Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-36385

CVE-2020-36385: Linux Kernel Use-After-Free Vulnerability

CVE-2020-36385 is a use-after-free vulnerability in the Linux kernel's InfiniBand RDMA subsystem that can lead to system instability. This article covers the technical details, affected versions, and mitigation.

Published: March 4, 2026

CVE-2020-36385 Overview

CVE-2020-36385 is a use-after-free vulnerability discovered in the Linux kernel before version 5.10. The vulnerability exists in drivers/infiniband/core/ucma.c, where a use-after-free condition occurs because the context (ctx) is reached via the ctx_list in certain ucma_migrate_id situations when ucma_close is called. This flaw is tracked as CID-f5449e74802c.

Critical Impact

A local attacker with user interaction could exploit this use-after-free vulnerability to achieve high confidentiality, integrity, and availability impact, potentially leading to privilege escalation or code execution on affected Linux kernel systems.

Affected Products

  • Linux Kernel (versions before 5.10)
  • NetApp H-Series Storage Firmware (H300S, H500S, H700S, H300E, H500E, H700E, H410S, H410C)
  • StarWind SAN & NAS v8r12
  • StarWind Virtual SAN v8 build14338

Discovery Timeline

  • 2021-06-07 - CVE-2020-36385 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2020-36385

Vulnerability Analysis

This use-after-free vulnerability (CWE-416) resides in the Linux kernel's InfiniBand subsystem, specifically within the User Communication Manager Access (UCMA) component. The vulnerability occurs due to improper synchronization between the ucma_migrate_id and ucma_close operations.

When a user-space application performs operations on RDMA (Remote Direct Memory Access) connections through the UCMA interface, the kernel maintains context structures to track connection state. The flaw manifests when ucma_close is called while another thread is iterating through the ctx_list during ucma_migrate_id operations. This race condition allows the context structure to be freed while still being referenced, creating a classic use-after-free scenario.

Successful exploitation requires local access and some user interaction, but can result in complete compromise of confidentiality, integrity, and availability of the affected system. The vulnerability is particularly concerning in environments utilizing InfiniBand for high-performance computing or storage networking.

Root Cause

The root cause of CVE-2020-36385 is insufficient locking and reference counting in the UCMA subsystem when handling concurrent operations on connection contexts. When ucma_close frees a context object, it does not properly ensure that no other threads are still accessing or iterating over the context via the ctx_list. The kernel commit f5449e74802c addresses this by implementing proper synchronization mechanisms to prevent the race condition.

Attack Vector

The attack vector for this vulnerability is local, requiring an attacker to have local access to the system. The exploitation scenario involves:

  1. An attacker with local access opens RDMA communication channels through the UCMA interface
  2. The attacker triggers concurrent operations: initiating ucma_migrate_id while simultaneously causing ucma_close to be invoked
  3. The race condition causes the context structure to be freed while still in use
  4. By manipulating memory allocation, the attacker can potentially control the freed memory contents
  5. Subsequent access to the freed context can lead to arbitrary code execution or privilege escalation

The vulnerability manifests in the context list traversal mechanism during migration operations. When ucma_close is called concurrently with ucma_migrate_id, the context may be freed while still being referenced through the ctx_list. For detailed technical analysis, see the Google SyzScope Analysis UCMA Issue and the Syzkaller Bug Report #457491.

Detection Methods for CVE-2020-36385

Indicators of Compromise

  • Kernel KASAN (Kernel Address Sanitizer) warnings indicating use-after-free read operations in ucma_close
  • Unexpected kernel panics or crashes related to InfiniBand or RDMA subsystems
  • Suspicious process activity involving /dev/infiniband/rdma_cm device access
  • Memory corruption artifacts in kernel logs referencing the UCMA driver

Detection Strategies

  • Enable KASAN in kernel builds to detect memory corruption issues including use-after-free conditions
  • Monitor kernel logs for errors or warnings related to ucma_close, ucma_migrate_id, or InfiniBand drivers
  • Implement audit rules to track access to RDMA-related device files and system calls
  • Deploy endpoint detection solutions capable of monitoring kernel-level memory access patterns

Monitoring Recommendations

  • Configure centralized logging to capture kernel messages related to InfiniBand and RDMA subsystems
  • Establish baseline behavior for RDMA operations and alert on anomalous patterns
  • Monitor for processes making unusual sequences of RDMA-related system calls
  • Implement kernel integrity monitoring to detect potential exploitation attempts

How to Mitigate CVE-2020-36385

Immediate Actions Required

  • Update Linux kernel to version 5.10 or later where the vulnerability has been patched
  • Apply vendor-specific firmware updates for NetApp H-Series storage systems (see NetApp Security Advisory NTAP-20210720-0004)
  • Update StarWind SAN & NAS and Virtual SAN products according to StarWind Security Advisory SW-20220802-0002
  • If immediate patching is not possible, restrict access to RDMA/InfiniBand functionality to trusted users only

Patch Information

The vulnerability was fixed in Linux kernel version 5.10. The specific patch is identified by commit f5449e74802c1112dea984aec8af7a33c4516af1. Organizations should update to kernel version 5.10 or later to address this vulnerability. The detailed changelog is available at the Linux Changelog for 5.10, and the specific commit can be reviewed at the Linux Kernel Commit f5449e748.

Workarounds

  • Disable or unload InfiniBand kernel modules (ib_ucm, rdma_ucm) if RDMA functionality is not required
  • Restrict access to /dev/infiniband/ device files using file permissions or SELinux/AppArmor policies
  • Implement network segmentation to isolate systems using InfiniBand from untrusted users
  • Apply kernel module blacklisting for rdma_ucm on systems where InfiniBand is not needed
bash
# Disable InfiniBand UCMA module if not required
echo "blacklist rdma_ucm" >> /etc/modprobe.d/blacklist-infiniband.conf
echo "blacklist ib_ucm" >> /etc/modprobe.d/blacklist-infiniband.conf

# Remove the module if currently loaded
modprobe -r rdma_ucm
modprobe -r ib_ucm

# Restrict access to InfiniBand device files
chmod 600 /dev/infiniband/*

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeUse After Free

  • Vendor/TechLinux Kernel

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.09%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-416
  • Technical References
  • NetApp Security Advisory NTAP-20210720-0004

  • StarWind Security Advisory SW-20220802-0002
  • Vendor Resources
  • Linux Changelog for 5.10

  • Linux Kernel Commit f5449e748

  • Google SyzScope Analysis UCMA Issue

  • Syzkaller Bug Report #457491
  • Related CVEs
  • CVE-2026-31475: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-31469: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-31457: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-31444: Linux Kernel Use-After-Free Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English