U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-20636

Change History

Modified Analysis by NIST 10/20/2023 5:00:37 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
     *cpe:2.3:h:netapp:baseboard_management_controller_h300s:-:*:*:*:*:*:*:*
     *cpe:2.3:h:netapp:baseboard_management_controller_h410s:-:*:*:*:*:*:*:*
     *cpe:2.3:h:netapp:baseboard_management_controller_h500s:-:*:*:*:*:*:*:*
     *cpe:2.3:h:netapp:baseboard_management_controller_h610c:-:*:*:*:*:*:*:*
     *cpe:2.3:h:netapp:baseboard_management_controller_h610s:-:*:*:*:*:*:*:*
     *cpe:2.3:h:netapp:baseboard_management_controller_h615c:-:*:*:*:*:*:*:*
     *cpe:2.3:h:netapp:baseboard_management_controller_h700s:-:*:*:*:*:*:*:*
     *cpe:2.3:h:netapp:fas_8300:-:*:*:*:*:*:*:*
     *cpe:2.3:h:netapp:fas_8700:-:*:*:*:*:*:*:*
     *cpe:2.3:h:netapp:fas_a400:-:*:*:*:*:*:*:*
     *cpe:2.3:h:netapp:fas_baseboard_management_controller_a220:-:*:*:*:*:*:*:*
     *cpe:2.3:h:netapp:fas_baseboard_management_controller_a320:-:*:*:*:*:*:*:*
     *cpe:2.3:h:netapp:fas_baseboard_management_controller_a800:-:*:*:*:*:*:*:*
     *cpe:2.3:h:netapp:fas_baseboard_management_controller_c190:-:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 5.4.12
OR
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 3.16.83
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.17 up to (excluding) 4.4.210
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.5 up to (excluding) 4.9.210
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.10 up to (excluding) 4.14.165
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.15 up to (excluding) 4.19.96
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.12
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html No Types Assigned
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html Mailing List, Third Party Advisory
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html No Types Assigned
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html Mailing List, Third Party Advisory
Changed Reference Type
https://security.netapp.com/advisory/ntap-20200430-0004/ No Types Assigned
https://security.netapp.com/advisory/ntap-20200430-0004/ Third Party Advisory