First published: Tue Feb 16 2021(Updated: )
Last updated 24 July 2024
Credit: Tavis Ormandy Google openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-apr | <0:1.6.3-107.el8 | 0:1.6.3-107.el8 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-84.el8 | 0:1.6.1-84.el8 |
redhat/jbcs-httpd24-curl | <0:7.78.0-2.el8 | 0:7.78.0-2.el8 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-78.el8 | 0:2.4.37-78.el8 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-39.el8 | 0:1.39.2-39.el8 |
redhat/jbcs-httpd24-openssl | <1:1.1.1g-8.el8 | 1:1.1.1g-8.el8 |
redhat/jbcs-httpd24-openssl-chil | <0:1.0.0-7.el8 | 0:1.0.0-7.el8 |
redhat/jbcs-httpd24-openssl-pkcs11 | <0:0.4.10-22.el8 | 0:0.4.10-22.el8 |
redhat/jbcs-httpd24-apr | <0:1.6.3-107.jbcs.el7 | 0:1.6.3-107.jbcs.el7 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-84.jbcs.el7 | 0:1.6.1-84.jbcs.el7 |
redhat/jbcs-httpd24-curl | <0:7.78.0-2.jbcs.el7 | 0:7.78.0-2.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-78.jbcs.el7 | 0:2.4.37-78.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-39.jbcs.el7 | 0:1.39.2-39.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1g-8.jbcs.el7 | 1:1.1.1g-8.jbcs.el7 |
redhat/jbcs-httpd24-openssl-chil | <0:1.0.0-7.jbcs.el7 | 0:1.0.0-7.jbcs.el7 |
redhat/jbcs-httpd24-openssl-pkcs11 | <0:0.4.10-22.jbcs.el7 | 0:0.4.10-22.jbcs.el7 |
redhat/openssl | <1:1.0.2k-22.el7_9 | 1:1.0.2k-22.el7_9 |
redhat/edk2 | <0:20210527gite1999b264f1f-3.el8 | 0:20210527gite1999b264f1f-3.el8 |
redhat/openssl | <1:1.1.1k-4.el8 | 1:1.1.1k-4.el8 |
redhat/jws5-tomcat | <0:9.0.50-3.redhat_00004.1.el7 | 0:9.0.50-3.redhat_00004.1.el7 |
redhat/jws5-tomcat-native | <0:1.2.30-3.redhat_3.el7 | 0:1.2.30-3.redhat_3.el7 |
redhat/jws5-tomcat-vault | <0:1.1.8-4.Final_redhat_00004.1.el7 | 0:1.1.8-4.Final_redhat_00004.1.el7 |
redhat/jws5-tomcat | <0:9.0.50-3.redhat_00004.1.el8 | 0:9.0.50-3.redhat_00004.1.el8 |
redhat/jws5-tomcat-native | <0:1.2.30-3.redhat_3.el8 | 0:1.2.30-3.redhat_3.el8 |
redhat/jws5-tomcat-vault | <0:1.1.8-4.Final_redhat_00004.1.el8 | 0:1.1.8-4.Final_redhat_00004.1.el8 |
redhat/openssl | <1.1.1 | 1.1.1 |
redhat/openssl | <1.0.2 | 1.0.2 |
Apple macOS | <11.4 | 11.4 |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.4.1-1 | |
IBM Security Verify Bridge | <=All | |
Safari | <14.1.1 | 14.1.1 |
Apple iOS and iPadOS | <14.6 | 14.6 |
Apple iOS, iPadOS, and macOS | <14.6 | 14.6 |
OpenSSL | >=1.0.2<1.0.2y | |
OpenSSL | >=1.1.1<1.1.1j | |
Debian Linux | =10.0 | |
Tenable Nessus | =5.11.0 | |
Tenable Nessus | =5.11.1 | |
Tenable Nessus | =5.12.0 | |
Tenable Nessus | =5.12.1 | |
Tenable Nessus | =5.13.0 | |
Tenable.sc | >=5.13.0<=5.17.0 | |
Safari | <14.1.1 | |
Apple iOS, iPadOS, and macOS | <14.6 | |
iPhone OS | <14.6 | |
macOS | >=11.1<11.4 | |
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
NetApp SnapCenter | ||
Oracle Business Intelligence Enterprise Edition | =5.5.0.0.0 | |
Oracle Business Intelligence Enterprise Edition | =5.9.0.0.0 | |
Oracle Business Intelligence Enterprise Edition | =12.2.1.3.0 | |
Oracle Business Intelligence Enterprise Edition | =12.2.1.4.0 | |
Oracle Communications Cloud Native Core Policy | =1.15.0 | |
Oracle Enterprise Manager for Storage Management | =13.4.0.0 | |
Oracle Enterprise Manager Ops Center | =12.4.0.0 | |
Oracle Hyperion Essbase | =21.2 | |
Oracle GraalVM Enterprise Edition | =19.3.5 | |
Oracle GraalVM Enterprise Edition | =20.3.1.2 | |
Oracle GraalVM Enterprise Edition | =21.0.0.2 | |
Oracle JD Edwards World Security | =a9.4 | |
MySQL Enterprise Monitor | <8.0.23 | |
MySQL | <5.7.33 | |
MySQL | >=8.0.15<8.0.23 | |
Oracle PeopleTools | =8.57 | |
Oracle PeopleTools | =8.58 | |
Oracle PeopleTools | =8.59 | |
Oracle Storage Cloud Software Appliance | =8.8 | |
Siemens SINEC Ins | <1.0 | |
Siemens SINEC Ins | =1.0 | |
Siemens SINEC Ins | =1.0-sp1 |
As per upstream "The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources."
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2021-23841 is a vulnerability that involves a null pointer dereference in the OpenSSL public API function X509_issuer_and_serial_hash().
The severity of CVE-2021-23841 is medium with a CVSS score of 5.9.
CVE-2021-23841 may affect Safari users, but it is recommended to refer to Apple's support page for specific information and remedies.
To fix CVE-2021-23841 on Red Hat products, update the affected packages to the specified versions provided by Red Hat.
The references for CVE-2021-23841 can be found at the following URLs: 1. [Apple Support - HT212529](https://support.apple.com/en-us/HT212529) 2. [Apple Support - HT212534](https://support.apple.com/en-us/HT212534) 3. [Apple Support - HT212528](https://support.apple.com/en-us/HT212528)