CVE-2025-71226
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
18/02/2026
Última modificación:
18/02/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP<br />
<br />
Since commit dfb073d32cac ("ptp: Return -EINVAL on ptp_clock_register if<br />
required ops are NULL"), PTP clock registered through ptp_clock_register<br />
is required to have ptp_clock_info.settime64 set, however, neither MVM<br />
nor MLD&#39;s PTP clock implementation sets it, resulting in warnings when<br />
the interface starts up, like<br />
<br />
WARNING: drivers/ptp/ptp_clock.c:325 at ptp_clock_register+0x2c8/0x6b8, CPU#1: wpa_supplicant/469<br />
CPU: 1 UID: 0 PID: 469 Comm: wpa_supplicant Not tainted 6.18.0+ #101 PREEMPT(full)<br />
ra: ffff800002732cd4 iwl_mvm_ptp_init+0x114/0x188 [iwlmvm]<br />
ERA: 9000000002fdc468 ptp_clock_register+0x2c8/0x6b8<br />
iwlwifi 0000:01:00.0: Failed to register PHC clock (-22)<br />
<br />
I don&#39;t find an appropriate firmware interface to implement settime64()<br />
for iwlwifi MLD/MVM, thus instead create a stub that returns<br />
-EOPTNOTSUPP only, suppressing the warning and allowing the PTP clock to<br />
be registered.



