Distros list statistics and data for 2024

Statistics by month

Statistics are grouped by month of the issue being reported to the private list.

Month All reports Embargoed Average Median Min Max embargo days
2024-01 9 9 9.18 8.79 1.09 14.12
2024-02 6 6 2.13 1.33 0.77 6.96
2024-03 9 9 7.23 7.97 1.15 12.53
2024-04 4 3 7.83 7.45 2.03 14.00
2024-05 3 3 4.05 5.05 1.07 6.04
2024-06 6 6 7.84 9.31 1.53 12.49
2024-07 5 5 5.08 6.84 0.90 8.37
2024-08 2 2 11.15 11.15 7.93 14.37
2024-09 5 5 6.22 7.20 0.44 9.15
2024-10 3 3 6.97 7.37 5.63 7.90
2024-11 2 2 11.32 11.32 7.88 14.75
Total 54 53 6.90 7.37 0.44 14.75

Non-embargoed reports (issue already posted to oss-security before being brought to (linux-)distros, which in 2024 so far only occurred once) are excluded from the calculation of average, median, and minimum embargo duration above.

Formatted input data

For the statistics above, we only use the first embargo duration seen in this table, which is the delay between postings to (linux-)distros and oss-security.

For some reports, there's a second embargo duration - that one is the delay (sometimes negative) between a first public posting elsewhere and the posting to (linux-)distros. Such first public posting often does not fully (or at all) reveal security relevance of the issue/fix, making it not-too-unreasonable to allow a little bit (more) of embargo time on the full detail, especially when that's the issue reporter's and/or the upstream project's preference.

