Malware in the official Cemu downloads (AppImage and the zip file for Ubuntu)
Posted by shroddy@reddit | linux | View on Reddit | 12 comments
From 7.5 until earlier today, the official downloads on the GitHub download page for Cemu were infected by a Malware. The Windows version and Flatpak were not affected.
microry@reddit
r/chaoticgood
ICantBelieveItsNotEC@reddit
Yeah, I'm sure wiping some random Israeli gamer's PC will finally solve a centuries-old conflict!
We did it Reddit!!!
shogun77777777@reddit
I get it, the Israel government is terrible but that doesn’t mean all people living there are bad. Just like not all Americans are MAGA
adamkex@reddit
Same can be said about the Russians
Offbeatalchemy@reddit
I'm honestly disgusted that people in this subreddit thinks wiping random Israeli gamers' machines is a "good thing" and getting upvoted.
abbidabbi@reddit
Unless the author of that post just made an example using Python APIs as the equivalent of a shell command, that Python statement doesn't do shit, because
/*is part of the argument vector for thermexecutable. Globbing patterns are not expanded here like your command-line shell does (by default).samuerusama@reddit
It's true, you can curl the malware from this screenshot and see the script 😹
abbidabbi@reddit
That's why immutable releases should be enabled on GitHub, to prevent release asset modifications after a release was published:
https://docs.github.com/en/code-security/concepts/supply-chain-security/immutable-releases
According to their AppImage build scripts, they are pulling their AppImage build tools from continuous releases from other projects on GitHub without any checks/validations, opening the door wide for further supply chain attacks:
https://github.com/cemu-project/Cemu/blob/v2.6/dist/linux/appimage.sh#L7-L14
The current AppImage release file does include an embedded signature, but it's unclear (to me) which key was used to sign it. Nothing in the build script indicates using their own keys, so this must be something else.
Unfortunately, GitHub has removed old actions workflow runs for the
build.ymlworkflow, so the build logs ofv2.6can't be read, as it's over a year old (not talking about the max log retention time of 90d).CrazyKilla15@reddit
Its why github should not be used for releases period. It is an untrustworthy and unserious corporate entity and its insane the entire open source ecosystem has trusted them with supply chain security.
To quote security expert Filippo Valsorda
tulpyvow@reddit
Wasn't this already posted earlier?
revolutier@reddit
reddit filter removed it
DamonsLinux@reddit
Not affected also packages in distro repositories: OpenMandriva, Arch and Solus.