No need to panic, but grab those updates or mitigations anyway just to be safe
A vulnerability in the SSH protocol can be exploited by a well-placed adversary to weaken the security of people’s connections, if conditions are right.…
This article has been indexed from The Register – Security