This update for openssl-1_1 fixes the following issues:
CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption. The previous fix for this timing side channel turned out to cause a severe 2-3x performance regression in the typical use case (bsc#1207534).
Update further expiring certificates that affect tests (bsc#1201627)
{ "binaries": [ { "libopenssl1_1-32bit": "1.1.1l-150500.17.6.1", "libopenssl-1_1-devel": "1.1.1l-150500.17.6.1", "libopenssl1_1-hmac-32bit": "1.1.1l-150500.17.6.1", "libopenssl1_1-hmac": "1.1.1l-150500.17.6.1", "libopenssl1_1": "1.1.1l-150500.17.6.1", "openssl-1_1": "1.1.1l-150500.17.6.1" } ] }
{ "binaries": [ { "libopenssl1_1-32bit": "1.1.1l-150500.17.6.1", "openssl-1_1": "1.1.1l-150500.17.6.1", "libopenssl1_1-hmac-32bit": "1.1.1l-150500.17.6.1", "libopenssl-1_1-devel-32bit": "1.1.1l-150500.17.6.1", "libopenssl1_1-hmac": "1.1.1l-150500.17.6.1", "libopenssl-1_1-devel": "1.1.1l-150500.17.6.1", "openssl-1_1-doc": "1.1.1l-150500.17.6.1", "libopenssl1_1": "1.1.1l-150500.17.6.1" } ] }