diff options
| author | Jakob Unterwurzacher | 2019-10-06 22:35:27 +0200 | 
|---|---|---|
| committer | Jakob Unterwurzacher | 2019-10-06 22:35:27 +0200 | 
| commit | 8cb104f004cc5d3343bc3b5ef2187c1830e00f19 (patch) | |
| tree | 48f131866c639b378e06ee69a60944edf8544efa | |
| parent | 65bc006a78c67b8f8cf0b01f8ed948dca6c1e408 (diff) | |
Update README for v1.7.1v1.7.1
| -rw-r--r-- | README.md | 7 | 
1 files changed, 6 insertions, 1 deletions
| @@ -187,7 +187,7 @@ RM:    3.379  Changelog  --------- -vNEXT, in progress +v1.7.1, in progress  * Support wild cards in reverse mode via `--exclude-wildcard`    ([#367](https://github.com/rfjakob/gocryptfs/pull/367)). Thanks @ekalin!  * Create `gocryptfs.diriv` files with 0440 permissions to make it easier to @@ -200,6 +200,11 @@ vNEXT, in progress    ([#400](https://github.com/rfjakob/gocryptfs/issues/400))  * Fix `-idle` unmounting the filesystem despite recent activity    ([#421](https://github.com/rfjakob/gocryptfs/issues/421)) +* **Fix a race condition related to inode number reuse +  ([#363](https://github.com/rfjakob/gocryptfs/issues/363))**. +  It could be triggered by concurrently creating and deleting files and can lead to data loss +  in the affected file. This bug was found by the automated tests on Travis +  and was very hard to trigger locally.  v1.7, 2019-03-17  * **Fix possible symlink race attacks in forward mode** when using allow_other + plaintextnames | 
