Update (October 29th, 2014 12:15 pm PT)
See today's v2 release notes and v4 release notes for a subsequent update related to "Poodle".
Update (October 16th, 2014 4:15 pm PT)
The hotfix has been released and you can read the release notes here. The security patches are now available via the Upgrade button in your environment.
Update (October 16th, 2014 3:00 pm PT)
Our engineers are hard at work and are still testing the fix for our non-ELB/classicUI customers. All of our ELB and newUI customers have been patched up. Please let us know if you have any questions. Our current ETA is at or before 17:00 PDT 10/16.
A vulnerability with OpenSSl has been discovered--affecting Debian, Ubuntu, Gentoo, and other Linux distributions relying on OpenSSL--This vulnerability relies on having SSLv3 available for connections.
Any ssl terminated hosted applications using SSLv3 has the possibility with some browsers to be forced to retry SSL negotiation using older versions (including SSLv3). A complicated scenario exists in which an attacker might use this to gain access to the unencrypted communications; the fix is to disable SSLv3 to prevent this from being possible.
Engine Yard engineers are actively working through the official patches to have SSL version 3 disabled on all applications.
Once we disable SSLv3, some IE6 users will not be able to use your site.
Further updates will be posted as available. Be sure to subscribe to this Known Issue to receive prompt email notifications.
Google Online Security Blog - http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
Openssl Security Advisory - https://www.openssl.org/~bodo/ssl-poodle.pdf