This bug was fixed in the package bind9 - 1:9.11.3+dfsg-1ubuntu1.5
---
bind9 (1:9.11.3+dfsg-1ubuntu1.5) bionic-security; urgency=medium
* SECURITY UPDATE: memory leak via specially crafted packet
- debian/patches/CVE-2018-5744.patch: silently drop additional keytag
options
rebuilt bind9 1:9.11.3+dfsg-1ubuntu1.4 against openssl 1.1.1a, and it
built correctly and kept the dep on 1.1.0 only.
** Tags removed: verification-needed verification-needed-bionic
** Tags added: verification-done verification-done-bionic
--
You received this bug notification because you are a
Hello Dimitri, or anyone else affected,
Accepted bind9 into bionic-proposed. The package will build now and be
available at https://launchpad.net/ubuntu/+source/bind9/1:9.11.3+dfsg-
1ubuntu1.4 in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
h
** Tags added: id-5c6196e9e3e4c51dd370ee15
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1815474
Title:
bind9 FTBFS in bionic, regression in updates
To manage notifications about this bug go to:
ht