Debian Package Tracker
Register | Log in
Subscribe

robocode

Java programming game based on battle tanks

Choose email to subscribe with

general
  • source: robocode (main)
  • version: 1.9.3.9-4
  • maintainer: Debian Java Maintainers (archive) (DMD)
  • uploaders: Markus Koschany [DMD]
  • arch: all
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.9.3.9-2
  • oldstable: 1.9.3.9-3
  • stable: 1.9.3.9-4
  • testing: 1.9.3.9-4
  • unstable: 1.9.3.9-4
versioned links
  • 1.9.3.9-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.9.3.9-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.9.3.9-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • robocode
action needed
A new upstream version is available: 1_10_1 high
A new upstream version 1_10_1 is available, you should consider packaging it.
Created: 2025-11-27 Last update: 2025-12-18 17:01
3 security issues in sid high

There are 3 open security issues in sid.

3 important issues:
  • CVE-2025-14306: A directory traversal vulnerability exists in the CacheCleaner component of Robocode version 1.9.3.6. The recursivelyDelete method fails to properly sanitize file paths, allowing attackers to traverse directories and delete arbitrary files on the system. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the file path, leading to potential unauthorized file deletions. https://robo-code.blogspot.com/
  • CVE-2025-14307: An insecure temporary file creation vulnerability exists in the AutoExtract component of Robocode version 1.9.3.6. The createTempFile method fails to securely create temporary files, allowing attackers to exploit race conditions and potentially execute arbitrary code or overwrite critical files. This vulnerability can be exploited by manipulating the temporary file creation process, leading to potential unauthorized actions.
  • CVE-2025-14308: An integer overflow vulnerability exists in the write method of the Buffer class in Robocode version 1.9.3.6. The method fails to properly validate the length of data being written, allowing attackers to cause an overflow, potentially leading to buffer overflows and arbitrary code execution. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the data length, leading to potential unauthorized code execution.
Created: 2025-12-09 Last update: 2025-12-13 23:01
3 security issues in forky high

There are 3 open security issues in forky.

3 important issues:
  • CVE-2025-14306: A directory traversal vulnerability exists in the CacheCleaner component of Robocode version 1.9.3.6. The recursivelyDelete method fails to properly sanitize file paths, allowing attackers to traverse directories and delete arbitrary files on the system. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the file path, leading to potential unauthorized file deletions. https://robo-code.blogspot.com/
  • CVE-2025-14307: An insecure temporary file creation vulnerability exists in the AutoExtract component of Robocode version 1.9.3.6. The createTempFile method fails to securely create temporary files, allowing attackers to exploit race conditions and potentially execute arbitrary code or overwrite critical files. This vulnerability can be exploited by manipulating the temporary file creation process, leading to potential unauthorized actions.
  • CVE-2025-14308: An integer overflow vulnerability exists in the write method of the Buffer class in Robocode version 1.9.3.6. The method fails to properly validate the length of data being written, allowing attackers to cause an overflow, potentially leading to buffer overflows and arbitrary code execution. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the data length, leading to potential unauthorized code execution.
Created: 2025-12-09 Last update: 2025-12-13 23:01
3 security issues in bullseye high

There are 3 open security issues in bullseye.

3 important issues:
  • CVE-2025-14306: A directory traversal vulnerability exists in the CacheCleaner component of Robocode version 1.9.3.6. The recursivelyDelete method fails to properly sanitize file paths, allowing attackers to traverse directories and delete arbitrary files on the system. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the file path, leading to potential unauthorized file deletions. https://robo-code.blogspot.com/
  • CVE-2025-14307: An insecure temporary file creation vulnerability exists in the AutoExtract component of Robocode version 1.9.3.6. The createTempFile method fails to securely create temporary files, allowing attackers to exploit race conditions and potentially execute arbitrary code or overwrite critical files. This vulnerability can be exploited by manipulating the temporary file creation process, leading to potential unauthorized actions.
  • CVE-2025-14308: An integer overflow vulnerability exists in the write method of the Buffer class in Robocode version 1.9.3.6. The method fails to properly validate the length of data being written, allowing attackers to cause an overflow, potentially leading to buffer overflows and arbitrary code execution. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the data length, leading to potential unauthorized code execution.
Created: 2025-12-09 Last update: 2025-12-13 23:01
lintian reports 5 warnings high
Lintian reports 5 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2020-08-22 Last update: 2024-10-05 14:04
AppStream hints: 1 warning normal
AppStream found metadata issues for packages:
  • robocode: 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2020-06-01 Last update: 2020-06-01 01:13
3 low-priority security issues in trixie low

There are 3 open security issues in trixie.

3 issues left for the package maintainer to handle:
  • CVE-2025-14306: (needs triaging) A directory traversal vulnerability exists in the CacheCleaner component of Robocode version 1.9.3.6. The recursivelyDelete method fails to properly sanitize file paths, allowing attackers to traverse directories and delete arbitrary files on the system. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the file path, leading to potential unauthorized file deletions. https://robo-code.blogspot.com/
  • CVE-2025-14307: (needs triaging) An insecure temporary file creation vulnerability exists in the AutoExtract component of Robocode version 1.9.3.6. The createTempFile method fails to securely create temporary files, allowing attackers to exploit race conditions and potentially execute arbitrary code or overwrite critical files. This vulnerability can be exploited by manipulating the temporary file creation process, leading to potential unauthorized actions.
  • CVE-2025-14308: (needs triaging) An integer overflow vulnerability exists in the write method of the Buffer class in Robocode version 1.9.3.6. The method fails to properly validate the length of data being written, allowing attackers to cause an overflow, potentially leading to buffer overflows and arbitrary code execution. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the data length, leading to potential unauthorized code execution.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-12-09 Last update: 2025-12-13 23:01
3 low-priority security issues in bookworm low

There are 3 open security issues in bookworm.

