In the Linux kernel, the following vulnerability has been resolved:
crypto: rsa - add a check for allocation failure
Static checkers insist that the mpi_alloc() allocation can fail so add a check to prevent a NULL dereference. Small allocations like this can't actually fail in current kernels, but adding a check is very simple and makes the static checkers happy.
[
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "281681987625605300526851111576017665795",
                "334079705588388087437512168706977324096",
                "333701904950736895866439348866629523419",
                "296674451905543643141328840570942064877"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "crypto/rsa.c"
        },
        "id": "CVE-2023-52472-16206988",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d872ca165cb67112f2841ef9c37d51ef7e63d1e4",
        "signature_type": "Line"
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "281681987625605300526851111576017665795",
                "334079705588388087437512168706977324096",
                "333701904950736895866439348866629523419",
                "296674451905543643141328840570942064877"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "crypto/rsa.c"
        },
        "id": "CVE-2023-52472-69322bd5",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2831f4d3bfa68e64c5f83e96688be779c87b3511",
        "signature_type": "Line"
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "function_hash": "177214536051971316348805378311924141659",
            "length": 331.0
        },
        "target": {
            "function": "rsa_check_exponent_fips",
            "file": "crypto/rsa.c"
        },
        "id": "CVE-2023-52472-6fe6e7d2",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d872ca165cb67112f2841ef9c37d51ef7e63d1e4",
        "signature_type": "Function"
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "function_hash": "177214536051971316348805378311924141659",
            "length": 331.0
        },
        "target": {
            "function": "rsa_check_exponent_fips",
            "file": "crypto/rsa.c"
        },
        "id": "CVE-2023-52472-97f35a95",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@95ad8b6879e2e49d02e3bfc0e1fb46421633fe2a",
        "signature_type": "Function"
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "281681987625605300526851111576017665795",
                "334079705588388087437512168706977324096",
                "333701904950736895866439348866629523419",
                "296674451905543643141328840570942064877"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "crypto/rsa.c"
        },
        "id": "CVE-2023-52472-c3f78a72",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@95ad8b6879e2e49d02e3bfc0e1fb46421633fe2a",
        "signature_type": "Line"
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "function_hash": "177214536051971316348805378311924141659",
            "length": 331.0
        },
        "target": {
            "function": "rsa_check_exponent_fips",
            "file": "crypto/rsa.c"
        },
        "id": "CVE-2023-52472-cff8f833",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2831f4d3bfa68e64c5f83e96688be779c87b3511",
        "signature_type": "Function"
    }
]