From 1b7c82cafe8f5bd83f46a7c6f26618d58cdd36f2 Mon Sep 17 00:00:00 2001 From: Sandrine Bailleux Date: Fri, 13 May 2022 12:40:22 +0200 Subject: [PATCH] docs(threat-model): remove some redundant text in threat #08 The threat description was repeating the threat title. Change-Id: I67de2c0aab6e86bf33eb91e7562e075fcb76259b Signed-off-by: Sandrine Bailleux --- docs/threat_model/threat_model.rst | 9 ++------- 1 file changed, 2 insertions(+), 7 deletions(-) diff --git a/docs/threat_model/threat_model.rst b/docs/threat_model/threat_model.rst index 46f8a5256..611e8a108 100644 --- a/docs/threat_model/threat_model.rst +++ b/docs/threat_model/threat_model.rst @@ -555,13 +555,8 @@ each diagram element of the data flow diagram. | | flow of the program, or leak sensitive | | | information** | | | | -| | | Like in other software, the Trusted Firmware has | -| | multiple points where memory corruption security | -| | errors can arise. Memory corruption is a dangerous | -| | security issue since it could allow an attacker | -| | to execute arbitrary code, modify some state | -| | variable to change the normal flow of the program, | -| | or leak sensitive information. | +| | | Like in other software, TF-A has multiple points | +| | where memory corruption security errors can arise. | | | | | | | Some of the errors include integer overflow, | | | buffer overflow, incorrect array boundary checks, |