Multiple vulnerabilities have been found in OpenSSL, allowing remote attackers to cause a Denial of Service or obtain sensitive information.
Package | dev-libs/openssl on all architectures |
---|---|
Affected versions | < 1.0.0g |
Unaffected versions | >= 1.0.0g revision >= 0.9.8t revision >= 0.9.8u revision >= 0.9.8v revision >= 0.9.8w revision >= 0.9.8x revision >= 0.9.8y revision >= 0.9.8z_p1 revision >= 0.9.8z_p2 revision >= 0.9.8z_p3 revision >= 0.9.8z_p4 revision >= 0.9.8z_p5 revision >= 0.9.8z_p6 revision >= 0.9.8z_p7 revision >= 0.9.8z_p8 revision >= 0.9.8z_p9 revision >= 0.9.8z_p10 revision >= 0.9.8z_p11 revision >= 0.9.8z_p12 revision >= 0.9.8z_p13 revision >= 0.9.8z_p14 revision >= 0.9.8z_p15 |
OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general purpose cryptography library.
Multiple vulnerabilities have been found in OpenSSL:
A remote attacker may be able to cause a Denial of Service or obtain sensitive information, including plaintext passwords.
There is no known workaround at this time.
All OpenSSL users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.0g"