baf9fba303
In case a vulnerability is discovered, the process to follow is described in this document. It has been inspired by the process of some referenced projects and with the help of experts from Intel, RedHat, Mellanox and the Linux Foundation. Signed-off-by: Thomas Monjalon <thomas@monjalon.net> Signed-off-by: Maxime Coquelin <maxime.coquelin@redhat.com> Signed-off-by: Ferruh Yigit <ferruh.yigit@intel.com> Acked-by: Stephen Hemminger <stephen@networkplumber.org> Acked-by: Luca Boccassi <bluca@debian.org>
19 lines
298 B
ReStructuredText
19 lines
298 B
ReStructuredText
.. SPDX-License-Identifier: BSD-3-Clause
|
|
Copyright 2018 The DPDK contributors
|
|
|
|
Contributor's Guidelines
|
|
========================
|
|
|
|
.. toctree::
|
|
:maxdepth: 2
|
|
:numbered:
|
|
|
|
coding_style
|
|
design
|
|
versioning
|
|
documentation
|
|
patches
|
|
vulnerability
|
|
stable
|
|
cheatsheet
|