this post was submitted on 14 Jul 2025
29 points (100.0% liked)

Linux Gaming

20136 readers
18 users here now

Discussions and news about gaming on the GNU/Linux family of operating systems (including the Steam Deck). Potentially a $HOME away from home for disgruntled /r/linux_gaming denizens of the redditarian demesne.

This page can be subscribed to via RSS.

Original /r/linux_gaming pengwing by uoou.

No memes/shitposts/low-effort posts, please.

Resources

WWW:

Discord:

IRC:

Matrix:

Telegram:

founded 2 years ago
MODERATORS
 

I'm feeling a bit nostalgic and wanted to play some of the old COD games, and noticed that remote code execution exploits such as CVE-2018-20817 exist and seem to be unpatched. So I was wondering if this exploit affects or can be mitigated when running through Proton?

As I assume most of these exploits are intended for Windows systems, I'd assume it would be fairly harmless if I could disable mounting the default root filesystem and external drive mounts to the prefix. Digging through winetricks/protontricks I haven't managed to find such an option though.

you are viewing a single comment's thread
view the rest of the comments
[–] freddo@feddit.nu 8 points 6 days ago* (last edited 6 days ago) (1 children)

I'm aware it isn't designed to be a sandbox, I'm just betting that the typical exploiter wouldn't target wine past writing stuff into mounted filesystems. So at most they'd wreck the proton prefix and perhaps spawn a few processes within it.

[–] exu@feditown.com 3 points 6 days ago

Your root disk is usually mounted at Z: so any ransomware could just encrypt that