| Name | CVE-2025-2486 |
| Description | The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| edk2 (PTS) | bullseye | 2020.11-2+deb11u2 | vulnerable |
| bullseye (security) | 2020.11-2+deb11u3 | vulnerable | |
| bookworm | 2022.11-6+deb12u2 | fixed | |
| bookworm (security) | 2022.11-6+deb12u1 | fixed | |
| trixie | 2025.02-8 | fixed | |
| forky | 2025.02-9 | fixed | |
| sid | 2025.08.01-6 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| edk2 | source | bookworm | 2022.11-6+deb12u1 | |||
| edk2 | source | (unstable) | 2023.11-7 |
[bullseye] - edk2 <postponed> (Can be piggyback'd with future DLA but be careful about possible regression)
https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2101797
To address CVE-2023-48733 in Debian a local patch disabled the built-in Shell
when SecureBoot is enabled fixing CVE-2025-2486.
Be cautious of possible regression when backporting patches to stable releases -
https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2101797/comments/9