A lot of people are apparently happily running a script clearly marked as a root exploit from some random website using curl | bash
Some do inspect the script, but then still run it using curl | bash anyway.
Incidentally, this very relevant blogpost about detecting curl | bash and serving different scripts based on that is almost exactly a decade old:
https://web.archive.org/web/20230318063325/https://www.idontplaydarts.com/2016/04/detecting-curl-pipe-bash-server-side/
I’d argue this not having a broader security push before the public release happened, is a pretty serious failure on someone’s part.
And who is that “someone”? We fix bugs like this in the kernel on a daily basis. If people have not learned to constantly upgrade to stay ahead of this, then why even assign these 10 CVEs a day in the first place? :)
Once again, my professional recommendation in response to the latest Linux kernel vulnerability in the news is that you should gather up all your electronic devices, cast them into the sea, and retreat to the woods.
Each night, gather your children and tell them tales of the Before Times when the hubris of humanity grew so large that we made idols of sand and spoke to them as equals. Remind them that the sand, of course, did not speak or think, but we imagined it could, and let it guide us to folly.
Should a stranger ever come to your village with a glowing rectangle, encourage the youth to beat them with sticks.
I was explaining how we built #bluefin with buildstream and bootc to a coworker and he goes.
"So you made Gentoo but cloud native."
And now I am never going to shut about it lol.