From 8119092285babcf78f47236a58d927761c8b9439 Mon Sep 17 00:00:00 2001 From: Michael <33252157+APMichael@users.noreply.github.com> Date: Mon, 21 Oct 2024 18:04:27 +0200 Subject: [PATCH 1/2] Update CHANGELOG.md - Fixed minor typos. --- CHANGELOG.md | 27 +++++++++++++-------------- 1 file changed, 13 insertions(+), 14 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 1fda1d7f..d28150f9 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -8,7 +8,7 @@ This project adheres to [Semantic Versioning](http://semver.org/). ### Fixed - fixed Sandboxie crypto fails to start in red boxes -- fixed issue with breakout process when usign explorer.exe +- fixed issue with breakout process when using explorer.exe @@ -16,37 +16,36 @@ This project adheres to [Semantic Versioning](http://semver.org/). ### Added - added new user proxy mechanism to enable user specific operations -- added Support for EFS using the user proxy [#1980](https://github.com/sandboxie-plus/Sandboxie/issues/1980) +- added support for EFS using the user proxy [#1980](https://github.com/sandboxie-plus/Sandboxie/issues/1980) - to enable add 'EnableEFS=y' to the sandbox config -- added break out document functionality [#2741](https://github.com/sandboxie-plus/Sandboxie/issues/2741) +- added breakout document functionality [#2741](https://github.com/sandboxie-plus/Sandboxie/issues/2741) - use a syntax like this 'BreakoutDocument=C:\path\*.txt' to specify path and extension - - Security Warning: Do not use paths terminated with a wildcard like 'BreakoutDocument=C:\path\*' as they will allow for execution of malicious scripts outside the sandbox! -- added mechanism to set set box folder ACLs to allow only the creating user access 'LockBoxToUser=y' + - Security Warning: do not use paths terminated with a wildcard like 'BreakoutDocument=C:\path\*' as they will allow for execution of malicious scripts outside the sandbox! +- added mechanism to set box folder ACLs to allow only the creating user access 'LockBoxToUser=y' - added option to keep original ACLs on sandboxed files 'UseOriginalACLs=y' - added option 'OpenWPADEndpoint=y' [#4292](https://github.com/sandboxie-plus/Sandboxie/issues/4292) -### Fixed -- fixed ImDiskApp uninstall key is always written to the registry [#4282](https://github.com/sandboxie-plus/Sandboxie/issues/4282) - ### Changed - improved SandboxieCrypto startup - improved Sandboxed RPCSS startup -- Set tab orders and buddies of UI controls [#4300](https://github.com/sandboxie-plus/Sandboxie/pull/4300) (thanks gexgd0419) +- set tab orders and buddies of UI controls [#4300](https://github.com/sandboxie-plus/Sandboxie/pull/4300) (thanks gexgd0419) + +### Fixed +- fixed ImDiskApp uninstall key is always written to the registry [#4282](https://github.com/sandboxie-plus/Sandboxie/issues/4282) ## [1.14.10 / 5.69.10] - 2024-10-03 ### Added -- added Ability to import encrypted archive files directly [#4255](https://github.com/sandboxie-plus/Sandboxie/issues/4255) +- added ability to import encrypted archive files directly [#4255](https://github.com/sandboxie-plus/Sandboxie/issues/4255) ### Changed -- when the sbiesvc.exe worker crashes it now can automatically be restarted. +- when the SbieSvc.exe worker crashes it now can automatically be restarted ### Fixed - fixed issue with sandbox path entry combo boxes -- fixed Proxy for GetRawInputDeviceInfoW() causes a buffer overflow [#4267](https://github.com/sandboxie-plus/Sandboxie/issues/4267) (thanks marti4d) - +- fixed proxy for GetRawInputDeviceInfoW() causes a buffer overflow [#4267](https://github.com/sandboxie-plus/Sandboxie/issues/4267) (thanks marti4d) @@ -63,7 +62,7 @@ This project adheres to [Semantic Versioning](http://semver.org/). - sandbox root selection in global settings is now a combo box ### Fixed -- fixed Exported encrypted archive files cannot be unpacked by Sandboxie [#4229](https://github.com/sandboxie-plus/Sandboxie/issues/4229) +- fixed exported encrypted archive files cannot be unpacked by Sandboxie [#4229](https://github.com/sandboxie-plus/Sandboxie/issues/4229) From dcab2e6ee5cd8e676d3420e242c2e0431b15ad1c Mon Sep 17 00:00:00 2001 From: Michael <33252157+APMichael@users.noreply.github.com> Date: Mon, 21 Oct 2024 18:13:26 +0200 Subject: [PATCH 2/2] Update OptionsWindow.ui - Fixed minor typo. --- SandboxiePlus/SandMan/Forms/OptionsWindow.ui | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui index 8e5f3913..d872dd69 100644 --- a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui +++ b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui @@ -2377,7 +2377,7 @@ Partially checked: No groups will be added to the newly created sandboxed token. - <b><font color='red'>SECURITY ADVISORY</font>:</b> Using <a href="sbie://docs/breakoutfolder">BreakoutFolder</a> and/or <a href="sbie://docs/breakoutprocess">BreakoutProcess</a> in combination with Open[File/Pipe]Path directives can compromise security, as can the use of <a href="sbie://docs/breakoutdocument">BreakoutDocument</a> allowing any * or insecure (*.exe;*.dll;*.ocx;*.cmd;*.bat;*.lnk;*.pif;*.url;*.ps1;etc…) extensions. Please review the security section for each option in the documentation before use. + <b><font color='red'>SECURITY ADVISORY</font>:</b> Using <a href="sbie://docs/breakoutfolder">BreakoutFolder</a> and/or <a href="sbie://docs/breakoutprocess">BreakoutProcess</a> in combination with Open[File/Pipe]Path directives can compromise security, as can the use of <a href="sbie://docs/breakoutdocument">BreakoutDocument</a> allowing any * or insecure (*.exe;*.dll;*.ocx;*.cmd;*.bat;*.lnk;*.pif;*.url;*.ps1;etc...) extensions. Please review the security section for each option in the documentation before use. true