Maybe you shouldn't install new software for a bit

· systems · Source ↗

TLDR

  • Two new Linux kernel vulns (copy.fail follow-ons: Copy Fail 2 and Dirty Frag) make this a high-risk window for supply chain attacks via npm.

Key Takeaways

  • The author recommends a moratorium on installing new software for roughly a week while distros ship kernel patches.
  • Exceptions: Linux kernel patches from your own distro are fine to apply.
  • The timing risk: unpatched kernel vulns create ideal conditions for a malicious npm package to escalate to root.
  • “copy.fail” is the anchor event; related vulns are still being discovered, so the attack surface remains open.

Hacker News Comment Review

  • Commenters pushed back on the “wait a week” framing: sophisticated supply chain attacks already sit dormant for weeks or months, so a fixed delay is not a durable defense against typosquatting or timed payloads.
  • The practical consensus landed on pinning dependency versions to packages at least a few days old by default, avoiding latest tags in CI, and using artifact managers to gate approvals – moves that survive beyond this specific incident.
  • FreeBSD was surfaced as a structural alternative, with coordinated security-team review and binary updates published minutes after patches land, contrasting with Linux’s current patch chaos.

Notable Comments

  • @AgentME: Set package managers to reject versions less than a few days old by default; recent high-profile attacks were all caught and rolled back within a day.
  • @anymouse123456: Bake external dependencies into base containers and update them deliberately – CI build times and flaky failures drop too.
  • @KevinMS: “I got rid of half of my VSCode extensions a couple days ago, its too risky.”

Original | Discuss on HN