On Tue, 2019-05-07 at 18:02 +0200, Thomas Monjalon wrote:
> In case a vulnerability is discovered, the process to follow
> is described in this document.
> It has been inspired by the process of some referenced projects
> and with the help of experts from Intel, RedHat, Mellanox
> and the Linux Foundation.
> 
> Signed-off-by: Thomas Monjalon <
> tho...@monjalon.net
> >
> Signed-off-by: Maxime Coquelin <
> maxime.coque...@redhat.com
> >
> Signed-off-by: Ferruh Yigit <
> ferruh.yi...@intel.com
> >
> ---
>  doc/guides/contributing/index.rst         |   1 +
>  doc/guides/contributing/vulnerability.rst | 316
> ++++++++++++++++++++++
>  2 files changed, 317 insertions(+)
>  create mode 100644 doc/guides/contributing/vulnerability.rst

I think at least the fingerprint of the GPG key to encrypt to, if a
link to the whole public key given the page is served over https,
should be on the  page.

Other than that, good stuff!

Acked-by: Luca Boccassi <bl...@debian.org>

-- 
Kind regards,
Luca Boccassi

Reply via email to