Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1821 articles · 103989 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-31396EXPLOITEDPATCHED
linux · linux kernel

net: macb: fix use-after-free access to PTP clock

Description

In the Linux kernel, the following vulnerability has been resolved: net: macb: fix use-after-free access to PTP clock PTP clock is registered on every opening of the interface and destroyed on every closing. However it may be accessed via get_ts_info ethtool call which is possible while the interface is just present in the kernel. BUG: KASAN: use-after-free in ptp_clock_index+0x47/0x50 drivers/ptp/ptp_clock.c:426 Read of size 4 at addr ffff8880194345cc by task syz.0.6/948 CPU: 1 PID: 948 Comm: syz.0.6 Not tainted 6.1.164+ #109 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.1-0-g3208b098f51a-prebuilt.qemu.org 04/01/2014 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x8d/0xba lib/dump_stack.c:106 print_address_description mm/kasan/report.c:316 [inline] print_report+0x17f/0x496 mm/kasan/report.c:420 kasan_report+0xd9/0x180 mm/kasan/report.c:524 ptp_clock_index+0x47/0x50 drivers/ptp/ptp_clock.c:426 gem_get_ts_info+0x138/0x1e0 drivers/net/ethernet/cadence/macb_main.c:3349 macb_get_ts_info+0x68/0xb0 drivers/net/ethernet/cadence/macb_main.c:3371 __ethtool_get_ts_info+0x17c/0x260 net/ethtool/common.c:558 ethtool_get_ts_info net/ethtool/ioctl.c:2367 [inline] __dev_ethtool net/ethtool/ioctl.c:3017 [inline] dev_ethtool+0x2b05/0x6290 net/ethtool/ioctl.c:3095 dev_ioctl+0x637/0x1070 net/core/dev_ioctl.c:510 sock_do_ioctl+0x20d/0x2c0 net/socket.c:1215 sock_ioctl+0x577/0x6d0 net/socket.c:1320 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:870 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __x64_sys_ioctl+0x18c/0x210 fs/ioctl.c:856 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x35/0x80 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x6e/0xd8 </TASK> Allocated by task 457: kmalloc include/linux/slab.h:563 [inline] kzalloc include/linux/slab.h:699 [inline] ptp_clock_register+0x144/0x10e0 drivers/ptp/ptp_clock.c:235 gem_ptp_init+0x46f/0x930 drivers/net/ethernet/cadence/macb_ptp.c:375 macb_open+0x901/0xd10 drivers/net/ethernet/cadence/macb_main.c:2920 __dev_open+0x2ce/0x500 net/core/dev.c:1501 __dev_change_flags+0x56a/0x740 net/core/dev.c:8651 dev_change_flags+0x92/0x170 net/core/dev.c:8722 do_setlink+0xaf8/0x3a80 net/core/rtnetlink.c:2833 __rtnl_newlink+0xbf4/0x1940 net/core/rtnetlink.c:3608 rtnl_newlink+0x63/0xa0 net/core/rtnetlink.c:3655 rtnetlink_rcv_msg+0x3c6/0xed0 net/core/rtnetlink.c:6150 netlink_rcv_skb+0x15d/0x430 net/netlink/af_netlink.c:2511 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x6d7/0xa30 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x97e/0xeb0 net/netlink/af/netlink.c:1872 sock_sendmsg_nosec net/socket.c:718 [inline] __sock_sendmsg+0x14b/0x180 net/socket.c:730 __sys_sendto+0x320/0x3b0 net/socket.c:2152 __do_sys_sendto net/socket.c:2164 [inline] __se_sys_sendto net/socket.c:2160 [inline] __x64_sys_sendto+0xdc/0x1b0 net/socket.c:2160 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x35/0x80 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x6e/0xd8 Freed by task 938: kasan_slab_free include/linux/kasan.h:177 [inline] slab_free_hook mm/slub.c:1729 [inline] slab_free_freelist_hook mm/slub.c:1755 [inline] slab_free mm/slub.c:3687 [inline] __kmem_cache_free+0xbc/0x320 mm/slub.c:3700 device_release+0xa0/0x240 drivers/base/core.c:2507 kobject_cleanup lib/kobject.c:681 [inline] kobject_release lib/kobject.c:712 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put+0x1cd/0x350 lib/kobject.c:729

Affected Products

VendorProductVersions
linuxlinux kernelc2594d804d5c8033861d44840673d852d98508c1, c2594d804d5c8033861d44840673d852d98508c1, c2594d804d5c8033861d44840673d852d98508c1, c2594d804d5c8033861d44840673d852d98508c1, c2594d804d5c8033861d44840673d852d98508c1, c2594d804d5c8033861d44840673d852d98508c1, 4.11, 7.0-rc4

References

  • https://git.kernel.org/stable/c/341d01087f821aa0f165fb1ffc8bfe4e50776da7
  • https://git.kernel.org/stable/c/5653af416a48f6c18f9626ae9df96f814f45ff34
  • https://git.kernel.org/stable/c/0bb848d8c64938024e45780f8032f1f67d3a3607
  • https://git.kernel.org/stable/c/1f4714065b2bcbb0a4013fd355b84b848e6cc345
  • https://git.kernel.org/stable/c/eb652535e9ec795ef5c1078f7578eaaed755268b
  • https://git.kernel.org/stable/c/8da13e6d63c1a97f7302d342c89c4a56a55c7015

Related News (2 articles)

Tier C
VulDB8h ago
CVE-2026-31396 | Linux Kernel up to 7.0-rc4 macb get_ts_info use after free
→ No new info (linked only)
Tier C
Linux Kernel CVEs9h ago
CVE-2026-31396: net: macb: fix use-after-free access to PTP clock
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
341d01087f821aa0f165fb1ffc8bfe4e50776da75653af416a48f6c18f9626ae9df96f814f45ff340bb848d8c64938024e45780f8032f1f67d3a36071f4714065b2bcbb0a4013fd355b84b848e6cc345eb652535e9ec795ef5c1078f7578eaaed755268b8da13e6d63c1a97f7302d342c89c4a56a55c701506.1.1676.6.1306.12.786.18.206.19.107.0-rc5
PublishedApr 3, 2026
Last enriched8h agov3
Trending Score59
Source articles2
Independent2
Info Completeness8/14
Missing: cvss, epss, cwe, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-31393EXP
Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access
Trending: 59
CRITICALCVE-2026-31397EXP
mm/huge_memory: fix use of NULL folio in move_pages_huge_pmd()
Trending: 59
CRITICALCVE-2026-23463EXP
soc: fsl: qbman: fix race condition in qman_destroy_fq
Trending: 59
CRITICALCVE-2026-23438EXP
net: mvpp2: guard flow control update with global_tx_fc in buffer switching
Trending: 59
CRITICALCVE-2026-23449EXP
net/sched: teql: Fix double-free in teql_master_xmit
Trending: 59

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Actively Exploited
Apr 3, 2026
Exploit Available
Apr 3, 2026
Patch Available
Apr 3, 2026
Updated: description, exploitAvailable, activelyExploited
Apr 3, 2026
Updated: severity, affectedVersions
Apr 3, 2026

Version History

v3
Last enriched 8h ago
v3Tier C8h ago

Updated severity to CRITICAL, added affected version 7.0-rc4, and noted no available exploit.

severityaffectedVersions
via VulDB
v2Tier C9h ago

Updated description, marked exploit availability as true, marked as actively exploited, and set patch availability to null.

descriptionexploitAvailableactivelyExploited
via Linux Kernel CVEs
v19h ago

Initial creation