In the Linux kernel, the following vulnerability has been resolved:
crypto: lib/mpi - Fix unexpected pointer access in mpiecinit
When the mpiecctx structure is initialized, some fields are not cleared, causing a crash when referencing the field when the structure was released. Initially, this issue was ignored because memory for mpiecctx is allocated with the _GFPZERO flag. For example, this error will be triggered when calculating the Za value for SM2 separately.
{ "vanir_signatures": [ { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "332740200521563314345525723206942650365", "111572363480981791925727237653508016194", "338462168168539323973748267563346294643" ] }, "id": "CVE-2023-52616-0ef527c3", "deprecated": false, "target": { "file": "lib/crypto/mpi/ec.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a" }, { "signature_version": "v1", "digest": { "length": 2159.0, "function_hash": "74065781749038392197631965524300855729" }, "id": "CVE-2023-52616-1bb1be60", "deprecated": false, "target": { "file": "lib/crypto/mpi/ec.c", "function": "mpi_ec_init" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ba3c5574203034781ac4231acf117da917efcd2a" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "332740200521563314345525723206942650365", "111572363480981791925727237653508016194", "338462168168539323973748267563346294643" ] }, "id": "CVE-2023-52616-6f5ba6e4", "deprecated": false, "target": { "file": "lib/mpi/ec.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2bb86817b33c9d704e127f92b838035a72c315b6" }, { "signature_version": "v1", "digest": { "length": 2159.0, "function_hash": "74065781749038392197631965524300855729" }, "id": "CVE-2023-52616-7192afe7", "deprecated": false, "target": { "file": "lib/crypto/mpi/ec.c", "function": "mpi_ec_init" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7abdfd45a650c714d5ebab564bb1b988f14d9b49" }, { "signature_version": "v1", "digest": { "length": 2159.0, "function_hash": "74065781749038392197631965524300855729" }, "id": "CVE-2023-52616-76b61f09", "deprecated": false, "target": { "file": "lib/mpi/ec.c", "function": "mpi_ec_init" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bb44477d4506e52785693a39f03cdc6a2c5e8598" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "332740200521563314345525723206942650365", "111572363480981791925727237653508016194", "338462168168539323973748267563346294643" ] }, "id": "CVE-2023-52616-787128fe", "deprecated": false, "target": { "file": "lib/crypto/mpi/ec.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ba3c5574203034781ac4231acf117da917efcd2a" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "332740200521563314345525723206942650365", "111572363480981791925727237653508016194", "338462168168539323973748267563346294643" ] }, "id": "CVE-2023-52616-92c51917", "deprecated": false, "target": { "file": "lib/mpi/ec.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bb44477d4506e52785693a39f03cdc6a2c5e8598" }, { "signature_version": "v1", "digest": { "length": 2159.0, "function_hash": "74065781749038392197631965524300855729" }, "id": "CVE-2023-52616-a27fec1a", "deprecated": false, "target": { "file": "lib/mpi/ec.c", "function": "mpi_ec_init" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c3687822259a7628c85cd21a3445cbe3c367165" }, { "signature_version": "v1", "digest": { "length": 2159.0, "function_hash": "74065781749038392197631965524300855729" }, "id": "CVE-2023-52616-af59c7f4", "deprecated": false, "target": { "file": "lib/mpi/ec.c", "function": "mpi_ec_init" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2bb86817b33c9d704e127f92b838035a72c315b6" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "332740200521563314345525723206942650365", "111572363480981791925727237653508016194", "338462168168539323973748267563346294643" ] }, "id": "CVE-2023-52616-b2f35ee2", "deprecated": false, "target": { "file": "lib/mpi/ec.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c3687822259a7628c85cd21a3445cbe3c367165" }, { "signature_version": "v1", "digest": { "length": 2159.0, "function_hash": "74065781749038392197631965524300855729" }, "id": "CVE-2023-52616-cb7e9102", "deprecated": false, "target": { "file": "lib/crypto/mpi/ec.c", "function": "mpi_ec_init" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "332740200521563314345525723206942650365", "111572363480981791925727237653508016194", "338462168168539323973748267563346294643" ] }, "id": "CVE-2023-52616-d969e29c", "deprecated": false, "target": { "file": "lib/crypto/mpi/ec.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7abdfd45a650c714d5ebab564bb1b988f14d9b49" } ] }