Debian Package Tracker
Register | Log in
Subscribe

teeworlds

online multi-player platform 2D shooter

Choose email to subscribe with

general
  • source: teeworlds (main)
  • version: 0.7.5-1
  • maintainer: Debian Games Team (archive) (DMD)
  • uploaders: Jack Coulter [DMD] – Felix Geyer [DMD]
  • arch: all any
  • std-ver: 4.5.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-bpo: 0.7.2-2~bpo9+1
  • oldstable: 0.7.2-5+deb10u1
  • old-sec: 0.7.2-5+deb10u1
  • stable: 0.7.5-1
  • testing: 0.7.5-1
  • unstable: 0.7.5-1
versioned links
  • 0.7.2-2~bpo9+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.7.2-5+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.7.5-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • teeworlds (1 bugs: 0, 1, 0, 0)
  • teeworlds-data
  • teeworlds-server
action needed
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2021-43518: Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.
Created: 2021-12-16 Last update: 2022-04-06 21:30
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2021-43518: Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.
Created: 2021-12-16 Last update: 2022-04-06 21:30
lintian reports 2 warnings high
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2020-07-29 Last update: 2021-10-13 21:35
Multiarch hinter reports 1 issue(s) normal
There are issues with the multiarch metadata for this package.
  • teeworlds-data could be marked Multi-Arch: foreign
Created: 2016-09-14 Last update: 2022-05-19 03:10
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2020-09-11 Last update: 2022-05-19 03:09
AppStream hints: 1 warning normal
AppStream found metadata issues for packages:
  • teeworlds: 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2020-06-01 Last update: 2020-06-01 01:13
1 low-priority security issue in buster low

There is 1 open security issue in buster.

1 issue left for the package maintainer to handle:
  • CVE-2021-43518: (needs triaging) Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.

You can find information about how to handle this issue in the security team's documentation.

Created: 2021-12-16 Last update: 2022-04-06 21:30
1 low-priority security issue in bullseye low

There is 1 open security issue in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2021-43518: (needs triaging) Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.

You can find information about how to handle this issue in the security team's documentation.

Created: 2021-12-16 Last update: 2022-04-06 21:30
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2014-07-02 Last update: 2014-07-02 18:05
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.0).
Created: 2020-11-17 Last update: 2022-05-11 23:25
news
[rss feed]
  • [2020-09-17] Accepted teeworlds 0.7.2-5+deb10u1 (source all amd64) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Markus Koschany)
  • [2020-09-14] Accepted teeworlds 0.7.2-5+deb10u1 (source all amd64) into stable->embargoed, stable (Debian FTP Masters) (signed by: Markus Koschany)
  • [2020-09-05] teeworlds 0.7.5-1 MIGRATED to testing (Debian testing watch)
  • [2020-08-30] Accepted teeworlds 0.7.5-1 (source) into unstable (Markus Koschany)
  • [2019-05-11] teeworlds 0.7.2-5 MIGRATED to testing (Debian testing watch)
  • [2019-05-06] Accepted teeworlds 0.7.2-5 (source) into unstable (Dylan Aïssi)
  • [2019-05-04] Accepted teeworlds 0.7.2-4 (source) into unstable (Dylan Aïssi)
  • [2019-03-11] teeworlds 0.7.2-3 MIGRATED to testing (Debian testing watch)
  • [2019-02-28] Accepted teeworlds 0.7.2-3 (source) into unstable (Felix Geyer)
  • [2019-01-10] Accepted teeworlds 0.7.2-2~bpo9+1 (source) into stretch-backports (Markus Koschany)
  • [2019-01-08] teeworlds 0.7.2-2 MIGRATED to testing (Debian testing watch)
  • [2019-01-03] Accepted teeworlds 0.7.2-2 (source) into unstable (Markus Koschany)
  • [2019-01-02] Accepted teeworlds 0.7.2-1 (source) into unstable (Markus Koschany)
  • [2018-12-06] Accepted teeworlds 0.7.0-1~bpo9+1 (source all amd64) into stretch-backports, stretch-backports (Markus Koschany)
  • [2018-11-01] Accepted teeworlds 0.6.5+dfsg-1~deb9u1 (source all amd64) into proposed-updates->stable-new, proposed-updates (Markus Koschany)
  • [2018-11-01] teeworlds 0.7.0-1 MIGRATED to testing (Debian testing watch)
  • [2018-10-28] Accepted teeworlds 0.6.5+dfsg-1~deb9u1 (source all amd64) into stable->embargoed, stable (Markus Koschany)
  • [2018-10-27] Accepted teeworlds 0.7.0-1 (source) into unstable (Markus Koschany)
  • [2016-11-28] Accepted teeworlds 0.6.4+dfsg-1~bpo8+1 (source amd64 all) into jessie-backports, jessie-backports (Felix Geyer)
  • [2016-11-20] teeworlds 0.6.4+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2016-11-17] Accepted teeworlds 0.6.4+dfsg-1 (source) into unstable (Felix Geyer)
  • [2016-08-20] teeworlds 0.6.3+dfsg-3 MIGRATED to testing (Debian testing watch)
  • [2016-08-14] Accepted teeworlds 0.6.3+dfsg-3 (source) into unstable (Felix Geyer)
  • [2016-07-07] teeworlds 0.6.3+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2016-07-01] Accepted teeworlds 0.6.3+dfsg-2 (source) into unstable (Felix Geyer)
  • [2016-05-07] teeworlds 0.6.3+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2016-04-25] Accepted teeworlds 0.6.3+dfsg-1 (source) into unstable (Felix Geyer)
  • [2014-11-26] teeworlds 0.6.2+dfsg-2 MIGRATED to testing (Britney)
  • [2014-11-23] Accepted teeworlds 0.6.2+dfsg-2 (source all) into unstable (Felix Geyer)
  • [2013-05-16] teeworlds 0.6.2+dfsg-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 2
  • RC: 0
  • I&N: 2
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 2)
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.7.5-1
  • 5 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing