CVE-2022-49357: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: efi: Do not import certificates from UEFI Secure Boot for T2 Macs On Apple T2 Macs, when Linux attempts to read the db and dbx efi variables at early boot to load UEFI Secure Boot certificates, a page fault occurs in Apple firmware code and EFI runtime services are disabled with the following logs: [Firmware Bug]: Page fault caused by firmware at PA: 0xffffb1edc0068000 WARNING: CPU: 3 PID: 104 at arch/x86/platform/efi/quirks.c:735 efi_crash_gracefully_on_page_fault+0x50/0xf0 (Removed some logs from here) Call Trace: <TASK> page_fault_oops+0x4f/0x2c0 ? search_bpf_extables+0x6b/0x80 ? search_module_extables+0x50/0x80 ? search_exception_tables+0x5b/0x60 kernelmode_fixup_or_oops+0x9e/0x110 __bad_area_nosemaphore+0x155/0x190 bad_area_nosemaphore+0x16/0x20 do_kern_addr_fault+0x8c/0xa0 exc_page_fault+0xd8/0x180 asm_exc_page_fault+0x1e/0x30 (Removed some logs from here) ? __efi_call+0x28/0x30 ? switch_mm+0x20/0x30 ? efi_call_rts+0x19a/0x8e0 ? process_one_work+0x222/0x3f0 ? worker_thread+0x4a/0x3d0 ? kthread+0x17a/0x1a0 ? process_one_work+0x3f0/0x3f0 ? set_kthread_struct+0x40/0x40 ? ret_from_fork+0x22/0x30 </TASK> ---[ end trace 1f82023595a5927f ]--- efi: Froze efi_rts_wq and disabled EFI Runtime Services integrity: Couldn't get size: 0x8000000000000015 integrity: MODSIGN: Couldn't get UEFI db list efi: EFI Runtime Services are disabled! integrity: Couldn't get size: 0x8000000000000015 integrity: Couldn't get UEFI dbx list integrity: Couldn't get size: 0x8000000000000015 integrity: Couldn't get mokx list integrity: Couldn't get size: 0x80000000 So we avoid reading these UEFI variables and thus prevent the crash.
AI Analysis
Technical Summary
CVE-2022-49357 is a vulnerability identified in the Linux kernel related to the handling of UEFI Secure Boot variables on Apple T2 Macs. Specifically, when Linux attempts to read the 'db' and 'dbx' EFI variables during early boot to load UEFI Secure Boot certificates, a page fault occurs within the Apple firmware code. This fault leads to the disabling of EFI runtime services, which are critical for certain system operations and security features. The root cause is that the Apple T2 chip firmware does not properly handle these EFI variable reads, causing a memory access violation (page fault) at a physical address within firmware space. The Linux kernel logs indicate a crash in the EFI quirks handling code, followed by the freezing of the EFI runtime services work queue and disabling of EFI runtime services altogether. This results in the inability to retrieve UEFI Secure Boot certificate lists such as 'db', 'dbx', and 'mokx', which are essential for verifying the integrity and authenticity of boot components. The vulnerability does not appear to allow direct code execution or privilege escalation but causes a denial of service of EFI runtime services, potentially impacting system security features reliant on these services. The fix implemented avoids reading these problematic UEFI variables on Apple T2 Macs, thereby preventing the page fault and maintaining EFI runtime service availability. There are no known exploits in the wild, and no CVSS score has been assigned to this vulnerability as of the publication date.
Potential Impact
For European organizations, the impact of CVE-2022-49357 is primarily operational and security-related rather than directly exploitable for compromise. Organizations using Linux on Apple T2 Macs may experience EFI runtime services being disabled during boot, which can affect system integrity checks, secure boot validation, and other firmware-dependent security mechanisms. This could lead to reduced trust in the boot process and potentially complicate compliance with security policies that require secure boot enforcement. Additionally, some security features relying on EFI runtime services, such as kernel module signature verification or measured boot, may not function correctly, increasing the risk surface. However, since the vulnerability does not allow arbitrary code execution or privilege escalation, the confidentiality and integrity of data are not directly threatened by this flaw. The denial of EFI runtime services could cause system instability or boot issues in affected environments, impacting availability. European organizations with Apple hardware running Linux, especially in sectors requiring high security such as finance, government, or critical infrastructure, should be aware of this issue to maintain system reliability and security posture.
