[USN-6638-1] EDK II vulnerabilities

Mark Esler mark.esler at canonical.com
Thu Feb 15 01:48:46 UTC 2024


==========================================================================
Ubuntu Security Notice USN-6638-1
February 15, 2024

edk2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in EDK II.

Software Description:
- edk2: UEFI firmware for virtual machines

Details:

Marc Beatove discovered buffer overflows exit in EDK2. An attacker on the
local network could potentially use this to impact availability or possibly
cause remote code execution. (CVE-2022-36763, CVE-2022-36764,
CVE-2022-36765)

It was discovered that a buffer overflows exists in EDK2's Network Package
An attacker on the local network could potentially use these to impact
availability or possibly cause remote code execution. (CVE-2023-45230,
CVE-2023-45234, CVE-2023-45235)

It was discovered that an out-of-bounds read exists in EDK2's Network
Package An attacker on the local network could potentially use this to
impact confidentiality. (CVE-2023-45231)

It was discovered that infinite-loops exists in EDK2's Network Package
An attacker on the local network could potentially use these to impact
availability. (CVE-2023-45232, CVE-2023-45233)

Mate Kukri discovered that an insecure default to allow UEFI Shell in
EDK2 was left enabled in Ubuntu's EDK2. An attacker could use this to
bypass Secure Boot. (CVE-2023-48733)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
   efi-shell-aa64                  2023.05-2ubuntu0.1
   efi-shell-arm                   2023.05-2ubuntu0.1
   efi-shell-x64                   2023.05-2ubuntu0.1
   ovmf                            2023.05-2ubuntu0.1
   qemu-efi-aarch64                2023.05-2ubuntu0.1
   qemu-efi-arm                    2023.05-2ubuntu0.1

Ubuntu 22.04 LTS:
   ovmf                            2022.02-3ubuntu0.22.04.2
   qemu-efi                        2022.02-3ubuntu0.22.04.2
   qemu-efi-aarch64                2022.02-3ubuntu0.22.04.2
   qemu-efi-arm                    2022.02-3ubuntu0.22.04.2

Ubuntu 20.04 LTS:
   ovmf                            0~20191122.bd85bf54-2ubuntu3.5
   qemu-efi                        0~20191122.bd85bf54-2ubuntu3.5
   qemu-efi-aarch64                0~20191122.bd85bf54-2ubuntu3.5
   qemu-efi-arm                    0~20191122.bd85bf54-2ubuntu3.5

In general, a standard system update will make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-6638-1
   CVE-2022-36763, CVE-2022-36764, CVE-2022-36765, CVE-2023-45230,
   CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
   CVE-2023-45235, CVE-2023-48733,https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137

Package Information:
   https://launchpad.net/ubuntu/+source/edk2/2023.05-2ubuntu0.1
   https://launchpad.net/ubuntu/+source/edk2/2022.02-3ubuntu0.22.04.2
   https://launchpad.net/ubuntu/+source/edk2/0~20191122.bd85bf54-2ubuntu3.5

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xD60B83C90513BD4F.asc
Type: application/pgp-keys
Size: 4646 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20240214/484c2938/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20240214/484c2938/attachment-0001.sig>


More information about the ubuntu-security-announce mailing list