Got this email this morning, means nothing to me, but do any of you need to be aware?
As you may be aware a vulnerability has been identified in OpenSSL versions 1.0.1 and 1.0.2-beta. This has the potential to allow attackers to gain access to users' passwords and fool people into using false versions of Web sites. The vulnerability was made public on Monday evening before most vendors had a chance to issue a bug fix.
Since OpenSSL is the default secure-socket layer/Transport Layer Security (SSL/TLS) for the Apache and NGINX Web servers, some estimates claim that as many as two-thirds of all "secured" Web sites are vulnerable to Heartbleed.
Heartbleed can reveal the contents of a server's memory, where sensitive data is stored. That includes private data such as usernames, passwords, and credit card numbers. It also means an attacker can get copies of a server's digital keys then use that to impersonate servers or to decrypt communications from the past or potentially the future, too. There is no record of an attack.
OpenSSL is used in other places that you may not be aware of, for example VMware ESXi v5.5 has been seen to be vulnerable. So please test any server that has secure access over SSL, starting with publicly accessible servers first then working in to the network in to non-publicly accessible servers.
Checkpoint firewalls are not vulnerable.
More information is available here:
http://heartbleed.com/
Patches
Companies are now delivering the OpenSSL patches to their clients. So far, the fixed Linux operating systems include:
CentOS https://rhn.redhat.com/errata/RHSA-2014-0376.html
Debian http://www.debian.org/security/2014/dsa-2896
Fedora https://lists.fedoraproject.org/pipermail/announce/2014-April/003205.html
Red Hat https://access.redhat.com/site/announcements/781953
openSUSE http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html
Ubuntu http://www.ubuntu.com/usn/usn-2165-1/
SUSE Linux Enterprise Server (SLES) was not affected.