Installer Steam
log på
|
sprog
简体中文 (forenklet kinesisk)
繁體中文 (traditionelt kinesisk)
日本語 (japansk)
한국어 (koreansk)
ไทย (thai)
Български (bulgarsk)
Čeština (tjekkisk)
Deutsch (tysk)
English (engelsk)
Español – España (spansk – Spanien)
Español – Latinoamérica (spansk – Latinamerika)
Ελληνικά (græsk)
Français (fransk)
Italiano (italiensk)
Bahasa indonesia (indonesisk)
Magyar (ungarsk)
Nederlands (hollandsk)
Norsk
Polski (polsk)
Português (portugisisk – Portugal)
Português – Brasil (portugisisk – Brasilien)
Română (rumænsk)
Русский (russisk)
Suomi (finsk)
Svenska (svensk)
Türkçe (tyrkisk)
Tiếng Việt (Vietnamesisk)
Українська (ukrainsk)
Rapporter et oversættelsesproblem
Unity devs have already updated their code to eliminate the vulnerability. Now the game devs have to either rebuild their games with the new code or swap out a DLL file. They will then have to publish that newly built game to Steam which will then build patches to the users to update their games. Big dev houses like Microsoft's have already been doing this.
In the meantime, if you run them with Steam, Steam will warn you if it's being launched with the susceptible command line arguments and give you the option to ignore the warning or stop the game.
So it's up to you if don't think enough is being done to protect you. Your unity games are only vulnerable if certain command line arguments are used. Otherwise, they are safe. And Steam is intervening where necessary to protect you.
It's on the last steam update :
Added mitigations for Unity CVE-2025-59489, blocking a game launch through the Steam Client when an exploit attempt is detected.