* Thijs Kinkhorst:

> However, one consistent claim is that the "current version" of OpenSSH
> isn't affected. It would make sense to me to get at least unstable/sid
> updated with the most recent upstream version, as it wouldn't hurt. Do you
> as openssh maintainers think you can do this in the short term? This is at
> least some potentially mitigating action we can already take.

The last time we did something similar in the wake of an OpenSSH
vulnerability, we *introduced* the vulnerability.  And I strongly
object to rumor-driven software development.

(This does not however invalidate any other reason why it an upload of
a new upstream version is warranted.)



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to