CVE-2024-6387

HIGH CVSS 3.1: 8,1 EPSS 44.6%
Обновлено 30 сентября 2025
Debian
Параметр Значение
CVSS 8,1 (HIGH)
Уязвимые версии 11.0.0 — 9.8
Устранено в версии 12.7.6
Тип уязвимости CWE-362 (Состояние гонки), CWE-364
Поставщик Debian
Публичный эксплойт Да

На сервере OpenSSH (sshd) была обнаружена регрессия безопасности (CVE-2006-5051). Существует состояние гонки, которое может привести к тому, что sshd будет обрабатывать некоторые сигналы небезопасным образом. Неаутентифицированный удаленный злоумышленник может запустить его, не сумев пройти аутентификацию в течение установленного периода времени.

Показать оригинальное описание (EN)

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

Характеристики атаки

Способ атаки
По сети
Атака возможна удалённо
Сложность
Высокая
Сложно эксплуатировать
Нужны права
Не требуются
Права не нужны
Участие пользователя
Не требуется
Не нужно действие пользователя

Последствия

Конфиденциальность
Высокое
Полная утечка данных
Целостность
Высокое
Полная модификация данных
Доступность
Высокое
Полный отказ в обслуживании

Строка CVSS v3.1

Уязвимые продукты 120

Конфигурация От (включительно) До (исключительно)
Sonicwall Sma_6200_Firmware
cpe:2.3:o:sonicwall:sma_6200_firmware:-:*:*:*:*:*:*:*
Sonicwall Sma_6200
cpe:2.3:h:sonicwall:sma_6200:-:*:*:*:*:*:*:*
Sonicwall Sma_7200_Firmware
cpe:2.3:o:sonicwall:sma_7200_firmware:-:*:*:*:*:*:*:*
Sonicwall Sma_7200
cpe:2.3:h:sonicwall:sma_7200:-:*:*:*:*:*:*:*
Arista Eos
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
4.32.0 <= 4.32.1f
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:23.10:*:*:*:*:*:*:*
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
Almalinux Almalinux
cpe:2.3:o:almalinux:almalinux:9.0:-:*:*:*:*:*:*
Sonicwall Sma_6210_Firmware
cpe:2.3:o:sonicwall:sma_6210_firmware:-:*:*:*:*:*:*:*
Sonicwall Sma_6210
cpe:2.3:h:sonicwall:sma_6210:-:*:*:*:*:*:*:*
Sonicwall Sma_7210_Firmware
cpe:2.3:o:sonicwall:sma_7210_firmware:-:*:*:*:*:*:*:*
Sonicwall Sma_7210
cpe:2.3:h:sonicwall:sma_7210:-:*:*:*:*:*:*:*
Sonicwall Sma_8200v_Firmware
cpe:2.3:o:sonicwall:sma_8200v_firmware:-:*:*:*:*:*:*:*
Sonicwall Sma_8200v
cpe:2.3:h:sonicwall:sma_8200v:-:*:*:*:*:*:*:*
Sonicwall Sra_Ex_7000_Firmware
cpe:2.3:o:sonicwall:sra_ex_7000_firmware:-:*:*:*:*:*:*:*
Sonicwall Sra_Ex_7000
cpe:2.3:h:sonicwall:sra_ex_7000:-:*:*:*:*:*:*:*
Netapp A1k_Firmware
cpe:2.3:o:netapp:a1k_firmware:-:*:*:*:*:*:*:*
Netapp A1k
cpe:2.3:h:netapp:a1k:-:*:*:*:*:*:*:*
Netapp A70_Firmware
cpe:2.3:o:netapp:a70_firmware:-:*:*:*:*:*:*:*
Netapp A70
cpe:2.3:h:netapp:a70:-:*:*:*:*:*:*:*
Netapp A90_Firmware
cpe:2.3:o:netapp:a90_firmware:-:*:*:*:*:*:*:*
Netapp A90
cpe:2.3:h:netapp:a90:-:*:*:*:*:*:*:*
Netapp A700s_Firmware
cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:*
Netapp A700s
cpe:2.3:h:netapp:a700s:-:*:*:*:*:*:*:*
Netapp 8300_Firmware
cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*
Netapp 8300
cpe:2.3:h:netapp:8300:-:*:*:*:*:*:*:*
Netapp 8700_Firmware
cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*
Netapp 8700
cpe:2.3:h:netapp:8700:-:*:*:*:*:*:*:*
Netapp A400_Firmware
cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*
Netapp A400
cpe:2.3:h:netapp:a400:-:*:*:*:*:*:*:*
Netapp C400_Firmware
cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:*
Netapp C400
cpe:2.3:h:netapp:c400:-:*:*:*:*:*:*:*
Netapp A250_Firmware
cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*
Netapp A250
cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*
Netapp 500f_Firmware
cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*
Netapp 500f
cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*
Netapp C250_Firmware
cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*
Netapp C250
cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:*
Netapp A800_Firmware
cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*
Netapp A800
cpe:2.3:h:netapp:a800:-:*:*:*:*:*:*:*
Netapp C800_Firmware
cpe:2.3:o:netapp:c800_firmware:-:*:*:*:*:*:*:*
Netapp C800
cpe:2.3:h:netapp:c800:-:*:*:*:*:*:*:*
Netapp A900_Firmware
cpe:2.3:o:netapp:a900_firmware:-:*:*:*:*:*:*:*
Netapp A900
cpe:2.3:h:netapp:a900:-:*:*:*:*:*:*:*
Netapp A9500_Firmware
cpe:2.3:o:netapp:a9500_firmware:-:*:*:*:*:*:*:*
Netapp A9500
cpe:2.3:h:netapp:a9500:-:*:*:*:*:*:*:*
Netapp C190_Firmware
cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*
Netapp C190
