parent
01c6011972
commit
2a4204d1ca
|
@ -126,5 +126,5 @@ jobs:
|
||||||
echo 'tailing->trailing' >> dictionary_code.txt
|
echo 'tailing->trailing' >> dictionary_code.txt
|
||||||
# Only lowercase letters are allowed in --ignore-words-list
|
# Only lowercase letters are allowed in --ignore-words-list
|
||||||
codespell --dictionary=dictionary.txt --dictionary=dictionary_rare.txt --dictionary=dictionary_code.txt \
|
codespell --dictionary=dictionary.txt --dictionary=dictionary_rare.txt --dictionary=dictionary_code.txt \
|
||||||
--ignore-words-list="wil,unknwn,tolen,pevent,doubleclick,parm,parms,etcp,ois,ba,ptd,modell,namesd,stdio,uint,errorstring,ontext,atend,deque,ecounter,nmake,namess,inh,daa,varient,lite,uis,emai,ws,slanguage,woh,tne,typpos,enew,shft,seh,ser,servent,socio-economic,rime,falt,infor,vor,lets,od,fo,aas," \
|
--ignore-words-list="wil,unknwn,tolen,pevent,doubleclick,parm,parms,etcp,ois,ba,ptd,modell,namesd,stdio,uint,errorstring,ontext,atend,deque,ecounter,nmake,namess,inh,daa,varient,lite,uis,emai,ws,slanguage,woh,tne,typpos,enew,shft,seh,ser,servent,socio-economic,rime,falt,infor,vor,lets,od,fo,aas,shs," \
|
||||||
--skip="./.git,./.github/workflows/codespell.yml,./dictionary*.txt,./Sandboxie/msgs/Text-*-*.txt,./Sandboxie/msgs/report/Report-*.txt,./SandboxiePlus/SandMan/*.ts,./Installer/Languages.iss,./Installer/isl/*.isl,./SandboxiePlus/SandMan/Troubleshooting/lang_*.json,./Sandboxie/install/build.bat,./SandboxieTools/ImBox/dc/crypto_fast/xts_fast.c"
|
--skip="./.git,./.github/workflows/codespell.yml,./dictionary*.txt,./Sandboxie/msgs/Text-*-*.txt,./Sandboxie/msgs/report/Report-*.txt,./SandboxiePlus/SandMan/*.ts,./Installer/Languages.iss,./Installer/isl/*.isl,./SandboxiePlus/SandMan/Troubleshooting/lang_*.json,./Sandboxie/install/build.bat,./SandboxieTools/ImBox/dc/crypto_fast/xts_fast.c"
|
||||||
|
|
|
@ -11,7 +11,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
|
||||||
- to enable add 'EnableEFS=y' to the sandbox config
|
- to enable add 'EnableEFS=y' to the sandbox config
|
||||||
- added break out document functionality [#2741](https://github.com/sandboxie-plus/Sandboxie/issues/2741)
|
- added break out document functionality [#2741](https://github.com/sandboxie-plus/Sandboxie/issues/2741)
|
||||||
- use a syntax like this 'BreakoutDocument=C:\path\*.txt' to specify path and extension
|
- use a syntax like this 'BreakoutDocument=C:\path\*.txt' to specify path and extension
|
||||||
- Security Warning: do not use paths terminated with a wild card like 'BreakoutDocument=C:\path\*' as thay will allow for executeion ot maliciouse scripts outside teh sandbox!!!
|
- Security Warning: Do not use paths terminated with a wildcard like 'BreakoutDocument=C:\path\*' as they will allow for execution of malicious scripts outside the sandbox!
