PT-2021-3610 · Openssl+12 · Openssl+12

Paul Kehrer

·

Published

2020-01-24

·

Updated

2025-10-16

·

CVE-2021-23840

CVSS v3.1

7.5

High

AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Name of the Vulnerable Software and Affected Versions OpenSSL versions 1.1.1i and below OpenSSL versions 1.0.2x and below
Description The issue is related to the functions EVP CipherUpdate, EVP EncryptUpdate, and EVP DecryptUpdate in OpenSSL, which may overflow the output length argument when the input length is close to the maximum permissible length for an integer on the platform. This could cause applications to behave incorrectly or crash. The problem is due to an integer overflow, which can lead to a negative output length value, even though the function call returns a success indicator.
Recommendations For OpenSSL versions 1.1.1i and below, upgrade to OpenSSL 1.1.1j. For OpenSSL versions 1.0.2x and below, premium support customers should upgrade to 1.0.2y, while other users should upgrade to 1.1.1j. As a temporary workaround, consider restricting the use of the vulnerable functions EVP CipherUpdate, EVP EncryptUpdate, and EVP DecryptUpdate until a patch is available.

Exploit

Fix

DoS

Integer Overflow

Weakness Enumeration

Related Identifiers

ALSA-2021:4198
ALT-PU-2020-1090
ALT-PU-2020-3341
ALT-PU-2020-3423
ALT-PU-2021-1338
ALT-PU-2021-1473
ALT-PU-2021-1494
ALT-PU-2021-1507
ALT-PU-2021-2380
ALT-PU-2021-3668
ALT-PU-2022-3073
BDU:2021-03742
BIT-NODE-2021-23840
BIT-NODE-MIN-2021-23840
CESA-2021_3798
CESA-2021_4198
CESA-2021_4424
CVE-2021-23840
DLA-2563-1
DLA-2565-1
DSA-4855-1
FREEBSD-SA-21_17
GHSA-QGM6-9472-PWQ7
MGASA-2021-0108
OESA-2021-1121
OESA-2022-1938
OPENSUSE-SU-2021:0357-1
OPENSUSE-SU-2021:0372-1
OPENSUSE-SU-2021:0427-1
OPENSUSE-SU-2021:0430-1
OPENSUSE-SU-2021_0357-1
OPENSUSE-SU-2021_0372-1
OPENSUSE-SU-2021_0427-1
OPENSUSE-SU-2021_0430-1
OPENSUSE-SU-2024:11126-1
OPENSUSE-SU-2024:11127-1
RHSA-2021:3798
RHSA-2021:4198
RHSA-2021:4424
RHSA-2021:4614
RHSA-2021:4861
RHSA-2021_3798
RHSA-2021_4198
RHSA-2021_4424
RLSA-2021:4198
RLSA-2021:4424
RUSTSEC-2021-0057
SUSE-FU-2022:0445-1
SUSE-SU-2021:0649-1
SUSE-SU-2021:0651-1
SUSE-SU-2021:0673-1
SUSE-SU-2021:0674-1
SUSE-SU-2021:0725-1
SUSE-SU-2021:0752-1
SUSE-SU-2021:0753-1
SUSE-SU-2021:0754-1
SUSE-SU-2021:0755-1
SUSE-SU-2021:0769-1
SUSE-SU-2021:0793-1
SUSE-SU-2021:0939-1
SUSE-SU-2021:14667-1
SUSE-SU-2021:14670-1
SUSE-SU-2021_0725-1
SUSE-SU-2021_0752-1
SUSE-SU-2021_0753-1
SUSE-SU-2021_0754-1
SUSE-SU-2021_0755-1
SUSE-SU-2021_0769-1
SUSE-SU-2021_0793-1
SUSE-SU-2021_0939-1
SUSE-SU-2021_14667-1
SUSE-SU-2021_14670-1
USN-4738-1
USN-5088-1
USN-7018-1

Affected Products

Alt Linux
Almalinux
Astra Linux
Centos
Freebsd
Ibm Aix
Linuxmint
Openssl
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu