This bug was fixed in the package openssl - 3.0.1-0ubuntu1 --------------- openssl (3.0.1-0ubuntu1) jammy; urgency=medium
* New upstream release (LP: #1955026). + Dropped patches, merged upstream: - d/p/double-engine-load* - d/p/Add-null-digest-implementation-to-the-default-provid.patch - d/p/Don-t-create-an-ECX-key-with-short-keys.patch + Refreshed patches: - d/p/c_rehash-compat.patch -- Simon Chopin <simon.cho...@canonical.com> Thu, 16 Dec 2021 09:10:48 +0100 ** Changed in: openssl (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssl in Ubuntu. https://bugs.launchpad.net/bugs/1955026 Title: Upgrade openssl to 3.0.1 on Jammy Status in openssl package in Ubuntu: Fix Released Bug description: Upstream has released a new version 3.0.1, including a security fix. https://mta.openssl.org/pipermail/openssl-announce/2021-December/000212.html https://mta.openssl.org/pipermail/openssl-announce/2021-December/000213.html To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1955026/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp