aboutsummaryrefslogtreecommitdiffstats
path: root/docs/linux_kernel_reporting_bugs.md
diff options
context:
space:
mode:
authorAndrey Konovalov <andreyknvl@gmail.com>2017-09-01 13:58:35 +0200
committerGitHub <noreply@github.com>2017-09-01 13:58:35 +0200
commit70ab363e79a4369af15201619389b576baf97410 (patch)
tree4d5516d196b25f89b5152562732d3c7624043dd7 /docs/linux_kernel_reporting_bugs.md
parent83f1ca5484dfe91a4435c091e9a5991e29e42e05 (diff)
Update linux_kernel_reporting_bugs.md
Diffstat (limited to 'docs/linux_kernel_reporting_bugs.md')
-rw-r--r--docs/linux_kernel_reporting_bugs.md6
1 files changed, 3 insertions, 3 deletions
diff --git a/docs/linux_kernel_reporting_bugs.md b/docs/linux_kernel_reporting_bugs.md
index 4fd456e5f..fe4004c06 100644
--- a/docs/linux_kernel_reporting_bugs.md
+++ b/docs/linux_kernel_reporting_bugs.md
@@ -52,11 +52,11 @@ To report major security bugs (such as LPE, remote DOS, remote info leak or RCE)
1. Understand the bug and develop a patch with a fix if possible. Optionally develop a proof-of-concept exploit.
2. Notify `security@kernel.org`:
- * Describe vulnerability details, include the proposed patch and the exploit.
+ * Describe vulnerability details, include the proposed patch and optionally the exploit.
* Ask for 7 days of embargo.
* Work on the patch together with the `security@kernel.org` members.
3. Notify `linux-distros@vs.openwall.org`:
- * Describe vulnerability details, include the proposed patch and the exploit.
+ * Describe vulnerability details, include the proposed patch and optionally the exploit.
* Ask them to assign a CVE number.
* Ask for 7 days of embargo.
4. Wait 7 days for linux distros to apply the patch.
@@ -67,7 +67,7 @@ To report major security bugs (such as LPE, remote DOS, remote info leak or RCE)
7. Notify `oss-security@lists.openwall.com`:
* Describe vulnerability details, include a link to the committed patch.
8. Wait 1-3 days for people to update their kernels.
-9. Publish the exploit on `oss-security@lists.openwall.com`.
+9. Optionally publish the exploit on `oss-security@lists.openwall.com`.
A few notes: