发现了一个安全漏洞,影响了基于Unity 2017.1及更高版本构建的游戏。

1作者: sen大约 1 个月前原帖
我刚收到的邮件。主题/标题已缩短以适应格式。 --- 重要消息 发现了一项安全漏洞,影响基于Unity 2017.1及更高版本构建的Android、Windows、Linux和macOS操作系统上的游戏和应用程序。目前没有证据表明该漏洞被利用,也没有对用户或客户造成任何影响。我们已经主动提供了修复方案,解决了该漏洞,并且这些修复已向所有开发者开放。该漏洞由安全研究员RyotaK负责任地报告,我们感谢他与我们的合作。 关键事实: 目前没有证据表明该漏洞被利用,也没有对用户或客户造成任何影响。 Unity与我们的平台合作伙伴紧密合作,他们已采取进一步措施来保护其平台并保障最终用户的安全。 使用Unity 2017.1或更高版本在Windows、Android、macOS或Linux上发布的游戏或应用程序可能存在此漏洞。 Unity已为从Unity 2019.1开始的每个主要和次要版本的Unity编辑器发布了更新。 Unity已发布了一个二进制补丁程序,以修补自2017.1以来构建的应用程序。 您应该采取什么行动? 如果您使用Unity 2017.1或更高版本为Windows、Android或macOS开发并发布了游戏或应用程序,您需要采取行动。务必查看以下指导,以确保用户的持续安全。
查看原文
Email I just received. Subject&#x2F;title above shortened to fit.<p>- - -<p>An important message<p>A security vulnerability was identified that affects games and applications built on Unity versions 2017.1 and later for Android, Windows, Linux, and macOS operating systems. There is no evidence of any exploitation of the vulnerability, nor has there been any impact on users or customers. We have proactively provided fixes that address the vulnerability, and they are already available to all developers. The vulnerability was responsibly reported by the security researcher RyotaK, and we thank him for working with us.<p>Key Facts:<p>There is no evidence of any exploitation of the vulnerability nor has there been any impact on users or customers.<p>Unity has worked in close collaboration with our platform partners who have taken further steps to secure their platforms and protect end users. Released games or applications using Unity 2017.1 or later for Windows, Android, macOS, or Linux may contain this vulnerability.<p>Unity has released an update for each of the major and minor versions of the Unity Editor starting with Unity 2019.1.<p>Unity has released a binary patcher to patch already-built applications dating back to 2017.1.<p>What Actions Should You Take?<p>You need to take action if you have developed and released a game or application using Unity 2017.1 or later for Windows, Android, or macOS. It is imperative that you review the following guidance to ensure the continued safety of your users.