Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 829305 (CVE-2021-43518)

Summary: games-action/teeworlds: code execution via malicious map file
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: CONFIRMED ---    
Severity: trivial CC: games
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://github.com/teeworlds/teeworlds/issues/2981
Whiteboard: ~2 [upstream]
Package list:
Runtime testing required: ---

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-12-15 23:52:00 UTC
CVE-2021-43518 (https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/):

Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.

No fix upstream as of yet.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-16 19:57:40 UTC
There is now a patch: https://github.com/teeworlds/teeworlds/commit/7e81ae1aac5dc4dc80b064262a4cef57d1361ce4