First published: Mon Jun 07 2021(Updated: )
An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.43.1.el6 | 0:2.6.32-754.43.1.el6 |
redhat/kernel-rt | <0:3.10.0-1160.49.1.rt56.1189.el7 | 0:3.10.0-1160.49.1.rt56.1189.el7 |
redhat/kernel | <0:3.10.0-1160.49.1.el7 | 0:3.10.0-1160.49.1.el7 |
redhat/kernel | <0:3.10.0-327.102.1.el7 | 0:3.10.0-327.102.1.el7 |
redhat/kernel | <0:3.10.0-514.95.1.el7 | 0:3.10.0-514.95.1.el7 |
redhat/kernel | <0:3.10.0-693.95.1.el7 | 0:3.10.0-693.95.1.el7 |
redhat/kernel | <0:3.10.0-957.86.1.el7 | 0:3.10.0-957.86.1.el7 |
redhat/kernel | <0:3.10.0-1062.59.1.el7 | 0:3.10.0-1062.59.1.el7 |
redhat/kernel-rt | <0:4.18.0-305.25.1.rt7.97.el8_4 | 0:4.18.0-305.25.1.rt7.97.el8_4 |
redhat/kernel | <0:4.18.0-305.25.1.el8_4 | 0:4.18.0-305.25.1.el8_4 |
redhat/kernel | <0:4.18.0-147.57.1.el8_1 | 0:4.18.0-147.57.1.el8_1 |
redhat/kernel-rt | <0:4.18.0-193.70.1.rt13.120.el8_2 | 0:4.18.0-193.70.1.rt13.120.el8_2 |
redhat/kernel | <0:4.18.0-193.70.1.el8_2 | 0:4.18.0-193.70.1.el8_2 |
redhat/redhat-virtualization-host | <0:4.3.20-20211202.1.el7_9 | 0:4.3.20-20211202.1.el7_9 |
redhat/kernel | <5.10 | 5.10 |
Linux Kernel | <5.10 | |
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h300e firmware | ||
netapp h300e | ||
netapp h500e firmware | ||
netapp h500e | ||
netapp h700e firmware | ||
netapp h700e | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp h410c firmware | ||
netapp h410c | ||
starwindsoftware starwind san \& nas | =v8r12 | |
StarWind Virtual SAN | =v8-build14338 | |
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h300e firmware | ||
netapp h300e | ||
All of | ||
netapp h500e firmware | ||
netapp h500e | ||
All of | ||
netapp h700e firmware | ||
netapp h700e | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-36385 has been identified with a severity level of high due to the potential for a use-after-free vulnerability in the Linux kernel.
To fix CVE-2020-36385, upgrade your Linux kernel to version 5.10 or later, or apply specific patched versions provided by your distribution.
CVE-2020-36385 affects Linux kernel versions prior to 5.10, including various versions in the Red Hat kernel series.
Exploiting CVE-2020-36385 may allow an attacker to execute arbitrary code in the context of the kernel, leading to system compromise.
Currently, there are no known workarounds for CVE-2020-36385, so it is recommended to upgrade to a fixed version as soon as possible.