Changelog fixes

This commit is contained in:
NewKidOnTheBlock 2024-02-05 22:54:17 +01:00 committed by GitHub
parent da1ecf59ac
commit 46f0d55cff
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 25 additions and 25 deletions

View File

@ -8,7 +8,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
## [1.12.9 / 5.67.9] - 2024-02-xx
### Fixed
- fixed issue with symlink resolver introduced in previous build [#3481](https://github.com/sandboxie-plus/Sandboxie/issues/3481)
- fixed issue with symlink resolver introduced in the previous build [#3481](https://github.com/sandboxie-plus/Sandboxie/issues/3481)
@ -31,18 +31,18 @@ This project adheres to [Semantic Versioning](http://semver.org/).
### Fixed
- fixed "Duplicate Box Config" option not being able to keep the order of the original sandbox configuration [#3523](https://github.com/sandboxie-plus/Sandboxie/issues/3523)
- fixed "Save options as new defaults" option not being able to appear when "Configure Advanced Options" is enabled [#3522](https://github.com/sandboxie-plus/Sandboxie/issues/3522)
- fixed "Save options as new defaults" option not appearing when "Configure Advanced Options" is enabled [#3522](https://github.com/sandboxie-plus/Sandboxie/issues/3522)
- fixed Windows Explorer issue when running in a sandbox with data protection enabled on Windows 11 [#3517](https://github.com/sandboxie-plus/Sandboxie/issues/3517)
- the default template for privacy boxes now sets `NormalFilePath=%ProgramData%\Microsoft\*`
- fixed message boxes with MB_DEFAULT_DESKTOP_ONLY or MB_SERVICE_NOTIFICATION not being able to display title and text correctly in security hardened sandbox [#3529](https://github.com/sandboxie-plus/Sandboxie/issues/3529)
- fixed issue with npm failing to run inside security hardened sandbox on Windows 11 [#3505](https://github.com/sandboxie-plus/Sandboxie/issues/3505)
- fixed message boxes with MB_DEFAULT_DESKTOP_ONLY or MB_SERVICE_NOTIFICATION not being able to display title and text correctly in Security Hardened sandboxes [#3529](https://github.com/sandboxie-plus/Sandboxie/issues/3529)
- fixed issue with npm failing to run inside a Security Hardened sandbox on Windows 11 [#3505](https://github.com/sandboxie-plus/Sandboxie/issues/3505)
- fixed symlink and open path issue introduced in 1.12.6 [#3537](https://github.com/sandboxie-plus/Sandboxie/issues/3537)
- when a volume without a associated drive letter is encountered, Sandboxie uses `\drive\{guid}` instead of `\drive\[letter]`
- Note: when the volume later gets a drive letter, the data under `\drive\{guid}` will be ignored!
- when a volume without an associated drive letter is encountered, Sandboxie uses `\drive\{guid}` instead of `\drive\[letter]`
- Note: if the volume is subsequently assigned a drive letter, the data under `\drive\{guid}` will be ignored!
- fixed "Run Unsandboxed" command when right-clicking shortcuts created with Sandboxie Plus [#3528](https://github.com/sandboxie-plus/Sandboxie/issues/3528)
- Note: for the fix to take full effect, the shell integration needs to be re-applied
- fixed `Error Status: 0x0000065b (Function failed during execution)` [#3504](https://github.com/sandboxie-plus/Sandboxie/issues/3504)
- fixed Privacy Enhanced sandboxes not working with SBIE2204 error code [#3542](https://github.com/sandboxie-plus/Sandboxie/issues/3542)
- fixed Privacy Enhanced sandboxes failing with error code SBIE2204 [#3542](https://github.com/sandboxie-plus/Sandboxie/issues/3542)
- fixed OpenFilePath directories not being enumerated within their parent folders [#3519](https://github.com/sandboxie-plus/Sandboxie/issues/3519)
@ -50,10 +50,10 @@ This project adheres to [Semantic Versioning](http://semver.org/).
