{"affected":[{"ecosystem_specific":{"binaries":[{"chocolate-doom":"3.0.1-lp152.4.3.1","chocolate-doom-bash-completion":"3.0.1-lp152.4.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.2","name":"chocolate-doom","purl":"pkg:rpm/opensuse/chocolate-doom&distro=openSUSE%20Leap%2015.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.1-lp152.4.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for chocolate-doom to version 3.0.1 fixes the following issues:\n\n- CVE-2020-14983: Fixed a stack-based buffer overflow in the networking code (boo#1173595).\n","id":"openSUSE-SU-2020:0939-1","modified":"2020-07-06T22:28:50Z","published":"2020-07-06T22:28:50Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY7HT3HHISHNUZ7EKXQIOB6AG53K75CZ/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173595"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-14983"}],"related":["CVE-2020-14983"],"summary":"Security update for chocolate-doom","upstream":["CVE-2020-14983"]}