18aa05055SPaul BeesleySecurity Handling 28aa05055SPaul Beesley================= 38aa05055SPaul Beesley 48aa05055SPaul BeesleySecurity Disclosures 58aa05055SPaul Beesley-------------------- 68aa05055SPaul Beesley 7*55f14059SJohn TsichritzisWe disclose all security vulnerabilities we find, or are advised about, that are 8*55f14059SJohn Tsichritzisrelevant to Trusted Firmware-A. We encourage responsible disclosure of 98aa05055SPaul Beesleyvulnerabilities and inform users as best we can about all possible issues. 108aa05055SPaul Beesley 11*55f14059SJohn TsichritzisWe disclose TF-A vulnerabilities as Security Advisories, all of which are listed 12*55f14059SJohn Tsichritzisat the bottom of this page. Any new ones will, additionally, be announced as 13*55f14059SJohn Tsichritzisissues in the project's `issue tracker`_ with the ``security-advisory`` tag. You 14*55f14059SJohn Tsichritziscan receive notification emails for these by watching the "Trusted Firmware-A" 15*55f14059SJohn Tsichritzisproject at https://developer.trustedfirmware.org/. 168aa05055SPaul Beesley 178aa05055SPaul BeesleyFound a Security Issue? 188aa05055SPaul Beesley----------------------- 198aa05055SPaul Beesley 20*55f14059SJohn TsichritzisAlthough we try to keep TF-A secure, we can only do so with the help of the 218aa05055SPaul Beesleycommunity of developers and security researchers. 228aa05055SPaul Beesley 23*55f14059SJohn TsichritzisIf you think you have found a security vulnerability, please **do not** report it 24*55f14059SJohn Tsichritzisin the `issue tracker`_. Instead send an email to 258aa05055SPaul Beesleytrusted-firmware-security@arm.com 268aa05055SPaul Beesley 278aa05055SPaul BeesleyPlease include: 288aa05055SPaul Beesley 29*55f14059SJohn Tsichritzis* Trusted Firmware-A version (or commit) affected 308aa05055SPaul Beesley 318aa05055SPaul Beesley* A description of the concern or vulnerability 328aa05055SPaul Beesley 338aa05055SPaul Beesley* Details on how to replicate the vulnerability, including: 348aa05055SPaul Beesley 358aa05055SPaul Beesley - Configuration details 368aa05055SPaul Beesley 378aa05055SPaul Beesley - Proof of concept exploit code 388aa05055SPaul Beesley 398aa05055SPaul Beesley - Any additional software or tools required 408aa05055SPaul Beesley 418aa05055SPaul BeesleyWe recommend using `this PGP/GPG key`_ for encrypting the information. This key 428aa05055SPaul Beesleyis also available at http://keyserver.pgp.com and LDAP port 389 of the same 438aa05055SPaul Beesleyserver. The fingerprint for this key is: 448aa05055SPaul Beesley 458aa05055SPaul Beesley:: 468aa05055SPaul Beesley 478aa05055SPaul Beesley 1309 2C19 22B4 8E87 F17B FE5C 3AB7 EFCB 45A0 DFD0 488aa05055SPaul Beesley 498aa05055SPaul BeesleyIf you would like replies to be encrypted, please provide your public key. 508aa05055SPaul Beesley 518aa05055SPaul BeesleyPlease give us the time to respond to you and fix the vulnerability before going 528aa05055SPaul Beesleypublic. We do our best to respond and fix any issues quickly. We also need to 53*55f14059SJohn Tsichritzisensure providers of products that use TF-A have a chance to consider the 548aa05055SPaul Beesleyimplications of the vulnerability and its remedy. 558aa05055SPaul Beesley 56*55f14059SJohn TsichritzisAfterwards, we encourage you to write-up your findings about the TF-A source 57*55f14059SJohn Tsichritziscode. 