3 issues left for the package maintainer to handle:
  • CVE-2025-14306: (needs triaging) A directory traversal vulnerability exists in the CacheCleaner component of Robocode version 1.9.3.6. The recursivelyDelete method fails to properly sanitize file paths, allowing attackers to traverse directories and delete arbitrary files on the system. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the file path, leading to potential unauthorized file deletions. https://robo-code.blogspot.com/
  • CVE-2025-14307: (needs triaging) An insecure temporary file creation vulnerability exists in the AutoExtract component of Robocode version 1.9.3.6. The createTempFile method fails to securely create temporary files, allowing attackers to exploit race conditions and potentially execute arbitrary code or overwrite critical files. This vulnerability can be exploited by manipulating the temporary file creation process, leading to potential unauthorized actions.
  • CVE-2025-14308: (needs triaging) An integer overflow vulnerability exists in the write method of the Buffer class in Robocode version 1.9.3.6. The method fails to properly validate the length of data being written, allowing attackers to cause an overflow, potentially leading to buffer overflows and arbitrary code execution. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the data length, leading to potential unauthorized code execution.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-12-09 Last update: 2025-12-13 23:01
debian/patches: 2 patches to forward upstream low

Among the 3 debian patches available in version 1.9.3.9-4 of the package, we noticed the following issues:

  • 2 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2024-12-02 14:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.6.2).
Created: 2024-04-07 Last update: 2025-02-27 13:24
news
[rss feed]
  • [2024-12-07] robocode 1.9.3.9-4 MIGRATED to testing (Debian testing watch)
  • [2024-12-02] Accepted robocode 1.9.3.9-4 (source) into unstable (tony mancill)
  • [2023-03-05] robocode 1.9.3.9-3 MIGRATED to testing (Debian testing watch)
  • [2023-02-23] Accepted robocode 1.9.3.9-3 (source) into unstable (Emmanuel Bourg)
  • [2020-09-15] robocode 1.9.3.9-2 MIGRATED to testing (Debian testing watch)
  • [2020-09-10] Accepted robocode 1.9.3.9-2 (source) into unstable (Markus Koschany)
  • [2020-05-08] robocode 1.9.3.9-1 MIGRATED to testing (Debian testing watch)
  • [2020-05-03] Accepted robocode 1.9.3.9-1 (source) into unstable (Markus Koschany)
  • [2020-04-27] robocode 1.9.3.8-1 MIGRATED to testing (Debian testing watch)
  • [2020-04-19] Accepted robocode 1.9.3.8-1 (source) into unstable (Markus Koschany)
  • [2019-09-10] robocode 1.9.3.7-1 MIGRATED to testing (Debian testing watch)
  • [2019-09-04] Accepted robocode 1.9.3.7-1 (source) into unstable (Markus Koschany)
  • [2019-07-23] robocode 1.9.3.5-1 MIGRATED to testing (Debian testing watch)
  • [2019-07-18] Accepted robocode 1.9.3.5-1 (source) into unstable (Markus Koschany)
  • [2019-05-30] robocode 1.9.3.3-3 MIGRATED to testing (Debian testing watch)
  • [2019-05-24] Accepted robocode 1.9.3.3-3 (source) into unstable (Markus Koschany)
  • [2019-04-13] robocode 1.9.3.3-2 MIGRATED to testing (Debian testing watch)
  • [2019-04-07] Accepted robocode 1.9.3.3-2 (source) into unstable (Markus Koschany)
  • [2018-09-18] robocode 1.9.3.3-1 MIGRATED to testing (Debian testing watch)
  • [2018-09-13] Accepted robocode 1.9.3.3-1 (source) into unstable (Markus Koschany)
  • [2018-08-04] robocode 1.9.3.2-1 MIGRATED to testing (Debian testing watch)
  • [2018-07-30] Accepted robocode 1.9.3.2-1 (source) into unstable (Markus Koschany)
  • [2018-03-25] robocode 1.9.3.1-1 MIGRATED to testing (Debian testing watch)
  • [2018-03-19] Accepted robocode 1.9.3.1-1 (source) into unstable (Markus Koschany)
  • [2017-09-07] robocode 1.9.2.6-3 MIGRATED to testing (Debian testing watch)
  • [2017-09-02] Accepted robocode 1.9.2.6-3 (source) into unstable (Markus Koschany)
  • [2017-06-24] robocode 1.9.2.6-2 MIGRATED to testing (Debian testing watch)
  • [2017-06-19] Accepted robocode 1.9.2.6-2 (source) into unstable (Markus Koschany)
  • [2017-04-30] Accepted robocode 1.9.2.6-1 (source) into experimental (Markus Koschany)
  • [2016-05-03] Accepted robocode 1.6.2+dfsg-3.1+deb7u1 (source all) into oldstable (signed by: Markus Koschany)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 5)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.9.3.9-4

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing