Multiple Information Disclosure vulnerabilities in OpenSSL allow remote attackers to obtain sensitive information via various vectors.
|Package||dev-libs/openssl on all architectures|
|Affected versions||< 1.0.1g|
|Unaffected versions||>= 1.0.1g, revision >= 0.9.8y, revision >= 0.9.8z_p1, revision >= 0.9.8z_p2, revision >= 0.9.8z_p3, revision >= 0.9.8z_p4, revision >= 0.9.8z_p5, revision >= 0.9.8z_p6, revision >= 0.9.8z_p7, revision >= 0.9.8z_p8, revision >= 0.9.8z_p9, revision >= 0.9.8z_p10, revision >= 0.9.8z_p11, revision >= 0.9.8z_p12, revision >= 0.9.8z_p13, revision >= 0.9.8z_p14, revision >= 0.9.8z_p15|
OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general purpose cryptography library.
Multiple vulnerabilities have been found in OpenSSL:
A remote attacker could exploit these issues to disclose information, including private keys or other sensitive information, or perform side-channel attacks to obtain ECDSA nonces.
Disabling the tls-heartbeat USE flag (enabled by default) provides a workaround for the CVE-2014-0160 issue.
All OpenSSL users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1g"
Note: All services using OpenSSL to provide TLS connections have to be restarted for the update to take effect. Utilities like app-admin/lib_users can aid in identifying programs using OpenSSL.
As private keys may have been compromised using the Heartbleed attack, it is recommended to regenerate them.