From bb0cdf049570df15df22278300867ab2ad62ca2c Mon Sep 17 00:00:00 2001 From: Eric Larson Date: Mon, 20 Nov 2023 13:27:19 -0500 Subject: [PATCH] MAINT: Security --- SECURITY.md | 8 ++++---- doc/_static/versions.json | 9 +++++++-- 2 files changed, 11 insertions(+), 6 deletions(-) diff --git a/SECURITY.md b/SECURITY.md index c61f3bfae87..e627242d244 100644 --- a/SECURITY.md +++ b/SECURITY.md @@ -10,9 +10,9 @@ without a proper 6-month deprecation cycle. | Version | Supported | | ------- | ------------------------ | -| 1.6.x | :heavy_check_mark: (dev) | -| 1.5.x | :heavy_check_mark: | -| < 1.5 | :x: | +| 1.7.x | :heavy_check_mark: (dev) | +| 1.6.x | :heavy_check_mark: | +| < 1.6 | :x: | ## Reporting a Vulnerability @@ -21,7 +21,7 @@ recorded with a variety of devices/modalities (EEG, MEG, ECoG, fNIRS, etc). It is not expected that using MNE-Python will lead to security vulnerabilities under normal use cases (i.e., running without administrator privileges). However, if you think you have found a security vulnerability -in MNE-Python, **please do not report it as a GitHub issue**, in order to +in MNE-Python, **please do not report it as a GitHub issue**, in order to keep the vulnerability confidential. Instead, please report it to mne-core-dev-team@groups.io and include a description and proof-of-concept that is [short and self-contained](http://www.sscce.org/). diff --git a/doc/_static/versions.json b/doc/_static/versions.json index 9845f298fb6..8141440bd16 100644 --- a/doc/_static/versions.json +++ b/doc/_static/versions.json @@ -1,14 +1,19 @@ [ { - "name": "1.6 (devel)", + "name": "1.7 (devel)", "version": "dev", "url": "https://mne.tools/dev/" }, { - "name": "1.5 (stable)", + "name": "1.6 (stable)", "version": "stable", "url": "https://mne.tools/stable/" }, + { + "name": "1.5", + "version": "1.5", + "url": "https://mne.tools/1.5/" + }, { "name": "1.4", "version": "1.4",