CVE-2020-14983

NameCVE-2020-14983
DescriptionThe server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh
Debian Bugs964564

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
chocolate-doom (PTS)stretch2.3.0-3vulnerable
buster3.0.0-4vulnerable
bullseye, sid3.0.1-1fixed
crispy-doom (PTS)buster5.4-3vulnerable
bullseye, sid5.8.0-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
chocolate-doomsourcejessie(unfixed)end-of-life
chocolate-doomsource(unstable)3.0.1-1
crispy-doomsource(unstable)(unfixed)964564

Notes

[buster] - crispy-doom <no-dsa> (Minor issue)
[buster] - chocolate-doom <no-dsa> (Minor issue)
[stretch] - chocolate-doom <no-dsa> (Minor issue)
[jessie] - chocolate-doom <end-of-life> (games are not supported)
https://github.com/chocolate-doom/chocolate-doom/issues/1293
https://github.com/chocolate-doom/chocolate-doom/commit/8b6cfbfc6c934923b3c2c16e5e7e5a74d5d238e1
https://github.com/fabiangreffrath/crispy-doom/commit/8b6cfbfc6c934923b3c2c16e5e7e5a74d5d238e1

Search for package or bug name: Reporting problems