oda

2.6K posts

oda banner
oda

oda

@0I74_

ゆるふわえんじにゃー @ 事業会社 | travel ✈️| Google Cloud PTE 2026(Sec&NW)

pwd Katılım Ocak 2017
169 Takip Edilen148 Takipçiler
oda
oda@0I74_·
ゴールデンウィーク断捨離はかどる
日本語
0
0
0
85
oda
oda@0I74_·
直島よかったなー 地中美術館 李禹煥美術館 ヴァレーギャラリー 直島新美術館
oda tweet mediaoda tweet mediaoda tweet mediaoda tweet media
日本語
0
0
0
234
oda retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 BREAKING: An AI found a Linux kernel zero-day that roots every distribution since 2017. The exploit fits in 732 bytes of Python. Patch your kernel ASAP. The vulnerability is CVE-2026-31431, nicknamed "Copy Fail," disclosed today by Theori. It has been sitting quietly in the Linux kernel for nine years. Most Linux privilege-escalation bugs are picky. They need a precise timing window (a "race"), or specific kernel addresses leaked from somewhere, or careful tuning per distribution. Copy Fail needs none of that. It is a straight-line logic mistake that works on the first try, every time, on every mainstream Linux box. The attacker just needs a normal user account on the machine. From there, the script asks the kernel to do some encryption work, abuses how that work is wired up, and ends up writing 4 bytes into a memory area called the "page cache" (Linux's high-speed copy of files in RAM). Those 4 bytes can be aimed at any program the system trusts, like /usr/bin/su, the shortcut to becoming root. Result: the next time anyone runs that program, it lets the attacker in as root. What should worry most: the corruption never touches the file on disk. It only exists in Linux's in-memory copy of that file. If you imaged the hard drive afterwards, the on-disk file would match the official package hash exactly. Reboot the machine, or just put it under memory pressure (any normal system load that needs the RAM), and the cached copy reloads fresh from disk. Containers do not help either. The page cache is shared across the whole host, so a process inside a container can use this bug to compromise the underlying server and reach into other tenants. The original sin was a 2017 "in-place optimization" in a kernel crypto module called algif_aead. It was meant to make encryption slightly faster. The change broke a critical safety assumption, and nobody noticed for nine years. That bug then rode every kernel update from 2017 to today. This vulnerability affects the following: 🔴 Shared servers (dev boxes, jump hosts, build servers): any user becomes root 🔴 Kubernetes and container clusters: one compromised pod escapes to the host 🔴 CI runners (GitHub Actions, GitLab, Jenkins): a malicious pull request becomes root on the runner 🔴 Cloud platforms running user code (notebooks, agent sandboxes, serverless functions): a tenant becomes host root Timeline: 🔴 March 23, 2026: reported to the Linux kernel security team 🔴 April 1: patch committed to mainline (commit a664bf3d603d) 🔴 April 22: CVE assigned 🔴 April 29: public disclosure Mitigation: update your kernel to a build that includes mainline commit a664bf3d603d. If you cannot patch immediately, turn off the vulnerable module: echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf rmmod algif_aead 2>/dev/null || true For environments that run untrusted code (containers, sandboxes, CI runners), block access to the kernel's AF_ALG crypto interface entirely, even after patching. Almost nothing legitimate needs it, and blocking it shuts the door on this whole class of bug...
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
230
2.7K
11.7K
2.4M
oda
oda@0I74_·
Akari が流行っているせいか、外国人ばっかりだったなー
oda tweet media
日本語
0
0
0
102
oda
oda@0I74_·
ずっと行きたかったイサム・ノグチ庭園美術館よかった! 撮影禁止やから写真はない
日本語
1
0
1
117
oda
oda@0I74_·
香川県庁東館すごい
oda tweet mediaoda tweet mediaoda tweet media
日本語
0
0
0
80
oda
oda@0I74_·
@makies ほんとややこしいですww 他社製品とも名前かぶってますけど、検索の会社なのでググると1番目に出てくるのは流石
日本語
1
0
1
98
マキ @makies
マキ @makies@makies·
@0I74_ Looker Studioの名前、変わってたんですね!けどまた微妙にググりにくい名前に
日本語
1
0
1
164
oda
oda@0I74_·
Data Studio (旧 Looker Studio) の MCP ってないんすか?
日本語
1
0
1
176
oda
oda@0I74_·
また Cloud SQL 放置してた 課金でやらかすところだった
日本語
0
0
0
77
oda
oda@0I74_·
持っててよかった JGC
日本語
0
0
0
129
oda
oda@0I74_·
ANA カード使わんのよなー
日本語
0
0
0
161
oda
oda@0I74_·
SFC 改悪まじかー
日本語
0
0
0
390
oda
oda@0I74_·
今日も肉出社
oda tweet media
日本語
0
0
1
92
oda retweetledi
Richard Seroter
Richard Seroter@rseroter·
My team built a thing! Today we shipped the first official agent skills for @googlecloud. This repo initially covers 13 top products, 3 pillars of our Well Architected framework, and 3 common journeys (e.g. auth). Plug into your fav agentic tool: cloud.google.com/blog/topics/de…
Richard Seroter tweet media
English
9
87
552
50.6K
oda
oda@0I74_·
在庫ないから欲しくても買えない
日本語
0
0
0
28
oda
oda@0I74_·
Qwen3.6 強そうだし、やっぱメモリもりもり Mac Studio 行くしか無いな
日本語
0
0
0
91
oda
oda@0I74_·
Google Cloud Next 行ける予定だったんだけどなー なんでだろうなー
日本語
0
0
0
68
oda
oda@0I74_·
メモリ管理上手くなってくれればなんでも良い
日本語
0
0
0
88
oda retweetledi
brendan
brendan@brendonovich·
we've moved opencode desktop to electron. it's faster, more reliable, and will replace our tauri build soon. try it out in beta via the link below.
English
195
82
1.9K
1.1M