docs(threat-model): remove some redundant text in threat #08

The threat description was repeating the threat title.

Change-Id: I67de2c0aab6e86bf33eb91e7562e075fcb76259b
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
This commit is contained in:
Sandrine Bailleux 2022-05-13 12:40:22 +02:00
parent 4365b30ccf
commit 1b7c82cafe
1 changed files with 2 additions and 7 deletions

View File

@ -555,13 +555,8 @@ each diagram element of the data flow diagram.
| | flow of the program, or leak sensitive |
| | information** |
| | |
| | | Like in other software, the Trusted Firmware has |
| | multiple points where memory corruption security |
| | errors can arise. Memory corruption is a dangerous |
| | security issue since it could allow an attacker |
| | to execute arbitrary code, modify some state |
| | variable to change the normal flow of the program, |
| | or leak sensitive information. |
| | | Like in other software, TF-A has multiple points |
| | where memory corruption security errors can arise. |
| | |
| | | Some of the errors include integer overflow, |
| | buffer overflow, incorrect array boundary checks, |