this post was submitted on 18 Jul 2025
337 points (99.7% liked)

Linux

56529 readers
439 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 6 years ago
MODERATORS
 

On the 16th of July, at around 8pm UTC+2, a malicious AUR package was uploaded to the AUR. Two other malicious packages were uploaded by the same user a few hours later. These packages were installing a script coming from the same GitHub repository that was identified as a Remote Access Trojan (RAT).

The affected malicious packages are:

  • librewolf-fix-bin
  • firefox-patch-bin
  • zen-browser-patched-bin

The Arch Linux team addressed the issue as soon as they became aware of the situation. As of today, 18th of July, at around 6pm UTC+2, the offending packages have been deleted from the AUR.

We strongly encourage users that may have installed one of these packages to remove them from their system and to take the necessary measures in order to ensure they were not compromised.

Follow up

There are more packages with this malware found.

  • minecraft-cracked
  • ttf-ms-fonts-all
  • vesktop-bin-patched
  • ttf-all-ms-fonts

What to do

If you installed any of these packages, check your running processes for one named systemd-initd (this is the RAT).

The suspicious packages have a patch from this now-inaccessible Codeberg repo: https://codeberg.org/arch_lover3/browser-patch

The Arch maintainers have been informed of all this already and are investigating.

top 50 comments
sorted by: hot top controversial new old
[–] redxef@feddit.org 9 points 1 day ago

To check your system for those packages (assuming you are using bash):

comm -1 -2 <(pacman -Q | awk '{print $1}' | sort) <(sort vulnerable_packages.txt)

With vulnerable_packages.txt containing one package name per line.

[–] Tundra@sh.itjust.works 136 points 2 days ago (8 children)

this is going to increase in frequency as linux gains popularity

[–] DirkMcCallahan@lemmy.world 34 points 2 days ago (4 children)

This is why I felt uncomfortable when I first switched to Linux and kept reading that I didn't need to worry about viruses as long as I didn't click on dodgy links and only installed from trusted sources. I'm sure I'm betraying my lack of security knowledge here, but that always seemed a bit too easy.

[–] mark@social.cool110.xyz 116 points 2 days ago (9 children)

@DirkMcCallahan @Tundra The AUR isn't a trusted source, but most of the the Arch cult forget to mention that.

[–] copygirl@lemmy.blahaj.zone 106 points 2 days ago* (last edited 2 days ago) (2 children)

most of the the Arch cult forget to mention that

The "Arch cult's" holy book, the ArchWiki, states the following pretty clearly:

Warning: AUR packages are user-produced content. These PKGBUILDs are completely unofficial and have not been thoroughly vetted. Any use of the provided files is at your own risk.

Mention of one's use of the AUR for their needs doesn't need to come with a disclaimer.
People who don't read or don't use their brain are going to keep not doing so, regardless.

[–] tehn00bi@lemmy.world 25 points 2 days ago (1 children)

Arch is not responsible for idiots.

[–] irotsoma@lemmy.blahaj.zone 2 points 1 day ago

Arch is not recommended for idiots either. If you want cutting edge, you accept the risks. Works that way with all tech.

load more comments (1 replies)
[–] caseyweederman@lemmy.ca 16 points 2 days ago (5 children)

Half the posts on the Internet are people replying to requests for help with the message "read the wiki, the aur isn't a trusted source, dummy"

load more comments (5 replies)
[–] teawrecks@sopuli.xyz 3 points 1 day ago

You can't even install from AUR using pacman directly. You either need to makepkg them manually, or use an extra AUR compatible package manager like yay. It's made as clear as possible to arch users that the AUR is not vetted in any way, it's just for convenience.

load more comments (6 replies)
[–] Fecundpossum@lemmy.world 50 points 2 days ago (1 children)

The AUR, key words “user repository” is a specific weak point. It doesn’t have the same level of oversight that the main arch repo has. Stick to main repos and verified flatpaks and it’s very unlikely that you’d ever be compromised.

Linux isn’t perfect, but it’s certainly better than windows where you just download executables willy nilly to install your software.

load more comments (1 replies)
[–] Nibodhika@lemmy.world 18 points 2 days ago (1 children)

That is sound advice, the AUR is most definitely not a trusted source though. For the normal arch repos the people who put the stuff there are known, they work for the project, you're as likely to get malware from one of those as you are to read an article bashing gamespot in gamespot, the people in charge of putting the packages there are the ones with more vested interest in things working so they won't knowingly introduce malicious code (plus it's a handful of people who know each other by first name).

