In the Linux kernel, the following vulnerability has been resolved:
Input: tiam335xtsc - fix off-by-one error in wire_order validation
The current validation 'wireorder[i] > ARRAYSIZE(configpins)' allows wireorder[i] to equal ARRAYSIZE(configpins), which causes out-of-bounds access when used as index in 'configpins[wireorder[i]]'.
Since configpins has 4 elements (indices 0-3), the valid range for wireorder should be 0-3. Fix the off-by-one error by using >= instead of > in the validation check.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68777.json"
}