aboutsummaryrefslogtreecommitdiffstats
path: root/docs/linux_kernel_reporting_bugs.md
diff options
context:
space:
mode:
authorAndrey Konovalov <andreyknvl@gmail.com>2017-08-03 14:36:28 +0200
committerGitHub <noreply@github.com>2017-08-03 14:36:28 +0200
commit35e1c3cdb5411c207d0ab77a70ba87da6e728122 (patch)
tree078769ebaade10349f2895544734c16e74b16f6c /docs/linux_kernel_reporting_bugs.md
parent5766dbe7963d7b08864ea5a5557b735cace4eb59 (diff)
Update linux_kernel_reporting_bugs.md
Diffstat (limited to 'docs/linux_kernel_reporting_bugs.md')
-rw-r--r--docs/linux_kernel_reporting_bugs.md11
1 files changed, 5 insertions, 6 deletions
diff --git a/docs/linux_kernel_reporting_bugs.md b/docs/linux_kernel_reporting_bugs.md
index 4972c0ccf..3bf24875f 100644
--- a/docs/linux_kernel_reporting_bugs.md
+++ b/docs/linux_kernel_reporting_bugs.md
@@ -51,14 +51,13 @@ To report major security bugs (such as LPE, remote DOS, remote info leak or RCE)
* Ask them to assign a CVE number.
* Ask for 7 days of embargo.
4. Wait 7 days for linux distros to apply the patch.
-5. Send the fix upstream:
+5. Ask `linux-distros@vs.openwall.org` to make the CVE description public and roll out the update.
+6. Send the fix upstream:
* Mention the CVE number in the commit message.
* Mention syzkaller in the commit message.
-6. Wait 3 days for the patch to be committed to mainline and backported to stable kernels.
-7. Ask `linux-distros@vs.openwall.org` to make the CVE description public.
-8. Notify `oss-security@lists.openwall.com`:
+7. Notify `oss-security@lists.openwall.com`:
* Describe vulnerability details, include a link to the committed patch.
-9. Wait 1-3 days for people to update their kernels.
-10. Publish the exploit on `oss-security@lists.openwall.com`.
+8. Wait 1-3 days for people to update their kernels.
+9. Publish the exploit on `oss-security@lists.openwall.com`.
A good example of an LPE announcement on `oss-security@lists.openwall.com` can be found [here](http://seclists.org/oss-sec/2016/q4/607).