{"id":"USN-6638-1","summary":"edk2 vulnerabilities","details":"Marc Beatove discovered buffer overflows exit in EDK2. An attacker on the\nlocal network could potentially use this to impact availability or possibly\ncause remote code execution. (CVE-2022-36763, CVE-2022-36764,\nCVE-2022-36765)\n\nIt was discovered that a buffer overflows exists in EDK2's Network Package\nAn attacker on the local network could potentially use these to impact\navailability or possibly cause remote code execution. (CVE-2023-45230,\nCVE-2023-45234, CVE-2023-45235)\n\nIt was discovered that an out-of-bounds read exists in EDK2's Network\nPackage An attacker on the local network could potentially use this to\nimpact confidentiality. (CVE-2023-45231)\n\nIt was discovered that infinite-loops exists in EDK2's Network Package\nAn attacker on the local network could potentially use these to impact\navailability. (CVE-2023-45232, CVE-2023-45233)\n\nMate Kukri discovered that an insecure default to allow UEFI Shell in\nEDK2 was left enabled in Ubuntu's EDK2. An attacker could use this to\nbypass Secure Boot. (CVE-2023-48733)\n","modified":"2026-04-27T17:04:39.263284Z","published":"2024-02-15T01:36:15Z","related":["UBUNTU-CVE-2022-36763","UBUNTU-CVE-2022-36764","UBUNTU-CVE-2022-36765","UBUNTU-CVE-2023-45230","UBUNTU-CVE-2023-45231","UBUNTU-CVE-2023-45232","UBUNTU-CVE-2023-45233","UBUNTU-CVE-2023-45234","UBUNTU-CVE-2023-45235","UBUNTU-CVE-2023-48733"],"upstream":["CVE-2022-36763","CVE-2022-36764","CVE-2022-36765","CVE-2023-45230","CVE-2023-45231","CVE-2023-45232","CVE-2023-45233","CVE-2023-45234","CVE-2023-45235","CVE-2023-48733","UBUNTU-CVE-2022-36763","UBUNTU-CVE-2022-36764","UBUNTU-CVE-2022-36765","UBUNTU-CVE-2023-45230","UBUNTU-CVE-2023-45231","UBUNTU-CVE-2023-45232","UBUNTU-CVE-2023-45233","UBUNTU-CVE-2023-45234","UBUNTU-CVE-2023-45235","UBUNTU-CVE-2023-48733"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6638-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-36763"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-36764"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-36765"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-45230"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-45231"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-45232"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-45233"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-45234"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-45235"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-48733"},{"type":"REPORT","url":"https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137"}],"affected":[{"package":{"name":"edk2","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/edk2@0~20191122.bd85bf54-2ubuntu3.5?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0~20191122.bd85bf54-2ubuntu3.5"}]}],"versions":["0~20190606.20d2e5a1-2ubuntu1","0~20190828.37eef910-3","0~20190828.37eef910-4","0~20191122.bd85bf54-1","0~20191122.bd85bf54-1ubuntu1","0~20191122.bd85bf54-2","0~20191122.bd85bf54-2ubuntu1","0~20191122.bd85bf54-2ubuntu2","0~20191122.bd85bf54-2ubuntu3","0~20191122.bd85bf54-2ubuntu3.1","0~20191122.bd85bf54-2ubuntu3.2","0~20191122.bd85bf54-2ubuntu3.3","0~20191122.bd85bf54-2ubuntu3.4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"ovmf","binary_version":"0~20191122.bd85bf54-2ubuntu3.5"},{"binary_name":"qemu-efi","binary_version":"0~20191122.bd85bf54-2ubuntu3.5"},{"binary_name":"qemu-efi-aarch64","binary_version":"0~20191122.bd85bf54-2ubuntu3.5"},{"binary_name":"qemu-efi-arm","binary_version":"0~20191122.bd85bf54-2ubuntu3.5"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-36763"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-36764"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-36765"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45230"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45231"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45232"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45233"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45234"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45235"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-48733"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6638-1.json"}},{"package":{"name":"edk2","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/edk2@2022.02-3ubuntu0.22.04.2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2022.02-3ubuntu0.22.04.2"}]}],"versions":["2021.08~rc0-2","2021.08-3","2021.11~rc1-1","2021.11-1","2021.11-2","2022.02~rc1-1","2022.02~rc1-1ubuntu1","2022.02-1","2022.02-2","2022.02-3","2022.02-3ubuntu0.22.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"ovmf","binary_version":"2022.02-3ubuntu0.22.04.2"},{"binary_name":"ovmf-ia32","binary_version":"2022.02-3ubuntu0.22.04.2"},{"binary_name":"qemu-efi","binary_version":"2022.02-3ubuntu0.22.04.2"},{"binary_name":"qemu-efi-aarch64","binary_version":"2022.02-3ubuntu0.22.04.2"},{"binary_name":"qemu-efi-arm","binary_version":"2022.02-3ubuntu0.22.04.2"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-36763"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-36764"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-36765"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45230"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45231"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45232"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45233"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45234"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-45235"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-48733"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6638-1.json"}}],"schema_version":"1.7.5"}