aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTobias Geerinckx-Rice <me@tobias.gr>2020-01-29 00:52:20 +0100
committerTobias Geerinckx-Rice <me@tobias.gr>2020-01-29 00:54:46 +0100
commite19e3430cdb7c884ac6f91a618aafa6bb94554be (patch)
tree4de0ce2cab74428cba40ca8a5a7666acf2eda66d
parent24882d3d9a0529f34217aac2da2c8d6e2a076a63 (diff)
downloadpatches-e19e3430cdb7c884ac6f91a618aafa6bb94554be.tar
patches-e19e3430cdb7c884ac6f91a618aafa6bb94554be.tar.gz
gnu: opensmtpd-next: Update to 6.6.2p1 [security fixes].
Upstream[0] says “Qualys has found a critical vulnerability leading to a possible privilege escalation” and will provide more information later. [0]: https://www.opensmtpd.org * gnu/packages/mail.scm (opensmtpd-next): Update to 6.6.2p1.
-rw-r--r--gnu/packages/mail.scm4
1 files changed, 2 insertions, 2 deletions
diff --git a/gnu/packages/mail.scm b/gnu/packages/mail.scm
index baae1d29f4..aa37c4e38c 100644
--- a/gnu/packages/mail.scm
+++ b/gnu/packages/mail.scm
@@ -2367,14 +2367,14 @@ e-mails with other systems speaking the SMTP protocol.")
(define-public opensmtpd-next
(package
(name "opensmtpd-next")
- (version "6.6.1p1")
+ (version "6.6.2p1")
(source
(origin
(method url-fetch)
(uri (string-append "https://www.opensmtpd.org/archives/"
"opensmtpd-" version ".tar.gz"))
(sha256
- (base32 "1ngil8j13m2rq07g94j4yjr6zmaimzy8wbfr17shi7rxnazys6zb"))))
+ (base32 "16nz2n4s3djlasd6m6dqfwggf6igyfxzq5igny5i0qb8lnn13f33"))))
(build-system gnu-build-system)
(inputs
`(("bdb" ,bdb)