Maybe you shouldn't install new software for a bit

Kernel LPEs, disclosure, and immediate risk

  • Thread revolves around recent Linux local-privilege-escalation bugs (Copy Fail / Dirty Frag / variants).
  • Confusion over disclosure: some think embargo was broken; links show third parties derived exploits from public patches.
  • Debate on responsible disclosure: seen as a “gentleman’s agreement” under strain from low bounties and AI‑generated low‑quality reports.
  • Several note that if fixes are public, LLMs can help reverse patches and generate exploits faster.

“Don’t install new software” and supply-chain attacks

  • OP’s advice is read as: short, one‑time moratorium on installing new software while kernel vulns are unpatched, especially via npm.
  • Rationale: a compromised npm package could chain the LPE to get root on many systems (dev machines, CI, servers).
  • Some call this FUD or “attacker logic” (“don’t update your systems”), arguing unpatched old software is a bigger risk.
  • Others think the advice is narrowly reasonable for this particular week, not as a general practice.

Dependency management & cooldowns

  • Strong concern about npm/PyPI/Cargo attacks via account compromise and malicious releases.
  • Proposed mitigations:
    • “Cooldowns”: only allow package versions older than X days; let others be the beta testers.
    • Corporate artifact repositories / allow‑lists (e.g. artifact managers, internal mirrors).
    • Pin exact versions and use lockfiles correctly (npm ci, --frozen-lockfile).
    • PR guards that forbid unpinned or lockfile‑mismatched deps.
  • Critiques:
    • Cooldowns can delay real security fixes.
    • Attackers can just wait out the cooldown or label malware as “security updates.”
    • Reviewing all transitive deps is often infeasible; many “curated” repos mostly bump versions and hashes.

OS choices and security postures

  • Some advocate BSDs (especially FreeBSD, OpenBSD) for more coordinated security handling and faster binary updates.
  • Pushback notes gaps like late ASLR adoption, missing kASLR, past incidents (e.g., buggy WireGuard import), and weak defaults.
  • Microkernels and capability systems (e.g., seL4) discussed as structurally safer, but others argue they don’t inherently stop logic bugs in critical components like filesystems.

Sandboxing, containers, and practices

  • Many recommend isolating risky tooling (npm, pip, gem, etc.) in containers/VMs; avoid installing such tools on the host.
  • Examples: Docker, Kata, Qubes OS, macOS firewalls (e.g., LuLu), disabling kernel modules (esp4/esp6/rxrpc) as temporary mitigations.
  • Consensus that user‑space compromise plus easy sudo use is already near‑“game over”; proper isolation and minimal privileges matter more.

Broader reflections

  • Widespread sense that:
    • Package ecosystems and “curl | sh” norms have created enormous attack surfaces.
    • AI accelerates both vulnerability discovery and “slopcode” generation.
    • Open source’s economic model (heavy corporate dependence, light maintainer support) is under serious strain.