• Aganim@lemmy.world
    link
    fedilink
    arrow-up
    15
    ·
    18 days ago

    Which is a fairly high hurdle for an attacker in most instances.

    With software projects training people that curl <link to their install script> | bash is totally fine and the insane amount of supply chain attacks lately it’s a critical bug that’s just begging to be exploited on single user systems.

    So yes, patch your systems and definitely do not downplay this.

    • atzanteol@sh.itjust.works
      link
      fedilink
      arrow-up
      6
      ·
      18 days ago

      With software projects training people that curl <link to their install script> | bash is totally fine and the insane amount of supply chain attacks lately it’s a critical bug that’s just begging to be exploited on single user systems.

      I wish the worst case of gout on people who do this. I can’t believe it’s become such an accepted way of installing software.

      • moopet@sh.itjust.works
        link
        fedilink
        arrow-up
        8
        ·
        17 days ago

        I have a vague memory of some project that did this ages ago where you could see the script on their web page but when you ran the command it executed a different script (there was a single-character difference in the URL) and the result was it told you not to be so dumb as to run scripts like that.