An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.
{ "binaries": [ { "binary_name": "ovmf", "binary_version": "0~20191122.bd85bf54-2ubuntu3.5" }, { "binary_name": "qemu-efi", "binary_version": "0~20191122.bd85bf54-2ubuntu3.5" }, { "binary_name": "qemu-efi-aarch64", "binary_version": "0~20191122.bd85bf54-2ubuntu3.5" }, { "binary_name": "qemu-efi-arm", "binary_version": "0~20191122.bd85bf54-2ubuntu3.5" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "ovmf", "binary_version": "2022.02-3ubuntu0.22.04.2" }, { "binary_name": "ovmf-ia32", "binary_version": "2022.02-3ubuntu0.22.04.2" }, { "binary_name": "qemu-efi", "binary_version": "2022.02-3ubuntu0.22.04.2" }, { "binary_name": "qemu-efi-aarch64", "binary_version": "2022.02-3ubuntu0.22.04.2" }, { "binary_name": "qemu-efi-arm", "binary_version": "2022.02-3ubuntu0.22.04.2" } ], "availability": "No subscription required" }