Update

USN-7894-1: EDK II vulnerabilities

USN-7894-1: EDK II vulnerabilities

Publication date :26 November 2025
Overview: Several security issues were fixed in EDK II.

Packages
edk2 - UEFI firmware for virtual machines

Details
It was discovered that EDK II was susceptible to a predictable TCP Initial
Sequence Number. An attacker could possibly use this issue to gain
unauthorized access. This issue only affected Ubuntu 22.04 LTS, and Ubuntu
24.04 LTS. (CVE-2023-45236, CVE-2023-45237)

It was discovered that EDK II incorrectly handled S3 sleep. An attacker
could possibly use this issue to cause a denial of service. This issue only
affected Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS. (CVE-2024-1298)

It was discovered that the EDK II PE/COFF loader incorrectly handled
certain memory operations. An attacker could possibly use this issue to
cause a denial of service, obtain sensitive information, or execute
arbitrary code. This issue only affected Ubuntu 22.04 LTS, and Ubuntu
24.04 LTS. (CVE-2024-38796)

It was discovered that the EDK II PE image hashing function incorrectly
handled certain memory operations. An attacker could possibly use this
issue to cause a denial of service, or execute arbitrary code.
(CVE-2024-38797)

It was discovered that the EDK II BIOS incorrectly handled certain memory
operations. An attacker could possibly use this issue to cause a denial of
service. (CVE-2024-38805, CVE-2025-2295)

It was discovered that EDK II incorrectly handled the enabling of MCE. An
attacker could possibly use this issue to cause a denial of service, or
execute arbitrary code. (CVE-2025-3770)

It was discovered that the OpenSSL library embedded in EDK II contained
multiple vulnerabilties. An attacker could possibly use these issues to
cause a denial of service, obtain sensitive information, or execute
arbitrary code. (CVE-2021-3712, CVE-2022-0778, CVE-2022-4304,
CVE-2022-4450, CVE-2023-0215, CVE-2023-0286, CVE-2023-0464, CVE-2023-0465,
CVE-2023-0466, CVE-2023-2650, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678,

Update instructions
After a standard system update you need to restart the virtual machines that use the affected firmware to make all the necessary changes.

The problem can be corrected by updating your system to the following package versions:

  • 25.04 plucky
  • ovmf – 2025.02-3ubuntu2.2
  • ovmf-ia32 – 2025.02-3ubuntu2.2
  • qemu-efi-aarch64 – 2025.02-3ubuntu2.2
  • qemu-efi-arm – 2025.02-3ubuntu2.2
  • qemu-efi-loongarch64 – 2025.02-3ubuntu2.2
  • qemu-efi-riscv64 – 2025.02-3ubuntu2.2

24.04 LTS noble

  • ovmf – 2024.02-2ubuntu0.6
  • ovmf-ia32 – 2024.02-2ubuntu0.6
  • qemu-efi-aarch64 – 2024.02-2ubuntu0.6
  • qemu-efi-arm – 2024.02-2ubuntu0.6
  • qemu-efi-riscv64 – 2024.02-2ubuntu0.6

22.04 LTS jammy

  • ovmf – 2022.02-3ubuntu0.22.04.4
  • - ovmf-ia32 – 2022.02-3ubuntu0.22.04.4
  • - qemu-efi – 2022.02-3ubuntu0.22.04.4
  • - qemu-efi-aarch64 – 2022.02-3ubuntu0.22.04.4
  • - qemu-efi-arm – 2022.02-3ubuntu0.22.04.4
The manufacturer Canonical has not yet set up its devicebase profile. Content such as updates, compatibilities and support may only be maintained with a delay.
Receive Important Update Messages Stay tuned for upcoming Canonical updates

Was the content helpful to you?

Advertisement Advertise here?
Udemy IT certification ad