Ad

CVE-2024-6387

HIGH CVSS 3.1: 8.1 EPSS 44.6%
Updated Sep 30, 2025
Debian
Parameter Value
CVSS 8.1 (HIGH)
Affected Versions 11.0.0 — 9.8
Fixed In 12.7.6
Type CWE-362 (Race Condition), CWE-364
Vendor Debian
Public PoC Yes

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
High
Difficult to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Vulnerable Products 120

Configuration From (including) Up to (excluding)
Sonicwall Sma_6200_Firmware
cpe:2.3:o:sonicwall:sma_6200_firmware:-:*:*:*:*:*:*:*
Sonicwall Sma_6200
cpe:2.3:h:sonicwall:sma_6200:-:*:*:*:*:*:*:*
Sonicwall Sma_7200_Firmware
cpe:2.3:o:sonicwall:sma_7200_firmware:-:*:*:*:*:*:*:*
Sonicwall Sma_7200
cpe:2.3:h:sonicwall:sma_7200:-:*:*:*:*:*:*:*
Arista Eos
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
4.32.0 <= 4.32.1f
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:23.10:*:*:*:*:*:*:*
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
Almalinux Almalinux
cpe:2.3:o:almalinux:almalinux:9.0:-:*:*:*:*:*:*
Sonicwall Sma_6210_Firmware
cpe:2.3:o:sonicwall:sma_6210_firmware:-:*:*:*:*:*:*:*
Sonicwall Sma_6210
cpe:2.3:h:sonicwall:sma_6210:-:*:*:*:*:*:*:*
Sonicwall Sma_7210_Firmware
cpe:2.3:o:sonicwall:sma_7210_firmware:-:*:*:*:*:*:*:*
Sonicwall Sma_7210
cpe:2.3:h:sonicwall:sma_7210:-:*:*:*:*:*:*:*
Sonicwall Sma_8200v_Firmware
cpe:2.3:o:sonicwall:sma_8200v_firmware:-:*:*:*:*:*:*:*
Sonicwall Sma_8200v
cpe:2.3:h:sonicwall:sma_8200v:-:*:*:*:*:*:*:*
Sonicwall Sra_Ex_7000_Firmware
cpe:2.3:o:sonicwall:sra_ex_7000_firmware:-:*:*:*:*:*:*:*
Sonicwall Sra_Ex_7000
cpe:2.3:h:sonicwall:sra_ex_7000:-:*:*:*:*:*:*:*
Netapp A1k_Firmware
cpe:2.3:o:netapp:a1k_firmware:-:*:*:*:*:*:*:*
Netapp A1k
cpe:2.3:h:netapp:a1k:-:*:*:*:*:*:*:*
Netapp A70_Firmware
cpe:2.3:o:netapp:a70_firmware:-:*:*:*:*:*:*:*
Netapp A70
cpe:2.3:h:netapp:a70:-:*:*:*:*:*:*:*
Netapp A90_Firmware
cpe:2.3:o:netapp:a90_firmware:-:*:*:*:*:*:*:*
Netapp A90
cpe:2.3:h:netapp:a90:-:*:*:*:*:*:*:*
Netapp A700s_Firmware
cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:*
Netapp A700s
cpe:2.3:h:netapp:a700s:-:*:*:*:*:*:*:*
Netapp 8300_Firmware
cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*
Netapp 8300
cpe:2.3:h:netapp:8300:-:*:*:*:*:*:*:*
Netapp 8700_Firmware
cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*
Netapp 8700
cpe:2.3:h:netapp:8700:-:*:*:*:*:*:*:*
Netapp A400_Firmware
cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*
Netapp A400
cpe:2.3:h:netapp:a400:-:*:*:*:*:*:*:*
Netapp C400_Firmware
cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:*
Netapp C400
cpe:2.3:h:netapp:c400:-:*:*:*:*:*:*:*
Netapp A250_Firmware
cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*
Netapp A250
cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*
Netapp 500f_Firmware
cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*
Netapp 500f
cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*
Netapp C250_Firmware
cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*
Netapp C250
cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:*
Netapp A800_Firmware
cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*
Netapp A800
cpe:2.3:h:netapp:a800:-:*:*:*:*:*:*:*
Netapp C800_Firmware
cpe:2.3:o:netapp:c800_firmware:-:*:*:*:*:*:*:*
Netapp C800
cpe:2.3:h:netapp:c800:-:*:*:*:*:*:*:*
Netapp A900_Firmware
cpe:2.3:o:netapp:a900_firmware:-:*:*:*:*:*:*:*
Netapp A900
cpe:2.3:h:netapp:a900:-:*:*:*:*:*:*:*
Netapp A9500_Firmware
cpe:2.3:o:netapp:a9500_firmware:-:*:*:*:*:*:*:*
Netapp A9500
cpe:2.3:h:netapp:a9500:-:*:*:*:*:*:*:*
Netapp C190_Firmware
cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*
Netapp C190
cpe:2.3:h:netapp:c190:-:*:*:*:*:*:*:*
Netapp A150_Firmware
cpe:2.3:o:netapp:a150_firmware:-:*:*:*:*:*:*:*
Netapp A150
cpe:2.3:h:netapp:a150:-:*:*:*:*:*:*:*
Netapp A220_Firmware
cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*
Netapp A220
cpe:2.3:h:netapp:a220:-:*:*:*:*:*:*:*
Netapp Fas2720_Firmware
cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*
Netapp Fas2720
