security.rst 5.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798
  1. Security Handling
  2. =================
  3. Security Disclosures
  4. --------------------
  5. We disclose all security vulnerabilities we find, or are advised about, that are
  6. relevant to Trusted Firmware-A. We encourage responsible disclosure of
  7. vulnerabilities and inform users as best we can about all possible issues.
  8. We disclose TF-A vulnerabilities as Security Advisories, all of which are listed
  9. at the bottom of this page. Any new ones will, additionally, be announced on the
  10. TF-A project's `mailing list`_.
  11. Found a Security Issue?
  12. -----------------------
  13. Although we try to keep TF-A secure, we can only do so with the help of the
  14. community of developers and security researchers.
  15. .. warning::
  16. If you think you have found a security vulnerability, please **do not**
  17. report it in the `issue tracker`_ or on the `mailing list`_. Instead, please
  18. follow the `TrustedFirmware.org security incident process`_.
  19. One of the goals of this process is to ensure providers of products that use
  20. TF-A have a chance to consider the implications of the vulnerability and its
  21. remedy before it is made public. As such, please follow the disclosure plan
  22. outlined in the process. We do our best to respond and fix any issues quickly.
  23. Afterwards, we encourage you to write-up your findings about the TF-A source
  24. code.
  25. Attribution
  26. -----------
  27. We will name and thank you in the :ref:`Change Log & Release Notes` distributed
  28. with the source code and in any published security advisory.
  29. Security Advisories
  30. -------------------
  31. +-----------+------------------------------------------------------------------+
  32. | ID | Title |
  33. +===========+==================================================================+
  34. | |TFV-1| | Malformed Firmware Update SMC can result in copy of unexpectedly |
  35. | | large data into secure memory |
  36. +-----------+------------------------------------------------------------------+
  37. | |TFV-2| | Enabled secure self-hosted invasive debug interface can allow |
  38. | | normal world to panic secure world |
  39. +-----------+------------------------------------------------------------------+
  40. | |TFV-3| | RO memory is always executable at AArch64 Secure EL1 |
  41. +-----------+------------------------------------------------------------------+
  42. | |TFV-4| | Malformed Firmware Update SMC can result in copy or |
  43. | | authentication of unexpected data in secure memory in AArch32 |
  44. | | state |
  45. +-----------+------------------------------------------------------------------+
  46. | |TFV-5| | Not initializing or saving/restoring PMCR_EL0 can leak secure |
  47. | | world timing information |
  48. +-----------+------------------------------------------------------------------+
  49. | |TFV-6| | Trusted Firmware-A exposure to speculative processor |
  50. | | vulnerabilities using cache timing side-channels |
  51. +-----------+------------------------------------------------------------------+
  52. | |TFV-7| | Trusted Firmware-A exposure to cache speculation vulnerability |
  53. | | Variant 4 |
  54. +-----------+------------------------------------------------------------------+
  55. | |TFV-8| | Not saving x0 to x3 registers can leak information from one |
  56. | | Normal World SMC client to another |
  57. +-----------+------------------------------------------------------------------+
  58. | |TFV-9| | Trusted Firmware-A exposure to speculative processor |
  59. | | vulnerabilities with branch prediction target reuse |
  60. +-----------+------------------------------------------------------------------+
  61. | |TFV-10| | Incorrect validation of X.509 certificate extensions can result |
  62. | | in an out-of-bounds read |
  63. +-----------+------------------------------------------------------------------+
  64. | |TFV-11| | A Malformed SDEI SMC can cause out of bound memory read |
  65. +-----------+------------------------------------------------------------------+
  66. .. _issue tracker: https://github.com/TrustedFirmware-A/trusted-firmware-a/issues
  67. .. _mailing list: https://lists.trustedfirmware.org/mailman3/lists/tf-a.lists.trustedfirmware.org/
  68. .. |TFV-1| replace:: :ref:`Advisory TFV-1 (CVE-2016-10319)`
  69. .. |TFV-2| replace:: :ref:`Advisory TFV-2 (CVE-2017-7564)`
  70. .. |TFV-3| replace:: :ref:`Advisory TFV-3 (CVE-2017-7563)`
  71. .. |TFV-4| replace:: :ref:`Advisory TFV-4 (CVE-2017-9607)`
  72. .. |TFV-5| replace:: :ref:`Advisory TFV-5 (CVE-2017-15031)`
  73. .. |TFV-6| replace:: :ref:`Advisory TFV-6 (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754)`
  74. .. |TFV-7| replace:: :ref:`Advisory TFV-7 (CVE-2018-3639)`
  75. .. |TFV-8| replace:: :ref:`Advisory TFV-8 (CVE-2018-19440)`
  76. .. |TFV-9| replace:: :ref:`Advisory TFV-9 (CVE-2022-23960)`
  77. .. |TFV-10| replace:: :ref:`Advisory TFV-10 (CVE-2022-47630)`
  78. .. |TFV-11| replace:: :ref:`Advisory TFV-11 (CVE-2023-49100)`
  79. .. _TrustedFirmware.org security incident process: https://trusted-firmware-docs.readthedocs.io/en/latest/security_center/
  80. --------------
  81. *Copyright (c) 2019-2023, Arm Limited. All rights reserved.*