CVE-2025-71226

Source
https://cve.org/CVERecord?id=CVE-2025-71226
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71226.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-71226
Downstream
Published
2026-02-18T14:21:47.369Z
Modified
2026-04-10T05:35:41.596029Z
Summary
wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP

Since commit dfb073d32cac ("ptp: Return -EINVAL on ptpclockregister if required ops are NULL"), PTP clock registered through ptpclockregister is required to have ptpclockinfo.settime64 set, however, neither MVM nor MLD's PTP clock implementation sets it, resulting in warnings when the interface starts up, like

WARNING: drivers/ptp/ptpclock.c:325 at ptpclockregister+0x2c8/0x6b8, CPU#1: wpasupplicant/469 CPU: 1 UID: 0 PID: 469 Comm: wpasupplicant Not tainted 6.18.0+ #101 PREEMPT(full) ra: ffff800002732cd4 iwlmvmptpinit+0x114/0x188 [iwlmvm] ERA: 9000000002fdc468 ptpclockregister+0x2c8/0x6b8 iwlwifi 0000:01:00.0: Failed to register PHC clock (-22)

I don't find an appropriate firmware interface to implement settime64() for iwlwifi MLD/MVM, thus instead create a stub that returns -EOPTNOTSUPP only, suppressing the warning and allowing the PTP clock to be registered.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71226.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
ff6892ea544c4052dd5799f675ebc20419953801
Fixed
81d90d93d22ca4f61833cba921dce9a0bd82218f

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71226.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.18.10

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71226.json"