{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-68777","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-24T10:30:51.035Z","datePublished":"2026-01-13T15:28:53.416Z","dateUpdated":"2026-05-11T21:53:09.176Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:53:09.176Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nInput: ti_am335x_tsc - fix off-by-one error in wire_order validation\n\nThe current validation 'wire_order[i] > ARRAY_SIZE(config_pins)' allows\nwire_order[i] to equal ARRAY_SIZE(config_pins), which causes out-of-bounds\naccess when used as index in 'config_pins[wire_order[i]]'.\n\nSince config_pins has 4 elements (indices 0-3), the valid range for\nwire_order should be 0-3. Fix the off-by-one error by using >= instead\nof > in the validation check."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/input/touchscreen/ti_am335x_tsc.c"],"versions":[{"version":"bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439","lessThan":"a7ff2360431561b56f559d3a628d1f096048d178","status":"affected","versionType":"git"},{"version":"bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439","lessThan":"136abe173a3cc2951d70c6e51fe7abdbadbb204b","status":"affected","versionType":"git"},{"version":"bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439","lessThan":"08c0b561823a7026364efb38ed7f4a3af48ccfcd","status":"affected","versionType":"git"},{"version":"bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439","lessThan":"bf95ec55805828c4f2b5241fb6b0c12388548570","status":"affected","versionType":"git"},{"version":"bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439","lessThan":"84e4d3543168912549271b34261f5e0f94952d6e","status":"affected","versionType":"git"},{"version":"bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439","lessThan":"40e3042de43ffa0017a8460ff9b4cad7b8c7cb96","status":"affected","versionType":"git"},{"version":"bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439","lessThan":"248d3a73a0167dce15ba100477c3e778c4787178","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/input/touchscreen/ti_am335x_tsc.c"],"versions":[{"version":"3.11","status":"affected"},{"version":"0","lessThan":"3.11","status":"unaffected","versionType":"semver"},{"version":"5.10.248","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.198","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.160","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.120","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.64","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.3","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.11","versionEndExcluding":"5.10.248"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.11","versionEndExcluding":"5.15.198"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.11","versionEndExcluding":"6.1.160"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.11","versionEndExcluding":"6.6.120"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.11","versionEndExcluding":"6.12.64"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.11","versionEndExcluding":"6.18.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.11","versionEndExcluding":"6.19"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/a7ff2360431561b56f559d3a628d1f096048d178"},{"url":"https://git.kernel.org/stable/c/136abe173a3cc2951d70c6e51fe7abdbadbb204b"},{"url":"https://git.kernel.org/stable/c/08c0b561823a7026364efb38ed7f4a3af48ccfcd"},{"url":"https://git.kernel.org/stable/c/bf95ec55805828c4f2b5241fb6b0c12388548570"},{"url":"https://git.kernel.org/stable/c/84e4d3543168912549271b34261f5e0f94952d6e"},{"url":"https://git.kernel.org/stable/c/40e3042de43ffa0017a8460ff9b4cad7b8c7cb96"},{"url":"https://git.kernel.org/stable/c/248d3a73a0167dce15ba100477c3e778c4787178"}],"title":"Input: ti_am335x_tsc - fix off-by-one error in wire_order validation","x_generator":{"engine":"bippy-1.2.0"}}}}