UbuntuUpdates.org

Package "edk2"

Name: edk2

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • UEFI Shell for 64-bit ARM architecture
  • UEFI Shell for 32-bit ARM architecture
  • UEFI Shell for 32-bit x86 architecture
  • UEFI Shell for 64-bit LoongArch architecture

Latest version: 2025.02-3ubuntu2.2
Release: plucky (25.04)
Level: updates
Repository: universe

Links



Other versions of "edk2" in Plucky

Repository Area Version
base main 2025.02-3ubuntu2
base universe 2025.02-3ubuntu2
security main 2025.02-3ubuntu2.2
security universe 2025.02-3ubuntu2.2
updates main 2025.02-3ubuntu2.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2025.02-3ubuntu2.2 2025-11-27 11:15:47 UTC

  edk2 (2025.02-3ubuntu2.2) plucky-security; urgency=medium

  * SECURITY UPDATE: Timing side-channel in ECDSA signature computation
    - debian/patches/CVE-2024-13176.patch: fix timing side-channel in
      CryptoPkg/Library/OpensslLib/openssl/crypto/bn/bn_exp.c,
      CryptoPkg/Library/OpensslLib/openssl/crypto/ec/ec_lib.c,
      CryptoPkg/Library/OpensslLib/openssl/include/crypto/bn.h.
    - CVE-2024-13176
  * SECURITY UPDATE: out of bounds read in HashPeImageByType()
    - debian/patches/CVE-2024-38797-1.patch: fix OOB read in
      SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.c.
    - debian/patches/CVE-2024-38797-2.patch: improve logic in
      SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.c.
    - debian/patches/CVE-2024-38797-3.patch: improve logic in
      SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigImpl.c.
    - CVE-2024-38797
  * SECURITY UPDATE: DoS via integer overflow
    - debian/patches/CVE-2024-38805.patch: fix for out of bound memory
      access in NetworkPkg/IScsiDxe/IScsiProto.c.
    - CVE-2024-38805
  * SECURITY UPDATE: DoS via integer overflow
    - debian/patches/CVE-2025-2295.patch: fix for Remote Memory Exposure in
      ISCSI in NetworkPkg/IScsiDxe/IScsiProto.c.
    - CVE-2025-2295
  * SECURITY UPDATE: code execution via IDT register
    - debian/patches/CVE-2025-3770.patch: safe handling of IDT register on
      SMM entry in UefiCpuPkg/PiSmmCpuDxeSmm/X64/SmiEntry.nasm.
    - CVE-2025-3770
  * SECURITY UPDATE: Out-of-bounds read in HTTP client no_proxy handling
    - debian/patches/CVE-2025-9232.patch: add missing terminating NUL byte
      in CryptoPkg/Library/OpensslLib/openssl/crypto/http/http_lib.c.
    - CVE-2025-9232

 -- Marc Deslauriers <email address hidden> Wed, 08 Oct 2025 09:55:35 -0400

Source diff to previous version
CVE-2024-13176 Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation. Impact summ
CVE-2024-38797 EDK2 contains a vulnerability in the HashPeImageByType(). A user may cause a read out of bounds when a corrupted data pointer and length are sent via
CVE-2024-38805 EDK2 contains a vulnerability in BIOS where a user may cause an Integer Overflow or Wraparound by network means. A successful exploitation of this vu
CVE-2025-2295 EDK2 contains a vulnerability in BIOS where a user may cause an Integer Overflow or Wraparound by network means. A successful exploitation of this vu
CVE-2025-3770 EDK2 contains a vulnerability in BIOS where an attacker may cause “Protection Mechanism Failure” by local access. Successful exploitation of this vul
CVE-2025-9232 Out-of-bounds read in HTTP client no_proxy handling

Version: 2025.02-3ubuntu2.1 2025-08-20 23:22:15 UTC

  edk2 (2025.02-3ubuntu2.1) plucky; urgency=medium

  * d/rules: Build OVMF.amdsev.fd (LP: #2106771)
  * d/descriptors: Add amd-sev JSON
  * d/ovmf.README.Debian: Mention OVMF.amdsev.fd firmware

 -- Lukas Märdian <email address hidden> Wed, 30 Jul 2025 10:00:21 +0200

2106771 Add support for QEMU AMD SNP VM Measured linux boot with the addition of new AMDSEV OVMF.fd



About   -   Send Feedback to @ubuntu_updates