119
submitted 11 months ago by igalmarino@lemmy.ml to c/linux@lemmy.ml
all 20 comments
sorted by: hot top controversial new old
[-] QuazarOmega@lemy.lol 40 points 11 months ago

TL;DR

sudo rm -rf /* # can't have problems without a system
[-] fxt_ryknow@lemmy.world 8 points 11 months ago

Copy. Paste. Enter.

[-] Goun@lemmy.ml 2 points 11 months ago

System administrators hate this trick!

[-] penquin@lemmy.kde.social 23 points 11 months ago

Ok, this is a very good cheat sheet

[-] stepanzak@iusearchlinux.fyi 8 points 11 months ago

Thefuck is a cool program, but I stopped using it because it was slow.

[-] fluckx@lemmy.world 4 points 11 months ago

I haven't had as much luck with that program as I'd like to. :(

[-] Cwilliams@beehaw.org 3 points 11 months ago

My .bash_history using this program...

[-] Administrator@monyet.cc 8 points 11 months ago* (last edited 11 months ago)
cheat() {
  curl cht.sh/$1
}
[-] Pantherina@feddit.de 2 points 11 months ago
[-] cypherpunks@lemmy.ml 8 points 11 months ago* (last edited 11 months ago)

sites like this are neat until you remember that curl's willingness to write ansi escape codes to stdout when it is a tty (as this site relies on to format the output when the user agent is curl) is actually a security vulnerability.

[-] JetpackJackson@feddit.de 5 points 11 months ago

Could you give me an ELI5 please

[-] cypherpunks@lemmy.ml 1 points 11 months ago* (last edited 11 months ago)

This post The Terminal Escapes: Engineering unexpected execution from command line interfaces has a summary of the longer paper in the first link.

tldr: There are a variety of ways that attackers can cause you to execute execute arbitrary code when you echo their maliciously-crafted data to your terminal. Therefore, when you run curl without redirecting its output, or when you cat a file you've downloaded, you're trusting the server (and also the network, when you don't have https:// in the url) not to exploit you.

[-] JetpackJackson@feddit.de 2 points 11 months ago

Ah ok that makes sense, thank you!

[-] tal@lemmy.today 3 points 11 months ago

I'm more-inclined to blame a virtual terminal than the program writing the sequences if there's an exploit there.

[-] cypherpunks@lemmy.ml 2 points 11 months ago

Of course the terminal emulators are ultimately to blame but when there are so many problems in so many of them, imo curl's default behavior should be to filter its output when writing to a tty.

[-] kraniax@lemmy.wtf 1 points 11 months ago

is there a curl argument that can be used to block this behavior?

[-] cypherpunks@lemmy.ml 1 points 11 months ago

You can redirect curl's output to a file with the -o filename option (or with > filename for shell redirection). But in the case of sites like this which output ansi-escape-formatted data that isn't very useful.

Also, after saving unknown data to a file it's common to look at it with less or perhaps xxd or strings or file ... all of which have had their own CVEs in recent years 🤦

Computer security is a fractal of bad news.

[-] stifle867@programming.dev 6 points 11 months ago

Appears to be the same developer as wttr.in

[-] bionicjoey@lemmy.ca 4 points 11 months ago

IIRC this site uses TLDR pages

this post was submitted on 21 Oct 2023
119 points (96.1% liked)

Linux

47343 readers
1382 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS