Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Search results

Jump to navigation Jump to search

Page title matches

  • '''The User Services Advisory Group (USAG) is formally closed as of 02 October 2012.''' The '''User Services Advisory Group (USAG)''' had representatives from the user communities and from the develo
    10 KB (1,497 words) - 19:32, 24 December 2014
  • #REDIRECT[[Operations Tools Advisory Groups]]
    45 bytes (5 words) - 18:10, 6 August 2014
  • #REDIRECT [[EGI-InSPIRE:User Services Advisory Group]]
    54 bytes (6 words) - 19:32, 24 December 2014

Page text matches

  • #REDIRECT [[EGI-InSPIRE:User Services Advisory Group]]
    54 bytes (6 words) - 19:32, 24 December 2014
  • #REDIRECT [[EGI-InSPIRE:User Services Advisory Group]]
    54 bytes (6 words) - 12:45, 5 June 2015
  • We will draft an advisory, and would appreciate your input to ensure it is complete and correct. The advisory will be located at
    3 KB (529 words) - 15:20, 28 April 2016
  • *[[Operations Tools Advisory Group|Operations Tools Advisory Group]] *[[GGUS Advisory Board|GGUS Advisory Board]]
    1 KB (147 words) - 17:30, 15 April 2015
  • EGI SVG ADVISORY [EGI-SVG-OpenSSL-CVE-2015] Title: EGI SVG Advisory 'Low' RISK - OpenSSL announcement on 3rd December
    1 KB (169 words) - 16:54, 7 December 2015
  • Each group can have medium-term goals that are not immediately achievable. To set up new Interest group please contact operations@egi.eu
    6 KB (805 words) - 13:48, 19 June 2015
  • ...ty Group, which is documented in SVG advisory [[SVG:Advisory-SVG-2012-4073|Advisory-SVG-2012-4073 ]]
    1 KB (195 words) - 12:43, 21 January 2015
  • EGI SVG ADVISORY [EGI-SVG-2014-8580] Title: EGI SVG Advisory 'High' Risk - Dirac does not check CRLs [EGI-SVG-2015-8585]
    2 KB (245 words) - 11:51, 13 October 2015
  • EGI SVG ADVISORY [EGI-SVG-2013-6052] Title: EGI SVG Advisory 'Moderate' RISK - PerfSONAR web interface vulnerabilities
    2 KB (328 words) - 16:02, 5 August 2014
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk vulnerability concerning SLURM CVE-2021-31215 [EGI- This advisory will be placed on the wiki on or after 2021-05-25
    4 KB (515 words) - 17:35, 16 June 2021
  • Title: EGI SVG Advisory [TLP:WHITE] Up to 'HIGH' risk Ansible input validation vulnerability [EGI-S URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-9587
    3 KB (460 words) - 15:52, 1 February 2017
  • Title: EGI SVG ADVISORY [TLP:WHITE] Up to 'HIGH' risk dnsmasq multiple vulnerabilities [EGI-SVG-CVE URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-14491
    4 KB (570 words) - 11:47, 10 October 2017
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] 'Moderate' risk DPM SRM Buffer Overflow [EGI-SVG-2017-13915] advisory as 'AMBER' to allow sites to patch before it is exposed publicly.
    4 KB (579 words) - 16:29, 8 May 2018
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] Up to 'CRITICAL' risk vulnerability concerning SLURM CVE-2018- URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-7033
    3 KB (477 words) - 10:59, 13 April 2018
  • Title: EGI SVG Advisory [TLP:WHITE] LOW risk vulnerability - URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-11839
    3 KB (430 words) - 12:42, 7 August 2017
  • Title: EGI SVG Advisory [TLP:WHITE] 'MODERATE' risk ARC 5.2.1 World Writeable log directory [EGI-S URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-12319
    3 KB (472 words) - 12:37, 7 August 2017
  • EGI CSIRT ADVISORY [EGI-ADV-20100628] This advisory is based on publically available information and
    4 KB (600 words) - 19:48, 26 July 2010
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] 'CRITICAL' risk. https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2018-14311
    4 KB (550 words) - 16:28, 23 May 2018
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] UP TO CRITICAL risk Remote Code execution in JupyterLab and Ju URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2021-32798
    4 KB (619 words) - 18:17, 7 September 2021
  • EGI SVG ADVISORY [EGI-SVG-2013-5890] Title: EGI SVG Advisory 'Critical' RISK - CVMFS root exploit
    3 KB (445 words) - 12:42, 26 September 2013
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] MODERATE risk - Cache Poisoning Squid Vulnerabilities [EGI-SV URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2020-16840
    5 KB (704 words) - 15:38, 16 September 2020
  • Title: EGI SVG 'ADVISORY' **UPDATE 2** [TLP:WHITE] 'CRITICAL' risk processor vulnerabilities - Meltd This advisory is under constant revision, links to detailed public information
    4 KB (609 words) - 13:03, 2 February 2018
  • Title: EGI SVG Advisory [TLP:WHITE] 'LOW' risk - XROOTD potential for remote code execution [EGI-S URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-12728
    3 KB (464 words) - 16:03, 22 August 2017
  • Title: EGI SVG Advisory [TLP:WHITE] 'HIGH' risk Xen vulnerability CVE-2016-9379, URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-9379
    3 KB (452 words) - 16:16, 6 December 2016
  • Title: EGI SVG Advisory [TLP:WHITE] Up to 'High' risk - Singularity container escape vulnerability URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-12381
    4 KB (509 words) - 14:24, 23 February 2017
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] MODERATE risk - Disk Pool Manager (DPM) logging may contain se URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2020-16835
    4 KB (580 words) - 16:36, 7 September 2020
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk. URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-1002105
    3 KB (481 words) - 12:52, 6 December 2018
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE ] LOW risk vulnerability in dCache xrootd protocol implementati URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2019-16022
    4 KB (569 words) - 13:37, 9 December 2019
  • Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] CRITICAL risk DPM vulnerability allowing file delet When the advisory was sent to sites, it additionally referred to RedHat 6 and its derivatives
    4 KB (645 words) - 16:05, 23 March 2021
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk vulnerability in Singularity 2.3.2 This advisory will be placed on the wiki on or after 2018-03-19
    4 KB (558 words) - 16:19, 19 March 2018
  • EGI SVG ADVISORY [EGI-SVG-2015-8464] Title: EGI SVG Advisory 'Low' RISK Buffer overflow vulnerability in XRootD client [EGI-SVG-2015-846
