This bug was fixed in the package openssl - 3.0.1-0ubuntu1

---------------
openssl (3.0.1-0ubuntu1) jammy; urgency=medium

  * New upstream release (LP: #1955026).
    + Dropped patches, merged upstream:
      - d/p/double-engine-load*
      - d/p/Add-null-digest-implementation-to-the-default-provid.patch
      - d/p/Don-t-create-an-ECX-key-with-short-keys.patch
    + Refreshed patches:
      - d/p/c_rehash-compat.patch

 -- Simon Chopin <simon.cho...@canonical.com>  Thu, 16 Dec 2021 09:10:48
+0100

** Changed in: openssl (Ubuntu)
       Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1955026

Title:
  Upgrade openssl to 3.0.1 on Jammy

Status in openssl package in Ubuntu:
  Fix Released

Bug description:
  Upstream has released a new version 3.0.1, including a security fix.

  https://mta.openssl.org/pipermail/openssl-announce/2021-December/000212.html
  https://mta.openssl.org/pipermail/openssl-announce/2021-December/000213.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1955026/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to