Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3451 articles · 142163 vulns · 36/41 feeds (7d)
← Back to list
—
CVE-2025-71300EXPLOITEDPATCHED
linux · linux kernel

Revert "arm64: zynqmp: Add an OP-TEE node to the device tree"

Description

In the Linux kernel, the following vulnerability has been resolved: Revert "arm64: zynqmp: Add an OP-TEE node to the device tree" This reverts commit 06d22ed6b6635b17551f386b50bb5aaff9b75fbe. OP-TEE logic in U-Boot automatically injects a reserved-memory node along with optee firmware node to kernel device tree. The injection logic is dependent on that there is no manually defined optee node. Having the node in zynqmp.dtsi effectively breaks OP-TEE's insertion of the reserved-memory node, causing memory access violations during runtime.

Affected Products

VendorProductVersions
linuxlinux kernel06d22ed6b6635b17551f386b50bb5aaff9b75fbe, 06d22ed6b6635b17551f386b50bb5aaff9b75fbe, 06d22ed6b6635b17551f386b50bb5aaff9b75fbe, 06d22ed6b6635b17551f386b50bb5aaff9b75fbe, 6.9, 6.12.74, 6.18.15, 6.19.5

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
open sourceopen source linux kernelcert_advisory90%

References

  • https://git.kernel.org/stable/c/eece81eeda10eb42c687399fb5aa69977ae15664
  • https://git.kernel.org/stable/c/3983ef126e439900bbf419724a9759863c146660
  • https://git.kernel.org/stable/c/2a833c730d4e8d1cc10953270ce0f3a156145d81
  • https://git.kernel.org/stable/c/c197179990124f991fca220d97fac56779a02c6d

Related News (3 articles)

Tier B
BSI Advisories8h ago
[NEU] [mittel] Linux Kernel: Mehrere Schwachstellen
→ No new info (linked only)
Tier C
VulDB3d ago
CVE-2025-71300 | Linux Kernel up to 6.12.74/6.18.15/6.19.5 injection
→ No new info (linked only)
Tier C
Linux Kernel CVEs3d ago
CVE-2025-71300: Revert "arm64: zynqmp: Add an OP-TEE node to the device tree"
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
eece81eeda10eb42c687399fb5aa69977ae156643983ef126e439900bbf419724a9759863c1466602a833c730d4e8d1cc10953270ce0f3a156145d81c197179990124f991fca220d97fac56779a02c6d06.12.756.18.166.19.67.0
PublishedMay 8, 2026
Last enriched3d agov2
Trending Score63
Source articles3
Independent3
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-31431EXPKEV
crypto: algif_aead - Revert to operating out-of-place
Trending: 122
IMPORTANTCVE-2026-43284EXP
xfrm: esp: avoid in-place decrypt on shared skb frags
Trending: 89
CRITICALCVE-2026-43312EXP
media: i2c: ov5647: Initialize subdev before controls
Trending: 63
CRITICALCVE-2025-71301EXP
drm/tests: shmem: Hold reservation lock around vmap/vunmap
Trending: 63
CRITICALCVE-2026-43289EXP
kexec: derive purgatory entry from symbol
Trending: 63

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
May 8, 2026
Actively Exploited
May 8, 2026
Patch Available
May 8, 2026
Discovered by ZDM
May 8, 2026
Updated: affectedVersions, severity, activelyExploited
May 8, 2026

Version History

v2
Last enriched 3d ago
v2Tier C3d ago

Updated affected versions to include 6.12.74, 6.18.15, and 6.19.5, changed severity to CRITICAL, and noted that no exploit is available.

affectedVersionsseverityactivelyExploited
via VulDB
v13d ago

Initial creation