    2 KB (259 words) - 11:18, 13 May 2015
  • Title: EGI SVG Advisory [TLP:WHITE] Moderate risk - OpenStack sites VM Management permissions - che ...ing OpenStack have been found to use the default configuration where every group
    3 KB (429 words) - 15:58, 28 April 2016
  • Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] HIGH risk - Squid Vulnerability [EGI-SVG-2021-1724 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2021-17247
    5 KB (732 words) - 10:51, 3 June 2021
  • Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] HIGH risk - Squid Vulnerability [EGI-SVG-2021-1724 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2021-17247
    5 KB (732 words) - 10:49, 3 June 2021
  • Title: EGI SVG Advisory [TLP:WHITE] 'HIGH' risk SLURM vulnerability CVE-2016-10030 [EGI-SVG-CVE-201 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-10030
    3 KB (474 words) - 11:09, 11 January 2017
  • Title: EGI SVG Advisory [TLP:WHITE] 'High' Risk Arbitrary file overwrite vulnerability in WebAppDIR URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-11033
    2 KB (338 words) - 10:42, 8 June 2016
  • Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] 'CRITICAL' risk runc malicious container escape aff From the Red Hat advisory: This vulnerability is mitigated by the use of SELinux in targeted enforcin
    5 KB (675 words) - 15:05, 1 March 2019
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] Singularity - file overwrite vulnerability [EGI-SVG-CVE-2020-1 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2020-15229
    4 KB (596 words) - 12:36, 21 October 2020
  • ...<ticket No> concerning <title of issue> to the EGI Software Vulnerability Group. ...d you are the first to report this to us your name will be included in the advisory,
    6 KB (1,002 words) - 19:57, 27 August 2019
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk Linux Kernel release fixing various software vulnera Additionally, this Advisory acts as an 'UPDATE' to the advisory sent on 6th January 2021 concerning this
    5 KB (743 words) - 13:31, 6 April 2021
  • Title: EGI SVG Advisory [TLP:WHITE] 'Moderate' risk - sudo local root vulnerability URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-1000367
    3 KB (503 words) - 15:35, 6 June 2017
  • == Software Vulnerability Group (SVG) view and responsibilities concerning issue handling == Issues will be handled according to the OMB approved Software Vulnerability Group issue handling
    2 KB (313 words) - 10:40, 29 April 2016
  • Title: EGI SVG Advisory [TLP:WHITE] 'Moderate' risk vulnerability - VOMS server certificate chain/u URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-11495
    4 KB (532 words) - 16:19, 24 November 2016
  • EGI SVG ADVISORY [EGI-SVG-2015-8056] Title: EGI SVG Advisory 'High' RISK - CVE-2015-1195 OpenStack for [EGI-SVG-2015-8056]
    2 KB (334 words) - 17:02, 11 February 2015
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk use-after-free privilege The EGI Software Vulnerability Group considers this vulnerability 'HIGH' risk if
    5 KB (668 words) - 18:30, 12 October 2021
  • Title: EGI SVG Advisory [TLP:WHITE] VOMS Admin privilege escalation vulnerability [EGI-SVG-2017-132 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-13249
    4 KB (518 words) - 15:54, 5 March 2018
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] LOW risk vulnerability in dCache macaroon bearer token validat URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2020-16806
    4 KB (640 words) - 15:40, 17 August 2020
  • Title: EGI SVG Advisory [TLP:WHITE] up to 'HIGH' risk Qemu and Xen guest escape issues CVE-2016-960 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-9603
    4 KB (576 words) - 14:35, 1 June 2017
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] LOW risk CREAM command injection attack [EGI-SVG-2018-14321] As this is old and 'LOW' risk this advisory is being placed on the Wiki for completeness, without
    4 KB (610 words) - 15:57, 27 November 2019
  • Title: EGI SVG Advisory/Alert [TLP:WHITE] Attacks on Hadoop installations URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-12931
    3 KB (491 words) - 15:42, 13 February 2017
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] Up to 'HIGH' risk - MySQL server compromise [EGI-SVG-CVE-2018- URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-2562
    4 KB (541 words) - 16:49, 23 October 2018
  • Title: EGI SVG Advisory [TLP:WHITE] 'LOW' risk Remote authenticated DoS on CREAM-CE URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-12433
    4 KB (527 words) - 11:53, 14 December 2018
  • Title: EGI SVG Advisory [TLP:WHITE] OpenStack Nova Metadata leak URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-12231
    3 KB (519 words) - 16:08, 11 January 2017
  • EGI SVG ADVISORY [EGI-SVG-2014-7159] Title: EGI SVG Advisory 'Low' RISK - VOMs Potential DoS [EGI-SVG-2014-7159]
    3 KB (408 words) - 10:26, 18 August 2015
  • Title: EGI SVG 'ADVISORY' [TLP:AMBER] **UPDATE** CRITICAL risk - Updated: 2018-07-09 , 2018-09-20 (advisory placed on wiki)
    5 KB (677 words) - 10:01, 23 July 2018
  • <Most cases 'ADVISORY' > < ‘ADVISORY’ – Sites normally instructed to do something
    10 KB (1,455 words) - 12:33, 24 February 2021
  • Title: EGI SVG ADVISORY [TLP:WHITE] CRITICAL risk vulnerability concerning SLURM URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-15566
    4 KB (541 words) - 16:02, 2 November 2017
  • Title: EGI SVG Advisory [TLP:WHITE] 'High' risk - Linux kernel's IPv6 implementation - mishandled s URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-3841
    3 KB (505 words) - 12:00, 20 December 2016
  • EGI SVG ADVISORY [EGI-SVG-2014-7191] Title: EGI SVG Advisory "High" Risk CVE-2014-5261, CVE-2014-5262
    4 KB (535 words) - 15:50, 14 January 2015
  • Title: EGI SVG ADVISORY [TLP:WHITE] 'CRITICAL' risk vulnerability concerning VOMS Admin An advisory will be placed on the wiki after sites have had at least 2 weeks to upgrade
    5 KB (666 words) - 15:39, 4 July 2017
  • Title: EGI SVG Advisory [TLP:WHITE] 'HIGH' risk linux kernel privilege escalation vulnerability URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-2636
    4 KB (611 words) - 12:19, 27 April 2017
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk Sequoia Privilege escalation in See the Qualys Security Advisory [R 5] for further details.
