CVE-2026-31396 — Expired Pointer Dereference in Linux
Severity
—N/A
No vectorEPSS
0.0%
top 90.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 3
Description
In the Linux kernel, the following vulnerability has been resolved:
net: macb: fix use-after-free access to PTP clock
PTP clock is registered on every opening of the interface and destroyed on
every closing. However it may be accessed via get_ts_info ethtool call
which is possible while the interface is just present in the kernel.
BUG: KASAN: use-after-free in ptp_clock_index+0x47/0x50 drivers/ptp/ptp_clock.c:426
Read of size 4 at addr ffff8880194345cc by task syz.0.6/948
CPU: 1 PID: 948 Com…
Affected Packages3 packages
▶CVEListV5linux/linuxc2594d804d5c8033861d44840673d852d98508c1 — 341d01087f821aa0f165fb1ffc8bfe4e50776da7+6
🔴Vulnerability Details
2GHSA▶
GHSA-p6rr-6vhx-2g77: In the Linux kernel, the following vulnerability has been resolved:
net: macb: fix use-after-free access to PTP clock
PTP clock is registered on eve↗2026-04-03
OSV▶
CVE-2026-31396: In the Linux kernel, the following vulnerability has been resolved: net: macb: fix use-after-free access to PTP clock PTP clock is registered on every↗2026-04-03