Name | CVE-2020-14983 |
Description | The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 964564 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
chocolate-doom (PTS) | bullseye | 3.0.1-1 | fixed |
| bookworm | 3.0.1+really3.0.0+git1471-1 | fixed |
| sid, trixie | 3.1.0-1 | fixed |
crispy-doom (PTS) | bullseye | 5.10.0-1 | fixed |
| bookworm | 5.12.0-1 | fixed |
| sid, trixie | 7.0-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[buster] - crispy-doom <no-dsa> (Minor issue)
[stretch] - chocolate-doom <end-of-life> (games are not supported)
[jessie] - chocolate-doom <end-of-life> (games are not supported)
https://github.com/chocolate-doom/chocolate-doom/issues/1293
https://github.com/chocolate-doom/chocolate-doom/commit/8b6cfbfc6c934923b3c2c16e5e7e5a74d5d238e1
https://github.com/fabiangreffrath/crispy-doom/commit/8b6cfbfc6c934923b3c2c16e5e7e5a74d5d238e1