    5 KB (696 words) - 12:44, 6 October 2021
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] Up to 'CRITICAL' risk glibc vulnerability URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-1000001
    5 KB (663 words) - 14:05, 24 May 2018
  • EGI SVG ADVISORY [EGI-SVG-2014-7553] Title: EGI SVG Advisory 'High' Risk - Dirac SQL injection vulnerability [EGI-SVG-2014-7553]
    2 KB (294 words) - 14:41, 13 August 2015
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk. Microarchitectural Store Buffer Data vulnerability URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-12126
    5 KB (660 words) - 16:34, 16 May 2019
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] Up to 'CRITICAL' risk systemd-journald vulnerabilities Updated: 2019-01-15 Updates available therefore Advisory issued.
    4 KB (620 words) - 14:44, 14 May 2019
  • Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] CRITICAL risk Vulnerability concerning dCache [EGI- The other merely allows a user in some circumstances to change the group ownership of a file or directory they are authorized
    5 KB (747 words) - 17:13, 14 January 2021
  • Title: EGI-SVG Advisory [TLP:WHITE] 'HEADS-UP' on the escalation of privilege vulnerability in Inte
    5 KB (681 words) - 10:55, 17 May 2017
  • Title: EGI SVG ADVISORY [TLP:WHITE] 'HIGH' risk Linux kernel local root vulnerability CVE-2017-1000 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-1000253
    4 KB (627 words) - 14:13, 28 September 2017
  • Title: EGI SVG Advisory [TLP:WHITE] 'HIGH' risk NSS out of bounds write flaw URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-5461
    4 KB (555 words) - 15:18, 6 June 2017
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk L1TF - Speculative Execution Side Channel Intel has issued an advisory INTEL-SA-00161 [R 1], concerning Speculative Execution side channel
    5 KB (746 words) - 10:57, 4 September 2018
  • **NOTE** This is a separate issue from our "ADVISORY HIGH risk vulnerability in Singularity 2.3.2 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2018-13999
    4 KB (633 words) - 16:10, 19 March 2018
  • Title: EGI SVG 'ADVISORY' [TLP:AMBER] HIGH risk VOMS-Admin vulnerability [EGI-SVG-2020-17010] This advisory will be placed on the wiki on or after 2021-06-22
    5 KB (726 words) - 14:12, 22 June 2021
  • EGI SVG ADVISORY [EGI-SVG-2012-3765] Title: EGI SVG Advisory 'Low' RISK - Gridftp CVE-201203292
    3 KB (378 words) - 11:05, 20 December 2012
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk polkit vulnerability - RHEL/CentOS 8 and derivat URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2021-3560
    4 KB (553 words) - 17:26, 30 June 2021
  • Title: EGI SVG 'ADVISORY’ [TLP:WHITE] ‘CRITICAL’ risk. Local privilege escalation using URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2018-14311
    4 KB (538 words) - 16:21, 21 May 2018
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] (up to critical) vulnerabilities concerning Squid [EGI-SVG-202 This advisory will be placed on the wiki on or after 2020-02-25
    6 KB (821 words) - 17:19, 29 April 2020
  • Title: EGI SVG Advisory [TLP:WHITE] 'Moderate' Risk: XSS in DIRAC Webapp and Web portal [EGI-SVG-20 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-11107
    2 KB (325 words) - 10:56, 21 October 2016
  • Title: EGI SVG Advisory 'HIGH' risk canl-c impersonation vulnerability [EGI-SVG-2017-12276] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-12276
    4 KB (635 words) - 16:12, 1 June 2017
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk vulnerability in Singularity on CentOS/EL7 CVE-2 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-19295
    5 KB (689 words) - 13:30, 3 January 2019
  • EGI SVG ADVISORY [EGI-SVG-Xen-CVE-2015-7835] Title: EGI SVG Advisory 'Critical' Risk 'Breakout' vulnerability for sites running
    3 KB (468 words) - 16:02, 3 November 2015
  • Title: **UPDATE - re-introduction** EGI SVG Advisory [TLP:WHITE] "Moderate" RISK - dCache [EGI-SVG-2015-9323] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2015-9323
    4 KB (515 words) - 15:53, 22 August 2017
  • == Operations Tools Advisory Group - OTAG == == Policy Group ==
    7 KB (1,043 words) - 15:31, 19 December 2012
  • Title: EGI SVG Advisory [TLP:WHITE] 'Low' Risk - Panda Pilot factory payload verification URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2014-7430
    2 KB (321 words) - 15:12, 25 May 2016
  • EGI SVG ADVISORY [EGI-SVG-2011-342] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2011-342
    2 KB (270 words) - 15:32, 28 July 2011
  • ...ware of any impacted site. Hence we are sending an 'ALERT' rather than an advisory. URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-14649
    3 KB (481 words) - 16:28, 3 October 2018
  • Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] 'HIGH' risk - 2 HTCondor Security Vulnerabilities [ ...03 [R 1] was NOT fully resolved in the previous release referred to in the advisory on 2021-07-29,
    6 KB (885 words) - 18:11, 7 September 2021
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-12611 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 3]
    3 KB (492 words) - 18:38, 8 February 2018
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] 'CRITICAL' risk vulnerability - URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-1111
    4 KB (587 words) - 15:11, 16 May 2018
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] 'HIGH' risk Kernel Side-Channel Attack using Speculative Store URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-3639
    5 KB (660 words) - 11:31, 24 May 2018
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk Local Privilege Escalation via iSCSI URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2021-27365
    5 KB (813 words) - 17:35, 1 June 2021
  • In addition, CVE-2017-5689 (INTEL-SA-00075) about which SVG issued an advisory [R 4] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-5712
    4 KB (569 words) - 12:02, 7 December 2017
  • EGI SVG ADVISORY [EGI-SVG-2013-5268] Title: EGI SVG Advisory 'High' RISK - CREAM BUpdater improperly validated input / arbitrary command
    3 KB (393 words) - 12:32, 14 June 2013
  • EGI CSIRT ADVISORY [EGI-ADV-20130322] EGI SVG ADVISORY [EGI-SVG-2013-5244]
    4 KB (595 words) - 14:51, 29 April 2013
  • EGI CSIRT ADVISORY [EGI-ADV-20150330] Title: EGI Advisory 'CRITICAL' RISK CVE-2015-1815 RedHat setroubleshoot [EGI-ADV-20150330]
    2 KB (279 words) - 15:22, 30 March 2015
  • EGI SVG ADVISORY [EGI-SVG-2014-7472] Title: EGI SVG Advisory 'High' RISK - Users have possibility of introducing rogue VMs -
    3 KB (473 words) - 11:24, 12 November 2014
  • Title: EGI SVG Advisory [TLP:WHITE] 'Low' Risk - Dirac Pilot factory payload verification URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2014-7440
    3 KB (376 words) - 15:13, 25 May 2016
  • EGI SVG ADVISORY [EGI-SVG-2011-1414] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2011-1414
    4 KB (631 words) - 18:00, 15 November 2011
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] Singularity and unprivileged user namespaces [EGI-SVG-2020-16 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2020-16648
    6 KB (902 words) - 12:05, 12 May 2020
  • Title: EGI SVG Advisory [TLP:White] 'Low' risk STORM WebDAV interface XXE vulnerability [EGI-SVG-20 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2015-10134
    3 KB (423 words) - 15:54, 20 June 2016
  • Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] MODERATE Risk Vulnerabilities in HTCondor **UPDATE 2020-04-30** Advisory placed on public wiki
    7 KB (980 words) - 10:49, 30 April 2020
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk - 2 HTCondor Vulnerabilities affecting a limited URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2021-17030
    6 KB (924 words) - 14:23, 22 March 2021
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] 'MODERATE' risk - multiple vulnerabilities in the Linux kerne URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-8897
    5 KB (755 words) - 15:21, 16 May 2018
  • EGI SVG ADVISORY [EGI-SVG-2013-5995] Title: *No action required* EGI SVG Advisory 'Low' RISK - CREAM DoS vulnerability [EGI-SVG-2013-5995]
    3 KB (374 words) - 10:43, 20 August 2015
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk - Members of the Software Vulnerability Group and others have carried out some testing, and have not been
    6 KB (874 words) - 12:24, 6 October 2021
  • EGI SVG ADVISORY [EGI-SVG-2015-9495] Title: **UPDATE*** EGI SVG Advisory 'High' RISK - Vulnerability in the dCache SRM server module [EGI-SVG-2015-9
    4 KB (578 words) - 15:55, 26 October 2015
  • |The EGI Software Vulnerability Group meeting |The EGI Software Vulnerability Group meeting
    3 KB (500 words) - 18:45, 6 January 2015
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] **UPDATE ** CRITICAL risk - the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 99].
    5 KB (763 words) - 12:41, 10 February 2022
  • EGI SVG ADVISORY [EGI-SVG-2014-6627] Title: EGI SVG Advisory 'High' RISK - CVE-2013-4495 Torque Vulnerability:
    4 KB (641 words) - 18:11, 27 March 2014
  • EGI SVG ADVISORY [EGI-SVG-2012-4670] Title: EGI SVG Advisory 'Moderate' Risk DPM buffer overflow in SRM v2.2 endpoint
    3 KB (348 words) - 17:14, 19 February 2013
  • EGI SVG ADVISORY [EGI-SVG-2014-7696] Title: EGI SVG Advisory 'High' risk FTS3 and GFAL2 allow attacker to impersonate other users
    4 KB (620 words) - 15:49, 14 January 2015
  • EGI CSIRT ADVISORY [EGI-ADV-20120801] Title: EGI CSIRT ADVISORY [EGI-ADV-20120801] concerning gLite 3.2
    5 KB (666 words) - 13:53, 25 September 2012
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-13925 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 2]
    3 KB (403 words) - 11:28, 12 February 2018
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] **UPDATE 3** HIGH risk - privilege escalation vulnerability in carried out the mitigation described in this advisory on affected hosts, especially those providing shell or container
    8 KB (1,133 words) - 16:44, 28 October 2020
  • EGI SVG ADVISORY [EGI-SVG-2011-1641] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2011-1641
    3 KB (462 words) - 17:12, 15 November 2012
  • Title: EGI SVG Advisory [TLP:WHITE] 'HIGH' risk - Authorization by user_id to manage VMs URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-11190
    3 KB (411 words) - 10:09, 8 June 2016
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-3110 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 2]
    3 KB (399 words) - 14:00, 17 August 2018
  • **UPDATE 2019-09-16 ** Issue fixed, advisory updated. URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-15664
    4 KB (605 words) - 16:21, 16 September 2019
  • EGI SVG ADVISORY [EGI-SVG-2012-4560] Title: EGI SVG Advisory 'Moderate' RISK DPM world writable files
    2 KB (341 words) - 17:53, 19 December 2012
  • EGI SVG ADVISORY [EGI-SVG-2013-6116] Title: EGI SVG Advisory 'High' RISK - Vulnerabilities in STORM [EGI-SVG-2013-6116]
    4 KB (579 words) - 18:42, 25 March 2014
  • EGI SVG ADVISORY [EGI-SVG-2012-4228] Title: EGI SVG Advisory 'Low' RISK - SAML implementation vulnerability in Unicore
    3 KB (465 words) - 16:32, 17 September 2013
  • EGI SVG ADVISORY [EGI-SVG-2012-3306] Title: EGI SVG Advisory "Low" RISK - Potential for reduced availability of
    2 KB (332 words) - 16:29, 17 September 2013
  • Title: EGI SVG Advisory [TLP:WHITE] 'HIGH' risk CVE-2017-6074 linux kernel (DCCP) URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-6074
    6 KB (922 words) - 18:28, 28 February 2017
  • EGI SVG ADVISORY [EGI-SVG-2011-504] This advisory is updated as it is now also resolved in gLite3.2.
    4 KB (580 words) - 13:47, 26 January 2012
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk - sudo privilege escalation vulnerability CVE-20 ...ess bits & acls) on /usr/bin/sudo to restrict it to a smaller set of users/group.
    5 KB (752 words) - 15:29, 27 January 2021
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] Singularity security updates [EGI-SVG-CVE-2021-32635] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2021-32635
    6 KB (905 words) - 13:58, 22 June 2021
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-6983 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 3]
    3 KB (398 words) - 11:24, 19 December 2018
  • EGI SVG ADVISORY [EGI-SVG-2014-7749] Title: EGI SVG Advisory 'High' risk - Unicore command injection vulnerability
    4 KB (566 words) - 17:37, 31 March 2015
  • This describes the EGI Software Vulnerability Group issue handling process from the EGI Computer Security Incident Report Team The EGI SVG will inform CSIRT when an advisory is issued. It will be copied to CSIRT.
    2 KB (323 words) - 18:42, 1 November 2010
  • EGI SVG ADVISORY [EGI-SVG-2012-4600] Title: EGI SVG Advisory 'High' Risk - EMI-2 dcache-srmclient contains world writable files
    3 KB (455 words) - 14:56, 21 November 2012
  • EGI SVG ADVISORY [EGI-SVG-20110311] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2011-373
    2 KB (296 words) - 15:24, 16 March 2011
  • Title: EGI SVG Advisory - 'Moderate' risk KeyStone VOMS does not check CRLs [EGI-SVG-2016-10558] This advisory will be placed on the wiki on or after 2016-08-22
    4 KB (653 words) - 12:39, 25 August 2016
  • Title: EGI SVG Advisory [TLP:White] 'Low' risk vulnerability concerning LHCb setup scripts [EGI-SVG URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2015-9809
    2 KB (261 words) - 10:49, 8 June 2016
  • EGI SVG ADVISORY [EGI-SVG-2012-2683] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2012-2683
    3 KB (461 words) - 11:35, 6 March 2013
  • EGI SVG ADVISORY [EGI-SVG-2012-2683] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2012-2683
    3 KB (461 words) - 14:02, 5 March 2013
  • EGI SVG ADVISORY [EGI-SVG-2013-5331] Title: EGI SVG Advisory 'High' RISK - EMI WMS Impersonation vulnerability.
    4 KB (655 words) - 15:55, 23 June 2014
  • EGI SVG ADVISORY [EGI-SVG-2012-4598] Title: EGI SVG Advisory 'Moderate' RISK - VOMS Java APIs incorrect CRL checking
    3 KB (472 words) - 14:39, 17 April 2013
  • EGI SVG ADVISORY [EGI-SVG-2013-5560] Title: EGI SVG Advisory 'Moderate' RISK - glite_wms_wmproxy_dirmanager allows
    3 KB (359 words) - 10:12, 6 August 2014
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-13132 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 5]
    3 KB (454 words) - 10:57, 10 July 2019
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2019-13132 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 5]
    3 KB (455 words) - 11:28, 10 July 2019
  • Title: EGI SVG Advisory [TLP:WHITE] 'CRITICAL' risk vulnerability in IBM's GPFS CVE-2016-0392 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-0392
    3 KB (438 words) - 10:18, 8 June 2016
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-12680 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 1]
    4 KB (658 words) - 15:48, 1 June 2017
  • Title: EGI SVG Advisory 'High' RISK - DPM version in EPEL [EGI-SVG-2014-6963] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2014-6963
    3 KB (385 words) - 16:10, 2 June 2014
  • Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] HIGH risk Vulnerabilities in Squid CVE-2019-12526, action after the previous advisory.
    7 KB (1,048 words) - 16:11, 2 December 2019
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk Frontier-Squid-4 vulnerability [EGI-SVG-2019-15849] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2019-15849
    5 KB (676 words) - 15:32, 11 November 2019
  • EGI SVG ADVISORY [EGI-SVG-2013-5266] Title: EGI SVG Advisory 'Moderate' RISK - BDII Password access vulnerability
    3 KB (366 words) - 15:45, 25 October 2013
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-4924 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 3]
    3 KB (465 words) - 11:47, 10 October 2017
  • Title: EGI SVG 'ADVISORY' Singularity File Permission Vulnerability [EGI-SVG-CVE-2019-19724] images, and have open home directory permissions should remove any group and other write permission from the users'
    6 KB (958 words) - 17:33, 14 January 2020
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk **UPDATE** Singularity Vulnerability announced by URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2019-11328
    5 KB (717 words) - 12:23, 25 June 2019
  • The Grid Security Vulnerability Group (GSVG) and the Operational Original advisory:
    7 KB (993 words) - 13:20, 21 June 2010
  • EGI SVG ADVISORY [EGI-SVG-2015-8479] Title: EGI SVG Advisory 'High' RISK - perfSONAR potential for a remote root exploit
    4 KB (534 words) - 12:54, 27 May 2015
  • EGI SVG ADVISORY [EGI-SVG-2013-5769] Title: EGI SVG Advisory 'Low' RISK - FTS3 - Lack of Authorization on config
    3 KB (378 words) - 16:34, 5 August 2014
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-3259 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 2]
    4 KB (524 words) - 13:19, 23 October 2018
  • EGI SVG ADVISORY [EGI-SVG-NSS-CVE-2015-7183] Title: EGI SVG Advisory - 'Critical' risk. Remote arbitrary code execution vulnerabilities
    4 KB (551 words) - 23:22, 30 November 2015
  • * ESXi 6.7 https://my.vmware.com/group/vmware/patch * ESXi 6.5 https://my.vmware.com/group/vmware/patch
    4 KB (533 words) - 11:46, 24 October 2018
  • EGI SVG ADVISORY [EGI-SVG-2014-7009] Title: EGI SVG Advisory 'Moderate' RISK Remote access to dCache
    3 KB (473 words) - 14:43, 5 August 2014
  • Title: EGI SVG Advisory 'CRITICAL' risk - gridsite impersonation vulnerability [EGI-SVG-2016-11476] ...f the chosen VO. For example, the impersonated user could have access to a group-writable
    5 KB (706 words) - 11:43, 10 October 2016
  • EGI SVG ADVISORY [EGI-SVG-2013-5346] Title: EGI SVG Advisory 'Moderate' risk, WMS allows other users to access logging information
    3 KB (453 words) - 10:10, 6 August 2014
  • EGI SVG ADVISORY [EGI-SVG-2011-3202] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2011-3202
    3 KB (455 words) - 16:26, 25 February 2013
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2020-16274 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 1]
    3 KB (539 words) - 15:36, 5 June 2020
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-8903 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 2]
    4 KB (550 words) - 16:21, 25 September 2017
  • EGI CSIRT ADVISORY [EGI-ADV-20101118] member of the stapusr group to exploit the issue, which reduces the
    3 KB (417 words) - 13:16, 18 November 2010
  • EGI SVG ADVISORY [EGI-SVG-2014-6980] Title: EGI SVG Advisory 'Low' RISK - CREAM Proxy delegation [EGI-SVG-2014-6980]
    3 KB (471 words) - 18:28, 16 December 2015
  • EGI CSIRT ADVISORY [EGI-ADV-20150507] Title: EGI SVG Advisory 'High' RISK at least RH7 and derivatives - Linux vulnerabilities
    4 KB (516 words) - 14:48, 6 July 2015
  • Title: EGI SVG Advisory [TLP:AMBER] 'MODERATE' risk dCache READONLY and non-/ user root not enforce This advisory will be placed on the wiki on or after 2016-07-12
    6 KB (846 words) - 12:38, 12 July 2016
  • Title: EGI SVG Advisory **UPDATE** [TLP:White] 'CRITICAL' risk NSS heap buffer overflow vulnerabili URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-1950
    3 KB (437 words) - 15:57, 14 March 2016
  • | The EGI Security Risk Assessment Group - refinement of ratings | The EGI Security Risk Assessment Group - working towards the final report
    5 KB (727 words) - 18:45, 6 January 2015
  • Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk Integer overflow vulnerability in the URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-14634
    7 KB (976 words) - 10:01, 11 October 2018
  • EGI SVG ADVISORY [EGI-SVG-2011-1474] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2011-1474
    5 KB (778 words) - 17:10, 15 November 2012
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2019-11477 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 8]
    4 KB (622 words) - 11:53, 20 June 2019
  • Title: EGI SVG Advisory [TLP:WHITE] 'HIGH' risk - Stack clash memory allocation vulnerability CVE- URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-1000364
    4 KB (639 words) - 11:03, 11 July 2017
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-12615 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 10]
    5 KB (721 words) - 15:07, 3 November 2017
  • This advisory will be placed on the public wiki in due course URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2011-1569
    5 KB (678 words) - 12:46, 19 April 2011
  • EGI Software Vulnerability Group (SVG) ADVISORY [EGI-SVG-2011-1502] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2011-1502
    2 KB (285 words) - 15:28, 4 April 2011
  • Title: EGI SVG Advisory [TLP:WHITE] 'Moderate' risk Two Perfsonar URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-11363
    4 KB (501 words) - 11:53, 15 July 2016
  • EGI SVG ADVISORY [EGI-SVG-2011-1866] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2011-1866
    2 KB (331 words) - 15:01, 28 July 2011
  • Title: EGI SVG Advisory [TLP:White] 'Low' risk dCache WebDAV interface XXE vulnerability [EGI-SVG-2 reasonable advisory.
