First published: Wed Jan 08 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: mtd: spinand: winbond: Fix 512GW, 01GW, 01JW and 02JW ECC information These four chips: * W25N512GW * W25N01GW * W25N01JW * W25N02JW all require a single bit of ECC strength and thus feature an on-die Hamming-like ECC engine. There is no point in filling a ->get_status() callback for them because the main ECC status bytes are located in standard places, and retrieving the number of bitflips in case of corrected chunk is both useless and unsupported (if there are bitflips, then there is 1 at most, so no need to query the chip for that). Without this change, a kernel warning triggers every time a bit flips.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.7<6.12.4 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56771 has been classified with a moderate severity due to its impact on specific hardware compatibility.
To address CVE-2024-56771, you should update the Linux kernel to a version above 6.12.4 that includes the necessary patches.
CVE-2024-56771 affects versions of the Linux kernel between 6.7 and 6.12.4.
CVE-2024-56771 specifically involves the spinand subsystem related to certain Winbond NAND flash chips.
Currently, there are no known workarounds for CVE-2024-56771, and the best course of action is to apply the kernel update.