This bug was fixed in the package openssl - 3.0.2-0ubuntu1
---
openssl (3.0.2-0ubuntu1) jammy; urgency=medium
* New upstream bugfix release (LP: #1965141)
* d/p/skip_tls1.1_seclevel3_tests.patch: new Ubuntu-specific patch for the
testsuite
-- Simon Chopin Wed, 16 Mar 2022
[ubuntu/jammy-proposed] openssl 3.0.2-0ubuntu1 (Accepted)
Uploaded to proposed, it has to go through the usual process of passing
autopkgtests and such. It shouldn't need any additional package
rebuilds because of no ABI changes but expect autopkgtests to run hot a
while
** Changed in: openssl (
I've got some extra cycles later today, so I'll happily help the
Security team out and get this uploaded later today (Eastern US time for
clarity sake when I say "later today")
** Changed in: openssl (Ubuntu)
Assignee: (unassigned) => Thomas Ward (teward)
** Changed in: openssl (Ubuntu)
This update will fix CVE-2022-0778, so the security team is interested
in seeing it in jammy.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-0778
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpa
Attached is the debdiff for the upgrade. You can also find the package
at https://launchpad.net/~schopin/+archive/ubuntu/test-
ppa/+sourcepub/13390252/+listing-archive-extra (mind the version
number).
Note the new Ubuntu-specific patch to disable some tests that use a
configuration that's invalid