    7 KB (1,034 words) - 15:52, 20 June 2016
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-10931 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 5]
    5 KB (741 words) - 15:39, 17 August 2018
  • EGI SVG ADVISORY [EGI-SVG-2012-3390] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2012-3390
    2 KB (350 words) - 14:47, 5 August 2014
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-7184 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 13]
    5 KB (802 words) - 12:08, 27 October 2017
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-7184 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 13]
    5 KB (802 words) - 12:07, 27 October 2017
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2018-14117 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 4]
    5 KB (722 words) - 10:05, 23 July 2018
  • Title: EGI SVG Advisory **UPDATE**[TLP:WHITE] 'HIGH' risk CVE-2016-7117 Linux kernel vulnerability It is not necessary for sites to reply to this Advisory.
    4 KB (637 words) - 18:02, 18 January 2017
  • - Technical-unit (the group doing verification) - Staged-rollout (the staged-rollout managers, the SSO group contains really only the managers/coordinators)
    6 KB (1,035 words) - 23:22, 24 December 2014
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-16939 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 8]
    5 KB (751 words) - 15:15, 16 May 2018
  • ...or Strategy and Policy Officer, unless otherwise agreed through the Change Advisory Board (CAB is defined in the next section). ...eeting, issues an agenda and circulates all requests for changes to Change Advisory Board members in advance of meetings to allow prior consideration.
    9 KB (1,331 words) - 15:15, 19 June 2015
  • ...e created along with tools to insert / remove data to and from a specified group. With this functionality in place NGIs will be able to store and retrieve b ...ips (e.g. “method=get_site_list_by_group&group=EGI” or “&group=local” or “&group=any”).
    6 KB (885 words) - 13:29, 18 December 2012
  • URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2011-1569 2011-03-25 Assessment by the EGI Software Vulnerability Group reported to
    5 KB (665 words) - 13:25, 19 April 2011
  • Title: EGI SVG/IRTF Advisory **UPDATE** [TLP:WHITE ] 'CRITICAL' Risk CVE-2016-5195 and an advisory update is circulated.
    8 KB (1,131 words) - 17:06, 31 October 2016
  • 2015-01-05 Assessment by the EGI Software Vulnerability Group/CSIRT agreed as 'High' and that alert/advisory should be sent.
    3 KB (459 words) - 18:37, 7 January 2015
  • Title: EGI SVG Advisory [TLP:WHITE] CRITICAL risk CVE-2016-4303 in iperf3 in Perfsonar [EGI-SVG-CVE ESnet Software Security Advisory
    7 KB (1,154 words) - 11:08, 13 June 2016
  • EGI SVG ADVISORY [EGI-SVG-2012-3438] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2012-3438
    3 KB (455 words) - 14:11, 4 April 2012
  • Operations Tool Advisory Group ([[ OTAG]]) members can submit Nagios probe requirements on behalf of their NGI/EIRO Operations Centre Managers that are members of the noc-managers SSO group and SA1 task leaders.
    5 KB (731 words) - 19:07, 4 December 2012
  • Used by the User Services Advisory Group (USAG). See [[USAG]] and MS305 for details on USAG Used by the recently established Training Working Group. See [[Training_Working_Group]] for details
    5 KB (785 words) - 19:31, 24 December 2014
  • #NGI-DE has an advisory board (NGI-DE-Beirat) with regular meetings with representatives of scienti ...egular national events (Swiss Grid School, Swiss DCI day, Swing scientific advisory meeting); We have national project's mailing list and website where we reco
    11 KB (1,869 words) - 11:08, 22 June 2015
  • Title: EGI SVG Advisory [TLP:AMBER] Up to 'HIGH' risk DIRAC configuration - URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-11255
    6 KB (861 words) - 17:57, 18 July 2016
  • ...fully satisfied. JRA1 management sent a summary mail to EGI.eu Operations group to understand the requirement priority. *GGUS-Advisory Board phone meeting
    2 KB (294 words) - 11:45, 6 January 2015
  • *[[OTAG|Operational Tool Advisory Group (OTAG)]]
    5 KB (638 words) - 15:31, 4 September 2019
  • '''The User Services Advisory Group (USAG) is formally closed as of 02 October 2012.''' The '''User Services Advisory Group (USAG)''' had representatives from the user communities and from the develo
    10 KB (1,497 words) - 19:32, 24 December 2014
  • * SVG: Issued EGI SVG ADVISORY [EGI-SVG-2013-5331] - High Risk - EMI WMS Impersonation vulnerability * Decomission of NGI_ZA group from dteam VO [[https://ggus.eu/ws/ticket_info.php?ticket=95069]]
    3 KB (413 words) - 18:18, 6 January 2015
  • * Recommendations and issues found by the Software Vulnerability Group: ...generic criteria: GENERIC_SERVICE_6 & GENERIC_SEC_3 (related both to [[SVG:Advisory-SVG-2011-1414]])
    4 KB (549 words) - 18:14, 29 November 2012
  • * SVG: Advisory issued for 1 vulnerability as fixed in UMD 2.7.0. Another updated and place ...m VOMS for NGI_MD, Benelux, NGI_MARGI and on the decomissioning of /france group (NGI_FRANCE will remain).
