Name | CVE-2020-11722 |
Description | Dungeon Crawl Stone Soup (aka DCSS or crawl) before 0.25 allows remote attackers to execute arbitrary code via Lua bytecode embedded in an uploaded .crawlrc file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 958232 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
crawl (PTS) | jessie | 2:0.15.1-1 | vulnerable |
| stretch | 2:0.19.3-1 | vulnerable |
| buster | 2:0.23.0-1 | vulnerable |
| bullseye | 2:0.26.1-1 | fixed |
| sid, trixie, bookworm | 2:0.28.0-1.1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
crawl | source | wheezy | (unfixed) | end-of-life | | |
crawl | source | (unstable) | 2:0.25.0-1 | | | 958232 |
Notes
[buster] - crawl <no-dsa> (Minor issue)
[stretch] - crawl <no-dsa> (Minor issue)
[jessie] - crawl <no-dsa> (Minor issue)
https://dpmendenhall.blogspot.com/2020/03/dungeon-crawl-stone-soup.html
https://github.com/crawl/crawl/commit/768f60da87a3fa0b5561da5ade9309577c176d04
https://github.com/crawl/crawl/commit/fc522ff6eb1bbb85e3de60c60a45762571e48c28