Debian Package Tracker
Register | Log in
Subscribe

teeworlds

online multi-player platform 2D shooter

Choose email to subscribe with

general
  • source: teeworlds (main)
  • version: 0.7.5-2
  • maintainer: Debian Games Team (archive) (DMD)
  • uploaders: Felix Geyer [DMD] – Jack Coulter [DMD]
  • arch: all any
  • std-ver: 4.5.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.7.2-5+deb10u1
  • o-o-sec: 0.7.2-5+deb10u1
  • oldstable: 0.7.5-1
  • stable: 0.7.5-2
  • testing: 0.7.5-2
  • unstable: 0.7.5-2
versioned links
  • 0.7.2-5+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.7.5-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.7.5-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • teeworlds (1 bugs: 0, 1, 0, 0)
  • teeworlds-data
  • teeworlds-server
action needed
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2023-31517: Teeworlds v0.7.5 was discovered to contain memory leaks.
  • CVE-2023-31518: A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file.
Created: 2023-05-24 Last update: 2023-06-11 06:30
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2023-31517: Teeworlds v0.7.5 was discovered to contain memory leaks.
  • CVE-2023-31518: A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file.
Created: 2023-06-11 Last update: 2023-06-11 06:30
lintian reports 6 warnings high
Lintian reports 6 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2020-07-29 Last update: 2023-03-17 21:36
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2020-09-11 Last update: 2023-09-28 02:02
Multiarch hinter reports 1 issue(s) normal
There are issues with the multiarch metadata for this package.
  • teeworlds-data could be marked Multi-Arch: foreign
Created: 2016-09-14 Last update: 2023-09-27 23:49
1 new commit since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit a6c4b23c1ce73466e6d89bccbede70e61e8c9cba
Author: Moritz Muehlenhoff <jmm@debian.org>
Date:   Fri Mar 17 12:53:10 2023 +0100

    * Backport 91e5492d4c210f82f1ca6b43a73417fef5463368 as the hotfix
      for CVE-2021-43518 (Closes: #1009070)
Created: 2023-03-17 Last update: 2023-09-27 02:45
AppStream hints: 1 warning normal
AppStream found metadata issues for packages:
  • teeworlds: 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2020-06-01 Last update: 2020-06-01 01:13
3 low-priority security issues in bullseye low

There are 3 open security issues in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2021-43518: (needs triaging) Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.

You can find information about how to handle this issue in the security team's documentation.

2 ignored issues:
  • CVE-2023-31517: Teeworlds v0.7.5 was discovered to contain memory leaks.
  • CVE-2023-31518: A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file.
Created: 2022-07-04 Last update: 2023-06-11 06:30
debian/patches: 8 patches to forward upstream low

Among the 8 debian patches available in version 0.7.5-2 of the package, we noticed the following issues:

  • 8 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-03-17 19:36
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2022-10-16 Last update: 2022-10-16 06:01
No known security issue in bookworm wishlist

There are 2 open security issues in bookworm.

2 ignored issues:
  • CVE-2023-31517: Teeworlds v0.7.5 was discovered to contain memory leaks.
  • CVE-2023-31518: A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file.
Created: 2023-06-10 Last update: 2023-06-11 06:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.5.0).
Created: 2020-11-17 Last update: 2023-03-17 19:39
news
[rss feed]
  • [2023-04-11] teeworlds 0.7.5-2 MIGRATED to testing (Debian testing watch)
  • [2023-03-17] Accepted teeworlds 0.7.5-2 (source) into unstable (Moritz Muehlenhoff) (signed by: Moritz Mühlenhoff)
  • [2020-09-17] Accepted teeworlds 0.7.2-5+deb10u1 (source all amd64) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Markus Koschany)
  • [2020-09-14] Accepted teeworlds 0.7.2-5+deb10u1 (source all amd64) into stable->embargoed, stable (Debian FTP Masters) (signed by: Markus Koschany)
  • [2020-09-05] teeworlds 0.7.5-1 MIGRATED to testing (Debian testing watch)
  • [2020-08-30] Accepted teeworlds 0.7.5-1 (source) into unstable (Markus Koschany)
  • [2019-05-11] teeworlds 0.7.2-5 MIGRATED to testing (Debian testing watch)
  • [2019-05-06] Accepted teeworlds 0.7.2-5 (source) into unstable (Dylan Aïssi)
  • [2019-05-04] Accepted teeworlds 0.7.2-4 (source) into unstable (Dylan Aïssi)
  • [2019-03-11] teeworlds 0.7.2-3 MIGRATED to testing (Debian testing watch)
  • [2019-02-28] Accepted teeworlds 0.7.2-3 (source) into unstable (Felix Geyer)
  • [2019-01-10] Accepted teeworlds 0.7.2-2~bpo9+1 (source) into stretch-backports (Markus Koschany)
  • [2019-01-08] teeworlds 0.7.2-2 MIGRATED to testing (Debian testing watch)
  • [2019-01-03] Accepted teeworlds 0.7.2-2 (source) into unstable (Markus Koschany)
  • [2019-01-02] Accepted teeworlds 0.7.2-1 (source) into unstable (Markus Koschany)
  • [2018-12-06] Accepted teeworlds 0.7.0-1~bpo9+1 (source all amd64) into stretch-backports, stretch-backports (Markus Koschany)
  • [2018-11-01] Accepted teeworlds 0.6.5+dfsg-1~deb9u1 (source all amd64) into proposed-updates->stable-new, proposed-updates (Markus Koschany)
  • [2018-11-01] teeworlds 0.7.0-1 MIGRATED to testing (Debian testing watch)
  • [2018-10-28] Accepted teeworlds 0.6.5+dfsg-1~deb9u1 (source all amd64) into stable->embargoed, stable (Markus Koschany)
  • [2018-10-27] Accepted teeworlds 0.7.0-1 (source) into unstable (Markus Koschany)
  • [2016-11-28] Accepted teeworlds 0.6.4+dfsg-1~bpo8+1 (source amd64 all) into jessie-backports, jessie-backports (Felix Geyer)
  • [2016-11-20] teeworlds 0.6.4+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2016-11-17] Accepted teeworlds 0.6.4+dfsg-1 (source) into unstable (Felix Geyer)
  • [2016-08-20] teeworlds 0.6.3+dfsg-3 MIGRATED to testing (Debian testing watch)
  • [2016-08-14] Accepted teeworlds 0.6.3+dfsg-3 (source) into unstable (Felix Geyer)
  • [2016-07-07] teeworlds 0.6.3+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2016-07-01] Accepted teeworlds 0.6.3+dfsg-2 (source) into unstable (Felix Geyer)
  • [2016-05-07] teeworlds 0.6.3+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2016-04-25] Accepted teeworlds 0.6.3+dfsg-1 (source) into unstable (Felix Geyer)
  • [2014-11-26] teeworlds 0.6.2+dfsg-2 MIGRATED to testing (Britney)
  • 1
  • 2
bugs [bug history graph]
  • all: 3
  • RC: 0
  • I&N: 2
  • M&W: 1
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 6)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.7.5-2
  • 5 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing