In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP
Since commit dfb073d32cac ("ptp: Return -EINVAL on ptpclockregister if required ops are NULL"), PTP clock registered through ptpclockregister is required to have ptpclockinfo.settime64 set, however, neither MVM nor MLD's PTP clock implementation sets it, resulting in warnings when the interface starts up, like
WARNING: drivers/ptp/ptpclock.c:325 at ptpclockregister+0x2c8/0x6b8, CPU#1: wpasupplicant/469 CPU: 1 UID: 0 PID: 469 Comm: wpasupplicant Not tainted 6.18.0+ #101 PREEMPT(full) ra: ffff800002732cd4 iwlmvmptpinit+0x114/0x188 [iwlmvm] ERA: 9000000002fdc468 ptpclockregister+0x2c8/0x6b8 iwlwifi 0000:01:00.0: Failed to register PHC clock (-22)
I don't find an appropriate firmware interface to implement settime64() for iwlwifi MLD/MVM, thus instead create a stub that returns -EOPTNOTSUPP only, suppressing the warning and allowing the PTP clock to be registered.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71226.json"
}