Really, the only sane method here is to place 0.6.2 in hardy-security.
Backporting the fixes introduces a fairly major regression, and anything
other than an upstream-vetted change to allocation is begging for
disaster.

-- 
CVE-2008-3547: Network exploitable buffer overrun in openttd < 0.6.2
https://bugs.launchpad.net/bugs/261373
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to