First published: Tue Feb 16 2021(Updated: )
Last updated 24 July 2024
Credit: Tavis Ormandy Google openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-apr | <0:1.6.3-107.el8 | 0:1.6.3-107.el8 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-84.el8 | 0:1.6.1-84.el8 |
redhat/jbcs-httpd24-curl | <0:7.78.0-2.el8 | 0:7.78.0-2.el8 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-78.el8 | 0:2.4.37-78.el8 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-39.el8 | 0:1.39.2-39.el8 |
redhat/jbcs-httpd24-openssl | <1:1.1.1g-8.el8 | 1:1.1.1g-8.el8 |
redhat/jbcs-httpd24-openssl-chil | <0:1.0.0-7.el8 | 0:1.0.0-7.el8 |
redhat/jbcs-httpd24-openssl-pkcs11 | <0:0.4.10-22.el8 | 0:0.4.10-22.el8 |
redhat/jbcs-httpd24-apr | <0:1.6.3-107.jbcs.el7 | 0:1.6.3-107.jbcs.el7 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-84.jbcs.el7 | 0:1.6.1-84.jbcs.el7 |
redhat/jbcs-httpd24-curl | <0:7.78.0-2.jbcs.el7 | 0:7.78.0-2.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-78.jbcs.el7 | 0:2.4.37-78.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-39.jbcs.el7 | 0:1.39.2-39.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1g-8.jbcs.el7 | 1:1.1.1g-8.jbcs.el7 |
redhat/jbcs-httpd24-openssl-chil | <0:1.0.0-7.jbcs.el7 | 0:1.0.0-7.jbcs.el7 |
redhat/jbcs-httpd24-openssl-pkcs11 | <0:0.4.10-22.jbcs.el7 | 0:0.4.10-22.jbcs.el7 |
redhat/openssl | <1:1.0.2k-22.el7_9 | 1:1.0.2k-22.el7_9 |
redhat/edk2 | <0:20210527gite1999b264f1f-3.el8 | 0:20210527gite1999b264f1f-3.el8 |
redhat/openssl | <1:1.1.1k-4.el8 | 1:1.1.1k-4.el8 |
redhat/jws5-tomcat | <0:9.0.50-3.redhat_00004.1.el7 | 0:9.0.50-3.redhat_00004.1.el7 |
redhat/jws5-tomcat-native | <0:1.2.30-3.redhat_3.el7 | 0:1.2.30-3.redhat_3.el7 |
redhat/jws5-tomcat-vault | <0:1.1.8-4.Final_redhat_00004.1.el7 | 0:1.1.8-4.Final_redhat_00004.1.el7 |
redhat/jws5-tomcat | <0:9.0.50-3.redhat_00004.1.el8 | 0:9.0.50-3.redhat_00004.1.el8 |
redhat/jws5-tomcat-native | <0:1.2.30-3.redhat_3.el8 | 0:1.2.30-3.redhat_3.el8 |
redhat/jws5-tomcat-vault | <0:1.1.8-4.Final_redhat_00004.1.el8 | 0:1.1.8-4.Final_redhat_00004.1.el8 |
IBM Security Verify Bridge | <=All | |
redhat/openssl | <1.1.1 | 1.1.1 |
redhat/openssl | <1.0.2 | 1.0.2 |
Apple macOS | <11.4 | 11.4 |
Apple Mobile Safari | <14.1.1 | 14.1.1 |
Apple iOS, iPadOS, and watchOS | <14.6 | 14.6 |
Apple iOS, iPadOS, and watchOS | <14.6 | 14.6 |
OpenSSL libcrypto | >=1.0.2<1.0.2y | |
OpenSSL libcrypto | >=1.1.1<1.1.1j | |
Debian | =10.0 | |
Tenable Nessus Network Monitor | =5.11.0 | |
Tenable Nessus Network Monitor | =5.11.1 | |
Tenable Nessus Network Monitor | =5.12.0 | |
Tenable Nessus Network Monitor | =5.12.1 | |
Tenable Nessus Network Monitor | =5.13.0 | |
tenable tenable.sc | >=5.13.0<=5.17.0 | |
Apple Mobile Safari | <14.1.1 | |
Apple iOS, iPadOS, and watchOS | <14.6 | |
iOS | <14.6 | |
Apple iOS and macOS | >=11.1<11.4 | |
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
NetApp SnapCenter | ||
Oracle Business Intelligence Enterprise Edition | =5.5.0.0.0 | |
Oracle Business Intelligence Enterprise Edition | =5.9.0.0.0 | |
Oracle Business Intelligence Enterprise Edition | =12.2.1.3.0 | |
Oracle Business Intelligence Enterprise Edition | =12.2.1.4.0 | |
oracle communications Cloud native core policy | =1.15.0 | |
oracle enterprise manager for storage management | =13.4.0.0 | |
Oracle Enterprise Manager Ops Center | =12.4.0.0 | |
Oracle Hyperion Essbase | =21.2 | |
Oracle GraalVM Enterprise Edition | =19.3.5 | |
Oracle GraalVM Enterprise Edition | =20.3.1.2 | |
Oracle GraalVM Enterprise Edition | =21.0.0.2 | |
oracle jd edwards world security | =a9.4 | |
MySQL Enterprise Monitor | <8.0.23 | |
MySQL | <5.7.33 | |
MySQL | >=8.0.15<8.0.23 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.57 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.58 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.59 | |
Oracle Sun ZFS Storage Appliance Kit | =8.8 | |
siemens sinec ins | <1.0 | |
siemens sinec ins | =1.0 | |
siemens sinec ins | =1.0-sp1 | |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.4.1-1 |
As per upstream "The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources."
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2021-23841 is a vulnerability that involves a null pointer dereference in the OpenSSL public API function X509_issuer_and_serial_hash().
The severity of CVE-2021-23841 is medium with a CVSS score of 5.9.
CVE-2021-23841 may affect Safari users, but it is recommended to refer to Apple's support page for specific information and remedies.
To fix CVE-2021-23841 on Red Hat products, update the affected packages to the specified versions provided by Red Hat.
The references for CVE-2021-23841 can be found at the following URLs: 1. [Apple Support - HT212529](https://support.apple.com/en-us/HT212529) 2. [Apple Support - HT212534](https://support.apple.com/en-us/HT212534) 3. [Apple Support - HT212528](https://support.apple.com/en-us/HT212528)