Skip to main content

CVE-2022-49357: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49357cvecve-2022-49357
Published: Wed Feb 26 2025 (02/26/2025, 02:11:06 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: efi: Do not import certificates from UEFI Secure Boot for T2 Macs On Apple T2 Macs, when Linux attempts to read the db and dbx efi variables at early boot to load UEFI Secure Boot certificates, a page fault occurs in Apple firmware code and EFI runtime services are disabled with the following logs: [Firmware Bug]: Page fault caused by firmware at PA: 0xffffb1edc0068000 WARNING: CPU: 3 PID: 104 at arch/x86/platform/efi/quirks.c:735 efi_crash_gracefully_on_page_fault+0x50/0xf0 (Removed some logs from here) Call Trace: <TASK> page_fault_oops+0x4f/0x2c0 ? search_bpf_extables+0x6b/0x80 ? search_module_extables+0x50/0x80 ? search_exception_tables+0x5b/0x60 kernelmode_fixup_or_oops+0x9e/0x110 __bad_area_nosemaphore+0x155/0x190 bad_area_nosemaphore+0x16/0x20 do_kern_addr_fault+0x8c/0xa0 exc_page_fault+0xd8/0x180 asm_exc_page_fault+0x1e/0x30 (Removed some logs from here) ? __efi_call+0x28/0x30 ? switch_mm+0x20/0x30 ? efi_call_rts+0x19a/0x8e0 ? process_one_work+0x222/0x3f0 ? worker_thread+0x4a/0x3d0 ? kthread+0x17a/0x1a0 ? process_one_work+0x3f0/0x3f0 ? set_kthread_struct+0x40/0x40 ? ret_from_fork+0x22/0x30 </TASK> ---[ end trace 1f82023595a5927f ]--- efi: Froze efi_rts_wq and disabled EFI Runtime Services integrity: Couldn't get size: 0x8000000000000015 integrity: MODSIGN: Couldn't get UEFI db list efi: EFI Runtime Services are disabled! integrity: Couldn't get size: 0x8000000000000015 integrity: Couldn't get UEFI dbx list integrity: Couldn't get size: 0x8000000000000015 integrity: Couldn't get mokx list integrity: Couldn't get size: 0x80000000 So we avoid reading these UEFI variables and thus prevent the crash.

AI-Powered Analysis

AILast updated: 06/30/2025, 06:12:56 UTC

Technical Analysis

CVE-2022-49357 is a vulnerability identified in the Linux kernel related to the handling of UEFI Secure Boot variables on Apple T2 Macs. Specifically, when Linux attempts to read the 'db' and 'dbx' EFI variables during early boot to load UEFI Secure Boot certificates, a page fault occurs within the Apple firmware code. This fault leads to the disabling of EFI runtime services, which are critical for certain system operations and security features. The root cause is that the Apple T2 chip firmware does not properly handle these EFI variable reads, causing a memory access violation (page fault) at a physical address within firmware space. The Linux kernel logs indicate a crash in the EFI quirks handling code, followed by the freezing of the EFI runtime services work queue and disabling of EFI runtime services altogether. This results in the inability to retrieve UEFI Secure Boot certificate lists such as 'db', 'dbx', and 'mokx', which are essential for verifying the integrity and authenticity of boot components. The vulnerability does not appear to allow direct code execution or privilege escalation but causes a denial of service of EFI runtime services, potentially impacting system security features reliant on these services. The fix implemented avoids reading these problematic UEFI variables on Apple T2 Macs, thereby preventing the page fault and maintaining EFI runtime service availability. There are no known exploits in the wild, and no CVSS score has been assigned to this vulnerability as of the publication date.

Potential Impact

For European organizations, the impact of CVE-2022-49357 is primarily operational and security-related rather than directly exploitable for compromise. Organizations using Linux on Apple T2 Macs may experience EFI runtime services being disabled during boot, which can affect system integrity checks, secure boot validation, and other firmware-dependent security mechanisms. This could lead to reduced trust in the boot process and potentially complicate compliance with security policies that require secure boot enforcement. Additionally, some security features relying on EFI runtime services, such as kernel module signature verification or measured boot, may not function correctly, increasing the risk surface. However, since the vulnerability does not allow arbitrary code execution or privilege escalation, the confidentiality and integrity of data are not directly threatened by this flaw. The denial of EFI runtime services could cause system instability or boot issues in affected environments, impacting availability. European organizations with Apple hardware running Linux, especially in sectors requiring high security such as finance, government, or critical infrastructure, should be aware of this issue to maintain system reliability and security posture.

Mitigation Recommendations

To mitigate CVE-2022-49357, organizations should ensure that Linux kernel versions deployed on Apple T2 Macs include the patch that avoids reading the problematic UEFI variables ('db' and 'dbx') during early boot. This can be achieved by updating to the latest stable Linux kernel releases where this fix is incorporated. System administrators should audit their environments to identify Apple T2 Mac devices running Linux and prioritize patching these systems. Additionally, organizations should monitor boot logs for EFI runtime service errors or warnings indicative of this issue. Where possible, consider alternative hardware platforms for Linux workloads requiring secure boot features until the firmware or kernel fully supports Apple T2 Macs without issues. For environments requiring secure boot enforcement, implement compensating controls such as enhanced endpoint security monitoring and integrity verification tools that do not rely solely on EFI runtime services. Finally, maintain close coordination with Linux distribution vendors and Apple for firmware updates that may address the root cause in Apple T2 firmware.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.546Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe5784

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 6:12:56 AM

Last updated: 7/26/2025, 12:39:47 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats