I’m feeling a bit nostalgic and wanted to play some of the old COD games, and noticed that remote code execution exploits such as CVE-2018-20817 exist and seem to be unpatched. So I was wondering if this exploit affects or can be mitigated when running through Proton?

As I assume most of these exploits are intended for Windows systems, I’d assume it would be fairly harmless if I could disable mounting the default root filesystem and external drive mounts to the prefix. Digging through winetricks/protontricks I haven’t managed to find such an option though.

  • priapus@piefed.social
    link
    fedilink
    English
    arrow-up
    14
    ·
    edit-2
    1 day ago

    I would highly advise against it. While its not very likely someone will be targeting systems running the game through Proton, its also not out of the question and malicious code can do serious home even through Wine/Proton.

    Most vulnerable COD games have community patches and servers to avoid this. Theres Plutonium for WaW, BO1/2 and MW3, a community patch for BO3, and AlterWare for MW2/3, Ghosts, and Advanced Warfare. I’ve used Plutonium before with Proton and it worked great, and AlterWare has instructions for running it with Proton.

    Besides the security these community launchers/patches have quality of life and performance improvements, they’re definitely worth using.