Bug 1153811 (sat6-poodle)

Summary: POODLE: SSLv3 vulnerability (CVE-2014-3566)
Product: Red Hat Satellite Reporter: Mike McCune <mmccune>
Component: SecurityAssignee: Tomer Brisker <tbrisker>
Status: CLOSED CURRENTRELEASE QA Contact: Katello QA List <katello-qa-list>
Severity: high Docs Contact:
Priority: unspecified    
Version: 6.0.4CC: ahecox, bbreard, bbuckingham, bkearney, cwelton, dcleal, jmoran, mjs, mschreie, nshaik, ohadlevy, oshtaier
Target Milestone: UnspecifiedKeywords: Tracking, Triaged
Target Release: Unused   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-10-05 19:53:38 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1153054, 1153375, 1153815, 1153826, 1156565, 1156567, 1160804, 1186488, 1305779    
Bug Blocks:    

Description Mike McCune 2014-10-16 20:44:48 UTC
Tracker for various poodle related fixes to Satellite 6

Comment 1 RHEL Program Management 2014-10-16 21:02:47 UTC
Since this issue was entered in Red Hat Bugzilla, the release flag has been
set to ? to ensure that it is properly evaluated for this release.

Comment 12 Bryan Kearney 2016-10-05 19:53:38 UTC
All bugs in this tracker are closed, so I am closing this out. The final fixes are client pieces that landed in RHEL 6.8 and 7.2.