xref: /rk3399_ARM-atf/docs/process/security.rst (revision a88b3c296ab99fb7080de199a0b6291d2b44fceb)
1Security Handling
2=================
3
4Security Disclosures
5--------------------
6
7We disclose all security vulnerabilities we find, or are advised about, that are
8relevant to Trusted Firmware-A. We encourage responsible disclosure of
9vulnerabilities and inform users as best we can about all possible issues.
10
11We disclose TF-A vulnerabilities as Security Advisories, all of which are listed
12at the bottom of this page. Any new ones will, additionally, be announced as
13issues in the project's `issue tracker`_ with the ``security-advisory`` tag. You
14can receive notification emails for these by watching the "Trusted Firmware-A"
15project at https://developer.trustedfirmware.org/.
16
17Found a Security Issue?
18-----------------------
19
20Although we try to keep TF-A secure, we can only do so with the help of the
21community of developers and security researchers.
22
23If you think you have found a security vulnerability, please **do not** report
24it in the `issue tracker`_ or on the `mailing list`_. Instead, please follow the
25`TrustedFirmware.org security incident process`_. One of the goals of this
26process is to ensure providers of products that use TF-A have a chance to
27consider the implications of the vulnerability and its remedy before it is made
28public. As such, please follow the disclosure plan outlined in the process. We
29do our best to respond and fix any issues quickly.
30
31Afterwards, we encourage you to write-up your findings about the TF-A source
32code.
33
34Attribution
35-----------
36
37We will name and thank you in the :ref:`Change Log & Release Notes` distributed
38with the source code and in any published security advisory.
39
40Security Advisories
41-------------------
42
43+-----------+------------------------------------------------------------------+
44| ID        | Title                                                            |
45+===========+==================================================================+
46|  |TFV-1|  | Malformed Firmware Update SMC can result in copy of unexpectedly |
47|           | large data into secure memory                                    |
48+-----------+------------------------------------------------------------------+
49|  |TFV-2|  | Enabled secure self-hosted invasive debug interface can allow    |
50|           | normal world to panic secure world                               |
51+-----------+------------------------------------------------------------------+
52|  |TFV-3|  | RO memory is always executable at AArch64 Secure EL1             |
53+-----------+------------------------------------------------------------------+
54|  |TFV-4|  | Malformed Firmware Update SMC can result in copy or              |
55|           | authentication of unexpected data in secure memory in AArch32    |
56|           | state                                                            |
57+-----------+------------------------------------------------------------------+
58|  |TFV-5|  | Not initializing or saving/restoring PMCR_EL0 can leak secure    |
59|           | world timing information                                         |
60+-----------+------------------------------------------------------------------+
61|  |TFV-6|  | Trusted Firmware-A exposure to speculative processor             |
62|           | vulnerabilities using cache timing side-channels                 |
63+-----------+------------------------------------------------------------------+
64|  |TFV-7|  | Trusted Firmware-A exposure to cache speculation vulnerability   |
65|           | Variant 4                                                        |
66+-----------+------------------------------------------------------------------+
67|  |TFV-8|  | Not saving x0 to x3 registers can leak information from one      |
68|           | Normal World SMC client to another                               |
69+-----------+------------------------------------------------------------------+
70
71.. _issue tracker: https://developer.trustedfirmware.org/project/board/1/
72.. _mailing list: https://lists.trustedfirmware.org/mailman/listinfo/tf-a
73
74.. |TFV-1| replace:: :ref:`Advisory TFV-1 (CVE-2016-10319)`
75.. |TFV-2| replace:: :ref:`Advisory TFV-2 (CVE-2017-7564)`
76.. |TFV-3| replace:: :ref:`Advisory TFV-3 (CVE-2017-7563)`
77.. |TFV-4| replace:: :ref:`Advisory TFV-4 (CVE-2017-9607)`
78.. |TFV-5| replace:: :ref:`Advisory TFV-5 (CVE-2017-15031)`
79.. |TFV-6| replace:: :ref:`Advisory TFV-6 (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754)`
80.. |TFV-7| replace:: :ref:`Advisory TFV-7 (CVE-2018-3639)`
81.. |TFV-8| replace:: :ref:`Advisory TFV-8 (CVE-2018-19440)`
82
83.. _TrustedFirmware.org security incident process: https://developer.trustedfirmware.org/w/collaboration/security_center/
84
85--------------
86
87*Copyright (c) 2019-2020, Arm Limited. All rights reserved.*
88