This update for openssl fixes the following issues:
- CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7)
could eventually exceed the stack given malicious input with excessive recursion. This could result
in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from
untrusted sources so this is considered safe. (bsc#1087102).
{ "binaries": [ { "libopenssl-devel": "1.0.2j-60.24.1", "openssl-doc": "1.0.2j-60.24.1", "openssl": "1.0.2j-60.24.1", "libopenssl1_0_0": "1.0.2j-60.24.1", "libopenssl1_0_0-32bit": "1.0.2j-60.24.1", "libopenssl1_0_0-hmac": "1.0.2j-60.24.1", "libopenssl1_0_0-hmac-32bit": "1.0.2j-60.24.1" } ] }
{ "binaries": [ { "libopenssl-devel": "1.0.2j-60.24.1", "openssl-doc": "1.0.2j-60.24.1", "openssl": "1.0.2j-60.24.1", "libopenssl1_0_0": "1.0.2j-60.24.1", "libopenssl1_0_0-32bit": "1.0.2j-60.24.1", "libopenssl1_0_0-hmac": "1.0.2j-60.24.1", "libopenssl1_0_0-hmac-32bit": "1.0.2j-60.24.1" } ] }
{ "binaries": [ { "libopenssl-devel": "1.0.2j-60.24.1", "openssl-doc": "1.0.2j-60.24.1", "openssl": "1.0.2j-60.24.1", "libopenssl1_0_0": "1.0.2j-60.24.1", "libopenssl1_0_0-32bit": "1.0.2j-60.24.1", "libopenssl1_0_0-hmac": "1.0.2j-60.24.1", "libopenssl1_0_0-hmac-32bit": "1.0.2j-60.24.1" } ] }
{ "binaries": [ { "libopenssl-devel": "1.0.2j-60.24.1", "openssl-doc": "1.0.2j-60.24.1", "openssl": "1.0.2j-60.24.1", "libopenssl1_0_0": "1.0.2j-60.24.1", "libopenssl1_0_0-32bit": "1.0.2j-60.24.1", "libopenssl1_0_0-hmac": "1.0.2j-60.24.1", "libopenssl1_0_0-hmac-32bit": "1.0.2j-60.24.1" } ] }