* [PATCH v3 0/3] wifi: wlcore/wl18xx: firmware trust boundary hardening
@ 2026-04-21 13:49 Tristan Madani
2026-04-21 13:49 ` [PATCH v3 1/3] wifi: wl18xx: fix OOB read from firmware rx_ba_link_id in BA event handler Tristan Madani
` (2 more replies)
0 siblings, 3 replies; 4+ messages in thread
From: Tristan Madani @ 2026-04-21 13:49 UTC (permalink / raw)
To: Johannes Berg; +Cc: linux-wireless, linux-kernel, Tristan Madani
From: Tristan Madani <tristan@talencesecurity.com>
This series adds missing bounds checks for firmware-controlled fields
in the TI wlcore and wl18xx drivers.
Patches cover: BA event link_id, logger max_buff_size, and smart config
SSID/password lengths.
Changes in v3:
- Regenerated from wireless-next with proper git format-patch.
Changes in v2:
- No code changes from v1.
Tristan Madani (3):
wifi: wl18xx: fix OOB read from firmware rx_ba_link_id in BA event
handler
wifi: wlcore: fix OOB read from firmware max_buff_size in logger
handler
wifi: wl18xx: fix OOB read from firmware SSID/password lengths in
smart config event
drivers/net/wireless/ti/wl18xx/event.c | 9 +++++++++
drivers/net/wireless/ti/wlcore/event.c | 7 +++++++
2 files changed, 16 insertions(+)
--
2.47.3
^ permalink raw reply [flat|nested] 4+ messages in thread* [PATCH v3 1/3] wifi: wl18xx: fix OOB read from firmware rx_ba_link_id in BA event handler
2026-04-21 13:49 [PATCH v3 0/3] wifi: wlcore/wl18xx: firmware trust boundary hardening Tristan Madani
@ 2026-04-21 13:49 ` Tristan Madani
2026-04-21 13:49 ` [PATCH v3 2/3] wifi: wlcore: fix OOB read from firmware max_buff_size in logger handler Tristan Madani
2026-04-21 13:49 ` [PATCH v3 3/3] wifi: wl18xx: fix OOB read from firmware SSID/password lengths in smart config event Tristan Madani
2 siblings, 0 replies; 4+ messages in thread
From: Tristan Madani @ 2026-04-21 13:49 UTC (permalink / raw)
To: Johannes Berg; +Cc: linux-wireless, linux-kernel, Tristan Madani
From: Tristan Madani <tristan@talencesecurity.com>
The firmware-controlled rx_ba_link_id (u8) is used to index the 16-entry
wl->links[] array without bounds checking in the BA window size change
event handler. An out-of-range value causes OOB reads and an immediate
pointer dereference of the OOB wlvif field.
Add bounds validation consistent with all other HLID consumers in the
driver.
Fixes: d4392269f7ce ("wlcore: Add RX_BA_WIN_SIZE_CHANGE_EVENT event")
Signed-off-by: Tristan Madani <tristan@talencesecurity.com>
---
Changes in v3:
- Regenerated from wireless-next with proper git format-patch to
produce valid index hashes (v2 had post-processed index lines).
Changes in v2:
- No code changes from v1.
drivers/net/wireless/ti/wl18xx/event.c | 6 ++++++
1 file changed, 6 insertions(+)
diff --git a/drivers/net/wireless/ti/wl18xx/event.c b/drivers/net/wireless/ti/wl18xx/event.c
index a9f090e15cbbe..fac12a8590355 100644
--- a/drivers/net/wireless/ti/wl18xx/event.c
+++ b/drivers/net/wireless/ti/wl18xx/event.c
@@ -212,6 +212,12 @@ int wl18xx_process_mailbox_events(struct wl1271 *wl)
u8 win_size = mbox->rx_ba_win_size;
const u8 *addr;
+ if (link_id >= WLCORE_MAX_LINKS) {
+ wl1271_error("BA event: invalid link_id %u\n",
+ link_id);
+ goto out;
+ }
+
wlvif = wl->links[link_id].wlvif;
vif = wl12xx_wlvif_to_vif(wlvif);
--
2.47.3
^ permalink raw reply related [flat|nested] 4+ messages in thread* [PATCH v3 2/3] wifi: wlcore: fix OOB read from firmware max_buff_size in logger handler
2026-04-21 13:49 [PATCH v3 0/3] wifi: wlcore/wl18xx: firmware trust boundary hardening Tristan Madani
2026-04-21 13:49 ` [PATCH v3 1/3] wifi: wl18xx: fix OOB read from firmware rx_ba_link_id in BA event handler Tristan Madani
@ 2026-04-21 13:49 ` Tristan Madani
2026-04-21 13:49 ` [PATCH v3 3/3] wifi: wl18xx: fix OOB read from firmware SSID/password lengths in smart config event Tristan Madani
2 siblings, 0 replies; 4+ messages in thread
From: Tristan Madani @ 2026-04-21 13:49 UTC (permalink / raw)
To: Johannes Berg; +Cc: linux-wireless, linux-kernel, Tristan Madani
From: Tristan Madani <tristan@talencesecurity.com>
The firmware-controlled max_buff_size field is used to compute buffer
offsets in wlcore_event_fw_logger() without validation against the
4128-byte kernel allocation. An inflated value causes out-of-bounds
reads from kernel heap, with the data written to the debugfs-accessible
fwlog ring buffer.
