CVE-2017-3731 log

Source
Severity Medium
Remote Yes
Type Denial of service
Description
If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
Group Package Affected Fixed Severity Status Ticket
AVG-155 lib32-openssl 1:1.0.2.j-1 1:1.0.2.k-1 Medium Fixed
AVG-154 openssl 1.0.2.j-1 1.0.2.k-1 Medium Fixed
Date Advisory Group Package Severity Type
28 Jan 2017 ASA-201701-37 AVG-154 openssl Medium multiple issues
27 Jan 2017 ASA-201701-36 AVG-155 lib32-openssl Medium multiple issues
References
https://www.openssl.org/news/secadv/20170126.txt