An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0~20191122.bd85bf54-2ubuntu3.5", "binary_name": "ovmf" }, { "binary_version": "0~20191122.bd85bf54-2ubuntu3.5", "binary_name": "qemu-efi" }, { "binary_version": "0~20191122.bd85bf54-2ubuntu3.5", "binary_name": "qemu-efi-aarch64" }, { "binary_version": "0~20191122.bd85bf54-2ubuntu3.5", "binary_name": "qemu-efi-arm" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2022.02-3ubuntu0.22.04.2", "binary_name": "ovmf" }, { "binary_version": "2022.02-3ubuntu0.22.04.2", "binary_name": "ovmf-ia32" }, { "binary_version": "2022.02-3ubuntu0.22.04.2", "binary_name": "qemu-efi" }, { "binary_version": "2022.02-3ubuntu0.22.04.2", "binary_name": "qemu-efi-aarch64" }, { "binary_version": "2022.02-3ubuntu0.22.04.2", "binary_name": "qemu-efi-arm" } ] }