this post was submitted on 14 Jul 2025
29 points (100.0% liked)

Linux Gaming

20181 readers
457 users here now

Discussions and news about gaming on the GNU/Linux family of operating systems (including the Steam Deck). Potentially a $HOME away from home for disgruntled /r/linux_gaming denizens of the redditarian demesne.

This page can be subscribed to via RSS.

Original /r/linux_gaming pengwing by uoou.

No memes/shitposts/low-effort posts, please.

Resources

WWW:

Discord:

IRC:

Matrix:

Telegram:

founded 2 years ago
MODERATORS
 

I'm feeling a bit nostalgic and wanted to play some of the old COD games, and noticed that remote code execution exploits such as CVE-2018-20817 exist and seem to be unpatched. So I was wondering if this exploit affects or can be mitigated when running through Proton?

As I assume most of these exploits are intended for Windows systems, I'd assume it would be fairly harmless if I could disable mounting the default root filesystem and external drive mounts to the prefix. Digging through winetricks/protontricks I haven't managed to find such an option though.

you are viewing a single comment's thread
view the rest of the comments
[–] exu@feditown.com 3 points 1 week ago

Your root disk is usually mounted at Z: so any ransomware could just encrypt that