Spiped just 'pipes' an SSH connection from one point to another. It's essentially a very thin VPN.
But this bug is exploited via authenticated users. If you're using ssh keys (...you are, aren't you?) you would basically already need a valid SSH login to use this vuln; if nobody but you has an ssh key login, you're safe. This vulnerability may still affect you - even with spiped - depending on who has an ssh key login to your box.
(And this thinking that you can just 'wrap another layer of encryption/abstraction' around a problem, is why we can't have nice things)
Spiped just 'pipes' an SSH connection from one point to another. It's essentially a very thin VPN.
But this bug is exploited via authenticated users. If you're using ssh keys (...you are, aren't you?) you would basically already need a valid SSH login to use this vuln; if nobody but you has an ssh key login, you're safe. This vulnerability may still affect you - even with spiped - depending on who has an ssh key login to your box.
(And this thinking that you can just 'wrap another layer of encryption/abstraction' around a problem, is why we can't have nice things)