Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2021-23840

Published: 16 February 2021

Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).

Notes

AuthorNote
mdeslaur
edk2 doesn't use EVP_CipherUpdate, EVP_EncryptUpdate, or
EVP_DecryptUpdate, so it doesn't appear vulnerable to this issue
edk2 upstream says EVP_DecryptUpdate is used by drivers

Priority

Low

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
edk2
Launchpad, Ubuntu, Debian
impish Not vulnerable
(2021.08~rc0-2)
jammy Not vulnerable
(2021.08~rc0-2)
lunar Not vulnerable
(2021.08~rc0-2)
trusty Does not exist

bionic Needed

groovy Ignored
(end of life)
focal
Released (0~20191122.bd85bf54-2ubuntu3.3)
hirsute
Released (2020.11-4ubuntu0.1)
xenial Needs triage

upstream Not vulnerable

kinetic Not vulnerable
(2021.08~rc0-2)
nodejs
Launchpad, Ubuntu, Debian
impish Not vulnerable
(uses system openssl1.1)
lunar Not vulnerable
(uses system openssl1.1)
xenial Not vulnerable
(uses system openssl)
jammy Needed

upstream Needs triage

trusty Not vulnerable
(uses system openssl)
bionic Not vulnerable
(uses system openssl1.0)
focal Not vulnerable
(uses system openssl1.1)
groovy Not vulnerable
(uses system openssl1.1)
hirsute Not vulnerable
(uses system openssl1.1)
kinetic Not vulnerable
(uses system openssl1.1)
openssl
Launchpad, Ubuntu, Debian
impish
Released (1.1.1j-1ubuntu1)
jammy
Released (1.1.1j-1ubuntu1)
lunar
Released (1.1.1j-1ubuntu1)
upstream
Released (1.1.1j)
trusty Needs triage

bionic
Released (1.1.1-1ubuntu2.1~18.04.8)
hirsute
Released (1.1.1j-1ubuntu1)
focal
Released (1.1.1f-1ubuntu2.2)
groovy
Released (1.1.1f-1ubuntu4.2)
xenial
Released (1.0.2g-1ubuntu4.19)
kinetic
Released (1.1.1j-1ubuntu1)
Patches:
upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
openssl1.0
Launchpad, Ubuntu, Debian
hirsute Does not exist

impish Does not exist

jammy Does not exist

lunar Does not exist

upstream
Released (1.0.2y)
trusty Does not exist

xenial Does not exist

focal Does not exist

groovy Does not exist

bionic
Released (1.0.2n-1ubuntu5.6)
kinetic Does not exist

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H