commit
e8187ceb68
27
CHANGELOG.md
27
CHANGELOG.md
|
@ -8,7 +8,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
|
|||
|
||||
### Fixed
|
||||
- fixed Sandboxie crypto fails to start in red boxes
|
||||
- fixed issue with breakout process when usign explorer.exe
|
||||
- fixed issue with breakout process when using explorer.exe
|
||||
|
||||
|
||||
|
||||
|
@ -16,37 +16,36 @@ This project adheres to [Semantic Versioning](http://semver.org/).
|
|||
|
||||
### Added
|
||||
- added new user proxy mechanism to enable user specific operations
|
||||
- added Support for EFS using the user proxy [#1980](https://github.com/sandboxie-plus/Sandboxie/issues/1980)
|
||||
- added support for EFS using the user proxy [#1980](https://github.com/sandboxie-plus/Sandboxie/issues/1980)
|
||||
- to enable add 'EnableEFS=y' to the sandbox config
|
||||
- added break out document functionality [#2741](https://github.com/sandboxie-plus/Sandboxie/issues/2741)
|
||||
- added breakout document functionality [#2741](https://github.com/sandboxie-plus/Sandboxie/issues/2741)
|
||||
- use a syntax like this 'BreakoutDocument=C:\path\*.txt' to specify path and extension
|
||||
- Security Warning: Do not use paths terminated with a wildcard like 'BreakoutDocument=C:\path\*' as they will allow for execution of malicious scripts outside the sandbox!
|
||||
- added mechanism to set set box folder ACLs to allow only the creating user access 'LockBoxToUser=y'
|
||||
- Security Warning: do not use paths terminated with a wildcard like 'BreakoutDocument=C:\path\*' as they will allow for execution of malicious scripts outside the sandbox!
|
||||
- added mechanism to set box folder ACLs to allow only the creating user access 'LockBoxToUser=y'
|
||||
- added option to keep original ACLs on sandboxed files 'UseOriginalACLs=y'
|
||||
- added option 'OpenWPADEndpoint=y' [#4292](https://github.com/sandboxie-plus/Sandboxie/issues/4292)
|
||||
|
||||
### Fixed
|
||||
- fixed ImDiskApp uninstall key is always written to the registry [#4282](https://github.com/sandboxie-plus/Sandboxie/issues/4282)
|
||||
|
||||
### Changed
|
||||
- improved SandboxieCrypto startup
|
||||
- improved Sandboxed RPCSS startup
|
||||
- Set tab orders and buddies of UI controls [#4300](https://github.com/sandboxie-plus/Sandboxie/pull/4300) (thanks gexgd0419)
|
||||
- set tab orders and buddies of UI controls [#4300](https://github.com/sandboxie-plus/Sandboxie/pull/4300) (thanks gexgd0419)
|
||||
|
||||
### Fixed
|
||||
- fixed ImDiskApp uninstall key is always written to the registry [#4282](https://github.com/sandboxie-plus/Sandboxie/issues/4282)
|
||||
|
||||
|
||||
|
||||
## [1.14.10 / 5.69.10] - 2024-10-03
|
||||
|
||||
### Added
|
||||
- added Ability to import encrypted archive files directly [#4255](https://github.com/sandboxie-plus/Sandboxie/issues/4255)
|
||||
- added ability to import encrypted archive files directly [#4255](https://github.com/sandboxie-plus/Sandboxie/issues/4255)
|
||||
|
||||
### Changed
|
||||
- when the sbiesvc.exe worker crashes it now can automatically be restarted.
|
||||
- when the SbieSvc.exe worker crashes it now can automatically be restarted
|
||||
|
||||
### Fixed
|
||||
- fixed issue with sandbox path entry combo boxes
|
||||
- fixed Proxy for GetRawInputDeviceInfoW() causes a buffer overflow [#4267](https://github.com/sandboxie-plus/Sandboxie/issues/4267) (thanks marti4d)
|
||||
|
||||
- fixed proxy for GetRawInputDeviceInfoW() causes a buffer overflow [#4267](https://github.com/sandboxie-plus/Sandboxie/issues/4267) (thanks marti4d)
|
||||
|
||||
|
||||
|
||||
|
@ -63,7 +62,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
|
|||
- sandbox root selection in global settings is now a combo box
|
||||
|
||||
### Fixed
|
||||
- fixed Exported encrypted archive files cannot be unpacked by Sandboxie [#4229](https://github.com/sandboxie-plus/Sandboxie/issues/4229)
|
||||
- fixed exported encrypted archive files cannot be unpacked by Sandboxie [#4229](https://github.com/sandboxie-plus/Sandboxie/issues/4229)
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -2377,7 +2377,7 @@ Partially checked: No groups will be added to the newly created sandboxed token.
|
|||
<item row="8" column="0" colspan="2">
|
||||
<widget class="QLabel" name="lblBreakOut">
|
||||
<property name="text">
|
||||
<string><b><font color='red'>SECURITY ADVISORY</font>:</b> Using <a href="sbie://docs/breakoutfolder">BreakoutFolder</a> and/or <a href="sbie://docs/breakoutprocess">BreakoutProcess</a> in combination with Open[File/Pipe]Path directives can compromise security, as can the use of <a href="sbie://docs/breakoutdocument">BreakoutDocument</a> allowing any * or insecure (*.exe;*.dll;*.ocx;*.cmd;*.bat;*.lnk;*.pif;*.url;*.ps1;etc…) extensions. Please review the security section for each option in the documentation before use.</string>
|
||||
<string><b><font color='red'>SECURITY ADVISORY</font>:</b> Using <a href="sbie://docs/breakoutfolder">BreakoutFolder</a> and/or <a href="sbie://docs/breakoutprocess">BreakoutProcess</a> in combination with Open[File/Pipe]Path directives can compromise security, as can the use of <a href="sbie://docs/breakoutdocument">BreakoutDocument</a> allowing any * or insecure (*.exe;*.dll;*.ocx;*.cmd;*.bat;*.lnk;*.pif;*.url;*.ps1;etc...) extensions. Please review the security section for each option in the documentation before use.</string>
|
||||
</property>
|
||||
<property name="wordWrap">
|
||||
<bool>true</bool>
|
||||
|
|
Loading…
Reference in New Issue