summary refs log tree commit diff
path: root/gnu/packages
diff options
context:
space:
mode:
authorTobias Geerinckx-Rice <me@tobias.gr>2020-01-29 00:52:20 +0100
committerTobias Geerinckx-Rice <me@tobias.gr>2020-01-29 00:54:46 +0100
commite19e3430cdb7c884ac6f91a618aafa6bb94554be (patch)
tree4de0ce2cab74428cba40ca8a5a7666acf2eda66d /gnu/packages
parent24882d3d9a0529f34217aac2da2c8d6e2a076a63 (diff)
downloadguix-e19e3430cdb7c884ac6f91a618aafa6bb94554be.tar.gz
gnu: opensmtpd-next: Update to 6.6.2p1 [security fixes].
Upstream[0] says “Qualys has found a critical vulnerability leading to
a possible privilege escalation” and will provide more information
later.

[0]: https://www.opensmtpd.org

* gnu/packages/mail.scm (opensmtpd-next): Update to 6.6.2p1.
Diffstat (limited to 'gnu/packages')
-rw-r--r--gnu/packages/mail.scm4
1 files changed, 2 insertions, 2 deletions
diff --git a/gnu/packages/mail.scm b/gnu/packages/mail.scm
index baae1d29f4..aa37c4e38c 100644
--- a/gnu/packages/mail.scm
+++ b/gnu/packages/mail.scm
@@ -2367,14 +2367,14 @@ e-mails with other systems speaking the SMTP protocol.")
 (define-public opensmtpd-next
   (package
     (name "opensmtpd-next")
-    (version "6.6.1p1")
+    (version "6.6.2p1")
     (source
      (origin
        (method url-fetch)
        (uri (string-append "https://www.opensmtpd.org/archives/"
                            "opensmtpd-" version ".tar.gz"))
        (sha256
-        (base32 "1ngil8j13m2rq07g94j4yjr6zmaimzy8wbfr17shi7rxnazys6zb"))))
+        (base32 "16nz2n4s3djlasd6m6dqfwggf6igyfxzq5igny5i0qb8lnn13f33"))))
     (build-system gnu-build-system)
     (inputs
      `(("bdb" ,bdb)