## [1.12.6 / 5.67.6] - 2024-01-02
### Changed
- improved behaviour of toolbar customization menu
- improved behaviour of the toolbar customization menu
### Fixed
- fixed issue introduced in 1.12.4 with start.exe failing to run in a confidential box [#3514](https://github.com/sandboxie-plus/Sandboxie/issues/3514)
- fixed issue introduced in 1.12.4 with Start.exe failing to run in an encrypted box [#3514](https://github.com/sandboxie-plus/Sandboxie/issues/3514)
- fixed "The directory name is invalid" when starting a process in an encrypted private box [#3475](https://github.com/sandboxie-plus/Sandboxie/issues/3475)
- fixed symbolic links created inside a sandbox not working properly [#3181](https://github.com/sandboxie-plus/Sandboxie/issues/3181)
- fixed issue with drives mounted to multiple folders or a drive letter and a folder
@ -73,20 +73,20 @@ This project adheres to [Semantic Versioning](http://semver.org/).
## [1.12.4 / 5.67.4] - 2023-12-18
### Added
- added display of Date & Time in the Sbie Messages tab [#3429](https://github.com/sandboxie-plus/Sandboxie/issues/3429)
- added the display of date and time in the Sbie Messages tab [#3429](https://github.com/sandboxie-plus/Sandboxie/issues/3429)
### Changed
- without an active, non-expired, supporter certificate, automatic updates/downloads are no longer available for the stable channel
- the automatic updater will still work and notify about new stable releases, the user will be guided to visit the download page and download the latest installer manually
- the cleanup button in SandMan UI is now enabled even when not connected to the Sandboxie core components
- the box creation wizard now allows to create a black box based on any other box type
- without an active supporter certificate, automatic updates are no longer available for the stable channel
- the automatic updater will still notify about new stable releases and the user will be guided to the download page to download the latest installer manually
- the clean-up button in SandMan UI is now enabled even when not connected to the Sandboxie core components
- the box creation wizard now allows to create encrypted sandboxes based on any other box type
### Fixed
- fixed running sandboxed processes located in an ImDisk volume [#3472](https://github.com/sandboxie-plus/Sandboxie/discussions/3472)
- fixed sample 634d066fd4f9a8b201a3ddf346e880be unable to be terminated on Windows 7 x64 [#3482](https://github.com/sandboxie-plus/Sandboxie/issues/3482)
- fixed UseNewSymlinkResolver causing applications to create both the link and the target folder [#3481](https://github.com/sandboxie-plus/Sandboxie/issues/3481)
- fixed issue with sandbox renaming that broke the group hierarchy [#3430](https://github.com/sandboxie-plus/Sandboxie/issues/3430)
- fixed encrypted confidential sandbox with red box preset blocking access to its root directories [#3475](https://github.com/sandboxie-plus/Sandboxie/issues/3475)
- fixed encrypted sandbox with red box preset blocking access to its root directories [#3475](https://github.com/sandboxie-plus/Sandboxie/issues/3475)
- fixed SandMan crash issue introduced in 1.12.0 [#3492](https://github.com/sandboxie-plus/Sandboxie/issues/3492)
@ -338,7 +338,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
- improved robustness of snapshot merging [#3017](https://github.com/sandboxie-plus/Sandboxie/issues/3017)
### Fixed
- fixed "Disable Security Isolation" causes a game to stop playing audio [#2893](https://github.com/sandboxie-plus/Sandboxie/issues/2893)
- fixed "Disable Security Isolation" causing a game to stop playing audio [#2893](https://github.com/sandboxie-plus/Sandboxie/issues/2893)
- fixed NtQueryDirectoryObject not implemented [#2734](https://github.com/sandboxie-plus/Sandboxie/issues/2734)
- fixed issue with working directory for Run Menu entries
- fixed improper global symlink in sandboxed namespace [#3112](https://github.com/sandboxie-plus/Sandboxie/issues/3112)
@ -429,7 +429,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
- fixed empty lines when using "Copy Panel" in Plus UI [#2995](https://github.com/sandboxie-plus/Sandboxie/issues/2995)
- fixed Plus installer not honouring IniPath value when updating the current installed version (thanks offhub) [#2994](https://github.com/sandboxie-plus/Sandboxie/issues/2994)
- fixed timestamp on crash dumps
- fixed Firefox 114 crashes in security enhanced box, if start restrictions are enabled (thanks offhub) [#3019](https://github.com/sandboxie-plus/Sandboxie/issues/3019)
- fixed Firefox 114 crashes in Security Hardened boxes, if start restrictions are enabled (thanks offhub) [#3019](https://github.com/sandboxie-plus/Sandboxie/issues/3019)
- fixed a bug when there is no GUI proxy (thanks lmou523) [#3020](https://github.com/sandboxie-plus/Sandboxie/pull/3020)
@ -804,7 +804,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
- ApiLog support is now hidden from the trace UI when the appropriate DLLs are missing
### Fixed
- fixed issue with Microsoft Edge in a security enhanced box [#2571](https://github.com/sandboxie-plus/Sandboxie/issues/2571)
- fixed issue with Microsoft Edge in a Security Hardened box [#2571](https://github.com/sandboxie-plus/Sandboxie/issues/2571)
- opened OpenIpcPath=\\{BEC19D6F-D7B2-41A8-860C-8787BB964F2D} on ARM64 systems
- fixed incompatibility with Windows 11 21H2 ARM64 [#2431](https://github.com/sandboxie-plus/Sandboxie/issues/2431)
@ -1179,13 +1179,13 @@ This project adheres to [Semantic Versioning](http://semver.org/).
