Malware found in the Arch Linux AUR repository
The security investigation shows that shows that a malicious user with the nick name xeactor modified in June 7 an orphaned package (software without an active maintainer) called acroread. The changes included a curl script that downloads and runs a script from a remote site. This installs a persistent software that reconfigures systemd in order to start periodically. While it appears that they are not a serious threat to the security of the infected hosts, the scripts can be manipulated at any time to include arbitrary code. Two other packages were modified in the same manner." This thread in the aur-general list shows the timeline of the discovery and response.
Posted Jul 11, 2018 8:51 UTC (Wed)
by rengolin (guest, #48414)
[Link] (2 responses)
Source: https://lists.archlinux.org/pipermail/aur-general/2018-Ju...
Posted Jul 11, 2018 11:50 UTC (Wed)
by jak90 (subscriber, #123821)
[Link] (1 responses)
Posted Jul 12, 2018 11:50 UTC (Thu)
by feb (guest, #60129)
[Link]
Posted Jul 12, 2018 12:15 UTC (Thu)
by XTerminator (subscriber, #59581)
[Link]
Packages affected
* acrored 9.5.5-8
* balz 1.20-3
* minergate 8.1-2
Packages affected
Likewise, submitting "mistyped" packages would seem like a viable compromise vector as well.
Packages affected
It is not a surprise that a publically accessible repository contains malware. There is no vetting involved in creating an AUR account nor in submitting packages to it. AUR == caveat emptor. Always check what you are getting.
Malware found in the Arch Linux AUR repository