The AUR is a different story, because anyone can put stuff there it's very easy to have malicious code end up there. It doesn't happen that often because most of the time it's fairly obvious and it gets flagged straight away, plus if people start doing that people will migrate away from the AUR, so it's a high risk low reward situation. But as more and more people start to use Arch derivatives that come with the AUR enabled without understanding any of this it becomes a more rewarding thing to exploit.

[–] Dudewitbow@lemmy.zip 10 points 2 days ago (2 children)

like git repositories, AUR in its name itself says what it is, a User repository. its trust like repositories is fully based on how much you trust the user who uploaded it

load more comments (2 replies)
load more comments (1 replies)
load more comments (7 replies)
[–] Jolteon@lemmy.zip 44 points 2 days ago* (last edited 2 days ago) (1 children)

To be fair the AUR is known to be very susceptible to that kind of thing due to the effective absence of entry requirements.

[–] MentalEdge@sopuli.xyz 27 points 2 days ago (1 children)

Absolutely.

The Arch User Repository is a way for anyone to easily distribite software.

Hence it has never been secure, and rather than claim it is, you mostly see people and documentation warn you about this, and to be careful if using it.

Any schmuck can make whatever they want available via the AUR. That's how even the tiniest niche project can often be installed via the AUR. But you trade in some security for that convenience.

[–] derpgon@programming.dev 26 points 2 days ago (1 children)

It shouldn't be used as a marketplace, it should be used as a repository. You can probably find a lot of malware on GitHub, doesn't mean you go there to choose your text editor.

I never search the AUR directly, I only use it if some README tells me I can install their software via an AUR package.

[–] Dima@feddit.uk 13 points 2 days ago

Yeah, I search the AUR not to discover packages, but to see if something I want to install is in there, if it is I check the PKGBUILD and make sure none of the sources/commands/patches are suspicious.
People need to remember it's not some carefully vetted app store and that they need to be the ones vetting any packages they install and any changes when updating.

[–] muusemuuse@sh.itjust.works 30 points 2 days ago (1 children)

We are getting to the point where inviting more people in means we will need an automated babysitter to watch for this shit and to pull it once it’s discovered. Apple has a walled garden approach that’s certainly taken a big chunk of malware threats out of their devices but their walled garden approach is ridiculous and impractical for Linux. The Microsoft method of monitoring and second guessing everything with antimalware programs is also suspect because it is super easy to abuse and resource intensive. We have clamAV but clam kinda sucks.

Linux is at the point where we need something that audits what’s going in and automatically yanks it back out remotely if it’s found to be a problem. Things can only be added by the user, but the bot can remove them without interaction of the user.

I don’t see this happening though. Instead, I see this as more of a rust vs C thing all over again, where valid critiques are drowned out by “improve your skills bro.”

[–] mazzilius_marsti@lemmy.world 6 points 1 day ago

Heard OpenSuse has OpenQA - apparently it is like an automatic test tool for packages.

[–] HaraldvonBlauzahn@feddit.org 33 points 2 days ago* (last edited 2 days ago)

The affected malicious packages are:

  • librewolf-fix-bin
  • firefox-patch-bin
  • zen-browser-patched-bin

What a nice attack on privacy-friendly infrastructure.

And then, Arch AUR has such suspicious things like the Brave browser which claims to reduce tracking.... and works together with advertisers.

To be clear, AUR is fantastic if you develop some experimental package and you want to give it to your friends to try it out easily. But not as a general distribution mechanism.

[–] mazzilius_marsti@lemmy.world 7 points 1 day ago (1 children)

the firefox, zen browser and libre wolf packages are concerning. The ttf ms font too. Those are very normal apps and unless you pay attention to the package name when doing "pacman -Syu", you would fall for the malware.

If only we can compartmentalize all AUR packages. The download AUR sources iirc are already in something like $HOME/.paru. Installing is a different story, because these packages can put their executable all over the places: /usr/local/bin, $HOME/local/bin.

[–] Cyber@feddit.uk 6 points 1 day ago

With respect, you wouldn't install these by just doing an update, so pacman -Syu is fine.

