this post was submitted on 14 Jul 2025
29 points (100.0% liked)

Linux Gaming

20269 readers
241 users here now

Discussions and news about gaming on the GNU/Linux family of operating systems (including the Steam Deck). Potentially a $HOME away from home for disgruntled /r/linux_gaming denizens of the redditarian demesne.

This page can be subscribed to via RSS.

Original /r/linux_gaming pengwing by uoou.

No memes/shitposts/low-effort posts, please.

Resources

WWW:

Discord:

IRC:

Matrix:

Telegram:

founded 2 years ago
MODERATORS
 

I'm feeling a bit nostalgic and wanted to play some of the old COD games, and noticed that remote code execution exploits such as CVE-2018-20817 exist and seem to be unpatched. So I was wondering if this exploit affects or can be mitigated when running through Proton?

As I assume most of these exploits are intended for Windows systems, I'd assume it would be fairly harmless if I could disable mounting the default root filesystem and external drive mounts to the prefix. Digging through winetricks/protontricks I haven't managed to find such an option though.

you are viewing a single comment's thread
view the rest of the comments
[–] priapus@piefed.social 15 points 1 week ago* (last edited 1 week ago)

I would highly advise against it. While its not very likely someone will be targeting systems running the game through Proton, its also not out of the question and malicious code can do serious home even through Wine/Proton.

Most vulnerable COD games have community patches and servers to avoid this. Theres Plutonium for WaW, BO1/2 and MW3, a community patch for BO3, and AlterWare for MW2/3, Ghosts, and Advanced Warfare. I've used Plutonium before with Proton and it worked great, and AlterWare has instructions for running it with Proton.

Besides the security these community launchers/patches have quality of life and performance improvements, they're definitely worth using.