Project Subjects/titles/links Time at distros (UTC)
… oss-security (UTC)
Elsewhere (UTC)
Embargo days Planned CRD(s)
(exact wording)
CVE(s)
Mock [vs-plain] Mock: Privilege escalation for users that can access mock configuration
[oss-security] CVE-2023-6395 Mock: Privilege escalation for users that can access mock configuration
Mon Jan 08 20:42:02 2024
Tue Jan 16 14:37:14 2024
7.75 January 16th 2024 at 1 PM UTC CVE-2023-6395
Mock, Snap Re: [vs-plain] Mock: Privilege escalation for users that can access mock configuration
[oss-security] Mock, Snap, LXC expose(d) chroot, container trees with unsafe permissions and contents to host users, pose risk to host
Mon Jan 08 21:24:02 2024
Tue Jan 16 20:35:56 2024
7.97 January 16
X.Org X server and Xwayland [vs-plain] Embargoed X.Org Security Advisory: Issues in X server and Xwayland
[oss-security] Fwd: X.Org Security Advisory: Issues in X.Org X server prior to 21.1.11 and Xwayland prior to 23.2.4
https://lists.x.org/archives/xorg-announce/2024-January/003444.html
Tue Jan 09 07:12:50 2024
Thu Jan 18 09:21:40 2024
Tue Jan 16 14:24:36 2024
9.09
7.30
January 16, 2024 00:00 UTC CVE-2023-6816
CVE-2024-0229
CVE-2024-21885
CVE-2024-21886
CVE-2024-0409
CVE-2024-0408
Linux PAM pam_namespace [vs] encrypted subject
[oss-security] pam: pam_namespace misses O_DIRECTORY flag in `protect_dir()` (CVE-2024-22365)
https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0
Tue Jan 09 14:49:28 2024
Thu Jan 18 09:48:33 2024
Wed Jan 17 15:17:00 2024
8.79
8.02
2024-01-17 CVE-2024-22365
glibc [vs] CVE-2023-6246, CVE-2023-6779, CVE-2023-6780
[oss-security] CVE-2023-6246: Heap-based buffer overflow in the glibc's syslog()
Tue Jan 16 15:39:22 2024
Tue Jan 30 18:29:25 2024
14.12 Tuesday, January 30, 2024, 18:00 UTC CVE-2023-6246
CVE-2023-6779
CVE-2023-6780
glibc [vs] Second advisory
[oss-security] Out-of-bounds read & write in the glibc's qsort()
Tue Jan 16 16:02:18 2024
Tue Jan 30 18:37:31 2024
14.11 Tuesday, January 30, 2024, 18:00 UTC
coreutils [vs] …
[oss-security] GNU coreutils v9.4; v9.3; v9.2 split heap buffer overflow vulnerability
https://github.com/coreutils/coreutils/commit/c4c5ed8f4e9cd55a12966d4f520e3a13101637d9
Wed Jan 17 07:18:25 2024
Thu Jan 18 09:22:16 2024
Wed Jan 17 20:19:00 2024
1.09
0.54
CVE-2024-0684
curl [vs-plain] : curl pre-notification: CVE-2024-0853: OCSP verification bypass with TLS session reuse
[oss-security] [SECURITY ADVISORY] curl: CVE-2024-0853 : OCSP verification bypass with TLS session reuse
https://github.com/curl/curl/commit/c28e9478cb2548848ec
Wed Jan 24 09:26:59 2024
Wed Jan 31 07:10:04 2024
Tue Jan 23 07:26:00 2024
6.90
-1.08
January 31 2024 around 07:00 UTC CVE-2024-0853
grub2-set-bootflag [vs] grub-set-bootflag
[oss-security] CVE-2024-1048: grub2-set-bootflag may be abused to fill up /boot, bypass RLIMIT_NPROC
Wed Jan 24 22:07:37 2024
Tue Feb 06 17:01:28 2024
12.79 January 31
Feb 6th
CVE-2024-1048
Open vSwitch [vs-plain] [ADVISORY] CVE-2023-3966: Open vSwitch: Invalid memory access in Geneve with HW offload.
[oss-security] [ADVISORY] CVE-2023-3966: Open vSwitch: Invalid memory access in Geneve with HW offload.
Thu Feb 01 21:07:08 2024
Thu Feb 08 20:13:41 2024
6.96 08-Feb-2024 CVE-2023-3966
