diff --git a/CHANGELOG.md b/CHANGELOG.md index 5a08dc78..28dc218c 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -10,11 +10,11 @@ This project adheres to [Semantic Versioning](http://semver.org/). ## [1.12.3 / 5.67.3] - 2023-11- ### Added -- added template to add usefull exclusions to confidential boxes +- added template to add useful exclusions to confidential boxes ### Fixed - FIXED SECURITY ISSUE ID-23 SeManageVolumePrivilege is now blocked, as it allowed to read MFT data (thanks Diversenok) -- fixed Program launch when forcing prcesses into a confidential box [#3173](https://github.com/sandboxie-plus/Sandboxie/issues/3173) +- fixed program launch when forcing prcesses into a confidential box [#3173](https://github.com/sandboxie-plus/Sandboxie/issues/3173) @@ -24,7 +24,7 @@ This project adheres to [Semantic Versioning](http://semver.org/). - added options dialog when exporting a box [#3409](https://github.com/sandboxie-plus/Sandboxie/issues/3409) ### Changed -- moved process info retreival to SbieSvc, resolves some information not being available in comaprtment type boxes when sandman does not run as admin. +- moved process info retrieval to SbieSvc, resolves some information not being available in compartment type boxes when SandMan does not run as admin - moved Process Suspend/Resume to SbieSvc [#3156](https://github.com/sandboxie-plus/Sandboxie/issues/3156) ### Fixed @@ -32,7 +32,7 @@ This project adheres to [Semantic Versioning](http://semver.org/). - fixed warning issue `Acrobat.exe: SBIE2205 Service not implemented: CredEnumerateA` [#issuecomment-1826280016](https://github.com/sandboxie-plus/Sandboxie/issues/3441#issuecomment-1826280016) - fixed UNEXPECTED_KERNEL_MODE_TRAP BSOD when opening any web link from sandboxed Microsoft 365 app (e.g. Outlook, Word) [#3427](https://github.com/sandboxie-plus/Sandboxie/issues/3427) - fixed issue with force process warning message -- fixed Online updater does not respect portable mode [#3406](https://github.com/sandboxie-plus/Sandboxie/issues/3406) +- fixed online updater does not respect portable mode [#3406](https://github.com/sandboxie-plus/Sandboxie/issues/3406) diff --git a/Sandboxie/core/svc/ProcessServer.cpp b/Sandboxie/core/svc/ProcessServer.cpp index 75a5d278..3b541126 100644 --- a/Sandboxie/core/svc/ProcessServer.cpp +++ b/Sandboxie/core/svc/ProcessServer.cpp @@ -1964,7 +1964,7 @@ MSG_HEADER *ProcessServer::ProcInfoHandler(MSG_HEADER *msg) if (QueryFullProcessImageNameW(ProcessHandle, 0, filename, &dwSize)) ImagePath = filename; - // windows 8.1 and later + // Windows 8.1 and later #define ProcessCommandLineInformation ((PROCESSINFOCLASS)60) ULONG returnLength = 0; NTSTATUS status = NtQueryInformationProcess(ProcessHandle, ProcessCommandLineInformation, NULL, 0, &returnLength); @@ -1978,7 +1978,7 @@ MSG_HEADER *ProcessServer::ProcInfoHandler(MSG_HEADER *msg) } #undef ProcessCommandLineInformation - if (CommandLine.empty()) // fall back to the win 7 method - requirers PROCESS_VM_READ + if (CommandLine.empty()) // fall back to the Win 7 method - requires PROCESS_VM_READ CommandLine = GetPebString(ProcessHandle, PhpoCommandLine); WorkingDir = GetPebString(ProcessHandle, PhpoCurrentDirectory); diff --git a/Sandboxie/install/Templates.ini b/Sandboxie/install/Templates.ini index 8efc0ae6..b21ea50b 100644 --- a/Sandboxie/install/Templates.ini +++ b/Sandboxie/install/Templates.ini @@ -496,11 +496,11 @@ OpenIpcPath=\RPC Control\protected_storage # -# usefull exceptions for confidential boxes +# useful exceptions for confidential boxes # [Template_LessConfidentialBox] -Tmpl.Title=Allow some windows processes to access processes in a confidential box +Tmpl.Title=Allow some Windows processes to access processes in a confidential box Tmpl.Class=Misc DenyHostAccess=audiodg.exe,n