|
||||||
- added mechanism to set set box folder ACLs to allow only the creating user access 'LockBoxToUser=y'
|
- added mechanism to set set box folder ACLs to allow only the creating user access 'LockBoxToUser=y'
|
||||||
- added option to keep original ACLs on sandboxed files 'UseOriginalACLs=y'
|
- added option to keep original ACLs on sandboxed files 'UseOriginalACLs=y'
|
||||||
- added option 'OpenWPADEndpoint=y' [#4292](https://github.com/sandboxie-plus/Sandboxie/issues/4292)
|
- added option 'OpenWPADEndpoint=y' [#4292](https://github.com/sandboxie-plus/Sandboxie/issues/4292)
|
||||||
|
|
|
@ -1353,7 +1353,7 @@ _FX LONG Gui_GetRawInputDeviceInfo_impl(
|
||||||
memcpy(reqData, pData, lenData);
|
memcpy(reqData, pData, lenData);
|
||||||
|
|
||||||
// GetRawInputDeviceInfoA accesses pcbSize without testing it for being not NULL
|
// GetRawInputDeviceInfoA accesses pcbSize without testing it for being not NULL
|
||||||
// hence if the caller passes NULL we use a dummy value so that we dont crash the helper service
|
// hence if the caller passes NULL we use a dummy value so that we don't crash the helper service
|
||||||
if (pcbSize)
|
if (pcbSize)
|
||||||
req->cbSize = *pcbSize;
|
req->cbSize = *pcbSize;
|
||||||
else
|
else
|
||||||
|
|
|
@ -222,7 +222,7 @@ _FX BOX *Process_GetForcedStartBox(
|
||||||
}
|
}
|
||||||
|
|
||||||
//
|
//
|
||||||
// initialize ParentName but only if the parrent is not a system process
|
// initialize ParentName but only if the parent is not a system process
|
||||||
//
|
//
|
||||||
|
|
||||||
if (!MyIsProcessRunningAsSystemAccount(ParentId)) {
|
if (!MyIsProcessRunningAsSystemAccount(ParentId)) {
|
||||||
|
|
|
@ -207,7 +207,7 @@ ULONG UserServer::StartWorker(ULONG session_id)
|
||||||
//
|
//
|
||||||
// create an event object for the new User Worker process
|
// create an event object for the new User Worker process
|
||||||
// the user process needs to be able to set this event
|
// the user process needs to be able to set this event
|
||||||
// so set the apropriate security descriptor
|
// so set the appropriate security descriptor
|
||||||
//
|
//
|
||||||
|
|
||||||
SECURITY_DESCRIPTOR sd;
|
SECURITY_DESCRIPTOR sd;
|
||||||
|
@ -286,8 +286,8 @@ ULONG UserServer::StartWorker(ULONG session_id)
|
||||||
}
|
}
|
||||||
|
|
||||||
//
|
//
|
||||||
// since the worker is runnign as user it can't open this service process, even for SYNCHRONIZE only
|
// since the worker is running as user it can't open this service process, even for SYNCHRONIZE only
|
||||||
// hence we duplicate teh required token and use APC to pass it to our new worker.
|
// hence we duplicate the required token and use APC to pass it to our new worker.
|
||||||
//
|
//
|
||||||
|
|
||||||
HANDLE hThis;
|
HANDLE hThis;
|
||||||
|
|
|
@ -1328,7 +1328,7 @@
|
||||||
<item row="12" column="1" colspan="5">
|
<item row="12" column="1" colspan="5">
|
||||||
<widget class="QCheckBox" name="chkACLs">
|
<widget class="QCheckBox" name="chkACLs">
|
||||||
<property name="text">
|
<property name="text">
|
||||||
<string>Use original Access Control Entries for boxed Files and Folders (for MSIServer enable excemptions)</string>
|
<string>Use original Access Control Entries for boxed Files and Folders (for MSIServer enable exemptions)</string>
|
||||||
</property>
|
</property>
|
||||||
</widget>
|
</widget>
|
||||||
</item>
|
</item>
|
||||||
|
|
|
@ -338,7 +338,7 @@ void COptionsWindow::OnBreakoutDoc()
|
||||||
Ext.prepend("*.");
|
Ext.prepend("*.");
|
||||||
|
|
||||||
if (Ext.right(1) == "*") {
|
if (Ext.right(1) == "*") {
|
||||||
QMessageBox::warning(this, "Sansboxie-Plus", tr("For security reasons it it not permitted to create entierly wildcard BreakoutDocument presets."));
|
QMessageBox::warning(this, "Sandboxie-Plus", tr("For security reasons it it not permitted to create entirely wildcard BreakoutDocument presets."));
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
QStringList BannedExt = QString(// from: https://learn.microsoft.com/en-us/troubleshoot/developer/browsers/security-privacy/information-about-the-unsafe-file-list
|
QStringList BannedExt = QString(// from: https://learn.microsoft.com/en-us/troubleshoot/developer/browsers/security-privacy/information-about-the-unsafe-file-list
|
||||||
|
|
Loading…
Reference in New Issue