| Name | CVE-2020-14983 | 
| Description | The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack. | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
| Debian Bugs | 964564 | 
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status | 
|---|
| chocolate-doom (PTS) | bullseye | 3.0.1-1 | fixed | 
 | bookworm | 3.0.1+really3.0.0+git1471-1 | fixed | 
 | trixie | 3.1.0-1 | fixed | 
 | forky, sid | 3.1.1-1 | fixed | 
| crispy-doom (PTS) | bullseye | 5.10.0-1 | fixed | 
 | bookworm | 5.12.0-1 | fixed | 
 | trixie | 7.0-1 | fixed | 
 | forky, sid | 7.1-1 | fixed | 
The information below is based on the following data on fixed versions.
Notes
[buster] - crispy-doom <no-dsa> (Minor issue)
[stretch] - chocolate-doom <end-of-life> (games are not supported)
[jessie] - chocolate-doom <end-of-life> (games are not supported)
https://github.com/chocolate-doom/chocolate-doom/issues/1293
https://github.com/chocolate-doom/chocolate-doom/commit/8b6cfbfc6c934923b3c2c16e5e7e5a74d5d238e1
https://github.com/fabiangreffrath/crispy-doom/commit/8b6cfbfc6c934923b3c2c16e5e7e5a74d5d238e1