07/05/2019 21:06, Stephen Hemminger: > Thomas Monjalon <thomas at monjalon.net> wrote: > > > In case a vulnerability is discovered, the process to follow > > is described in this document. [...] > Maybe there should be a keysigning at the DPDK summit Yes it is must for using GPG in the security process.