In the Linux kernel, the following vulnerability has been resolved:
crypto: rsa - add a check for allocation failure
Static checkers insist that the mpi_alloc() allocation can fail so add a check to prevent a NULL dereference. Small allocations like this can't actually fail in current kernels, but adding a check is very simple and makes the static checkers happy.
[
{
"signature_version": "v1",
"id": "CVE-2023-52472-16206988",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"281681987625605300526851111576017665795",
"334079705588388087437512168706977324096",
"333701904950736895866439348866629523419",
"296674451905543643141328840570942064877"
]
},
"target": {
"file": "crypto/rsa.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d872ca165cb67112f2841ef9c37d51ef7e63d1e4",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2023-52472-69322bd5",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"281681987625605300526851111576017665795",
"334079705588388087437512168706977324096",
"333701904950736895866439348866629523419",
"296674451905543643141328840570942064877"
]
},
"target": {
"file": "crypto/rsa.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2831f4d3bfa68e64c5f83e96688be779c87b3511",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2023-52472-6fe6e7d2",
"signature_type": "Function",
"digest": {
"length": 331.0,
"function_hash": "177214536051971316348805378311924141659"
},
"target": {
"file": "crypto/rsa.c",
"function": "rsa_check_exponent_fips"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d872ca165cb67112f2841ef9c37d51ef7e63d1e4",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2023-52472-97f35a95",
"signature_type": "Function",
"digest": {
"length": 331.0,
"function_hash": "177214536051971316348805378311924141659"
},
"target": {
"file": "crypto/rsa.c",
"function": "rsa_check_exponent_fips"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@95ad8b6879e2e49d02e3bfc0e1fb46421633fe2a",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2023-52472-c3f78a72",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"281681987625605300526851111576017665795",
"334079705588388087437512168706977324096",
"333701904950736895866439348866629523419",
"296674451905543643141328840570942064877"
]
},
"target": {
"file": "crypto/rsa.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@95ad8b6879e2e49d02e3bfc0e1fb46421633fe2a",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2023-52472-cff8f833",
"signature_type": "Function",
"digest": {
"length": 331.0,
"function_hash": "177214536051971316348805378311924141659"
},
"target": {
"file": "crypto/rsa.c",
"function": "rsa_check_exponent_fips"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2831f4d3bfa68e64c5f83e96688be779c87b3511",
"deprecated": false
}
]