Cap max_buff_size at the allocation size minus the header offset.
Fixes: 3719c17e1816 ("wlcore/wl18xx: fw logger over sdio")
Signed-off-by: Tristan Madani <tristan@talencesecurity.com>
---
Changes in v3:
- Regenerated from wireless-next with proper git format-patch to
produce valid index hashes (v2 had post-processed index lines).
Changes in v2:
- No code changes from v1.
drivers/net/wireless/ti/wlcore/event.c | 7 +++++++
1 file changed, 7 insertions(+)
diff --git a/drivers/net/wireless/ti/wlcore/event.c b/drivers/net/wireless/ti/wlcore/event.c
index 6c3a8ea9613e9..26c74dfcaeeff 100644
--- a/drivers/net/wireless/ti/wlcore/event.c
+++ b/drivers/net/wireless/ti/wlcore/event.c
@@ -61,6 +61,13 @@ int wlcore_event_fw_logger(struct wl1271 *wl)
if (actual_len == 0)
goto free_out;
+ if (le32_to_cpu(fw_log.max_buff_size) >
+ WL18XX_LOGGER_SDIO_BUFF_MAX - WL18XX_LOGGER_BUFF_OFFSET) {
+ wl1271_error("fw logger: max_buff_size %u exceeds buffer\n",
+ le32_to_cpu(fw_log.max_buff_size));
+ goto free_out;
+ }
+
/* Calculate the internal pointer to the fwlog structure */
addr_ptr = internal_fw_addrbase + addr;
--
2.47.3
^ permalink raw reply related [flat|nested] 4+ messages in thread* [PATCH v3 3/3] wifi: wl18xx: fix OOB read from firmware SSID/password lengths in smart config event
2026-04-21 13:49 [PATCH v3 0/3] wifi: wlcore/wl18xx: firmware trust boundary hardening Tristan Madani
2026-04-21 13:49 ` [PATCH v3 1/3] wifi: wl18xx: fix OOB read from firmware rx_ba_link_id in BA event handler Tristan Madani
2026-04-21 13:49 ` [PATCH v3 2/3] wifi: wlcore: fix OOB read from firmware max_buff_size in logger handler Tristan Madani
@ 2026-04-21 13:49 ` Tristan Madani
2 siblings, 0 replies; 4+ messages in thread
From: Tristan Madani @ 2026-04-21 13:49 UTC (permalink / raw)
To: Johannes Berg; +Cc: linux-wireless, linux-kernel, Tristan Madani
From: Tristan Madani <tristan@talencesecurity.com>
The firmware-controlled sc_ssid_len and sc_pwd_len values are used as
nla_put sizes from fixed-size mailbox buffers (32 and 64 bytes) without
bounds checking. Values exceeding the buffer sizes cause out-of-bounds
reads delivered to userspace via nl80211 vendor events.
Clamp the lengths to the mailbox buffer sizes before use.
Fixes: e93e15fb47e5 ("wlcore/wl18xx: handle smart config events")
Signed-off-by: Tristan Madani <tristan@talencesecurity.com>
---
Changes in v3:
- Regenerated from wireless-next with proper git format-patch to
produce valid index hashes (v2 had post-processed index lines).
Changes in v2:
- No code changes from v1.
drivers/net/wireless/ti/wl18xx/event.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/drivers/net/wireless/ti/wl18xx/event.c b/drivers/net/wireless/ti/wl18xx/event.c
index fac12a8590355..19c7f5bdada5e 100644
--- a/drivers/net/wireless/ti/wl18xx/event.c
+++ b/drivers/net/wireless/ti/wl18xx/event.c
@@ -82,6 +82,9 @@ static int wlcore_smart_config_decode_event(struct wl1271 *wl,
{
struct sk_buff *skb;
+ ssid_len = min_t(u8, ssid_len, 32);
+ pwd_len = min_t(u8, pwd_len, 64);
+
wl1271_debug(DEBUG_EVENT, "SMART_CONFIG_DECODE_EVENT_ID");
wl1271_dump_ascii(DEBUG_EVENT, "SSID:", ssid, ssid_len);
--
2.47.3
^ permalink raw reply related [flat|nested] 4+ messages in thread
end of thread, other threads:[~2026-04-21 13:49 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-04-21 13:49 [PATCH v3 0/3] wifi: wlcore/wl18xx: firmware trust boundary hardening Tristan Madani
2026-04-21 13:49 ` [PATCH v3 1/3] wifi: wl18xx: fix OOB read from firmware rx_ba_link_id in BA event handler Tristan Madani
2026-04-21 13:49 ` [PATCH v3 2/3] wifi: wlcore: fix OOB read from firmware max_buff_size in logger handler Tristan Madani
2026-04-21 13:49 ` [PATCH v3 3/3] wifi: wl18xx: fix OOB read from firmware SSID/password lengths in smart config event Tristan Madani
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox