Commit e410b0bb authored by Eric Lawrence's avatar Eric Lawrence Committed by Commit Bot

Update Security Severity FAQ

Update the Critical section of the Security Severity FAQ.

Change-Id: I167cb99f3778e8c1f68c65de65a81a6354a5a346
Reviewed-on: https://chromium-review.googlesource.com/820172Reviewed-by: default avatarChris Palmer <palmer@chromium.org>
Commit-Queue: Eric Lawrence <elawrence@chromium.org>
Cr-Commit-Position: refs/heads/master@{#523170}
parent a2d271c9
......@@ -20,7 +20,7 @@ exhausted or in other exceptional circumstances.
## Critical severity
Critical severity issues allow an attacker run arbitrary code on the underlying
platform with the user's privileges in the normal course of browsing.
platform with the user's privileges.
They are normally assigned priority **Pri-0** and assigned to the current stable
milestone (or earliest milestone affected). For critical severity bugs,
......@@ -36,8 +36,7 @@ if there is evidence of active exploitation.
Example bugs:
* Memory corruption in the browser process controllable by a malicious web site
([564501](https://crbug.com/564501)).
* Memory corruption in the browser process ([564501](https://crbug.com/564501)).
* Exploit chains made up of multiple bugs that can lead to code execution
outside of the sandbox ([416449](https://crbug.com/416449)).
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment