This update fixes the following security issues:
- CVE-2015-4000 (boo#931698)
- The Logjam Attack / weakdh.org
- reject connections with DH parameters shorter than 1024 bits
- generates 2048-bit DH parameters by default
- CVE-2015-1788 (boo#934487)
- Malformed ECParameters causes infinite loop
- CVE-2015-1789 (boo#934489)
- Exploitable out-of-bounds read in X509_cmp_time
- CVE-2015-1790 (boo#934491)
- PKCS7 crash with missing EnvelopedContent
- CVE-2015-1792 (boo#934493)
- CMS verify infinite loop with unknown hash function
- CVE-2015-1791 (boo#933911)
- race condition in NewSessionTicket
- CVE-2015-3216 (boo#933898)
- Crash in ssleay_rand_bytes due to locking regression
- modified openssl-1.0.1i-fipslocking.patch
- fix timing side channel in RSA decryption (bnc#929678)
- add ECC ciphersuites to DEFAULT (bnc#879179)
- Disable EXPORT ciphers by default (bnc#931698, comment #3)