The openssl 0.9.8j compatibility package was updated to fix several security vulnerabilities:
CVE-2014-3570: Bignum squaring (BNsqr) may produce incorrect results on some platforms, including x8664.
CVE-2014-3571: Fix crash in dtls1getrecord whilst in the listen state where you get two separate reads performed - one for the header and one for the body of the handshake record.
CVE-2014-3572: Do not accept a handshake using an ephemeral ECDH ciphersuites with the server key exchange message omitted.
CVE-2014-8275: Fixed various certificate fingerprint issues
CVE-2015-0204: Only allow ephemeral RSA keys in export ciphersuites
CVE-2015-0205: OpenSSL 0.9.8j is NOT vulnerable to CVE-2015-0205 as it doesn't support DH certificates and this typo prohibits skipping of certificate verify message for sign only certificates anyway. (This patch only fixes the wrong condition)
This update also fixes regression caused by CVE-2014-0224.patch (bnc#892403)