The following table is updated after every review of this procedure.
|Date||Review by||Summary of results||Follow-up actions / Comments|
|Import form EGI wiki|
Table of contents
The EGI Software Vulnerability issue handling procedure is described in EGI Documents: EGI CSIRT Operational Procedure for Compromised Certificates and Central Security Emergency suspension.
Please refer to the EGI Glossary for the definitions of the terms used in this procedure.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", “MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119.