Tobias Geerinckx-Rice <m...@tobias.gr> writes:

> Fellow Guix running opensmtpd mail servers,
>
> As you probably know by now, a serious remote code execution bug was
> recently found and fixed in OpenSMTPd[0].
>
> TL;DR: You should probably stop your opensmtpd daemon until you've
> checked that our regular opensmtpd package (6.0.3p1) is not
> vulnerable.  If possible, switch to opensmtpd-next and adapt your
> configuration syntax:
>
>    (service opensmtpd-service-type
>         (opensmtpd-configuration
>          (package opensmtpd-next)
>          (config-file (plain-file "smtpd.conf"
>                       "include
> "/etc/guix/mail/my-new-smtpd.conf"\n"))))
>

I just upgrade my vulnerable opensmtpd 6.6.1p1 to 6.6.2p2, thank you
very much!

Reply via email to