cpe:2.3:h:netapp:fas2720:-:*:*:*:*:*:*:*
Netapp Fas2750_Firmware
cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*
Netapp Fas2750
cpe:2.3:h:netapp:fas2750:-:*:*:*:*:*:*:*
Netapp Fas2820_Firmware
cpe:2.3:o:netapp:fas2820_firmware:-:*:*:*:*:*:*:*
Netapp Fas2820
cpe:2.3:h:netapp:fas2820:-:*:*:*:*:*:*:*
Netapp Bootstrap_Os
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
Netapp Hci_Compute_Node
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
Apple Macos
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
12.0 12.7.6
Apple Macos
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
13.0 13.6.8
Apple Macos
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
14.0 14.6
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
4.4
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
8.6 <= 9.8
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:4.4:-:*:*:*:*:*:*
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:8.5:p1:*:*:*:*:*:*
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:8.6:-:*:*:*:*:*:*
Redhat Openshift_Container_Platform
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
Redhat Enterprise_Linux
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Eus
cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64_Eus
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems_Eus
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian_Eus
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_Aus
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*
Suse Linux_Enterprise_Micro
cpe:2.3:o:suse:linux_enterprise_micro:6.0:*:*:*:*:*:*:*
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:22.10:*:*:*:-:*:*:*
Canonical Ubuntu_Linux
cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:lts:*:*:*
Amazon Amazon_Linux
cpe:2.3:o:amazon:amazon_linux:2023.0:*:*:*:*:*:*:*
Netapp Active_Iq_Unified_Manager
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
Netapp E-Series_Santricity_Os_Controller
cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
11.0.0 <= 11.70.2
Netapp Ontap
cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
Netapp Ontap_Select_Deploy_Administration_Utility
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
Netapp Ontap_Tools
cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*
Netapp Ontap_Tools
cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p1:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p10:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p11:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p2:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p3:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p4:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p5:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p6:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p7:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p8:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.2:p9:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.3:-:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.3:p1:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.3:p2:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.3:p3:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:-:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:beta5:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:p1:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:p2:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:p3:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:p4:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:p5:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:p6:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:p7:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:rc3:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.0:rc4-p1:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.1:-:*:*:*:*:*:*
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.1:p1:*:*:*:*:*:*
Netbsd Netbsd
cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:*
<= 10.0.0

