This bug was fixed in the package openssl - 1.0.2g-1ubuntu14 --------------- openssl (1.0.2g-1ubuntu14) bionic; urgency=medium
* SECURITY UPDATE: Malformed X.509 IPAddressFamily could cause OOB read - debian/patches/CVE-2017-3735.patch: avoid out-of-bounds read in crypto/x509v3/v3_addr.c. - CVE-2017-3735 * SECURITY UPDATE: bn_sqrx8x_internal carry bug on x86_64 - debian/patches/CVE-2017-3736.patch: fix carry bug in bn_sqrx8x_internal in crypto/bn/asm/x86_64-mont5.pl. - CVE-2017-3736 * debian/patches/fix_armhf_ftbfs.patch: fix build with gcc-7.2 on armhf. (LP: #1729850) -- Marc Deslauriers <marc.deslauri...@ubuntu.com> Mon, 06 Nov 2017 07:56:00 -0500 ** Changed in: openssl (Ubuntu Bionic) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssl in Ubuntu. https://bugs.launchpad.net/bugs/1729850 Title: artful openssl FTBFS on armhf Status in binutils package in Ubuntu: Invalid Status in gcc-7 package in Ubuntu: Invalid Status in openssl package in Ubuntu: Fix Released Status in binutils source package in Artful: Invalid Status in gcc-7 source package in Artful: Invalid Status in openssl source package in Artful: Fix Released Status in binutils source package in Bionic: Invalid Status in gcc-7 source package in Bionic: Invalid Status in openssl source package in Bionic: Fix Released Bug description: openssl FTBFS on artful armhf with the following: ../util/shlib_wrap.sh ./sha256t Testing SHA-256 TEST 1 of 3 failed. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1729850/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp