CVE-2025-71300

Published: Mag 08, 2026 Last Modified: Mag 08, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

Revert 'arm64: zynqmp: Add an OP-TEE node to the device tree'

This reverts commit 06d22ed6b6635b17551f386b50bb5aaff9b75fbe.

OP-TEE logic in U-Boot automatically injects a reserved-memory
node along with optee firmware node to kernel device tree.
The injection logic is dependent on that there is no manually
defined optee node. Having the node in zynqmp.dtsi effectively
breaks OP-TEE's insertion of the reserved-memory node, causing
memory access violations during runtime.

https://git.kernel.org/stable/c/2a833c730d4e8d1cc10953270ce0f3a156145d81
https://git.kernel.org/stable/c/3983ef126e439900bbf419724a9759863c146660
https://git.kernel.org/stable/c/c197179990124f991fca220d97fac56779a02c6d
https://git.kernel.org/stable/c/eece81eeda10eb42c687399fb5aa69977ae15664