OpenSSL is vulnerable to denial of service (DoS) attacks. The vulnerability exists when a truncated packet causes an out-of-bounds (OOB) read on an SSL/TLS server/client on a 32-bit host using a specific cipher such as CHACHA20/POLY1305 or RC4-MD5 cipher.
rhn.redhat.com/errata/RHSA-2017-0286.html
www.debian.org/security/2017/dsa-3773
www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
www.securityfocus.com/bid/95813
www.securitytracker.com/id/1037717
access.redhat.com/errata/RHSA-2018:2185
access.redhat.com/errata/RHSA-2018:2186
access.redhat.com/errata/RHSA-2018:2187
github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21
security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc
security.gentoo.org/glsa/201702-07
security.netapp.com/advisory/ntap-20171019-0002/
security.paloaltonetworks.com/CVE-2017-3731
source.android.com/security/bulletin/pixel/2017-11-01
support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us
www.openssl.org/news/secadv/20170126.txt
www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
www.tenable.com/security/tns-2017-04