Impact
The Linux kernel driver ice, which handles Precision Time Protocol (PTP) functions, has been updated to avoid raising a kernel warning when the controlling Physical Function (PF) of a VFIO passthrough setup is unavailable. In configurations where only a PF that does not own the source timer is passed through, the internal call to ice_get_ctrl_ptp() returns NULL and previously triggered a WARN_ON(), producing a kernel warning. The new implementation replaces this warning with an informational message and returns -EOPNOTSUPP instead. This change removes a misleading log entry and aligns the behavior with the expected configuration. The modification does not alter system functionality for normal operation, nor does it introduce or cure a security flaw. It simply corrects an unnecessary diagnostic that could otherwise clutter logs.
Affected Systems
The issue applies to the Linux kernel across all vendor implementations (Linux:Linux). No specific version ranges are provided, indicating that the behavior was common to all kernel versions before the patch. The latest kernel releases contain the fix.
Risk and Exploitability
The event is a non‑exploitable informational change; EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog, confirming its absence from known exploitation activity. The CVSS score of 5.5 indicates a medium severity, but this does not translate into a real security risk. Because the original warning was triggered only when the controlling PF was legitimately missing, an attacker cannot manipulate kernel state or achieve elevated privileges through this path. The risk level is effectively zero from a security standpoint.
OpenCVE Enrichment