Forum OpenACS Development: Re: Security Bug In OpenSSL
Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.
But in my installation (upgraded from debian, I did'nt build it) with 1.0.1e worked (or at least that's what test said).
but compiling your own OpenSSL 1.0.1g is certainly safe in this regard.
Changing the library/recompiling is the easy part, "fixing" the damage is harder, since heartbleed allows to read the memory (tcp buffers, etc.). One should change all HTTP authentication credentials, which were ever transported over affected SSL channels, after the leak was fixed. .... also for external sites. Also, getting new certificates might not be a bad idea.