lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2026011359-CVE-2025-68777-2073@gregkh>
Date: Tue, 13 Jan 2026 16:29:03 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-68777: Input: ti_am335x_tsc - fix off-by-one error in wire_order validation

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

Input: ti_am335x_tsc - fix off-by-one error in wire_order validation

The current validation 'wire_order[i] > ARRAY_SIZE(config_pins)' allows
wire_order[i] to equal ARRAY_SIZE(config_pins), which causes out-of-bounds
access when used as index in 'config_pins[wire_order[i]]'.

Since config_pins has 4 elements (indices 0-3), the valid range for
wire_order should be 0-3. Fix the off-by-one error by using >= instead
of > in the validation check.

The Linux kernel CVE team has assigned CVE-2025-68777 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 3.11 with commit bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439 and fixed in 6.1.160 with commit 08c0b561823a7026364efb38ed7f4a3af48ccfcd
	Issue introduced in 3.11 with commit bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439 and fixed in 6.6.120 with commit bf95ec55805828c4f2b5241fb6b0c12388548570
	Issue introduced in 3.11 with commit bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439 and fixed in 6.12.64 with commit 84e4d3543168912549271b34261f5e0f94952d6e
	Issue introduced in 3.11 with commit bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439 and fixed in 6.18.3 with commit 40e3042de43ffa0017a8460ff9b4cad7b8c7cb96
	Issue introduced in 3.11 with commit bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439 and fixed in 6.19-rc2 with commit 248d3a73a0167dce15ba100477c3e778c4787178

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2025-68777
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/input/touchscreen/ti_am335x_tsc.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/08c0b561823a7026364efb38ed7f4a3af48ccfcd
	https://git.kernel.org/stable/c/bf95ec55805828c4f2b5241fb6b0c12388548570
	https://git.kernel.org/stable/c/84e4d3543168912549271b34261f5e0f94952d6e
	https://git.kernel.org/stable/c/40e3042de43ffa0017a8460ff9b4cad7b8c7cb96
	https://git.kernel.org/stable/c/248d3a73a0167dce15ba100477c3e778c4787178

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