Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 865401 (CVE-2022-35978)

Summary: <games-action/minetest-5.6.0: unsandboxed code execution by mods in menu
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Severity: trivial CC: games, marecki
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: ~2 [noglsa]
Package list:
Runtime testing required: ---

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-16 17:18:21 UTC

Minetest is a free open-source voxel game engine with easy modding and game creation. In **single player**, a mod can set a global setting that controls the Lua script loaded to display the main menu. The script is then loaded as soon as the game session is exited. The Lua environment the menu runs in is not sandboxed and can directly interfere with the user's system. There are currently no known workarounds.

Fixed in 5.6.0, please cleanup
Comment 1 Larry the Git Cow gentoo-dev 2022-08-16 18:06:01 UTC
The bug has been referenced in the following commit(s):

commit 61f18f0ba8608ba7fe49666415a37f5041e87a8f
Author:     Marek Szuba <>
AuthorDate: 2022-08-16 18:04:49 +0000
Commit:     Marek Szuba <>
CommitDate: 2022-08-16 18:05:53 +0000

    games-action/minetest: drop 5.5.1
    That's the last version vulnerable to CVE-2022-35978 gone.
    Signed-off-by: Marek Szuba <>

 games-action/minetest/Manifest              |   1 -
 games-action/minetest/minetest-5.5.1.ebuild | 142 ----------------------------
 2 files changed, 143 deletions(-)
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-17 16:05:17 UTC
Thanks! Tree is clean, all done