CVE-2021-23840
Description
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
openssl-srccrates.io | < 111.14.0 | 111.14.0 |
Affected products
43cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*+ 11 more
- cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*range: <5.10.0
- cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_9:*:*:*:*:*:*
cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*+ 3 more
- cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*
- cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*
- cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:*
- cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*
- cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:enterprise_manager_for_storage_management:13.4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*+ 2 more
- cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*
- cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*
- cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*
- cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*Range: <9.2.6.0
- cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*
cpe:2.3:a:tenable:nessus_network_monitor:5.11.0:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:tenable:nessus_network_monitor:5.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus_network_monitor:5.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus_network_monitor:5.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus_network_monitor:5.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:tenable:nessus_network_monitor:5.13.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Patches
9e5d189ecb9467ed30a74896457679e1c97a979ea8c333c0fce800870b420ab8d3c5a12627a4f260c5df4e818b74be217e04bd3433fd8Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
24- www.oracle.com//security-alerts/cpujul2021.htmlnvdPatchThird Party AdvisoryWEB
- www.oracle.com/security-alerts/cpuApr2021.htmlnvdPatchThird Party AdvisoryWEB
- www.oracle.com/security-alerts/cpuapr2022.htmlnvdPatchThird Party AdvisoryWEB
- www.oracle.com/security-alerts/cpujan2022.htmlnvdPatchThird Party AdvisoryWEB
- www.oracle.com/security-alerts/cpuoct2021.htmlnvdPatchThird Party AdvisoryWEB
- cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfnvdThird Party AdvisoryWEB
- github.com/advisories/GHSA-qgm6-9472-pwq7ghsaADVISORY
- kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846nvdThird Party AdvisoryWEB
- kc.mcafee.com/corporate/indexnvdThird Party AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2021-23840ghsaADVISORY
- security.gentoo.org/glsa/202103-03nvdThird Party AdvisoryWEB
- security.netapp.com/advisory/ntap-20210219-0009/nvdThird Party Advisory
- www.debian.org/security/2021/dsa-4855nvdThird Party AdvisoryWEB
- www.openssl.org/news/secadv/20210216.txtnvdVendor AdvisoryWEB
- www.tenable.com/security/tns-2021-03nvdThird Party AdvisoryWEB
- www.tenable.com/security/tns-2021-09nvdThird Party AdvisoryWEB
- www.tenable.com/security/tns-2021-10nvdThird Party AdvisoryWEB
- lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3EghsaWEB
- rustsec.org/advisories/RUSTSEC-2021-0057.htmlghsaWEB
- security.netapp.com/advisory/ntap-20210219-0009ghsaWEB
- lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3Envd
- lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3Envd
- security.netapp.com/advisory/ntap-20240621-0006/nvd
News mentions
0No linked articles in our index yet.