0.6.5 released(posted by: heinrich5991) | 2018-10-13
Same story as with 0.6.3 and 0.6.4, again we're doing a release to fix a vulnerability. If you're actively playing Teeworlds, you likely already noticed that a lot of servers were full of "(connecting)" clients. This was possible because you could forge the connection packet in a way that made it seem like it came from an arbitrary IP address.
CVE IDs: CVE-2018-18541
Other security advisory IDs: DSA-4329-1
Descriptions: https://teeworlds.com/?page=news&id=12544
0.6.5 released (posted by: heinrich5991) | 2018-10-13 Same story as with 0.6.3 and 0.6.4, again we're doing a release to fix a vulnerability. If you're actively playing Teeworlds, you likely already noticed that a lot of servers were full of "(connecting)" clients. This was possible because you could forge the connection packet in a way that made it seem like it came from an arbitrary IP address.
Architectural progress:
amd64
arm64
armel
ppc64
powerpc