Unbound [vs] …
[oss-security] Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilities
Mon Feb 12 08:50:19 2024
Tue Feb 13 14:23:55 2024
1.23 “not before 12:00 UTC” on 13 February 2024 CVE-2023-50387
CVE-2023-50868
PowerDNS Recursor [vs-plain] PowerDNS pre-notification: EMBARGO: PowerDNS Security Advisory 2024-01: crafted DNSSEC records in a zone can lead to a denial of service in Recursor
Re: [oss-security] Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilities
https://github.com/PowerDNS/pdns/pull/13781
Mon Feb 12 11:31:30 2024
Tue Feb 13 21:49:40 2024
Tue Feb 13 12:01:00 2024
1.43
1.02
13th of February 2024 CVE-2023-50387
CVE-2023-50868
BIND 9 [vs] …
[oss-security] ISC has disclosed six vulnerabilities in BIND 9 (CVE-2023-4408, CVE-2023-5517, CVE-2023-5679, CVE-2023-6516, CVE-2023-50387, CVE-2023-50868)
Mon Feb 12 15:34:41 2024
Tue Feb 13 14:23:37 2024
0.95 13 February 2024 CVE-2023-4408
CVE-2023-5517
CVE-2023-5679
CVE-2023-6516
CVE-2023-50387
CVE-2023-50868
EDK2 based Virtual Machine firmware [vs-plain] Secure Boot bypass in EDK2 based Virtual Machine firmware
[oss-security] Secure Boot bypass in EDK2 based Virtual Machine firmware
Tue Feb 13 03:44:41 2024
Wed Feb 14 14:48:15 2024
1.46 February 14th 2024 at 13:00 UTC+0 CVE-2023-48733
CVE-2023-49721
c-ares [vs-plain] c-ares security vuln
[oss-security] c-ares CVE-2024-25629
Thu Feb 22 18:12:49 2024
Fri Feb 23 12:40:51 2024
0.77 2/23/2024 CVE-2024-25629
Open Virtual Network [vs-plain] [ADVISORY] CVE-2024-2182: Open Virtual Network: Insufficient validation of incoming BFD packets.
[oss-security] [ADVISORY] CVE-2024-2182: Open Virtual Network: Insufficient validation of incoming BFD packets.
Tue Mar 05 16:01:37 2024
Tue Mar 12 14:13:02 2024
6.92 12-Mar-2024 CVE-2024-2182
curl [vs-plain] : curl pre-notification: CVE-2024-2004: Usage of disabled protocol
[oss-security] [SECURITY ADVISORY] curl: CVE-2024-2004: Usage of disabled protocol
Tue Mar 19 07:38:44 2024
Wed Mar 27 06:53:23 2024
7.97 March 27 CVE-2024-2004
curl [vs-plain] : curl pre-notification: CVE-2024-2379: QUIC certificate check bypass with wolfSSL
[oss-security] [SECURITY ADVISORY] curl: CVE-2024-2379: QUIC certificate check bypass with wolfSSL
Tue Mar 19 07:38:49 2024
Wed Mar 27 06:53:29 2024
7.97 March 27 CVE-2024-2379
curl [vs-plain] : curl pre-notification: CVE-2024-2398: HTTP/2 push headers memory-leak
[oss-security] [SECURITY ADVISORY] curl: CVE-2024-2398: HTTP/2 push headers memory-leak
Tue Mar 19 07:38:56 2024
Wed Mar 27 06:53:34 2024
7.97 March 27 CVE-2024-2398
curl [vs-plain] : curl pre-notification: CVE-2024-2466: TLS certificate check bypass with mbedTLS
[oss-security] [SECURITY ADVISORY] curl: CVE-2024-2466: TLS certificate check bypass with mbedTLS
Tue Mar 19 07:39:03 2024
Wed Mar 27 06:53:36 2024
7.97 March 27 CVE-2024-2466
util-linux [vs-plain] ANSI Escape sequence injection in wall (CVE-2024-28085)
[oss-security] CVE-2024-28085: Escape sequence injection in util-linux wall
Wed Mar 20 18:40:50 2024
Wed Mar 27 15:11:25 2024
6.85 March 27
xz [vs] Easter Eggs
[oss-security] backdoor in upstream xz/liblzma leading to ssh server compromise
Thu Mar 28 12:23:26 2024
Fri Mar 29 16:03:34 2024
1.15 tomorrow CVE-2024-3094
X.Org X server, Xwayland [vs-plain] Embargoed X.Org Security Advisory: Multiple issues in X servers
[oss-security] Fwd: X.Org Security Advisory: Issues in X.Org X server prior to 21.1.12 and Xwayland prior to 23.2.5
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=69762
Fri Mar 29 01:29:54 2024
Wed Apr 03 18:47:44 2024
Tue Mar 12 20:38:02 2024
5.72
-16.20
April 3, 2024 CVE-2024-31080
CVE-2024-31081
CVE-2024-31082
CVE-2024-31083
Linux [vs-plain] Skbuff null ptr derefence 0day potential LPE
[oss-security] CVE-2024-1086: Linux: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
Fri Mar 29 10:14:05 2024
Wed Apr 10 22:51:45 2024
Sat Jan 20 21:50:04 2024
12.53
-68.52
CVE-2024-1086
glibc [vs] …
[oss-security] The GNU C Library security advisories update for 2024-04-17: GLIBC-SA-2024-0004/CVE-2024-2961: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence
Wed Apr 03 17:43:55 2024
Wed Apr 17 17:43:39 2024
14.00 April 17th CVE-2024-2961
PuTTY [vs] CVE-2024-31497
[oss-security] CVE-2024-31497: Secret Key Recovery of NIST P-521 Private Keys Through Biased ECDSA Nonces in PuTTY Client
Mon Apr 08 08:58:06 2024
Mon Apr 15 19:43:58 2024
7.45 15.04.2024 19:00 UTC CVE-2024-31497
Linux [vs-plain] Zero day local root exploit with Ubuntu 22.04 HWE / Debian 12 and possible Fedora
[oss-security] New Linux LPE via GSMIOC_SETCONF_DLCI?
Thu Apr 11 21:10:42 2024
Wed Apr 10 19:57:32 2024
-1.05
PowerDNS [vs-plain] PowerDNS pre-notification: EMBARGO: PowerDNS Security Advisory 2024-02: if recursive forwarding is configured, crafted responses can lead to a denial of service in Recursor
[oss-security] PowerDNS Recursor Security Advisory 2024-02: if recursive forwarding is configured, crafted responses can lead to a denial of service in Recursor
Mon Apr 22 10:42:29 2024
Wed Apr 24 11:29:14 2024
2.03 24th of April 2024
We aim for 11:00 UTC
CVE-2024-25583
aiohttp [vs] CVE-2024-30251
[oss-security] CVE-2024-30251: DoS in aiohttp
https://github.com/aio-libs/aiohttp/pull/8280
Wed May 01 12:35:21 2024
Thu May 02 14:09:20 2024
Mon Apr 01 13:55:00 2024
1.07
-29.94
a 1 day embargo CVE-2024-30251
PowerDNS DNSdist [vs] …
[oss-security] PowerDNS Security Advisory 2024-03: Transfer requests received over DoH can lead to a denial of service in DNSdist
Tue May 07 09:18:23 2024
Mon May 13 10:18:09 2024
6.04 13th of May 2024
expect to release at 10:00 UTC
CVE-2024-25581
Git [vs-plain] Upcoming Git security fix release
[oss-security] git: 5 vulnerabilities fixed
Thu May 09 18:29:53 2024
Tue May 14 19:34:50 2024
5.05 May 14th, 2024 at 10am Pacific Time or soon thereafter CVE-2024-32002
CVE-2024-32004
CVE-2024-32020
CVE-2024-32021
CVE-2024-32465
CUPS [vs-plain] EMBARGOED CVE-2024-35235 cups: Cupsd Listen arbitrary chmod 0140777
[oss-security] CVE-2024-35235 cups: Cupsd Listen arbitrary chmod 0140777
Mon Jun 03 18:44:21 2024
Tue Jun 11 14:10:50 2024
7.81 June 11th 14:00 UTC CVE-2024-35235
OpenSSH [vs] Qualys Security Advisory (CRD: Monday, July 1)
[oss-security] CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems
Thu Jun 20 13:27:07 2024
Mon Jul 01 08:40:29 2024
10.80 Monday, July 1
Something like 08:00UTC
CVE-2024-6387
OpenSSH Re: [vs] Qualys Security Advisory (CRD: Monday, July 1)
