In the Linux kernel, the following vulnerability has been resolved:
crypto: lib/mpi - Fix unexpected pointer access in mpiecinit
When the mpiecctx structure is initialized, some fields are not cleared, causing a crash when referencing the field when the structure was released. Initially, this issue was ignored because memory for mpiecctx is allocated with the _GFPZERO flag. For example, this error will be triggered when calculating the Za value for SM2 separately.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52616.json",
"cna_assigner": "Linux"
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52616.json"
[
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"332740200521563314345525723206942650365",
"111572363480981791925727237653508016194",
"338462168168539323973748267563346294643"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a",
"id": "CVE-2023-52616-0ef527c3",
"target": {
"file": "lib/crypto/mpi/ec.c"
}
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 2159.0,
"function_hash": "74065781749038392197631965524300855729"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ba3c5574203034781ac4231acf117da917efcd2a",
"id": "CVE-2023-52616-1bb1be60",
"target": {
"file": "lib/crypto/mpi/ec.c",
"function": "mpi_ec_init"
}
},
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"332740200521563314345525723206942650365",
"111572363480981791925727237653508016194",
"338462168168539323973748267563346294643"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2bb86817b33c9d704e127f92b838035a72c315b6",
"id": "CVE-2023-52616-6f5ba6e4",
"target": {
"file": "lib/mpi/ec.c"
}
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 2159.0,
"function_hash": "74065781749038392197631965524300855729"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7abdfd45a650c714d5ebab564bb1b988f14d9b49",
"id": "CVE-2023-52616-7192afe7",
"target": {
"file": "lib/crypto/mpi/ec.c",
"function": "mpi_ec_init"
}
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 2159.0,
"function_hash": "74065781749038392197631965524300855729"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bb44477d4506e52785693a39f03cdc6a2c5e8598",
"id": "CVE-2023-52616-76b61f09",
"target": {
"file": "lib/mpi/ec.c",
"function": "mpi_ec_init"
}
},
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"332740200521563314345525723206942650365",
"111572363480981791925727237653508016194",
"338462168168539323973748267563346294643"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ba3c5574203034781ac4231acf117da917efcd2a",
"id": "CVE-2023-52616-787128fe",
"target": {
"file": "lib/crypto/mpi/ec.c"
}
},
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"332740200521563314345525723206942650365",
"111572363480981791925727237653508016194",
"338462168168539323973748267563346294643"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bb44477d4506e52785693a39f03cdc6a2c5e8598",
"id": "CVE-2023-52616-92c51917",
"target": {
"file": "lib/mpi/ec.c"
}
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 2159.0,
"function_hash": "74065781749038392197631965524300855729"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c3687822259a7628c85cd21a3445cbe3c367165",
"id": "CVE-2023-52616-a27fec1a",
"target": {
"file": "lib/mpi/ec.c",
"function": "mpi_ec_init"
}
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 2159.0,
"function_hash": "74065781749038392197631965524300855729"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2bb86817b33c9d704e127f92b838035a72c315b6",
"id": "CVE-2023-52616-af59c7f4",
"target": {
"file": "lib/mpi/ec.c",
"function": "mpi_ec_init"
}
},
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"332740200521563314345525723206942650365",
"111572363480981791925727237653508016194",
"338462168168539323973748267563346294643"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c3687822259a7628c85cd21a3445cbe3c367165",
"id": "CVE-2023-52616-b2f35ee2",
"target": {
"file": "lib/mpi/ec.c"
}
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 2159.0,
"function_hash": "74065781749038392197631965524300855729"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a",
"id": "CVE-2023-52616-cb7e9102",
"target": {
"file": "lib/crypto/mpi/ec.c",
"function": "mpi_ec_init"
}
},
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"332740200521563314345525723206942650365",
"111572363480981791925727237653508016194",
"338462168168539323973748267563346294643"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7abdfd45a650c714d5ebab564bb1b988f14d9b49",
"id": "CVE-2023-52616-d969e29c",
"target": {
"file": "lib/crypto/mpi/ec.c"
}
}
]