In the Linux kernel, the following vulnerability has been resolved: Input: tiam335xtsc - fix off-by-one error in wireorder validation The current validation 'wireorder[i] > ARRAYSIZE(configpins)' allows wireorder[i] to equal ARRAYSIZE(configpins), which causes out-of-bounds access when used as index in 'configpins[wireorder[i]]'. Since configpins has 4 elements (indices 0-3), the valid range for wire_order should be 0-3. Fix the off-by-one error by using >= instead of > in the validation check.