{"id":"CVE-2020-24977","details":"GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.","modified":"2026-03-17T07:27:19.016928Z","published":"2020-09-04T00:15:10.693Z","related":["MGASA-2021-0002","SUSE-SU-2020:2609-1","SUSE-SU-2020:2612-1","SUSE-SU-2021:14729-1","openSUSE-SU-2020:1430-1","openSUSE-SU-2020:1465-1","openSUSE-SU-2024:11016-1","openSUSE-SU-2024:11340-1","openSUSE-SU-2024:11912-1","openSUSE-SU-2024:13165-1","openSUSE-SU-2024:14174-1","openSUSE-SU-2025:14697-1","openSUSE-SU-2026:10356-1"],"references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202107-05"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200924-0001/"},{"type":"FIX","url":"https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2"},{"type":"FIX","url":"https://gitlab.gnome.org/GNOME/libxml2/-/issues/178"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.gnome.org/GNOME/libxml2","events":[{"introduced":"0"},{"last_affected":"41a34e1f4ffae2ce401600dbb5fe43f8fe402641"},{"fixed":"50f06b3efb638efb0abd95dc62dca05ae67882c2"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.9.10"}]}}],"versions":["CVE-2013-2877","CVE-2014-0191","CVE-2014-3660","CVE-2015-1819","CVE-2015-5312","CVE-2015-7497","CVE-2015-7498","CVE-2015-7499-1","CVE-2015-7499-2","CVE-2015-7500","CVE-2015-7941_1","CVE-2015-7941_2","CVE-2015-7942","CVE-2015-7942-2","CVE-2015-8035","CVE-2015-8242","CVE-2015-8317","CVE-2016-1762","CVE-2016-1833","CVE-2016-1834","CVE-2016-1835","CVE-2016-1836","CVE-2016-1837","CVE-2016-1838","CVE-2016-1839","CVE-2016-1840","CVE-2016-3627","CVE-2016-3705","CVE-2016-4449","CVE-2016-4483","EAZEL-NAUTILUS-MS-AUG07","FOR_GNOME_0_99_1","GNOME_0_30","GNOME_PRINT_0_24","GNUMERIC_FIRST_PUBLIC_RELEASE","LIBXML2.6.32","LIBXML2.7.0","LIBXML2.7.1","LIBXML2.7.2","LIBXML2.7.3","LIBXML2_2_4_21","LIBXML2_2_5_0","LIBXML2_2_5_10","LIBXML2_2_5_7","LIBXML2_2_5_8","LIBXML2_2_5_9","LIBXML2_2_5_x","LIBXML2_2_6_1","LIBXML2_2_6_11","LIBXML2_2_6_12","LIBXML2_2_6_13","LIBXML2_2_6_14","LIBXML2_2_6_15","LIBXML2_2_6_16","LIBXML2_2_6_18","LIBXML2_2_6_19","LIBXML2_2_6_2","LIBXML2_2_6_20","LIBXML2_2_6_21","LIBXML2_2_6_22","LIBXML2_2_6_23","LIBXML2_2_6_24","LIBXML2_2_6_26","LIBXML2_2_6_27","LIBXML2_2_6_28","LIBXML2_2_6_3","LIBXML2_2_6_4","LIBXML2_2_6_5","LIBXML2_2_6_6","LIBXML2_2_6_7","LIBXML2_2_6_8","LIBXML2_2_6_9","LIBXML2_6_0","LIBXML_0_99","LIBXML_1_5_0","LIBXML_1_8_5","LIBXML_1_8_6","LIBXML_2_0_0","LIBXML_2_1_0","LIBXML_2_1_1","LIBXML_2_2_1","LIBXML_2_2_3","LIBXML_2_2_4","LIBXML_2_2_6","LIBXML_2_2_7","LIBXML_2_2_8","LIBXML_2_3_0","LIBXML_2_3_10","LIBXML_2_3_11","LIBXML_2_3_12","LIBXML_2_3_13","LIBXML_2_3_14","LIBXML_2_3_2","LIBXML_2_3_3","LIBXML_2_3_4","LIBXML_2_3_5","LIBXML_2_3_6","LIBXML_2_3_7","LIBXML_2_3_8","LIBXML_2_3_9","LIBXML_2_4_0","LIBXML_2_4_11","LIBXML_2_4_12","LIBXML_2_4_13","LIBXML_2_4_14","LIBXML_2_4_16","LIBXML_2_4_18","LIBXML_2_4_2","LIBXML_2_4_20","LIBXML_2_4_22","LIBXML_2_4_23","LIBXML_2_4_24","LIBXML_2_4_25","LIBXML_2_4_26","LIBXML_2_4_27","LIBXML_2_4_29","LIBXML_2_4_3","LIBXML_2_4_30","LIBXML_2_4_4","LIBXML_2_4_6","LIBXML_2_4_7","LIBXML_2_5_1","LIBXML_2_5_2","LIBXML_2_5_3","LIBXML_2_5_4","LIBXML_2_5_5","LIBXML_2_5_6","LIBXML_2_6_10","LIBXML_TEST_2_0_0","LIB_XML_1_1","LIB_XML_1_3","LIB_XML_1_4","LIB_XML_1_6_1","LIB_XML_1_6_2","LIB_XML_1_7_0","LIB_XML_1_7_1","LIB_XML_1_7_3","LIB_XML_1_8_3","LIB_XML_1_X","PRE_MUCKUP","PRE_MUCKUP2","PRE_MUCKUP3","help","v2.7.4","v2.7.5","v2.7.6","v2.7.7","v2.7.8","v2.8.0","v2.8.0-rc1","v2.8.0-rc2","v2.9.0","v2.9.0-rc2","v2.9.1","v2.9.10","v2.9.10-rc1","v2.9.2","v2.9.2-rc1","v2.9.2-rc2","v2.9.3","v2.9.4","v2.9.4-rc1","v2.9.4-rc2","v2.9.5","v2.9.5-rc1","v2.9.5-rc2","v2.9.6","v2.9.6-rc1","v2.9.7","v2.9.7-rc1","v2.9.8","v2.9.8-rc1","v2.9.9","v2.9.9-rc1","v2.9.9-rc2"],"database_specific":{"vanir_signatures":[{"deprecated":false,"signature_type":"Function","id":"CVE-2020-24977-76b4c8fa","target":{"file":"xmllint.c","function":"xmlHTMLEncodeSend"},"digest":{"function_hash":"333089290179452094192545213626485405871","length":227},"source":"https://gitlab.gnome.org/GNOME/libxml2@50f06b3efb638efb0abd95dc62dca05ae67882c2","signature_version":"v1"},{"deprecated":false,"signature_type":"Line","id":"CVE-2020-24977-d0c9a80a","target":{"file":"xmllint.c"},"digest":{"line_hashes":["168672058864961257859405146754354472187","64644107898846976266284128143066975089","182440086416972751708829220127142151095"],"threshold":0.9},"source":"https://gitlab.gnome.org/GNOME/libxml2@50f06b3efb638efb0abd95dc62dca05ae67882c2","signature_version":"v1"}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]},{"events":[{"introduced":"7.3"}]},{"events":[{"introduced":"9.5"}]},{"events":[{"introduced":"0"},{"last_affected":"1.10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"13.4.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"13.5.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.4.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.26"}]},{"events":[{"introduced":"0"},{"last_affected":"8.58"}]},{"events":[{"introduced":"0"},{"last_affected":"13.4.1.0"}]},{"events":[{"introduced":"0"},{"last_affected":"13.5.1.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-24977.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}]}