You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -293,27 +291,6 @@ is available under Open Source licenses. The source code files identify external
293
291
modules used. Binaries are distributed as container images on
294
292
DockerHub*. Those images contain license texts and source code under `/licenses`.
295
293
296
-
## Security
297
-
298
-
**Reporting a Potential Security Vulnerability**: If you have discovered
299
-
potential security vulnerability in this project, please send an e-mail to
300
-
secure@intel.com. Encrypt sensitive information using our
301
-
[PGP public key](https://www.intel.com/content/www/us/en/security-center/pgp-public-key.html).
302
-
303
-
Please provide as much information as possible, including:
304
-
- The projects and versions affected
305
-
- Detailed description of the vulnerability
306
-
- Information on known exploits
307
-
308
-
A member of the Intel Product Security Team will review your e-mail and
309
-
contact you to collaborate on resolving the issue. For more information on
310
-
how Intel works to resolve security issues, see [Vulnerability Handling Guidelines](https://www.intel.com/content/www/us/en/security-center/vulnerability-handling-guidelines.html).
311
-
312
-
## Related Code
313
-
314
-
A related Intel SRIOV network device plugin can be found in
Device Plugins Helm Charts are located in Intel Helm Charts repository [Intel Helm Charts](https://github.com/intel/helm-charts). This is another way of distributing Kubernetes resources of the device plugins framework.
**Reporting a Potential Security Vulnerability**: If you have discovered
2
+
potential security vulnerability in this project, please send an e-mail to
3
+
secure@intel.com. Encrypt sensitive information using our
4
+
[PGP public key](https://www.intel.com/content/www/us/en/security-center/pgp-public-key.html).
5
+
6
+
Please provide as much information as possible, including:
7
+
- The projects and versions affected
8
+
- Detailed description of the vulnerability
9
+
- Information on known exploits
10
+
11
+
A member of the Intel Product Security Team will review your e-mail and
12
+
contact you to collaborate on resolving the issue. For more information on
13
+
how Intel works to resolve security issues, see [Vulnerability Handling Guidelines](https://www.intel.com/content/www/us/en/security-center/vulnerability-handling-guidelines.html).
0 commit comments