Maybe you shouldn't install new software for a bit

· systems · Source ↗

TLDR

  • Two new Linux kernel vulnerabilities (copy.fail follow-ons: Copy Fail 2 and Dirty Frag) make this a high-risk window for supply chain attacks via NPM.

Key Takeaways

  • Two newly announced Linux kernel vulns follow the copy.fail disclosure, compounding exposure for any internet-connected Linux system.
  • The author recommends a moratorium on installing new software for roughly one week outside of distro-provided kernel patches.
  • Timing overlap with active supply chain attack surface makes NPM packages a specific vector to avoid right now.

Hacker News Comment Review

  • Commenters note the vllm container remains unbuildable post-llmlite compromise, with transient dependency conflicts blocking updates, pushing some to llama.cpp as a fallback.
  • One commenter clarifies the Linux kernel vulnerability predates AI tooling concerns, originating in 2017, separating it from vibe-coded AI slop narratives.
  • Ops-focused commenters flip the advice: for networked non-personal machines, the priority is rapid patch rollout, not a freeze.

Notable Comments

  • @femiagbabiaka: For internet-connected machines, treat this as a drill for fast patch deployment, not a reason to pause.
  • @cookiengineer: vllm still broken post-llmlite pwn due to pinned, unpublished transitive deps; switched to llama.cpp as workaround.

Original | Discuss on HN