First published: Sun Dec 29 2024(Updated: )
GNU GRUB (aka GRUB2) through 2.12 does not use a constant-time algorithm for grub_crypto_memcmp and thus allows side-channel attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu GRUB (GNU GRand Unified Bootloader) | <2.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56738 is rated as a high-severity vulnerability due to its potential for facilitating side-channel attacks.
To mitigate CVE-2024-56738, update GNU GRUB to version 2.12 or later as this version implements a constant-time comparison function.
CVE-2024-56738 may allow attackers to infer secrets from the system by exploiting timing discrepancies in memory comparison operations.
CVE-2024-56738 affects all versions of GNU GRUB prior to version 2.12.
No official workaround is provided for CVE-2024-56738; the best practice is to update to the latest version as soon as possible.