The relevant bug is here

>
> https://bugs.gentoo.org/show_bug.cgi?id=576128
>
> If you have sslv2 enabled, your choices are clear:
>
> 1. high likelihood of wholesale breakage, or
> 2. wait a little longer for a proper fix
>
> Obviously -r1 is ideal as it disables sslv2. If you have it and it
> works, leave it in place.
>
> Everyone else is going to have to make up their own mind, and there's no
> sane rational advice that can be given for all, considering what the
> choices are above.
>

Remember that the versions of OpenSSL with SSLv2 can be safe if you disable
SSLv2 in the services that use that code, eg, in apache, at a minimum, set;

SSLProtocol All -SSLv2

To find out what software is using OpenSSL;

# qdepends -Q openssl
and then investigate how to disable SSLv2 in each of those with network
services. Dont forget to restart!

Reply via email to