From 0b810650e2baf3b92b141faaca334bfa22af67c0 Mon Sep 17 00:00:00 2001 From: Artem Metla Date: Wed, 25 Sep 2024 15:55:53 +0200 Subject: [PATCH] Introduce FAQ section into kernelCTF guidelines. Add FAQ section to guidelines and provide answer to the first question. --- kernelctf/faq.md | 5 +++++ kernelctf/rules.md | 4 +++- 2 files changed, 8 insertions(+), 1 deletion(-) create mode 100644 kernelctf/faq.md diff --git a/kernelctf/faq.md b/kernelctf/faq.md new file mode 100644 index 000000000..47025b9f3 --- /dev/null +++ b/kernelctf/faq.md @@ -0,0 +1,5 @@ +# Frequently Asked Questions (FAQ) + +#### 1. I'd sent one [bughunters.google.com](https://bughunters.google.com) report which contains multiple submissions (exploits). I'd noticed that only some PRs associated with the report are merged. After that I received a bounty email from kernelCTF which awards partial bounty (bounty not for all exploits submitted). When would I receive all the bounties? + +The above described situation means that at this moment only some exploits were reviewed, the rest of exploits associated with the report still stay in the review queue. We're doing everything possible to prioritize review of similar submissions and bundle them together, but sometimes we still need more time to make a decision on all exploits provided. Please stay tuned for the updates on the rest of pull requests. As soon as pull requests are merged the subsequent bounties will be issued. diff --git a/kernelctf/rules.md b/kernelctf/rules.md index f02cc401a..417df061f 100644 --- a/kernelctf/rules.md +++ b/kernelctf/rules.md @@ -387,7 +387,9 @@ If possible, also include how stable your exploit is (e.g. it worked 90% of the We announce major program changes on [Google's Security Blog](https://security.googleblog.com/), but we may change minor, mostly technical details (like steps in the submission process) by changing this page and announcing the change on our [#kernelctf-announcements](https://discord.gg/yXue2RwDEA) Discord channel. -If you have any question regarding kernelCTF, feel free to ask on the [#kernelctf](https://discord.gg/ECS5VnJZys) Discord channel. +## Questions about program + +If you have any question regarding kernelCTF, check [FAQ](faq.md) page and feel free to ask on the [#kernelctf](https://discord.gg/ECS5VnJZys) Discord channel. ## Non-kernel vulnerabilities