aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMichalis Spyrou <michalis.spyrou@arm.com>2022-04-26 16:48:24 +0100
committerMichalis Spyrou <michalis.spyrou@arm.com>2022-04-29 11:48:08 +0000
commit3ba177fde423adf97374783b80ad261cc91ceec1 (patch)
treee75a288cfc782dbd26efd9ea49bb4fd9908b0905
parentd51aad9dd238c6755d23c06f9a5bd4baaf84ba87 (diff)
downloadComputeLibrary-3ba177fde423adf97374783b80ad261cc91ceec1.tar.gz
Add a few sections on security conserns
Change-Id: If94171d52a37e917aaa75e1a137d7df561698290 Signed-off-by: Michalis Spyrou <michalis.spyrou@arm.com> Reviewed-on: https://review.mlplatform.org/c/ml/ComputeLibrary/+/7469 Tested-by: Arm Jenkins <bsgcomp@arm.com> Reviewed-by: Gunes Bayir <gunes.bayir@arm.com> Comments-Addressed: Arm Jenkins <bsgcomp@arm.com>
-rw-r--r--docs/user_guide/advanced.dox11
1 files changed, 11 insertions, 0 deletions
diff --git a/docs/user_guide/advanced.dox b/docs/user_guide/advanced.dox
index 806f4ea3b8..2b9e0d02f7 100644
--- a/docs/user_guide/advanced.dox
+++ b/docs/user_guide/advanced.dox
@@ -124,5 +124,16 @@ ptrace_scope in /proc/sys/kernel/yama.
Please refer to: https://www.kernel.org/doc/html/v4.15/admin-guide/LSM/Yama.html for more information on this regard.
+@subsection Malicious users could alter Compute Library related files
+
+Extra care must be taken in order to reduce the posibility of a user altering sensitive files. CLTuner files
+should be protected by arbitrary writes since this can lead Compute Library to crash or waste all system's resources.
+
+@subsection Various concerns
+
+Sensitive applications that use Compute Library should consider posible attack vectors such as shared library hooking,
+information leakage from the underlying OpenCL driver or previous excecution and running arbitrary networks that consume
+all the available resources on the system, leading to denial of service.
+
*/
} // namespace \ No newline at end of file