U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2020-24977

Change History

Modified Analysis by NIST 11/05/2020 1:23:02 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:hci_h410c_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:hci_h410c:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:* versions from (including) 7.3
     *cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:* versions from (including) 9.5
     *cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:inventory_collect_tool:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:manageability_software_development_kit:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*
     *cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:windows:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:* versions up to (including) 2.9.10
OR
     *cpe:2.3:a:xmlsoft:libxml2:2.9.10:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
OR
     *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html Mailing List, Third Party Advisory
Changed Reference Type
https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2 No Types Assigned
https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2 Patch, Vendor Advisory
Changed Reference Type
https://gitlab.gnome.org/GNOME/libxml2/-/issues/178 Exploit, Third Party Advisory
https://gitlab.gnome.org/GNOME/libxml2/-/issues/178 Exploit, Patch, Vendor Advisory
Changed Reference Type
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/ No Types Assigned
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/ Third Party Advisory
Changed Reference Type
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/ No Types Assigned
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/ Third Party Advisory
Changed Reference Type
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/ No Types Assigned
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/ Third Party Advisory
Changed Reference Type
https://security.netapp.com/advisory/ntap-20200924-0001/ No Types Assigned
https://security.netapp.com/advisory/ntap-20200924-0001/ Third Party Advisory