Really, the only sane method here is to place 0.6.2 in hardy-security. Backporting the fixes introduces a fairly major regression, and anything other than an upstream-vetted change to allocation is begging for disaster.
-- CVE-2008-3547: Network exploitable buffer overrun in openttd < 0.6.2 https://bugs.launchpad.net/bugs/261373 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs