CVE-2025-71226Kernel vulnerability

6 documents5 sources
Severity
7.1HIGH
No vector
EPSS
No EPSS data
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 18

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP Since commit dfb073d32cac ("ptp: Return -EINVAL on ptp_clock_register if required ops are NULL"), PTP clock registered through ptp_clock_register is required to have ptp_clock_info.settime64 set, however, neither MVM nor MLD's PTP clock implementation sets it, resulting in warnings when the interface starts up, like WARNING: drivers/ptp/ptp_clock.c:325 at ptp_clock_regis

Affected Packages2 packages

Linuxlinux/linux_kernel< 6.18.10
Debianlinux/linux_kernel< 6.18.10-1

🔴Vulnerability Details

3
OSV
CVE-2025-71226: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP Since commit dfb073d32c2026-02-18
GHSA
GHSA-r264-whc7-wwfw: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP Since commit dfb073d32026-02-18
OSV
wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP2026-02-18

📋Vendor Advisories

2
Red Hat
kernel: wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP2026-02-18
Microsoft
wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP2026-02-10

🕵️Threat Intelligence

1
Wiz
CVE-2025-71226 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-71226 — Linux Kernel vulnerability | cvebase