first to report this to us your name will be included in the advisory,
    6 KB (1,002 words) - 19:57, 27 August 2019
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk Linux Kernel release fixing various software vulnera Additionally, this Advisory acts as an 'UPDATE' to the advisory sent on 6th January 2021 concerning this
    5 KB (743 words) - 13:31, 6 April 2021
  • Title: EGI SVG Advisory [TLP:WHITE] 'Moderate' risk - sudo local root vulnerability URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-1000367
    3 KB (503 words) - 15:35, 6 June 2017
  • == Software Vulnerability Group (SVG) view and responsibilities concerning issue handling == Issues will be handled according to the OMB approved Software Vulnerability Group issue handling
    2 KB (313 words) - 10:40, 29 April 2016
  • Title: EGI SVG Advisory [TLP:WHITE] 'Moderate' risk vulnerability - VOMS server certificate chain/u URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-11495
    4 KB (532 words) - 16:19, 24 November 2016
  • EGI SVG ADVISORY [EGI-SVG-2015-8056] Title: EGI SVG Advisory 'High' RISK - CVE-2015-1195 OpenStack for [EGI-SVG-2015-8056]
    2 KB (334 words) - 17:02, 11 February 2015
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk use-after-free privilege The EGI Software Vulnerability Group considers this vulnerability 'HIGH' risk if
    5 KB (668 words) - 18:30, 12 October 2021
  • Title: EGI SVG Advisory [TLP:WHITE] VOMS Admin privilege escalation vulnerability [EGI-SVG-2017-132 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-13249
    4 KB (518 words) - 15:54, 5 March 2018
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] LOW risk vulnerability in dCache macaroon bearer token validat URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2020-16806
    4 KB (640 words) - 15:40, 17 August 2020
  • Title: EGI SVG Advisory [TLP:WHITE] up to 'HIGH' risk Qemu and Xen guest escape issues CVE-2016-960 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-9603
    4 KB (576 words) - 14:35, 1 June 2017
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] LOW risk CREAM command injection attack [EGI-SVG-2018-14321] As this is old and 'LOW' risk this advisory is being placed on the Wiki for completeness, without
    4 KB (610 words) - 15:57, 27 November 2019
  • Title: EGI SVG Advisory/Alert [TLP:WHITE] Attacks on Hadoop installations URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-12931
    3 KB (491 words) - 15:42, 13 February 2017

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)