Mitigation Recommendations
To mitigate CVE-2022-49357, organizations should ensure that Linux kernel versions deployed on Apple T2 Macs include the patch that avoids reading the problematic UEFI variables ('db' and 'dbx') during early boot. This can be achieved by updating to the latest stable Linux kernel releases where this fix is incorporated. System administrators should audit their environments to identify Apple T2 Mac devices running Linux and prioritize patching these systems. Additionally, organizations should monitor boot logs for EFI runtime service errors or warnings indicative of this issue. Where possible, consider alternative hardware platforms for Linux workloads requiring secure boot features until the firmware or kernel fully supports Apple T2 Macs without issues. For environments requiring secure boot enforcement, implement compensating controls such as enhanced endpoint security monitoring and integrity verification tools that do not rely solely on EFI runtime services. Finally, maintain close coordination with Linux distribution vendors and Apple for firmware updates that may address the root cause in Apple T2 firmware.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2022-49357: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: efi: Do not import certificates from UEFI Secure Boot for T2 Macs On Apple T2 Macs, when Linux attempts to read the db and dbx efi variables at early boot to load UEFI Secure Boot certificates, a page fault occurs in Apple firmware code and EFI runtime services are disabled with the following logs: [Firmware Bug]: Page fault caused by firmware at PA: 0xffffb1edc0068000 WARNING: CPU: 3 PID: 104 at arch/x86/platform/efi/quirks.c:735 efi_crash_gracefully_on_page_fault+0x50/0xf0 (Removed some logs from here) Call Trace: <TASK> page_fault_oops+0x4f/0x2c0 ? search_bpf_extables+0x6b/0x80 ? search_module_extables+0x50/0x80 ? search_exception_tables+0x5b/0x60 kernelmode_fixup_or_oops+0x9e/0x110 __bad_area_nosemaphore+0x155/0x190 bad_area_nosemaphore+0x16/0x20 do_kern_addr_fault+0x8c/0xa0 exc_page_fault+0xd8/0x180 asm_exc_page_fault+0x1e/0x30 (Removed some logs from here) ? __efi_call+0x28/0x30 ? switch_mm+0x20/0x30 ? efi_call_rts+0x19a/0x8e0 ? process_one_work+0x222/0x3f0 ? worker_thread+0x4a/0x3d0 ? kthread+0x17a/0x1a0 ? process_one_work+0x3f0/0x3f0 ? set_kthread_struct+0x40/0x40 ? ret_from_fork+0x22/0x30 </TASK> ---[ end trace 1f82023595a5927f ]--- efi: Froze efi_rts_wq and disabled EFI Runtime Services integrity: Couldn't get size: 0x8000000000000015 integrity: MODSIGN: Couldn't get UEFI db list efi: EFI Runtime Services are disabled! integrity: Couldn't get size: 0x8000000000000015 integrity: Couldn't get UEFI dbx list integrity: Couldn't get size: 0x8000000000000015 integrity: Couldn't get mokx list integrity: Couldn't get size: 0x80000000 So we avoid reading these UEFI variables and thus prevent the crash.
AI-Powered Analysis
Technical Analysis
CVE-2022-49357 is a vulnerability identified in the Linux kernel related to the handling of UEFI Secure Boot variables on Apple T2 Macs. Specifically, when Linux attempts to read the 'db' and 'dbx' EFI variables during early boot to load UEFI Secure Boot certificates, a page fault occurs within the Apple firmware code. This fault leads to the disabling of EFI runtime services, which are critical for certain system operations and security features. The root cause is that the Apple T2 chip firmware does not properly handle these EFI variable reads, causing a memory access violation (page fault) at a physical address within firmware space. The Linux kernel logs indicate a crash in the EFI quirks handling code, followed by the freezing of the EFI runtime services work queue and disabling of EFI runtime services altogether. This results in the inability to retrieve UEFI Secure Boot certificate lists such as 'db', 'dbx', and 'mokx', which are essential for verifying the integrity and authenticity of boot components. The vulnerability does not appear to allow direct code execution or privilege escalation but causes a denial of service of EFI runtime services, potentially impacting system security features reliant on these services. The fix implemented avoids reading these problematic UEFI variables on Apple T2 Macs, thereby preventing the page fault and maintaining EFI runtime service availability. There are no known exploits in the wild, and no CVSS score has been assigned to this vulnerability as of the publication date.
Potential Impact
For European organizations, the impact of CVE-2022-49357 is primarily operational and security-related rather than directly exploitable for compromise. Organizations using Linux on Apple T2 Macs may experience EFI runtime services being disabled during boot, which can affect system integrity checks, secure boot validation, and other firmware-dependent security mechanisms. This could lead to reduced trust in the boot process and potentially complicate compliance with security policies that require secure boot enforcement. Additionally, some security features relying on EFI runtime services, such as kernel module signature verification or measured boot, may not function correctly, increasing the risk surface. However, since the vulnerability does not allow arbitrary code execution or privilege escalation, the confidentiality and integrity of data are not directly threatened by this flaw. The denial of EFI runtime services could cause system instability or boot issues in affected environments, impacting availability. European organizations with Apple hardware running Linux, especially in sectors requiring high security such as finance, government, or critical infrastructure, should be aware of this issue to maintain system reliability and security posture.
Mitigation Recommendations
To mitigate CVE-2022-49357, organizations should ensure that Linux kernel versions deployed on Apple T2 Macs include the patch that avoids reading the problematic UEFI variables ('db' and 'dbx') during early boot. This can be achieved by updating to the latest stable Linux kernel releases where this fix is incorporated. System administrators should audit their environments to identify Apple T2 Mac devices running Linux and prioritize patching these systems. Additionally, organizations should monitor boot logs for EFI runtime service errors or warnings indicative of this issue. Where possible, consider alternative hardware platforms for Linux workloads requiring secure boot features until the firmware or kernel fully supports Apple T2 Macs without issues. For environments requiring secure boot enforcement, implement compensating controls such as enhanced endpoint security monitoring and integrity verification tools that do not rely solely on EFI runtime services. Finally, maintain close coordination with Linux distribution vendors and Apple for firmware updates that may address the root cause in Apple T2 firmware.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.546Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe5784
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 6:12:56 AM
Last updated: 7/26/2025, 12:39:47 AM
Views: 11
Related Threats
CVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumCVE-2025-55012: CWE-288: Authentication Bypass Using an Alternate Path or Channel in zed-industries zed
HighCVE-2025-8854: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in bulletphysics bullet3
HighCVE-2025-8830: OS Command Injection in Linksys RE6250
MediumCVE-2025-54878: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.