OpenSSL released an update for OpenSSL 1.1.0. The latest version is now OpenSSL 1.1.0e. OpenSSL 1.0.2 is not affected.
The vulnerability, %%cve:2017-3733%% can lead to a crash in either clients or servers. In order to trigger the vulnerability, an attacker would first negotiate an SSL connection without the Encrypt-Then-Mac extension. Later, the attacker would use the extension during a renegotiation handshake. The vulnerability is rated as High by OpenSSL, below the maximum level of Critical.
I recommend you wait for your respective vendor/Linux distribution to provide an updated OpenSSL library, which should be available shortly if it isnt already available. Not too many systems are using OpenSSL 1.1.0. Many current Linux distribution use the non-vulnerable1.0.2 branch. So no need to panic.
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.