On Tue, 7 May 2019 18:02:31 +0200 Thomas Monjalon <tho...@monjalon.net> wrote:
> In case a vulnerability is discovered, the process to follow > is described in this document. > It has been inspired by the process of some referenced projects > and with the help of experts from Intel, RedHat, Mellanox > and the Linux Foundation. > > Signed-off-by: Thomas Monjalon <tho...@monjalon.net> > Signed-off-by: Maxime Coquelin <maxime.coque...@redhat.com> > Signed-off-by: Ferruh Yigit <ferruh.yi...@intel.com> Maybe there should be a keysigning at the DPDK summit Acked-by: Stephen Hemminger <step...@networkplumber.org>