USN-7894-1 fixed vulnerabilities in EDK II. The update introduced a regression in the UEFI network boot. This update reverts the corresponding fixes for CVE-2023-45236 and CVE-2023-45237 pending further investigation.
We apologize for the inconvenience.
Original advisory details:
It was discovered that EDK II was susceptible to a predictable TCP Initial Sequence Number. An attacker could possibly use this issue to gain unauthorized access. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. (CVE-2023-45236, CVE-2023-45237)
It was discovered that EDK II incorrectly handled S3 sleep. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. (CVE-2024-1298)
It was discovered that the EDK II PE/COFF loader incorrectly handled certain memory operations. An attacker could possibly use this issue to cause a denial of service, obtain sensitive information, or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. (CVE-2024-38796)
It was discovered that the EDK II PE image hashing function incorrectly handled certain memory operations. An attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. (CVE-2024-38797)
It was discovered that the EDK II BIOS incorrectly handled certain memory operations. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-38805, CVE-2025-2295)
It was discovered that EDK II incorrectly handled the enabling of MCE. An attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. (CVE-2025-3770)
It was discovered that the OpenSSL library embedded in EDK II contained multiple vulnerabilties. An attacker could possibly use these issues to cause a denial of service, obtain sensitive information, or execute arbitrary code. (CVE-2021-3712, CVE-2022-0778, CVE-2022-4304, CVE-2022-4450, CVE-2023-0215, CVE-2023-0286, CVE-2023-0464, CVE-2023-0465, CVE-2023-0466, CVE-2023-2650, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2023-6237, CVE-2024-0727, CVE-2024-13176, CVE-2024-2511, CVE-2024-41996, CVE-2024-4741, CVE-2024-5535, CVE-2024-6119, CVE-2024-9143, CVE-2025-9232)
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2022.02-3ubuntu0.22.04.5",
"binary_name": "ovmf"
},
{
"binary_version": "2022.02-3ubuntu0.22.04.5",
"binary_name": "ovmf-ia32"
},
{
"binary_version": "2022.02-3ubuntu0.22.04.5",
"binary_name": "qemu-efi"
},
{
"binary_version": "2022.02-3ubuntu0.22.04.5",
"binary_name": "qemu-efi-aarch64"
},
{
"binary_version": "2022.02-3ubuntu0.22.04.5",
"binary_name": "qemu-efi-arm"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2024.02-2ubuntu0.7",
"binary_name": "efi-shell-aa64"
},
{
"binary_version": "2024.02-2ubuntu0.7",
"binary_name": "efi-shell-arm"
},
{
"binary_version": "2024.02-2ubuntu0.7",
"binary_name": "efi-shell-ia32"
},
{
"binary_version": "2024.02-2ubuntu0.7",
"binary_name": "efi-shell-riscv64"
},
{
"binary_version": "2024.02-2ubuntu0.7",
"binary_name": "efi-shell-x64"
},
{
"binary_version": "2024.02-2ubuntu0.7",
"binary_name": "ovmf"
},
{
"binary_version": "2024.02-2ubuntu0.7",
"binary_name": "ovmf-ia32"
},
{
"binary_version": "2024.02-2ubuntu0.7",
"binary_name": "qemu-efi-aarch64"
},
{
"binary_version": "2024.02-2ubuntu0.7",
"binary_name": "qemu-efi-arm"
},
{
"binary_version": "2024.02-2ubuntu0.7",
"binary_name": "qemu-efi-riscv64"
}
]
}