{"affected":[{"ecosystem_specific":{"binaries":[{"chocolate-doom":"3.0.1-lp151.3.3.1","chocolate-doom-bash-completion":"3.0.1-lp151.3.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.1","name":"chocolate-doom","purl":"pkg:rpm/opensuse/chocolate-doom&distro=openSUSE%20Leap%2015.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.1-lp151.3.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for chocolate-doom to version 3.0.1 fixes the following issues:\n\n- CVE-2020-14983: Fixed a stack-based buffer overflow in the networking code (boo#1173595).\n","id":"openSUSE-SU-2020:0928-1","modified":"2020-07-05T12:16:18Z","published":"2020-07-05T12:16:18Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AYBM53OFXOY7T3DKPPHK7ZW635BUSQES/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173595"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-14983"}],"related":["CVE-2020-14983"],"summary":"Security update for chocolate-doom","upstream":["CVE-2020-14983"]}