The games that have been temporarily taken down are:

  • Grounded 2 Founders Edition
  • Grounded 2 Founders Pack
  • Avowed Premium Edition
  • Avowed Premium Edition Upgrade
  • Pillars of Eternity: Hero Edition
  • Pillars of Eternity: Definitive Edition
  • Pillars of Eternity II: Deadfire
  • Pillars of Eternity II: Deadfire Ultimate
  • Pentiment
  • Quetzalcutlass@lemmy.world
    link
    fedilink
    English
    arrow-up
    63
    arrow-down
    1
    ·
    edit-2
    2 days ago

    This feels unnecessary and overblown. From what I’ve heard, the exploit in question requires a local file and only operates at the privilege level of the game itself, so you’re unlikely to encounter it unless you’re adding files to your game install.

    So you’re vulnerable if you install malicious mods, in other words. Which, consisting Unity mods are done via DLL injection, is already the case even without this exploit.

    • krooklochurm@lemmy.ca
      link
      fedilink
      English
      arrow-up
      22
      ·
      2 days ago

      How many unity games have kernel level anti cheat as a requirement and can this exploit leverage that?

      • sp3ctr4l@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        11
        ·
        2 days ago

        Oh probably at least some of them, though shouldn’t be a problem, after all, the rootkit kernel level anti cheat is within the game directory and its standard privelege/permission model, and is only there for your safety.

        =D =D =D

    • Scratch@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      25
      arrow-down
      1
      ·
      2 days ago

      Yeah, but if they didn’t do anything then they’d get roasted and maybe sued for negligence.

      • sp3ctr4l@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        13
        ·
        edit-2
        2 days ago

        Exactly.

        Unity literally issued a statement that every game that is affected by this should be patched with the fix ASAP… and this is people doing that.

        Not like anyone ever runs a game with admin priveleges or anything, right?

        Not like malware from some other source often exploits weird little shit like this that just nobody ever noticed before and thats why that malware stays hidden, right?

        https://unity.com/security/sept-2025-01

        “No evidence of exploitation” is not the same thing as “we are 100% sure no one has ever been harmed by/via this”.

        https://cwe.mitre.org/data/definitions/426.html

        Description

        The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product’s direct control.

        Extended Description

        This might allow attackers to execute their own programs, access unauthorized data files, or modify configuration in unexpected ways. If the product uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted product would then execute. The problem extends to any type of critical resource that the product trusts.

        Some of the most common variants of untrusted search path are:

        In various UNIX and Linux-based systems, the PATH environment variable may be consulted to locate executable programs, and LD_PRELOAD may be used to locate a separate library.

        In various Microsoft-based systems, the PATH environment variable is consulted to locate a DLL, if the DLL is not found in other paths that appear earlier in the search order.

        Yeah sounds fairly serious to me, its an 8.4 out of 10 on the severity scale for a reason.

        • ILikeBoobies@lemmy.ca
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          2
          ·
          edit-2
          2 days ago

          Not like anyone ever runs a game with admin priveleges or anything, right?

          I would hope no one runs userspace software with elevated privileges.

          • Venator@lemmy.nz
            link
            fedilink
            English
            arrow-up
            6
            arrow-down
            1
            ·
            edit-2
            1 day ago

            on windows its pretty much required by most software every time it does an update…

            on linux people login as root all the time because they’re too lazy to sudo… or because they messed up file permissions somewhere once…

  • RightHandOfIkaros@lemmy.world
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    2
    ·
    edit-2
    2 days ago

    I dont expect this to last very long, considering how easy and fast it is to apply the patch. Completely delisting the games feels a little bit excessive.

    Also, some of these games aren’t even effected by this, such as Avowed being an Unreal 5 game and Grounded being an Unreal 4 game. The only two games effected by this are Pillars of Eternity (depending on which version of Unity they used to create the current build, seeing as build 1.0 most certainly used an uneffected Unity version from 2015), PoE II, and Pentiment.

    • zerofk@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 day ago

      From what I heard, they delisted only the premium editions of Avowed because some part of those use Unity. It looks like the same is true for the other games. Even for Pillars they only delisted the definitive edition.