CVE-2020-14983

NameCVE-2020-14983
DescriptionThe server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs964564

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
chocolate-doom (PTS)buster3.0.0-4+deb10u1fixed
bullseye3.0.1-1fixed
bookworm3.0.1+really3.0.0+git1471-1fixed
sid, trixie3.0.1+really3.0.0+git1548-1fixed
crispy-doom (PTS)buster5.4-3vulnerable
bullseye5.10.0-1fixed
bookworm5.12.0-1fixed
sid, trixie6.0-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
chocolate-doomsourcejessie(unfixed)end-of-life
chocolate-doomsourcestretch(unfixed)end-of-life
chocolate-doomsourcebuster3.0.0-4+deb10u1
chocolate-doomsource(unstable)3.0.1-1
crispy-doomsource(unstable)5.9.0-1964564

Notes

[buster] - crispy-doom <no-dsa> (Minor issue)
[stretch] - chocolate-doom <end-of-life> (games are not supported)
[jessie] - chocolate-doom <end-of-life> (games are not supported)
https://github.com/chocolate-doom/chocolate-doom/issues/1293
https://github.com/chocolate-doom/chocolate-doom/commit/8b6cfbfc6c934923b3c2c16e5e7e5a74d5d238e1
https://github.com/fabiangreffrath/crispy-doom/commit/8b6cfbfc6c934923b3c2c16e5e7e5a74d5d238e1

Search for package or bug name: Reporting problems