Source: minetest Version: 5.5.0+dfsg+~1.9.0mt4+dfsg-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for minetest, filling it as grave, but downgrade if you strongly disagree. CVE-2022-35978[0]: | Minetest is a free open-source voxel game engine with easy modding and | game creation. In **single player**, a mod can set a global setting | that controls the Lua script loaded to display the main menu. The | script is then loaded as soon as the game session is exited. The Lua | environment the menu runs in is not sandboxed and can directly | interfere with the user's system. There are currently no known | workarounds. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-35978 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35978 [1] https://github.com/minetest/minetest/security/advisories/GHSA-663q-pcjw-27cc [2] https://github.com/minetest/minetest/commit/da71e86633d0b27cd02d7aac9fdac625d141ca13 Please adjust the affected versions in the BTS as needed. Regards, Salvatore