VYPR
Unrated severityNVD Advisory· Published Jan 13, 2026· Updated Apr 15, 2026

CVE-2025-68777

CVE-2025-68777

Description

In the Linux kernel, the following vulnerability has been resolved:

Input: ti_am335x_tsc - fix off-by-one error in wire_order validation

The current validation 'wire_order[i] > ARRAY_SIZE(config_pins)' allows wire_order[i] to equal ARRAY_SIZE(config_pins), which causes out-of-bounds access when used as index in 'config_pins[wire_order[i]]'.

Since config_pins has 4 elements (indices 0-3), the valid range for wire_order should be 0-3. Fix the off-by-one error by using >= instead of > in the validation check.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An off-by-one error in ti_am335x_tsc driver wire_order validation allows out-of-bounds array access, potentially causing memory corruption.

Vulnerability

Description

In the TI AM335x touchscreen controller (TSC) driver within the Linux kernel, an off-by-one error exists in the validation of the wire_order array. The check wire_order[i] > ARRAY_SIZE(config_pins) permits values equal to ARRAY_SIZE(config_pins) (which is 4) to pass validation. Since config_pins config_pins` is a 4-element array (indices 0–3), a value of 4 leads to an out-of-bounds read/write when used as an index [1][2][3].

Exploitation and

Attack Surface

The vulnerability can be triggered through specially crafted input that sets wire_order elements to invalid values (>=4). No special privileges are required beyond the ability to interact with the TSC device interface. The attack surface is local, and exploitation would typically require physical access or a malicious program running on the system.

Impact

An attacker could use this bug to read or write memory outside the config_pins array, potentially causing memory corruption, denial of service (kernel panic), or in some cases privilege escalation. The specific impact depends on system memory layout and the attacker's ability to control the ability to control the out-of-bounds index [1][2][3].

Mitigation

The fix changes the comparison from > to >=, ensuring only indices 0–3 are accepted. The commit is merged in stable kernel trees. Users should apply the latest kernel updates containing this patch [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.