diff options
-rw-r--r-- | README.md | 8 |
1 files changed, 6 insertions, 2 deletions
@@ -160,18 +160,22 @@ RM: 3.379 Changelog --------- -v1.7-beta1, 2019-01-03 + +v1.7, in progress (v1.7-beta1 released 2019-01-03) * **Fix possible symlink race attacks in forward mode** when using allow_other + plaintextnames * If you use *both* `-allow_other` *and* `-plaintextnames`, you should upgrade. Malicious users could trick gocryptfs into modifying files outside of `CIPHERDIR`, or reading files inside `CIPHERDIR` that they should not have access to. * If you do not use `-plaintextnames` (disabled per default), these attacks do not work as symlinks are encrypted. - * Forward mode has been reworked to use the "*at" family of system calls everywhere + * Forward mode has been reworked to use the "\*at" family of system calls everywhere (`Openat/Unlinkat/Symlinkat/...`). * As a result, gocryptfs may run slightly slower, as the caching logic has been replaced and is very simple at the moment. * The possibility for such attacks was found during an internal code review. +* Reverse mode: fix excluded, unaccessible files showing up in directory listings + ([#285](https://github.com/rfjakob/gocryptfs/issues/285), + [#286](https://github.com/rfjakob/gocryptfs/issues/286)) v1.6.1, 2018-12-12 * Fix "Operation not supported" chmod errors on Go 1.11 |