### Added
- added hook configuration for ntoskrnl/ntdll
- individual ntdll hooks can be disabled using "DisableWinNtHook=..."
- added new Super Extra Security Enhanced Box Mode; add "UseSecurityMode=y" to enable
- added a new Security Hardened Box Mode; add "UseSecurityMode=y" to enable
- when this setting is enabled, it combines "SysCallLockDown=y" which limits the use of NT system calls with "DropAdminRights=y" and "RestrictDevices=y"
- only calls configured in the global section as "ApproveWinNtSysCall=..."/"ApproveWin32SysCall=..." will be executed with the original token
- all non-approved NT syscalls will be executed with the sandboxed token, this may break compatibility in certain scenarios
- additional syscalls may need to be allowed, this has to be done in the [GlobalSettings] and the driver must be restarted
- Note: boxes created as Security Enhanced with prior builds will be displayed as normal in the UI from now on
- the Security Enhanced icons are now repurposed for the new Super Extra Security Enhanced Box Mode
- Note: boxes created as Security Hardened with prior builds will be displayed as normal in the UI from now on
- the Security Hardened icons are now repurposed for the new Super Extra Security Hardened Box Mode
- Note: the new enhanced security features require a supporter certificate
- added browse option to the "force process" tab
@ -1742,7 +1742,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
- fixed memory leak in driver (conf_user.c)
- fixed issue with file renaming in open paths introduced in 1.0.6
- fixed issue causing Chromium browsers not closing properly [#1496](https://github.com/sandboxie-plus/Sandboxie/issues/1496)
- fixed issue with start.exe [#1517](https://github.com/sandboxie-plus/Sandboxie/issues/1517) [#1516](https://github.com/sandboxie-plus/Sandboxie/issues/1516)
- fixed issue with Start.exe [#1517](https://github.com/sandboxie-plus/Sandboxie/issues/1517) [#1516](https://github.com/sandboxie-plus/Sandboxie/issues/1516)
- fixed SandMan issue with reused process IDs
- fixed KmdUtil sometimes not properly terminating the driver [#1493](https://github.com/sandboxie-plus/Sandboxie/issues/1493)
@ -1885,7 +1885,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
## [1.0.0 / 5.55.0] - 2021-11-17
### Added
- added Privacy enhanced mode, sandboxes with "UsePrivacyMode=y" will not allow read access to locations containing user data
- added Privacy Enhanced mode, sandboxes with "UsePrivacyMode=y" will not allow read access to locations containing user data
- all locations except generic Windows system paths will need to be opened explicitly for read and/or write access
- using "NormalFilePath=...", "NormalKeyPath=...", "NormalIpcPath=..." allows to open locations to be readable and sandboxed
- added new app compartment mode of operation, it is enabled by adding "NoSecurityIsolation=y" to the box config
@ -1905,7 +1905,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
### Changed
- reworked the resource access path matching mechanism to optionally apply more specific rules over less specific ones
- for example "OpenFilePath=C:\User\Me\AppData\Firefox takes precedence over "WriteFilePath=C:\User\Me\"
- to enable this new behaviour, add "UseRuleSpecificity=y" to your Sandboxie.ini, this behaviour is always enabled in Privacy enhanced mode
- to enable this new behaviour, add "UseRuleSpecificity=y" to your Sandboxie.ini, this behaviour is always enabled in Privacy Enhanced mode
- added "NormalFilePath=..." to restore default Sandboxie behaviour on a given path
- added "OpenConfPath=...", which similarly to "OpenPipePath=..." is a "OpenKeyPath=..." variant which applies to executables located in the sandbox
- removed option to copy a box during creation, instead the box context menu offers a duplication option