cpe:2.3:h:netapp:c190:-:*:*:*:*:*:*:*
Netapp A150_Firmware
cpe:2.3:o:netapp:a150_firmware:-:*:*:*:*:*:*:*
Netapp A150
cpe:2.3:h:netapp:a150:-:*:*:*:*:*:*:*
Netapp A220_Firmware
cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*
Netapp A220
cpe:2.3:h:netapp:a220:-:*:*:*:*:*:*:*
Netapp Fas2720_Firmware
cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*
Netapp Fas2720
cpe:2.3:h:netapp:fas2720:-:*:*:*:*:*:*:*
Netapp Fas2750_Firmware
cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*
Netapp Fas2750
cpe:2.3:h:netapp:fas2750:-:*:*:*:*:*:*:*
Netapp Fas2820_Firmware
cpe:2.3:o:netapp:fas2820_firmware:-:*:*:*:*:*:*:*
Netapp Fas2820
cpe:2.3:h:netapp:fas2820:-:*:*:*:*:*:*:*
Netapp Bootstrap_Os
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
Netapp Hci_Compute_Node
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
Apple Macos
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
12.0 12.7.6
Apple Macos
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
13.0 13.6.8
Apple Macos
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
14.0 14.6
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
4.4
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
8.6 <= 9.8
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:4.4:-:*:*:*:*:*:*
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:8.5:p1:*:*:*:*:*:*
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:8.6:-:*:*:*:*:*:*
Redhat Openshift_Container_Platform
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
Redhat Enterprise_Linux
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Eus
cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64_Eus
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems_Eus
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian_Eus
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_Aus
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*
Suse Linux_Enterprise_Micro
cpe:2.3:o:suse:linux_enterprise_micro:6.0:*:*:*:*:*:*:*
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:22.10:*:*:*:-:*:*:*
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:lts:*:*:*
Amazon Amazon_Linux
cpe:2.3:o:amazon:amazon_linux:2023.0:*:*:*:*:*:*:*
Netapp Active_Iq_Unified_Manager
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
Netapp E-Series_Santricity_Os_Controller
cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
11.0.0 <= 11.70.2
Netapp Ontap
cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
Netapp Ontap_Select_Deploy_Administration_Utility
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
Netapp Ontap_Tools
cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*
Netapp Ontap_Tools
cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p1:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p10:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p11:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p2:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p3:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p4:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p5:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p6:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p7:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p8:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p9:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.3:-:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.3:p1:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.3:p2:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.3:p3:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:-:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:beta5:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:p1:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:p2:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:p3:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:p4:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:p5:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:p6:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:p7:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:rc3:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:rc4-p1:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.1:-:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.1:p1:*:*:*:*:*:*
Netbsd Netbsd
cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:*
<= 10.0.0

