X-Git-Url: https://git.exim.org/users/jgh/exim.git/blobdiff_plain/fea24b2ea4e2c2a4b77d6fb222054e32e658b227..aa097c4c00f62487128d74f65c521f9e877b184f:/doc/doc-txt/ChangeLog diff --git a/doc/doc-txt/ChangeLog b/doc/doc-txt/ChangeLog index 0780fc7da..96cec2460 100644 --- a/doc/doc-txt/ChangeLog +++ b/doc/doc-txt/ChangeLog @@ -3,6 +3,13 @@ $Cambridge: exim/doc/doc-txt/ChangeLog,v 1.632 2010/06/12 15:21:25 jetmore Exp $ Change log file for Exim from version 4.21 ------------------------------------------- +Exim version 4.75 +----------------- + +NM/01 Workround for PCRE version dependancy in version reporting + Bugzilla 1073 + + Exim version 4.74 ----------------- @@ -27,6 +34,25 @@ PP/02 Let /dev/null have normal permissions. permissions on /dev/null. Exempt it from some checks. Reported by Andreas M. Kirchwitz. +PP/03 Report version information for many libraries, including + Exim version information for dynamically loaded libraries. Created + version.h, now support a version extension string for distributors + who patch heavily. Dynamic module ABI change. + +PP/04 CVE-2011-0017 - check return value of setuid/setgid. This is a + privilege escalation vulnerability whereby the Exim run-time user + can cause root to append content of the attacker's choosing to + arbitrary files. + +PP/05 Bugzilla 1041: merged DCC maintainer's fixes for return code. + (Wolfgang Breyha) + +PP/06 Bugzilla 1071: fix delivery logging with untrusted macros. + If dropping privileges for untrusted macros, we disabled normal logging + on the basis that it would fail; for the Exim run-time user, this is not + the case, and it resulted in successful deliveries going unlogged. + Fixed. Reported by Andreas Metzler. + Exim version 4.73 -----------------