The games that have been temporarily taken down are:

  • Grounded 2 Founders Edition
  • Grounded 2 Founders Pack
  • Avowed Premium Edition
  • Avowed Premium Edition Upgrade
  • Pillars of Eternity: Hero Edition
  • Pillars of Eternity: Definitive Edition
  • Pillars of Eternity II: Deadfire
  • Pillars of Eternity II: Deadfire Ultimate
  • Pentiment
  • Quetzalcutlass@lemmy.world
    link
    fedilink
    English
    arrow-up
    39
    arrow-down
    1
    ·
    edit-2
    12 hours ago

    This feels unnecessary and overblown. From what I’ve heard, the exploit in question requires a local file and only operates at the privilege level of the game itself, so you’re unlikely to encounter it unless you’re adding files to your game install.

    So you’re vulnerable if you install malicious mods, in other words. Which, consisting Unity mods are done via DLL injection, is already the case even without this exploit.

    • krooklochurm@lemmy.ca
      link
      fedilink
      English
      arrow-up
      9
      ·
      9 hours ago

      How many unity games have kernel level anti cheat as a requirement and can this exploit leverage that?

      • sp3ctr4l@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        2
        ·
        6 hours ago

        Oh probably at least some of them, though shouldn’t be a problem, after all, the rootkit kernel level anti cheat is within the game directory and its standard privelege/permission model, and is only there for your safety.

        =D =D =D

    • Scratch@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      1
      ·
      11 hours ago

      Yeah, but if they didn’t do anything then they’d get roasted and maybe sued for negligence.

      • sp3ctr4l@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        9 hours ago

        Exactly.

        Unity literally issued a statement that every game that is affected by this should be patched with the fix ASAP… and this is people doing that.

        Not like anyone ever runs a game with admin priveleges or anything, right?

        Not like malware from some other source often exploits weird little shit like this that just nobody ever noticed before and thats why that malware stays hidden, right?

        https://unity.com/security/sept-2025-01

        “No evidence of exploitation” is not the same thing as “we are 100% sure no one has ever been harmed by/via this”.

        https://cwe.mitre.org/data/definitions/426.html

        Description

        The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product’s direct control.

        Extended Description

        This might allow attackers to execute their own programs, access unauthorized data files, or modify configuration in unexpected ways. If the product uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted product would then execute. The problem extends to any type of critical resource that the product trusts.

        Some of the most common variants of untrusted search path are:

        In various UNIX and Linux-based systems, the PATH environment variable may be consulted to locate executable programs, and LD_PRELOAD may be used to locate a separate library.

        In various Microsoft-based systems, the PATH environment variable is consulted to locate a DLL, if the DLL is not found in other paths that appear earlier in the search order.

        Yeah sounds fairly serious to me, its an 8.4 out of 10 on the severity scale for a reason.

        • ILikeBoobies@lemmy.ca
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          edit-2
          9 hours ago

          Not like anyone ever runs a game with admin priveleges or anything, right?

          I would hope no one runs userspace software with elevated privileges.