Event JSON
{
"id": "4a081f2ab46719ca3a2d2bbc2c5eb191afc8b28a8de62e7fb8bfd1b31af2247b",
"pubkey": "dfc428b2e21b2b2a0e0a6f9f0e4d54a82eea42bf5415dda75336b11c8427ad43",
"created_at": 1719958692,
"kind": 1,
"tags": [
[
"e",
"94c402beb530cef27695abfaef127f4714256501ca33b9c11da3e4862ad35259",
"",
"root"
],
[
"e",
"d0e0482b3ffe5f9e0cf7b40f3416ab89818724ef838e2c0e4c0e5afa3a899d1a",
"",
"reply"
],
[
"p",
"d164d78c0b58edeb22d54942ccf2f8155befa45dc0e3717cc1f81d0f113451bf",
"",
"mention"
],
[
"p",
"db8b44433b49ac07c576a9cd59b74e6391e13f7637afa64d5f9bfe46640470d3"
],
[
"r",
"https://security-tracker.debian.org/tracker/CVE-2024-6387"
]
],
"content": "I might jump in here.\n\nsudo apt-get update\nsudo apt-get upgrade openssh-server\n\nas stated by nostr:nprofile1qqsdzexh3s943m0tyt25jskv7tup2kl053wupcm30nqls8g0zy69r0cpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgqgjwaehxw309ac82unsd3jhqct89ejhxqg5waehxw309aex2mrp0yhxgctdw4eju6t07jl2uc is correct. The bug has been fixed in the latest Debian openssh-server package. Which means this package has to be upgraded.\n\n(The first command \"apt-get update\" just fetches the newest package list).\nhttps://security-tracker.debian.org/tracker/CVE-2024-6387",
"sig": "12f092137a63d6ced7dd8177bf68eb987ecb79cbda3d106461c9b9062ac9e09a4aa43a4bf5ba370e59bdad1253e78169c005b0a2b9d5c8274444445be8798555"
}