2.4 KiB
Security Policy
Supported Versions
The application white check mark is still in support, without it means there version will no longer have an update including security fixture. That's because currently I have a job and a hard learning plain, which means I don't have too much time to dealing with this project now, sincerely, I am sorry for that. Maybe this situation will get better in the future. So it is recommended to use the latest version.
Version | Supported |
---|---|
1.x.x | ❌ |
2.x.x | ❌ |
2.1.x | ✅ |
Platform & Library Support
According to security concern and my limiting time to contributing, GpgFrontend will gradually drop the support of some old platforms. Furthermore, GpgFrontend will try to use newer libraries when it's more secure or taking another advantages.
Starting from v1.0.0, x32 operating system was no longer support. Mainly because I have limit time and the fact that x32 machine is getting less and less in the pc market, so I plan to stop spending tons of time dealing with lots of complex problem which might made me crazy. x64 is just enough, or you can use gpg4usb.
Starting from v2.0.1, Ubuntu 16.04 was no longer support. Mainly because Ubuntu 16.04 LTS's lifetime had come into an end at during that time. Keep using this version of Ubuntu is not safe anymore.
Starting from v2.1.0, macOS 10.15 was no longer support. Mainly because this OS will no longer support by GitHub Action in the near future. Also, I think this version is old enough to drop it out, and Apple might not longer to support it soon.
Starting from v2.1.1, Ubuntu 18.04 is no longer support. Mainly because Ubuntu 18.04 is not support by GitHub Action any more since April 3. So, all the build will move to Qt6, since Ubuntu 20.04 is supported by Qt6.
Starting from v2.1.2, Qt5 API will be removed from source, which means that the whole project will use Qt6 API and won't be able to compile under Qt5. I will consider removing deb package build.
Reporting a Vulnerability
If you want to report a vulnerability, it's not good to raise an issue in public. You should email eric@bktus.com to contract me. In the email, You can describe the vulnerability you have just discovered and request a hot-fix. Or you can just provide a git patch to fix it and send it to me using the email. This is a better way to solve the vulnerability as quick as possible.