CVE-2024-53233

Source
https://cve.org/CVERecord?id=CVE-2024-53233
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53233.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53233
Downstream
Related
Published
2024-12-27T13:50:20.220Z
Modified
2026-03-11T07:54:04.921798Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
unicode: Fix utf8_load() error path
Details

In the Linux kernel, the following vulnerability has been resolved:

unicode: Fix utf8_load() error path

utf8load() requests the symbol "utf8datatable" and then checks if the requested UTF-8 version is supported. If it's unsupported, it tries to put the data table using symbolput(). If an unsupported version is requested, symbol_put() fails like this:

kernel BUG at kernel/module/main.c:786! RIP: 0010:__symbol_put+0x93/0xb0 Call Trace: <TASK> ? __diebody.cold+0x19/0x27 ? die+0x2e/0x50 ? dotrap+0xca/0x110 ? doerrortrap+0x65/0x80 ? __symbolput+0x93/0xb0 ? excinvalid_op+0x51/0x70 ? __symbolput+0x93/0xb0 ? asmexcinvalidop+0x1a/0x20 ? __pfxcmpname+0x10/0x10 ? __symbol_put+0x93/0xb0 ? __symbolput+0x62/0xb0 utf8load+0xf8/0x150

That happens because symbol_put() expects the unique string that identify the symbol, instead of a pointer to the loaded symbol. Fix that by using such string.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53233.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2b3d047870120bcd46d7cc257d19ff49328fd585
Fixed
4387cef540f36c2c9297460758cc2438305a24a0
Fixed
c4b6c1781f6cc4e2283120ac8d873864b8056f21
Fixed
6504dd27123966dc455494cb55217c04ca479121
Fixed
89933f8ab3b4cad5ac14ea56a39947d1ffe7d0e3
Fixed
156bb2c569cd869583c593d27a5bd69e7b2a4264

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53233.json"