Thank you for your concern, got this update yesterday in "testing" branch.
You haven't read the article, only those screaming title, right? Next time you better read the source:
https://blog.torproject.org/blog/openssl-bug-cve-2014-0160Tor clients could possibly be induced to send sensitive information like "what sites you visited in this session" to your entry guards.
This is not "sensitive information" for this situation at all.
Also, I don't
"believe" in anything including Tor, I just
know how it works and how to use it. Fits for C2 well too.