Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: luanti

Found 3 matching suggestions

View:
Compact
Detailed
Untriaged
created 5 days, 19 hours ago Activity log
  • Created suggestion
Luanti has a mod security sandbox escape

Luanti (formerly Minetest) is an open source voxel game-creation platform. Starting in version 5.0.0 and prior to version 5.15.2, a malicious mod can trivially escape the sandboxed Lua environment to execute arbitrary code and gain full filesystem access on the user's device. This applies to the server-side mod, async and mapgen as well as the client-side (CSM) environments. This vulnerability is only exploitable when using LuaJIT. Version 5.15.2 contains a patch. On release versions, one can also patch this issue without recompiling by editing `builtin/init.lua` and adding the line `getfenv = nil` at the end. Note that this will break mods relying on this function (which is not inherently unsafe).

Affected products

luanti
  • ==>= 5.0.0, < 5.15.2

Matching in nixpkgs

Package maintainers

Published
Permalink CVE-2026-40959
9.3 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 week, 5 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 packages
    • luanti-client
    • luanti-server
  • @LeSuisse ignored
    3 maintainers
    • @06kellyjac
    • @fpletz
    • @fgaz
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Luanti 5 before 5.15.2, when LuaJIT is used, allows a …

Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a crafted mod.

Affected products

Luanti
  • <5.15.2

Matching in nixpkgs

Ignored packages (2)

Package maintainers

Ignored maintainers (3)
Published
Permalink CVE-2026-40960
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 week, 5 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 packages
    • luanti-client
    • luanti-server
  • @LeSuisse ignored
    3 maintainers
    • @fpletz
    • @fgaz
    • @06kellyjac
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Luanti 5 before 5.15.2 sometimes allows unintended access to an …

Luanti 5 before 5.15.2 sometimes allows unintended access to an insecure environment. If at least one mod is listed as secure.trusted_mods or secure.http_mods, then a crafted mod can intercept the request for the insecure environment or HTTP API, and also receive access to it.

Affected products

Luanti
  • <5.15.2

Matching in nixpkgs

Ignored packages (2)

Package maintainers

Ignored maintainers (3)