CVE-2025-71300
OP-TEE Node Reversion Fix in Linux Kernel
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel where a specific commit related to the arm64 architecture for the zynqmp platform was reverted. The issue arises because OP-TEE logic in U-Boot automatically injects a reserved-memory node along with the OP-TEE firmware node into the kernel device tree, but this injection only works if there is no manually defined OP-TEE node.
Having the OP-TEE node manually defined in the zynqmp.dtsi file breaks OP-TEE's ability to insert the reserved-memory node, which leads to memory access violations during runtime.
How can this vulnerability impact me? :
The vulnerability can cause memory access violations during runtime due to the failure of OP-TEE to properly insert the reserved-memory node when a manual OP-TEE node is present.
This can lead to system instability or crashes on affected devices using the arm64 zynqmp platform with the Linux kernel, potentially impacting device functionality and reliability.