This update for openssl fixes the following issues:
- CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7)
could eventually exceed the stack given malicious input with excessive recursion. This could result
in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from
untrusted sources so this is considered safe. (bsc#1087102).
{
"binaries": [
{
"libopenssl1_0_0-hmac": "1.0.2j-60.24.1",
"libopenssl1_0_0-hmac-32bit": "1.0.2j-60.24.1",
"libopenssl1_0_0": "1.0.2j-60.24.1",
"openssl": "1.0.2j-60.24.1",
"libopenssl-devel": "1.0.2j-60.24.1",
"openssl-doc": "1.0.2j-60.24.1",
"libopenssl1_0_0-32bit": "1.0.2j-60.24.1"
}
]
}{
"binaries": [
{
"libopenssl1_0_0-hmac": "1.0.2j-60.24.1",
"libopenssl1_0_0-hmac-32bit": "1.0.2j-60.24.1",
"libopenssl1_0_0": "1.0.2j-60.24.1",
"openssl": "1.0.2j-60.24.1",
"libopenssl-devel": "1.0.2j-60.24.1",
"openssl-doc": "1.0.2j-60.24.1",
"libopenssl1_0_0-32bit": "1.0.2j-60.24.1"
}
]
}{
"binaries": [
{
"libopenssl1_0_0-hmac": "1.0.2j-60.24.1",
"libopenssl1_0_0-hmac-32bit": "1.0.2j-60.24.1",
"libopenssl1_0_0": "1.0.2j-60.24.1",
"openssl": "1.0.2j-60.24.1",
"libopenssl-devel": "1.0.2j-60.24.1",
"openssl-doc": "1.0.2j-60.24.1",
"libopenssl1_0_0-32bit": "1.0.2j-60.24.1"
}
]
}{
"binaries": [
{
"libopenssl1_0_0-hmac": "1.0.2j-60.24.1",
"libopenssl1_0_0-hmac-32bit": "1.0.2j-60.24.1",
"libopenssl1_0_0": "1.0.2j-60.24.1",
"openssl": "1.0.2j-60.24.1",
"libopenssl-devel": "1.0.2j-60.24.1",
"openssl-doc": "1.0.2j-60.24.1",
"libopenssl1_0_0-32bit": "1.0.2j-60.24.1"
}
]
}