588aa05055SPaul Beesley 598aa05055SPaul BeesleyAttribution 608aa05055SPaul Beesley----------- 618aa05055SPaul Beesley 628aa05055SPaul BeesleyWe will name and thank you in the ``change-log.rst`` distributed with the source 638aa05055SPaul Beesleycode and in any published security advisory. 648aa05055SPaul Beesley 658aa05055SPaul BeesleySecurity Advisories 668aa05055SPaul Beesley------------------- 678aa05055SPaul Beesley 688aa05055SPaul Beesley+-----------+------------------------------------------------------------------+ 698aa05055SPaul Beesley| ID | Title | 708aa05055SPaul Beesley+===========+==================================================================+ 718aa05055SPaul Beesley| `TFV-1`_ | Malformed Firmware Update SMC can result in copy of unexpectedly | 728aa05055SPaul Beesley| | large data into secure memory | 738aa05055SPaul Beesley+-----------+------------------------------------------------------------------+ 748aa05055SPaul Beesley| `TFV-2`_ | Enabled secure self-hosted invasive debug interface can allow | 758aa05055SPaul Beesley| | normal world to panic secure world | 768aa05055SPaul Beesley+-----------+------------------------------------------------------------------+ 778aa05055SPaul Beesley| `TFV-3`_ | RO memory is always executable at AArch64 Secure EL1 | 788aa05055SPaul Beesley+-----------+------------------------------------------------------------------+ 798aa05055SPaul Beesley| `TFV-4`_ | Malformed Firmware Update SMC can result in copy or | 808aa05055SPaul Beesley| | authentication of unexpected data in secure memory in AArch32 | 818aa05055SPaul Beesley| | state | 828aa05055SPaul Beesley+-----------+------------------------------------------------------------------+ 838aa05055SPaul Beesley| `TFV-5`_ | Not initializing or saving/restoring PMCR_EL0 can leak secure | 848aa05055SPaul Beesley| | world timing information | 858aa05055SPaul Beesley+-----------+------------------------------------------------------------------+ 86*55f14059SJohn Tsichritzis| `TFV-6`_ | Trusted Firmware-A exposure to speculative processor | 878aa05055SPaul Beesley| | vulnerabilities using cache timing side-channels | 888aa05055SPaul Beesley+-----------+------------------------------------------------------------------+ 898aa05055SPaul Beesley| `TFV-7`_ | Trusted Firmware-A exposure to cache speculation vulnerability | 908aa05055SPaul Beesley| | Variant 4 | 918aa05055SPaul Beesley+-----------+------------------------------------------------------------------+ 928aa05055SPaul Beesley| `TFV-8`_ | Not saving x0 to x3 registers can leak information from one | 938aa05055SPaul Beesley| | Normal World SMC client to another | 948aa05055SPaul Beesley+-----------+------------------------------------------------------------------+ 958aa05055SPaul Beesley 96*55f14059SJohn Tsichritzis.. _issue tracker: https://developer.trustedfirmware.org/project/board/1/ 978aa05055SPaul Beesley.. _this PGP/GPG key: security-reporting.asc 988aa05055SPaul Beesley.. _TFV-1: ./security_advisories/security-advisory-tfv-1.rst 998aa05055SPaul Beesley.. _TFV-2: ./security_advisories/security-advisory-tfv-2.rst 1008aa05055SPaul Beesley.. _TFV-3: ./security_advisories/security-advisory-tfv-3.rst 1018aa05055SPaul Beesley.. _TFV-4: ./security_advisories/security-advisory-tfv-4.rst 1028aa05055SPaul Beesley.. _TFV-5: ./security_advisories/security-advisory-tfv-5.rst 1038aa05055SPaul Beesley.. _TFV-6: ./security_advisories/security-advisory-tfv-6.rst 1048aa05055SPaul Beesley.. _TFV-7: ./security_advisories/security-advisory-tfv-7.rst 1058aa05055SPaul Beesley.. _TFV-8: ./security_advisories/security-advisory-tfv-8.rst 106