Re: [oss-security] CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems
Wed Jun 26 04:32:49 2024
Mon Jul 08 16:21:30 2024
12.49 Monday, July 8 CVE-2024-6409
Emacs Org mode [vs-plain] Arbitrary shell command evaluation in Org mode (GNU Emacs)
[oss-security] Arbitrary shell command evaluation in Org mode (GNU Emacs)
Thu Jun 20 15:11:50 2024
Sun Jun 23 09:04:55 2024
2.75 Jun 21, 4pm UTC
postpone the releases to tomorrow (Saturday, Jun 22), same time (4pm UTC)
OpenStack [vs] Vulnerability in OpenStack Cinder, Glance and Nova (CVE-2024-32498)
[oss-security] [OSSA-2024-001] OpenStack Cinder, Glance, Nova: Arbitrary file access through custom QCOW2 external data (CVE-2024-32498)
Thu Jun 20 23:45:22 2024
Tue Jul 02 15:01:32 2024
11.64 2024-06-27, 1500UTC
15:00 UTC Tuesday 2024-07-02
CVE-2024-32498
Linux [vs-plain] stack-out-of-bounds Read in profile_pc
[oss-security] Linux non-security almost non-issue: stack-out-of-bounds Read in profile_pc
https://lore.kernel.org/all/CAK55_s7Xyq=nh97=K=G1sxueOFrJDAvPOJAL4TPTCAYvmxO9_A@mail.gmail.com/
Fri Jun 28 08:05:23 2024
Sat Jun 29 20:50:28 2024
Mon Mar 25 01:17:35 2024
1.53
-95.28
curl [vs-plain] : curl: CVE-2024-6197: freeing stack buffer in utf8asn1str
[oss-security] [SECURITY ADVISORY] curl: CVE-2024-6197: freeing stack buffer in utf8asn1str
https://github.com/curl/curl/commit/3a537a4db9e65e545
Mon Jul 15 21:37:52 2024
Wed Jul 24 06:34:48 2024
Fri Jun 28 12:45:00 2024
8.37
-17.37
July 24 CVE-2024-6197
BIND 9 [vs] Four BIND 9 vulnerabilities will be announced on 17 July 2024
[oss-security] ISC has disclosed four vulnerabilities in BIND 9 (CVE-2024-0760, CVE-2024-1737, CVE-2024-1975, CVE-2024-4076)
Tue Jul 16 11:25:45 2024
Tue Jul 23 14:56:25 2024
7.15 17 July 2024
2024-07-23 (next Tuesday)
CVE-2024-0760
CVE-2024-1737
CVE-2024-1975
CVE-2024-4076
OpenStack Nova [vs] Vulnerability in OpenStack Nova (CVE-2024-40767)
[oss-security] [OSSA-2024-002] OpenStack Nova: Incomplete file access fix and regression for QCOW2 backing files and VMDK flat descriptors (CVE-2024-40767)
Tue Jul 16 18:46:20 2024
Tue Jul 23 15:00:30 2024
6.84 2024-07-23, 1500UTC CVE-2024-40767
Linux [vs] linux kernel: virtio-net host dos
[oss-security] inux kernel: virtio-net host dos
Mon Jul 22 13:35:56 2024
Wed Jul 24 17:24:03 2024
2.16 2024-07-24 17:00 UTC CVE-2024-41090
CVE-2024-41091
curl [vs-plain] : curl: CVE-2024-7264: ASN.1 date parser overread
[oss-security] [SECURITY ADVISORY] curl: CVE-2024-7264 ASN.1 date parser overread
Tue Jul 30 09:41:07 2024
Wed Jul 31 07:19:57 2024
0.90 July 31st CVE-2024-7264
OpenSSL [vs-plain] Embargoed OpenSSL security issue
[oss-security] CVE-2024-6119: OpenSSL: Possible denial of service in X.509 name checks
Tue Aug 20 07:18:05 2024
Tue Sep 03 16:15:38 2024
14.37 3rd September 2024 CVE-2024-6119
OpenStack Ironic [vs] Vulnerability in OpenStack Ironic (CVE-2024-44082)
[oss-security] [OSSA-2024-003] OpenStack Ironic: Unvalidated image data passed to qemu-img (CVE-2024-44082)
Tue Aug 27 19:10:17 2024
Wed Sep 04 17:30:24 2024
7.93 Wednesday, 2024-09-04, 1600UTC CVE-2024-44082
Linux [vs-plain] Bug report: Memory leak in opal_event_init
[oss-security] Linux kernel: memory leak in arch/powerpc/platforms/powernv/opal-irqchip.c: opal_event_init()
Mon Sep 02 02:16:48 2024
Mon Sep 02 12:53:53 2024
0.44
curl [vs-plain] : curl prenotify CVE-2024-8096: OCSP stapling bypass
[oss-security] [SECURITY ADVISORY] curl: CVE-2024-8096: OCSP stapling bypass with GnuTLS
https://github.com/curl/curl/commit/aeb1a281cab13c7ba
Tue Sep 03 07:09:01 2024
Wed Sep 11 05:47:44 2024
Thu Aug 22 09:11:00 2024
7.94
-11.92
September 11 CVE-2024-8096
OpenStack Ironic [vs] …
[oss-security] OSSA-2024-004 / CVE-2024-47211: OpenStack Ironic <26.1.1 fails to verify checksums of supplied image_source URLs when configured to convert images to raw for streaming
Thu Sep 26 16:39:33 2024
Sat Oct 05 20:14:57 2024
9.15 2024-10-03, 1500UTC CVE-2024-47211
PowerDNS [vs-plain] PowerDNS Security Advisory 2024-04: Crafted responses can lead to a denial of service due to cache inefficiencies in the Recursor
[oss-security] PowerDNS Security Advisory 2024-04
Fri Sep 27 07:17:06 2024
Thu Oct 03 16:07:56 2024
6.37 3rd of October 2024 around 12:00 UTC CVE-2024-25590
oath-toolkit [vs] Local root exploit in a PAM module
[oss-security] CVE-2024-47191: Local root exploit in the PAM module pam_oath.so
Fri Sep 27 10:18:19 2024
Fri Oct 04 15:00:06 2024
7.20 2024-10-04 11:00 AM GMT+2 CVE-2024-47191
X.Org X server and Xwayland [vs-plain] Embargoed X.Org Security Advisory: Issue in X server and Xwayland
[oss-security] CVE-2024-9632: X.Org X server and Xwayland: Heap-based buffer overflow privilege escalation in _XkbSetCompatMap
Tue Oct 22 07:47:30 2024
Tue Oct 29 16:40:04 2024
7.37 October 29, 2024 15:00 UTC CVE-2024-9632
curl [vs-plain] : curl pre-notification: CVE-2024-9681
[oss-security] [SECURITY ADVISTORY] curl: CVE-2024-9681 HSTS subdomain overwrites parent cache entry
https://github.com/curl/curl/commit/a94973805df96269bf
Tue Oct 29 09:53:36 2024
Wed Nov 06 07:25:14 2024
Wed Oct 09 11:48:00 2024
7.90
-19.92
November 6 2024 around 06:00 UTC CVE-2024-9681
Unix shells [vs-plain] shell expansion bug
[oss-security] shell wildcard expansion (un)safety
Thu Oct 31 13:00:59 2024
Wed Nov 06 04:12:33 2024
5.63
needrestart, Module::ScanDeps [vs] LPEs discovered by Qualys
[oss-security] Local Privilege Escalations in needrestart
Mon Nov 11 19:23:14 2024
Tue Nov 19 16:25:29 2024
7.88 Tuesday November 19th at 16:00 UTC CVE-2024-48990
CVE-2024-48991
CVE-2024-48992
CVE-2024-10224
CVE-2024-11003
Linux [vs-plain] Race condition vulnerability that can lead to UAF in net/bluetooth/sco.c:sco_sock_connect
[oss-security] Linux: Race can lead to UAF in net/bluetooth/sco.c: sco_sock_connect()
Thu Nov 14 10:35:48 2024
Fri Nov 29 04:41:56 2024
14.75 CVE-2024-27398?

Source input data

These files were manually created based on review of the e-mail threads and external resources referenced from there. They were processed with this Perl script to produce the tables above. You should be able to reproduce that.

mailing-lists/distros/stats/2024.txt · Last modified: 2024/12/06 03:55 by solar
 
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution-Noncommercial-Share Alike 3.0 Unported
Recent changes RSS feed Donate to DokuWiki Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki Powered by OpenVZ Powered by Openwall GNU/*/Linux