Today a `security release of OpenSSL`_ was issued, fixing a critical vulnerability. This vulnerability allows a malicious client or server to read up to 64KB of memory out of the remote machine, potentially compromising any secrets within the process, including things like TLS private certificates.
This issue does not affect Twisted directly, but will affect many users of Twisted. Any machine which is serving traffic over TLS, or which is making outgoing TLS connections should upgrade it's version of OpenSSL immediately. This issue has been assigned CVE-2014-0160. A `complete description of the bug is also available`_. New packages have been issued for the following operating systems: * `Debian`_ * `Ubuntu`_ .. _`security release of OpenSSL`: https://www.openssl.org/news/secadv_20140407.txt .. _`complete description of the bug is also available`: http://heartbleed.com .. _`Debian`: https://www.debian.org/security/2014/dsa-2896 .. _`Ubuntu`: http://www.ubuntu.com/usn/usn-2165-1/ _______________________________________________ Twisted-Python mailing list Twisted-Python@twistedmatrix.com http://twistedmatrix.com/cgi-bin/mailman/listinfo/twisted-python