I would say the PEI owns the system and all memory (including the DXE). 

A bug in PEI may override the loaded DXE memory or the whole system.

In history I did see PEI security issues. 
Some security issue in PEI caused system compromised completely. You even have 
no chance to run DXE. 

thank you!
Yao, Jiewen


> 在 2021年11月23日,下午10:52,James Bottomley <j...@linux.ibm.com> 写道:
> 
> On Tue, 2021-11-23 at 14:36 +0000, Yao, Jiewen wrote:
>>> This strict isolation between DXE and PEI means that once we're in
>>> DXE, any bugs in PEI can't be exploited to attack the DXE
>>> environment.  
>> 
>> [jiewen] I would disagree the statement above. 
>> There is not strict isolation. Actually no isolation at all.
>> The DXE is loaded by PEI. 
> 
> Not in OVMF ... DXE and PEI are actually loaded by SEC.  PEI eventually
> jumps to execute DXE but that's after all its own tasks are completed.
> 
>> A bug in PEI has global impact and it can definitely be used to
>> attack the DXE.
> 
> Only if it can be exploited.  Moving things to PEI is mitigating the
> exploitability not the bugs.  The point about exploitability and PEI is
> that it doesn't read any config files, it can't execute any EFI
> binaries and it has no Human Interface modules so can't be influenced
> even by a physically present attacker.  No ability to influence is what
> removes the ability to exploit.
> 
> James
> 
> 


-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#83950): https://edk2.groups.io/g/devel/message/83950
Mute This Topic: https://groups.io/mt/86739864/21656
Group Owner: devel+ow...@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-


Reply via email to