On Tue, 2019-05-07 at 18:02 +0200, Thomas Monjalon wrote: > In case a vulnerability is discovered, the process to follow > is described in this document. > It has been inspired by the process of some referenced projects > and with the help of experts from Intel, RedHat, Mellanox > and the Linux Foundation. > > Signed-off-by: Thomas Monjalon < > tho...@monjalon.net > > > Signed-off-by: Maxime Coquelin < > maxime.coque...@redhat.com > > > Signed-off-by: Ferruh Yigit < > ferruh.yi...@intel.com > > > --- > doc/guides/contributing/index.rst | 1 + > doc/guides/contributing/vulnerability.rst | 316 > ++++++++++++++++++++++ > 2 files changed, 317 insertions(+) > create mode 100644 doc/guides/contributing/vulnerability.rst
I think at least the fingerprint of the GPG key to encrypt to, if a link to the whole public key given the page is served over https, should be on the page. Other than that, good stuff! Acked-by: Luca Boccassi <bl...@debian.org> -- Kind regards, Luca Boccassi