CVE-2024-56771
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/01/2025
Last modified:
01/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mtd: spinand: winbond: Fix 512GW, 01GW, 01JW and 02JW ECC information<br />
<br />
These four chips:<br />
* W25N512GW<br />
* W25N01GW<br />
* W25N01JW<br />
* W25N02JW<br />
all require a single bit of ECC strength and thus feature an on-die<br />
Hamming-like ECC engine. There is no point in filling a ->get_status()<br />
callback for them because the main ECC status bytes are located in<br />
standard places, and retrieving the number of bitflips in case of<br />
corrected chunk is both useless and unsupported (if there are bitflips,<br />
then there is 1 at most, so no need to query the chip for that).<br />
<br />
Without this change, a kernel warning triggers every time a bit flips.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



