matrixssl suffers from the so-called Lucky Thirteen attack on AES CBC cipher modes. Version 3.4.1 fixes this, see upstream news. No CVE yet, requested on oss-security.
CVE-2013-0169 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169): The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
Note: there has not been a stable release of this package before. Commit message: Version bump http://sources.gentoo.org/dev-libs/matrixssl/matrixssl-3.4.2.ebuild?rev=1.1
Thanks, guys. Closing as noglsa.