X-Git-Url: https://vcs.fsf.org/?a=blobdiff_plain;f=doc%2Fdoc-txt%2FChangeLog;h=624e0a8c70911f14f0e119a2d4122a7d3363f925;hb=fa32850be0d9e605da1b33305c122f7a59a24650;hp=630c1902a7a663d6f29e3bd788a4c845ac75cc6b;hpb=13eb9497df3c4149ea8cc3d95410f3232d6337da;p=exim.git diff --git a/doc/doc-txt/ChangeLog b/doc/doc-txt/ChangeLog index 630c1902a..624e0a8c7 100644 --- a/doc/doc-txt/ChangeLog +++ b/doc/doc-txt/ChangeLog @@ -71,6 +71,27 @@ PP/20 Added a CONTRIBUTING file. Fixed the documentation build to use http: XSL and documented dependency on system catalogs, with examples of how it normally works. +DW/21 Added Valgrind hooks in store.c to help it capture out-of-bounds store + access. + +DW/22 Bugzilla 1044: CVE-2010-4345 - partial fix: restrict default behaviour + of CONFIGURE_OWNER and CONFIGURE_GROUP options to no longer allow a + configuration file which is writeable by the Exim user or group. + +DW/23 Bugzilla 1044: CVE-2010-4345 - part two: extend checks for writeability + of configuration files to cover files specified with the -C option if + they are going to be used with root privileges, not just the default + configuration file. + +DW/24 Bugzilla 1044: CVE-2010-4345 - part three: remove ALT_CONFIG_ROOT_ONLY + option (effectively making it always true). + +DW/25 Add TRUSTED_CONFIG_PREFIX_FILE option to allow alternative configuration + files to be used while preserving root privileges. + +DW/26 Set FD_CLOEXEC on SMTP sockets after forking in the daemon, to ensure + that rogue child processes cannot use them. + Exim version 4.72 -----------------