teeworlds is vulnerable to Buffer Overflow. A malicious attacker may craft a specific map which will overwrite client data since ‘m_channels’ values coming from a map file are not validated by a map parser. This could lead to denial of service or code execution.
github.com/teeworlds/teeworlds/issues/2981
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIYZ7EVY6NZBM7FQF6GVUARYO6MKSEAT/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OS2LI2RHQNUKUT3FKWYHRC27PLRWCHMZ/
lists.fedoraproject.org/archives/list/[email protected]/message/JIYZ7EVY6NZBM7FQF6GVUARYO6MKSEAT/
lists.fedoraproject.org/archives/list/[email protected]/message/OS2LI2RHQNUKUT3FKWYHRC27PLRWCHMZ/
mmmds.pl/fuzzing-map-parser-part-1-teeworlds/
security-tracker.debian.org/tracker/CVE-2021-43518