From e19e3430cdb7c884ac6f91a618aafa6bb94554be Mon Sep 17 00:00:00 2001 From: Tobias Geerinckx-Rice Date: Wed, 29 Jan 2020 00:52:20 +0100 Subject: [PATCH] gnu: opensmtpd-next: Update to 6.6.2p1 [security fixes]. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Upstream[0] says “Qualys has found a critical vulnerability leading to a possible privilege escalation” and will provide more information later. [0]: https://www.opensmtpd.org * gnu/packages/mail.scm (opensmtpd-next): Update to 6.6.2p1. --- gnu/packages/mail.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/mail.scm b/gnu/packages/mail.scm index baae1d29f4..aa37c4e38c 100644 --- a/gnu/packages/mail.scm +++ b/gnu/packages/mail.scm @@ -2367,14 +2367,14 @@ (define-public opensmtpd (define-public opensmtpd-next (package (name "opensmtpd-next") - (version "6.6.1p1") + (version "6.6.2p1") (source (origin (method url-fetch) (uri (string-append "https://www.opensmtpd.org/archives/" "opensmtpd-" version ".tar.gz")) (sha256 - (base32 "1ngil8j13m2rq07g94j4yjr6zmaimzy8wbfr17shi7rxnazys6zb")))) + (base32 "16nz2n4s3djlasd6m6dqfwggf6igyfxzq5igny5i0qb8lnn13f33")))) (build-system gnu-build-system) (inputs `(("bdb" ,bdb)