    3 KB (448 words) - 18:29, 6 January 2015
  • #** (if applicable) link to [[OTAG|Operations Tool Advisory Group]] (OTAG) team # Where needed a dedicated [[OTAG|Operations Tool Advisory Group]] (OTAG) can be set up. The OTAG mandate is to help developers in requireme
    12 KB (1,799 words) - 15:20, 18 September 2019
  • | Martinelli presented a local solution for establishing advisory quotas for users and groups (q.v. progress summary) - advisory quotas for users and groups. Space calculations
    7 KB (1,027 words) - 10:21, 8 January 2015
  • Title: EGI SVG Advisory [TLP:WHITE] 'High' risk Configuration issue concerning dCache [EGI-SVG-2016 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-10837
    9 KB (1,199 words) - 10:22, 8 June 2016
  • *SVG: no new vulnerabilities but sent out advisory for a 'High' risk Torque problem, suggesting installing version of Torque f ...m VOMS for NGI_MD, Benelux, NGI_MARGI and on the decomissioning of /france group (NGI_FRANCE will remain).
    4 KB (553 words) - 18:16, 6 January 2015
  • .../twiki.cern.ch/twiki/bin/view/EGEE/SA1_USAG EGEE-III User Support Advisory Group]-->
    7 KB (1,002 words) - 23:36, 24 December 2014
  • ...d identify who is in charge of to define this function (PMB? AMB? Policies Group?) ...potentially interested are not adeguately represented within the advisory group.
    9 KB (1,345 words) - 11:15, 6 January 2015
  • As a part of the Training and Dissemination activities of the EGI CSIRT group, a security hands-on was organised for the EGI 2012 TF in Prague. In this e ...s for WMS vulnerabilities concerning proxy theft. (1 High, 1 Critical). An advisory was also released on 1st August 2012 for the retirement of gLite 3.2 compon
    5 KB (770 words) - 18:53, 6 January 2015
  • * SVG: 1 advisory issued for 'High' risk issue, which was past TD and fixed by EMI but not in * kickoff of working group on nagios probes, under the coordination of COD, focusing on the assessment
    5 KB (714 words) - 18:20, 6 January 2015
  • The security monitoring sub-group was very busy developing probes to The Software Vulnerability Group (SVG) continued to handle all reported
    9 KB (1,354 words) - 18:43, 6 January 2015
  • ...re maintenance and support: Spread sheet with information required from PT/group of PTs being edited: continuation of support through GGUS, requirement subm * organization of first GGUS advisory board, and minutes
    5 KB (764 words) - 17:45, 6 January 2015
  • Kickoff of GGUS advisory group
    6 KB (851 words) - 17:44, 6 January 2015
  • *Planning for next meeting of the GGUS Advisory Group ongoing
    5 KB (807 words) - 17:45, 6 January 2015
  • *'''e-IRG''' - e-Infrastructures Reflection Group *'''GAG''' - Grid Application Group
    26 KB (3,474 words) - 14:58, 9 November 2016
  • ...nvolving a site in Estonia during the quarter and issued just one security advisory. The Software Vulnerability Group handled more than ten new vulnerabilities during the quarter and issued or
    8 KB (1,247 words) - 18:43, 6 January 2015
  • * definition of mandate of working group for analysis/revision of probes (under COD coordination) * SVG - handling of several new issues. High Risk ADVISORY [EGI-SVG-2012-4600] issued.
    7 KB (1,017 words) - 17:46, 6 January 2015
  • *SVG RAT drafts advisory for a vulnerability, and notifies the Technology Provider. ...e urgency, the release manager will contact the EGI Security Vulnerability Group, or produce a broadcast to invite service managers to upgrade to the new ve
    9 KB (1,392 words) - 16:38, 7 January 2019
  • ...bilities after the end of EMI and IGE shows that the Software Vulnerabiliy Group (SVG) communication and handling issues. SVG issued 6 public advisories and one advisory that went to all EGI sites. The security assessment of CREAM-CE was complet
    8 KB (1,343 words) - 18:44, 6 January 2015
  • ...development roadmaps, in collaboration with the Operational Tools Advisory Group;<br>
    9 KB (1,275 words) - 20:58, 24 December 2014
  • ...e EGI.eu User Community Support Team (UCST) and the User Services Advisory Group (USAG). The prioritised, weighed requirements prepared by these groups prov | [https://savannah.cern.ch/support/?group=egeeptf]
    25 KB (3,475 words) - 19:35, 24 December 2014
  • ...ccessfully established. The Operations Management Board (OMB) – the policy group that leads the technical development of the operational activities – was ...respectively. The EGEE ROCs have consequently developed into a much larger group of smaller Operations Centres, which typically serve a single country . Thi
    23 KB (3,456 words) - 16:19, 6 January 2015
  • ...e EGI.eu User Community Support Team (UCST) and the User Services Advisory Group (USAG). The prioritised, weighed requirements prepared by these groups prov
    18 KB (2,263 words) - 19:29, 24 December 2014
  • [[Category:User Services Advisory Group (USAG)]]
    20 KB (2,865 words) - 21:45, 1 December 2012
  • * Minutes of USAG (User Services Advisory Group) meetings: https://www.egi.eu/indico/categoryDisplay.py?categId=38
    41 KB (5,314 words) - 18:06, 24 December 2014