In the Linux kernel, the following vulnerability has been resolved:
crypto: lib/mpi - Fix unexpected pointer access in mpiecinit
When the mpiecctx structure is initialized, some fields are not cleared, causing a crash when referencing the field when the structure was released. Initially, this issue was ignored because memory for mpiecctx is allocated with the _GFPZERO flag. For example, this error will be triggered when calculating the Za value for SM2 separately.
{ "vanir_signatures": [ { "digest": { "threshold": 0.9, "line_hashes": [ "332740200521563314345525723206942650365", "111572363480981791925727237653508016194", "338462168168539323973748267563346294643" ] }, "target": { "file": "lib/crypto/mpi/ec.c" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a", "signature_version": "v1", "id": "CVE-2023-52616-0ef527c3", "signature_type": "Line" }, { "digest": { "length": 2159.0, "function_hash": "74065781749038392197631965524300855729" }, "target": { "file": "lib/crypto/mpi/ec.c", "function": "mpi_ec_init" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ba3c5574203034781ac4231acf117da917efcd2a", "signature_version": "v1", "id": "CVE-2023-52616-1bb1be60", "signature_type": "Function" }, { "digest": { "threshold": 0.9, "line_hashes": [ "332740200521563314345525723206942650365", "111572363480981791925727237653508016194", "338462168168539323973748267563346294643" ] }, "target": { "file": "lib/mpi/ec.c" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2bb86817b33c9d704e127f92b838035a72c315b6", "signature_version": "v1", "id": "CVE-2023-52616-6f5ba6e4", "signature_type": "Line" }, { "digest": { "length": 2159.0, "function_hash": "74065781749038392197631965524300855729" }, "target": { "file": "lib/crypto/mpi/ec.c", "function": "mpi_ec_init" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7abdfd45a650c714d5ebab564bb1b988f14d9b49", "signature_version": "v1", "id": "CVE-2023-52616-7192afe7", "signature_type": "Function" }, { "digest": { "length": 2159.0, "function_hash": "74065781749038392197631965524300855729" }, "target": { "file": "lib/mpi/ec.c", "function": "mpi_ec_init" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bb44477d4506e52785693a39f03cdc6a2c5e8598", "signature_version": "v1", "id": "CVE-2023-52616-76b61f09", "signature_type": "Function" }, { "digest": { "threshold": 0.9, "line_hashes": [ "332740200521563314345525723206942650365", "111572363480981791925727237653508016194", "338462168168539323973748267563346294643" ] }, "target": { "file": "lib/crypto/mpi/ec.c" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ba3c5574203034781ac4231acf117da917efcd2a", "signature_version": "v1", "id": "CVE-2023-52616-787128fe", "signature_type": "Line" }, { "digest": { "threshold": 0.9, "line_hashes": [ "332740200521563314345525723206942650365", "111572363480981791925727237653508016194", "338462168168539323973748267563346294643" ] }, "target": { "file": "lib/mpi/ec.c" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bb44477d4506e52785693a39f03cdc6a2c5e8598", "signature_version": "v1", "id": "CVE-2023-52616-92c51917", "signature_type": "Line" }, { "digest": { "length": 2159.0, "function_hash": "74065781749038392197631965524300855729" }, "target": { "file": "lib/mpi/ec.c", "function": "mpi_ec_init" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c3687822259a7628c85cd21a3445cbe3c367165", "signature_version": "v1", "id": "CVE-2023-52616-a27fec1a", "signature_type": "Function" }, { "digest": { "length": 2159.0, "function_hash": "74065781749038392197631965524300855729" }, "target": { "file": "lib/mpi/ec.c", "function": "mpi_ec_init" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2bb86817b33c9d704e127f92b838035a72c315b6", "signature_version": "v1", "id": "CVE-2023-52616-af59c7f4", "signature_type": "Function" }, { "digest": { "threshold": 0.9, "line_hashes": [ "332740200521563314345525723206942650365", "111572363480981791925727237653508016194", "338462168168539323973748267563346294643" ] }, "target": { "file": "lib/mpi/ec.c" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c3687822259a7628c85cd21a3445cbe3c367165", "signature_version": "v1", "id": "CVE-2023-52616-b2f35ee2", "signature_type": "Line" }, { "digest": { "length": 2159.0, "function_hash": "74065781749038392197631965524300855729" }, "target": { "file": "lib/crypto/mpi/ec.c", "function": "mpi_ec_init" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a", "signature_version": "v1", "id": "CVE-2023-52616-cb7e9102", "signature_type": "Function" }, { "digest": { "threshold": 0.9, "line_hashes": [ "332740200521563314345525723206942650365", "111572363480981791925727237653508016194", "338462168168539323973748267563346294643" ] }, "target": { "file": "lib/crypto/mpi/ec.c" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7abdfd45a650c714d5ebab564bb1b988f14d9b49", "signature_version": "v1", "id": "CVE-2023-52616-d969e29c", "signature_type": "Line" } ] }