You would have needed to install these manually, or a package that depended on them - both from AUR - so you'd also need to use yay (etc) to install them.

But - I totally agree with your points that tge names look innocent enough for someone to install those over other packages.

Always look at the AUR (website) at the package details - if it's new(ish) and has 0 or 1 votes, then be suspicious.

[–] hobbsc@lemmy.sdf.org 43 points 2 days ago (1 children)
[–] lagoon8622@sh.itjust.works 16 points 2 days ago (2 children)

This is technically not Arch's fault btw. I use Arch but don't use AUR for this reason

[–] daggermoon@lemmy.world 16 points 2 days ago (1 children)

Also same problem adding random PPA's on Debian and Ubuntu.

[–] lagoon8622@sh.itjust.works 18 points 2 days ago

Agreed. Or piping random curl things into sh. Or downloading random exes on Windows etc

[–] hobbsc@lemmy.sdf.org 5 points 2 days ago (2 children)

it was a joke. perhaps a /s was warranted. it could happen in any package manager/repo and I'd be surprised if it hasn't yet.

[–] balsoft@lemmy.ml 1 points 20 hours ago

It has already happened a few times with other repos. Although AUR is especially susceptible because there's no vetting at all, it's a free-for-all that everyone can publish to within a few clicks. This will for sure happen again within a couple months, but better hidden the next time.

[–] lagoon8622@sh.itjust.works 5 points 2 days ago

Oh definitely, I wasn't trying to correct you or anything. Just having conversation

[–] teawrecks@sopuli.xyz 5 points 1 day ago

Why are they called "patched" and "fix" and who is installing them?

[–] AceFuzzLord@lemmy.zip 9 points 2 days ago (1 children)

minecraft-cracked

Gotta assume that if any Arch users actually fell for that one, that they either let their kids use their device or they're generally not smart ( which absolutely goes against my stereotypical view of an arch user ).

[–] pfr@lemmy.sdf.org 9 points 2 days ago (1 children)

The stereotype of arch uses generally being smart is no longer. The "I use arch btw" meme brought a whole new user base to arch. You'll find them on r/unixporn showing off their hyperland rice that they copied from some other user..

[–] moseschrute@lemmy.ml 9 points 2 days ago* (last edited 2 days ago) (1 children)

I had no idea that existed but I’ve just returned from r/unixporn. There are some sick setups. Also we all copy. My entire neovim config is copied and modified from a couple dozen setups I admired. Nothing wrong with copying things you like. Don’t gate keep Linux.

However… Minecraft cracked is pretty funny lol.

[–] lattrommi@lemmy.ml 3 points 1 day ago (1 children)

I agree that gatekeeping is no good and people should not do that.

However...

we all copy

I do not feel that assuming all people copy, should be done either, in my opinion.

[–] pfr@lemmy.sdf.org 2 points 1 day ago (1 children)

I never said there was anything wrong with copying. I was simply pointing out a stereotype.

[–] lattrommi@lemmy.ml 2 points 1 day ago

I don't know if there is a word for what I was trying to point out.

Like an opposite to gatekeeping, sort of.

I do not like when people use 'we', in ways that include people that it does not apply to. Lumping everyone together inaccurately into a group.

[–] HaraldvonBlauzahn@feddit.org 11 points 2 days ago (6 children)

Wait what happens once some government or state actor hacks rust's install script rustup with its curl | bash install procedure and relying on TLS certificates which are e.g. issued by the Russian government. (No, the rust project won't use a Russian/Chinese/US Gov certificate but your browser will trust near all of them...)

load more comments (6 replies)
[–] oo1@lemmings.world 6 points 2 days ago

I already assumed aur was riddled with stuff like that.

Use a condom when fucking around in there.

[–] Mwa@thelemmy.club 11 points 2 days ago (2 children)

I kinda watch the Arch devs packaged more stuff rather then relying on thr aur,Chaotic-aur (third party repo) solves mostly.

[–] voytrekk@sopuli.xyz 21 points 2 days ago (4 children)

The arch maintainers package more software than most other distributions. Some items they leave in the AUR by choice, if the Dev prefers it there. The key is to use the AUR sparingly and only if you trust the packager.

load more comments (4 replies)
load more comments (1 replies)
load more comments
view more: next ›