CVE-2025-68777
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an off-by-one error in the Linux kernel's ti_am335x_tsc input driver. The validation check for the wire_order array allows an index equal to the size of the config_pins array, which has 4 elements (indices 0-3). This causes an out-of-bounds access when the invalid index is used to access config_pins, potentially leading to unexpected behavior or crashes. The fix changes the validation to prevent wire_order indices from being equal to or greater than the array size.
How can this vulnerability impact me? :
The out-of-bounds access caused by the off-by-one error can lead to memory corruption, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or cause denial of service depending on the context in which the vulnerable code is used.