This update for openssl-1_1 fixes the following issues:
CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption. The previous fix for this timing side channel turned out to cause a severe 2-3x performance regression in the typical use case (bsc#1207534).
Update further expiring certificates that affect tests (bsc#1201627)
{
"binaries": [
{
"libopenssl1_1-hmac-32bit": "1.1.1l-150500.17.6.1",
"libopenssl1_1-hmac": "1.1.1l-150500.17.6.1",
"openssl-1_1": "1.1.1l-150500.17.6.1",
"libopenssl1_1": "1.1.1l-150500.17.6.1",
"libopenssl1_1-32bit": "1.1.1l-150500.17.6.1",
"libopenssl-1_1-devel": "1.1.1l-150500.17.6.1"
}
]
}
{
"binaries": [
{
"libopenssl1_1-hmac": "1.1.1l-150500.17.6.1",
"libopenssl1_1": "1.1.1l-150500.17.6.1",
"libopenssl1_1-32bit": "1.1.1l-150500.17.6.1",
"libopenssl-1_1-devel": "1.1.1l-150500.17.6.1",
"libopenssl1_1-hmac-32bit": "1.1.1l-150500.17.6.1",
"openssl-1_1": "1.1.1l-150500.17.6.1",
"openssl-1_1-doc": "1.1.1l-150500.17.6.1",
"libopenssl-1_1-devel-32bit": "1.1.1l-150500.17.6.1"
}
]
}