The vulnerability lies in an incorrect calculation within the CombinedMult function for the secp384r1 curve, caused by a flaw in the underlying elliptic curve point addition logic. The analysis of the commits reveals that the primary vulnerable function is (*jacobianPoint).add in ecc/p384/point.go. This function did not correctly handle the special case of adding a point to itself (point doubling), leading to incorrect results. The patch addresses this by explicitly detecting this condition and calling the correct double() function. Furthermore, the (curve).scalarMultOmega function in ecc/p384/p384opt.go, which is a dependency of CombinedMult, was refactored to use completeAdd formulas. This change makes the scalar multiplication logic more robust and avoids the vulnerable add function, thus mitigating the vulnerability at a higher level as well.