Your submission was sent successfully! Close

CVE-2017-3731

Published: 26 January 2017

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
openssl
Launchpad, Ubuntu, Debian
artful
Released (1.0.2g-1ubuntu11)
bionic
Released (1.0.2g-1ubuntu11)
cosmic
Released (1.0.2g-1ubuntu11)
disco
Released (1.0.2g-1ubuntu11)
precise
Released (1.0.1-4ubuntu5.39)
trusty
Released (1.0.1f-1ubuntu2.22)
upstream Needs triage

xenial
Released (1.0.2g-1ubuntu4.6)
yakkety
Released (1.0.2g-1ubuntu9.1)
zesty
Released (1.0.2g-1ubuntu11)
openssl098
Launchpad, Ubuntu, Debian
artful Does not exist

bionic Does not exist

cosmic Does not exist

disco Does not exist

precise Does not exist
(precise was needs-triage)
trusty Does not exist
(trusty was needs-triage)
upstream Needs triage

xenial Does not exist

yakkety Does not exist

zesty Does not exist