@@ -68,24 +68,24 @@ severity, advisory text, and fixes.
6868 * Affected components and APIs. The module, function, class, or method must be specified so users can
6969 search their codebase for usage. For issues affecting the entire project, this can be omitted.
7070
71- * Mitigations for the vulnerability beyond upgrading to a patched version, if applicable.
71+ * Mitigations for the vulnerability beyond upgrading to a fixed version, if applicable.
7272
7373 This can all be done within the GitHub Security Advisory UI for easier collaboration between reporter and coordinator.
7474
75- * The coordinator determines the fix approach and who will provide a patch .
76- Some reporters are willing to provide or collaborate to create a patch ,
75+ * The coordinator determines the fix approach and who will provide a fix .
76+ Some reporters are willing to provide or collaborate to create a fix ,
7777 otherwise relevant core developers can be invited to collaborate by
7878 the coordinator.
7979
8080 * For **Low ** and **Medium ** severity vulnerabilities it is acceptable
81- to develop a patch in public.
81+ to develop a fix in public.
8282 The pull request must be marked with the ``security `` and ``release-blocker ``
83- labels so that a release is not created without including the patch .
83+ labels so that a release is not created without including the fix .
8484
85- * For **High ** and **Critical ** severity vulnerabilities the patch must be
85+ * For **High ** and **Critical ** severity vulnerabilities the fix must be
8686 developed privately using GitHub Security Advisories' "Private Forks" feature.
8787 Core developers can be added to the GitHub Security Advisory via "collaborators"
88- to work on the fix together. Once a patch is approved privately and tested,
88+ to work on the fix together. Once a fix is approved privately and tested,
8989 a public issue and pull request can be created with
9090 the ``security `` and ``release-blocker `` labels.
9191
0 commit comments