UEFI is a specification; exploits are necessarily against implementations
thereof, not the spec itself.  Tianocore is a partial reference
implementation of the UEFI spec, and the package built for use with
coreboot an even smaller subset of that (since it completely skips the PEI
phase).  So unless you can provide evidence that UEFI-targeting malware
exploits specific features (or bugs) implemented in Tianocore as built for
coreboot, then it's not accurate in the least to say that "UEFI malware
exists, Tianocore is UEFI, so Tianocore is vulnerable to all UEFI-targeting
malware."

And certainly, traditional/legacy payloads not being vulnerable to
UEFI-targeting malware does not make them de-facto more secure.

Vulnerabilities/exploits/attack vectors, along with mitigations, etc in
open source firmware is certainly a topic worth discussing.  But let's base
that discussion in fact, and leave out the drive-by implications of
security not being a concern based on payload selection for a given use
case.

On Thu, Feb 21, 2019 at 12:24 AM Ivan Ivanov <qmaster...@gmail.com> wrote:

> Tianocore, being a standard UEFI, is vulnerable to UEFI-targeting
> malware whose functionality is based on UEFI architecture.
> "Traditional" payloads are not UEFI - and therefore are not vulnerable
> to UEFI-targeting malware. It does not take a genius to realize that.
>
_______________________________________________
coreboot mailing list -- coreboot@coreboot.org
To unsubscribe send an email to coreboot-le...@coreboot.org

Reply via email to