[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2026011359-CVE-2025-68777-2073@gregkh>
Date: Tue, 13 Jan 2026 16:29:03 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-68777: Input: ti_am335x_tsc - fix off-by-one error in wire_order validation
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
Input: ti_am335x_tsc - fix off-by-one error in wire_order validation
The current validation 'wire_order[i] > ARRAY_SIZE(config_pins)' allows
wire_order[i] to equal ARRAY_SIZE(config_pins), which causes out-of-bounds
access when used as index in 'config_pins[wire_order[i]]'.
Since config_pins has 4 elements (indices 0-3), the valid range for
wire_order should be 0-3. Fix the off-by-one error by using >= instead
of > in the validation check.
The Linux kernel CVE team has assigned CVE-2025-68777 to this issue.
Affected and fixed versions
===========================
Issue introduced in 3.11 with commit bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439 and fixed in 6.1.160 with commit 08c0b561823a7026364efb38ed7f4a3af48ccfcd
Issue introduced in 3.11 with commit bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439 and fixed in 6.6.120 with commit bf95ec55805828c4f2b5241fb6b0c12388548570
Issue introduced in 3.11 with commit bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439 and fixed in 6.12.64 with commit 84e4d3543168912549271b34261f5e0f94952d6e
Issue introduced in 3.11 with commit bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439 and fixed in 6.18.3 with commit 40e3042de43ffa0017a8460ff9b4cad7b8c7cb96
Issue introduced in 3.11 with commit bb76dc09ddfc135c6c5e8eb7d3c583bfa8bdd439 and fixed in 6.19-rc2 with commit 248d3a73a0167dce15ba100477c3e778c4787178
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-68777
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/input/touchscreen/ti_am335x_tsc.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/08c0b561823a7026364efb38ed7f4a3af48ccfcd
https://git.kernel.org/stable/c/bf95ec55805828c4f2b5241fb6b0c12388548570
https://git.kernel.org/stable/c/84e4d3543168912549271b34261f5e0f94952d6e
https://git.kernel.org/stable/c/40e3042de43ffa0017a8460ff9b4cad7b8c7cb96
https://git.kernel.org/stable/c/248d3a73a0167dce15ba100477c3e778c4787178
Powered by blists - more mailing lists