References 79

https://access.redhat.com/errata/RHSA-2024:4312
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:4340
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:4389
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:4469
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:4474
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:4479
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:4484
secalert@redhat.com
https://access.redhat.com/security/cve/CVE-2024-6387
secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2294604
secalert@redhat.com
https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
secalert@redhat.com
https://www.openssh.com/txt/release-9.8
secalert@redhat.com
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
secalert@redhat.com
http://seclists.org/fulldisclosure/2024/Jul/18
af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/fulldisclosure/2024/Jul/19
af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/fulldisclosure/2024/Jul/20
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/01/12
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/01/13
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/02/1
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/03/1
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/03/11
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/03/2
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/03/3
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/03/4
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/03/5
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/04/1
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/04/2
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/08/2
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/08/3
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/09/2
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/09/5
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/10/1
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/10/2
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/10/3
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/10/4
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/10/6
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/11/1
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/11/3
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/23/4
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/23/6
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/28/2
af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/07/28/3
af854a3a-2127-422b-91ae-364da2661108
https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgradi…
af854a3a-2127-422b-91ae-364da2661108
https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-g…
af854a3a-2127-422b-91ae-364da2661108
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-…
af854a3a-2127-422b-91ae-364da2661108
https://explore.alas.aws.amazon.com/CVE-2024-6387.html
af854a3a-2127-422b-91ae-364da2661108
https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132
af854a3a-2127-422b-91ae-364da2661108
https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc
af854a3a-2127-422b-91ae-364da2661108
https://github.com/AlmaLinux/updates/issues/629
af854a3a-2127-422b-91ae-364da2661108
https://github.com/Azure/AKS/issues/4379
af854a3a-2127-422b-91ae-364da2661108
https://github.com/PowerShell/Win32-OpenSSH/discussions/2248
af854a3a-2127-422b-91ae-364da2661108
https://github.com/PowerShell/Win32-OpenSSH/issues/2249
af854a3a-2127-422b-91ae-364da2661108
https://github.com/microsoft/azurelinux/issues/9555
af854a3a-2127-422b-91ae-364da2661108
https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19…
af854a3a-2127-422b-91ae-364da2661108
https://github.com/oracle/oracle-linux/issues/149
af854a3a-2127-422b-91ae-364da2661108
https://github.com/rapier1/hpn-ssh/issues/87
af854a3a-2127-422b-91ae-364da2661108
https://github.com/zgzhang/cve-2024-6387-poc
af854a3a-2127-422b-91ae-364da2661108
https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/2…
af854a3a-2127-422b-91ae-364da2661108
https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html
af854a3a-2127-422b-91ae-364da2661108
https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html
af854a3a-2127-422b-91ae-364da2661108
https://news.ycombinator.com/item?id=40843778
af854a3a-2127-422b-91ae-364da2661108
https://packetstorm.news/files/id/190587/
af854a3a-2127-422b-91ae-364da2661108
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010
af854a3a-2127-422b-91ae-364da2661108
https://security-tracker.debian.org/tracker/CVE-2024-6387
af854a3a-2127-422b-91ae-364da2661108
https://security.netapp.com/advisory/ntap-20240701-0001/
af854a3a-2127-422b-91ae-364da2661108
https://sig-security.rocky.page/issues/CVE-2024-6387/
af854a3a-2127-422b-91ae-364da2661108
https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execut…
af854a3a-2127-422b-91ae-364da2661108
https://support.apple.com/kb/HT214118
af854a3a-2127-422b-91ae-364da2661108
https://support.apple.com/kb/HT214119
af854a3a-2127-422b-91ae-364da2661108
https://support.apple.com/kb/HT214120
af854a3a-2127-422b-91ae-364da2661108
https://ubuntu.com/security/CVE-2024-6387
af854a3a-2127-422b-91ae-364da2661108
https://ubuntu.com/security/notices/USN-6859-1
af854a3a-2127-422b-91ae-364da2661108
https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regres…
af854a3a-2127-422b-91ae-364da2661108
https://www.arista.com/en/support/advisories-notices/security-advisory/19904-se…
af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/52269
af854a3a-2127-422b-91ae-364da2661108
https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc
af854a3a-2127-422b-91ae-364da2661108
https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerabil…
af854a3a-2127-422b-91ae-364da2661108
https://www.suse.com/security/cve/CVE-2024-6387.html
af854a3a-2127-422b-91ae-364da2661108
https://www.theregister.com/2024/07/01/regresshion_openssh/
af854a3a-2127-422b-91ae-364da2661108
https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-…
af854a3a-2127-422b-91ae-364da2661108