As you might know about “heartbeat ” ( CVE-2014-0160) bug of openssl is discovered by security researchers .
The vulnerability occurs in what is known as the heartbeat extension to this protocol, and it specifically impacts version 1.0.1 and beta versions of 1.0.2 of OpenSSL. Even though OpenSSL is just one implementation of the SSL / TLS protocol
Fix your openssl installation before somebody start sniffing your encrypted connections .
detailed info about flaw
posts about flaw
check your website
http://filippo.io/Heartbleed
use that site to check your website is vulnerable or not . if it is then update openssl as soon as possible
Update Openssl
For Linux
steps ( For Linux )
wget http://www.openssl.org/source/openssl-1.0.1g.tar.gz tar -xvzf openssl-1.0.1g.tar.gz cd openssl-1.0.1g ./config --prefix=/usr/ make sudo make install
steps ( for mac )
wget http://www.openssl.org/source/openssl-1.0.1g.tar.gz tar -xvzf openssl-1.0.1g.tar.gz cd openssl-1.0.1g ./Configure darwin64-x86_64-cc --prefix=/usr make sudo make install
Now verify your installed openssl version by typing
openssl version
be safe .