From mboxrd@z Thu Jan 1 00:00:00 1970 From: Artyom Poptsov Subject: Re: libssh upgraded; guile-ssh fails its tests Date: Fri, 04 Apr 2014 23:17:15 +0400 Message-ID: <87eh1cx5tw.fsf@elephant.savannah> References: <8761mrk6f8.fsf@yeeloong.lan> <87ha69ay8w.fsf@gnu.org> <87mwg1vyyr.fsf@elephant.savannah> <87vbupufxr.fsf@yeeloong.lan> Mime-Version: 1.0 Content-Type: text/plain Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:38046) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1WW9bo-0003Jf-I0 for guix-devel@gnu.org; Fri, 04 Apr 2014 15:17:04 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1WW9bk-00047F-Ga for guix-devel@gnu.org; Fri, 04 Apr 2014 15:17:00 -0400 In-Reply-To: <87vbupufxr.fsf@yeeloong.lan> (Mark H. Weaver's message of "Fri, 04 Apr 2014 14:07:12 -0400") List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-devel-bounces+gcggd-guix-devel=m.gmane.org@gnu.org Sender: guix-devel-bounces+gcggd-guix-devel=m.gmane.org@gnu.org To: Mark H Weaver Cc: guix-devel@gnu.org Hello Mark, thank you for pointing me out to this problem. I do understand that due to the aforementioned vulnerability Guile-SSH cannot do its job well. So I'll port Guile-SSH to libssh 0.6.3 where the vulnerability was closed. I think this solution is acceptable. - Artyom -- Artyom Poptsov Home page: http://poptsov-artyom.narod.ru/ JID: avp@xmpp.ru Nizhny Novgorod Linux Users Group (NNLUG) member: http://nnlug.ru/ CADR hackerspace founder: http://cadrspace.ru/