Ссылки 79

https://access.redhat.com/errata/RHSA-2024:4312
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:4340
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:4389
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:4469
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:4474
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:4479
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:4484
secalert@redhat.com
https://access.redhat.com/security/cve/CVE-2024-6387
secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2294604
secalert@redhat.com
https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
secalert@redhat.com
https://www.openssh.com/txt/release-9.8
secalert@redhat.com
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
secalert@redhat.com
http://seclists.org/fulldisclosure/2024/Jul/18
af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/fulldisclosure/2024/Jul/19
af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/fulldisclosure/2024/Jul/20
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/01/12
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/01/13
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/02/1
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/03/1
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/03/11
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/03/2
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/03/3
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/03/4
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/03/5
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/04/1
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/04/2
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/08/2
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/08/3
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/09/2
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/09/5
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/10/1
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/10/2
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/10/3
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/10/4
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/10/6
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/11/1
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/11/3
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/23/4
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/23/6
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/28/2
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/28/3
af854a3a-2127-422b-91ae-364da2661108
https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgradi…
af854a3a-2127-422b-91ae-364da2661108
https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-g…
af854a3a-2127-422b-91ae-364da2661108
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-…
af854a3a-2127-422b-91ae-364da2661108
https://explore.alas.aws.amazon.com/CVE-2024-6387.html
af854a3a-2127-422b-91ae-364da2661108
https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132
af854a3a-2127-422b-91ae-364da2661108
https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc
af854a3a-2127-422b-91ae-364da2661108
https://github.com/AlmaLinux/updates/issues/629
af854a3a-2127-422b-91ae-364da2661108
https://github.com/Azure/AKS/issues/4379
af854a3a-2127-422b-91ae-364da2661108
https://github.com/PowerShell/Win32-OpenSSH/discussions/2248
af854a3a-2127-422b-91ae-364da2661108
https://github.com/PowerShell/Win32-OpenSSH/issues/2249
af854a3a-2127-422b-91ae-364da2661108
https://github.com/microsoft/azurelinux/issues/9555
af854a3a-2127-422b-91ae-364da2661108
https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19…
af854a3a-2127-422b-91ae-364da2661108
https://github.com/oracle/oracle-linux/issues/149
af854a3a-2127-422b-91ae-364da2661108
https://github.com/rapier1/hpn-ssh/issues/87
af854a3a-2127-422b-91ae-364da2661108
https://github.com/zgzhang/cve-2024-6387-poc
af854a3a-2127-422b-91ae-364da2661108
https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/2…
af854a3a-2127-422b-91ae-364da2661108
https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html
af854a3a-2127-422b-91ae-364da2661108
https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html
af854a3a-2127-422b-91ae-364da2661108
https://news.ycombinator.com/item?id=40843778
af854a3a-2127-422b-91ae-364da2661108
https://packetstorm.news/files/id/190587/
af854a3a-2127-422b-91ae-364da2661108
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010
af854a3a-2127-422b-91ae-364da2661108
https://security-tracker.debian.org/tracker/CVE-2024-6387
af854a3a-2127-422b-91ae-364da2661108
https://security.netapp.com/advisory/ntap-20240701-0001/
af854a3a-2127-422b-91ae-364da2661108
https://sig-security.rocky.page/issues/CVE-2024-6387/
af854a3a-2127-422b-91ae-364da2661108
https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execut…
af854a3a-2127-422b-91ae-364da2661108
https://support.apple.com/kb/HT214118
af854a3a-2127-422b-91ae-364da2661108
https://support.apple.com/kb/HT214119
af854a3a-2127-422b-91ae-364da2661108
https://support.apple.com/kb/HT214120
af854a3a-2127-422b-91ae-364da2661108
https://ubuntu.com/security/CVE-2024-6387
af854a3a-2127-422b-91ae-364da2661108
https://ubuntu.com/security/notices/USN-6859-1
af854a3a-2127-422b-91ae-364da2661108
https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regres…
af854a3a-2127-422b-91ae-364da2661108
https://www.arista.com/en/support/advisories-notices/security-advisory/19904-se…
af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/52269
af854a3a-2127-422b-91ae-364da2661108
https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc
af854a3a-2127-422b-91ae-364da2661108
https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerabil…
af854a3a-2127-422b-91ae-364da2661108
https://www.suse.com/security/cve/CVE-2024-6387.html
af854a3a-2127-422b-91ae-364da2661108
https://www.theregister.com/2024/07/01/regresshion_openssh/
af854a3a-2127-422b-91ae-364da2661108
https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-…
af854a3a-2127-422b-91ae-364da2661108