• atzanteol@sh.itjust.works
    link
    fedilink
    arrow-up
    4
    ·
    2 days ago

    Copy Fail requires only an unprivileged local user account — no network access, no kernel debugging features, no pre-installed primitives

    Which is a fairly high hurdle for an attacker in most instances. Unless you’re running something like a shared university server.

    Definitely patch your systems though.

    • Aganim@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      2 days ago

      Which is a fairly high hurdle for an attacker in most instances.

      With software projects training people that curl <link to their install script> | bash is totally fine and the insane amount of supply chain attacks lately it’s a critical bug that’s just begging to be exploited on single user systems.

      So yes, patch your systems and definitely do not downplay this.

      • atzanteol@sh.itjust.works
        link
        fedilink
        arrow-up
        1
        ·
        2 days ago

        With software projects training people that curl <link to their install script> | bash is totally fine and the insane amount of supply chain attacks lately it’s a critical bug that’s just begging to be exploited on single user systems.

        I wish the worst case of gout on people who do this. I can’t believe it’s become such an accepted way of installing software.

        • moopet@sh.itjust.works
          link
          fedilink
          arrow-up
          0
          ·
          1 day ago

          I have a vague memory of some project that did this ages ago where you could see the script on their web page but when you ran the command it executed a different script (there was a single-character difference in the URL) and the result was it told you not to be so dumb as to run scripts like that.