diff options
author | Tobias Geerinckx-Rice <me@tobias.gr> | 2020-01-29 00:52:20 +0100 |
---|---|---|
committer | Tobias Geerinckx-Rice <me@tobias.gr> | 2020-01-29 00:54:46 +0100 |
commit | e19e3430cdb7c884ac6f91a618aafa6bb94554be (patch) | |
tree | 4de0ce2cab74428cba40ca8a5a7666acf2eda66d /gnu | |
parent | 24882d3d9a0529f34217aac2da2c8d6e2a076a63 (diff) | |
download | guix-e19e3430cdb7c884ac6f91a618aafa6bb94554be.tar.gz |
gnu: opensmtpd-next: Update to 6.6.2p1 [security fixes].
Upstream[0] says “Qualys has found a critical vulnerability leading to a possible privilege escalation” and will provide more information later. [0]: https://www.opensmtpd.org * gnu/packages/mail.scm (opensmtpd-next): Update to 6.6.2p1.
Diffstat (limited to 'gnu')
-rw-r--r-- | gnu/packages/mail.scm | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/gnu/packages/mail.scm b/gnu/packages/mail.scm index baae1d29f4..aa37c4e38c 100644 --- a/gnu/packages/mail.scm +++ b/gnu/packages/mail.scm @@ -2367,14 +2367,14 @@ e-mails with other systems speaking the SMTP protocol.") (define-public opensmtpd-next (package (name "opensmtpd-next") - (version "6.6.1p1") + (version "6.6.2p1") (source (origin (method url-fetch) (uri (string-append "https://www.opensmtpd.org/archives/" "opensmtpd-" version ".tar.gz")) (sha256 - (base32 "1ngil8j13m2rq07g94j4yjr6zmaimzy8wbfr17shi7rxnazys6zb")))) + (base32 "16nz2n4s3djlasd6m6dqfwggf6igyfxzq5igny5i0qb8lnn13f33")))) (build-system gnu-build-system) (inputs `(("bdb" ,bdb) |