The patch rolled out to LMDE yesterday (kernel v6.12.85), so I assume the number of affected systems has to be well on the wane by now.
(In that Debian is often well behind the cutting edge and Mint/LMDE is often a step or two behind that. Things are quicker than usual when there’s a showstopper kernel bug, but the lag factor is still there.)
Copy Fail requires only an unprivileged local user account — no network access, no kernel debugging features, no pre-installed primitives
Which is a fairly high hurdle for an attacker in most instances. Unless you’re running something like a shared university server.
Definitely patch your systems though.
Which is a fairly high hurdle for an attacker in most instances.
With software projects training people that
curl <link to their install script> | bashis totally fine and the insane amount of supply chain attacks lately it’s a critical bug that’s just begging to be exploited on single user systems.So yes, patch your systems and definitely do not downplay this.
With software projects training people that curl <link to their install script> | bash is totally fine and the insane amount of supply chain attacks lately it’s a critical bug that’s just begging to be exploited on single user systems.
I wish the worst case of gout on people who do this. I can’t believe it’s become such an accepted way of installing software.
I have a vague memory of some project that did this ages ago where you could see the script on their web page but when you ran the command it executed a different script (there was a single-character difference in the URL) and the result was it told you not to be so dumb as to run scripts like that.
It was idontplaydarts.com (search it up on Internet Archive). It could detect if you were downloading it directly, or piping it to bash, abd change the script it was delivering accordingly.
Think of the millions of systems running containers.
What about them?
I found the website you linked to be easy to digest. Impressed with their work, from the perspective of someone who uses Linux but doesn’t know too much about this stuff (other than patch good). I like how they gave credit to both the human and AI.
I wish they’d bothered with a coordinated vulnerability disclosure…



