Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2025-71226

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
18/02/2026
Última modificación:
18/02/2026

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP<br /> <br /> Since commit dfb073d32cac ("ptp: Return -EINVAL on ptp_clock_register if<br /> required ops are NULL"), PTP clock registered through ptp_clock_register<br /> is required to have ptp_clock_info.settime64 set, however, neither MVM<br /> nor MLD&amp;#39;s PTP clock implementation sets it, resulting in warnings when<br /> the interface starts up, like<br /> <br /> WARNING: drivers/ptp/ptp_clock.c:325 at ptp_clock_register+0x2c8/0x6b8, CPU#1: wpa_supplicant/469<br /> CPU: 1 UID: 0 PID: 469 Comm: wpa_supplicant Not tainted 6.18.0+ #101 PREEMPT(full)<br /> ra: ffff800002732cd4 iwl_mvm_ptp_init+0x114/0x188 [iwlmvm]<br /> ERA: 9000000002fdc468 ptp_clock_register+0x2c8/0x6b8<br /> iwlwifi 0000:01:00.0: Failed to register PHC clock (-22)<br /> <br /> I don&amp;#39;t find an appropriate firmware interface to implement settime64()<br /> for iwlwifi MLD/MVM, thus instead create a stub that returns<br /> -EOPTNOTSUPP only, suppressing the warning and allowing the PTP clock to<br /> be registered.

Impacto