Kah Zuhl List retweetledi
Kah Zuhl List
66K posts

Kah Zuhl List retweetledi

“I spent a lot of time thinking about this patch [NASA] and this patch [American flag], and not this patch [name tag].”
Capt. Victor Glover is a national treasure. 🛰️
Jon Root@JonnyRoot_
Pilot of Artemis II Victor Glover gave the perfect answer when asked what it felt like to be the first black person to fly around the moon 👏 🎥: CBS Mornings
English
Kah Zuhl List retweetledi

US fertility rates just hit another record low
In 2025, the US general fertility rate fell to 53.1 - the lowest level ever recorded
Japan, South Korea, and Germany have already been shrinking for years. Japan has been shrinking for years, South Korea’s population has already started to decline, and Germany would be shrinking without immigration
Now the UK joins them - deaths will outnumber births every single year starting in 2026
No economy grows without people
No pension system survives without young workers
No culture persists without families having children
This is the slowest civilizational crisis in human history

English
Kah Zuhl List retweetledi
Kah Zuhl List retweetledi

‼️🚨 BREAKING: An AI found a Linux kernel zero-day that roots every distribution since 2017. The exploit fits in 732 bytes of Python. Patch your kernel ASAP.
The vulnerability is CVE-2026-31431, nicknamed "Copy Fail," disclosed today by Theori. It has been sitting quietly in the Linux kernel for nine years.
Most Linux privilege-escalation bugs are picky. They need a precise timing window (a "race"), or specific kernel addresses leaked from somewhere, or careful tuning per distribution. Copy Fail needs none of that. It is a straight-line logic mistake that works on the first try, every time, on every mainstream Linux box.
The attacker just needs a normal user account on the machine. From there, the script asks the kernel to do some encryption work, abuses how that work is wired up, and ends up writing 4 bytes into a memory area called the "page cache" (Linux's high-speed copy of files in RAM). Those 4 bytes can be aimed at any program the system trusts, like /usr/bin/su, the shortcut to becoming root.
Result: the next time anyone runs that program, it lets the attacker in as root.
What should worry most: the corruption never touches the file on disk. It only exists in Linux's in-memory copy of that file. If you imaged the hard drive afterwards, the on-disk file would match the official package hash exactly. Reboot the machine, or just put it under memory pressure (any normal system load that needs the RAM), and the cached copy reloads fresh from disk.
Containers do not help either. The page cache is shared across the whole host, so a process inside a container can use this bug to compromise the underlying server and reach into other tenants.
The original sin was a 2017 "in-place optimization" in a kernel crypto module called algif_aead. It was meant to make encryption slightly faster. The change broke a critical safety assumption, and nobody noticed for nine years. That bug then rode every kernel update from 2017 to today.
This vulnerability affects the following:
🔴 Shared servers (dev boxes, jump hosts, build servers): any user becomes root
🔴 Kubernetes and container clusters: one compromised pod escapes to the host
🔴 CI runners (GitHub Actions, GitLab, Jenkins): a malicious pull request becomes root on the runner
🔴 Cloud platforms running user code (notebooks, agent sandboxes, serverless functions): a tenant becomes host root
Timeline:
🔴 March 23, 2026: reported to the Linux kernel security team
🔴 April 1: patch committed to mainline (commit a664bf3d603d)
🔴 April 22: CVE assigned
🔴 April 29: public disclosure
Mitigation: update your kernel to a build that includes mainline commit a664bf3d603d. If you cannot patch immediately, turn off the vulnerable module:
echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf
rmmod algif_aead 2>/dev/null || true
For environments that run untrusted code (containers, sandboxes, CI runners), block access to the kernel's AF_ALG crypto interface entirely, even after patching. Almost nothing legitimate needs it, and blocking it shuts the door on this whole class of bug...


English

@curvemanheadman @Andy_n_di @PenguinsJesus "No player, excluding the goaltender, may deliberately fall on the puck or gather the puck into their body"
These refs were somehow allergic to calling delay of game penalties on the Flyers.
English

@Andy_n_di @PenguinsJesus because that's what happens when the ref loses sight of the puck?
English

@jennabeee22 @DadHoody Worst part of this series was watching Tochett go from a hero of my childhood to an absolute clown.
English

@DadHoody Ohhh I’m aware. It’s why I’ve now lost all respect for him.
English
Kah Zuhl List retweetledi
Kah Zuhl List retweetledi
Kah Zuhl List retweetledi
Kah Zuhl List retweetledi

@MarkMaddenX Is 3 flyers sitting on the puck, not a delay of game? Genuinely curious
English
Kah Zuhl List retweetledi
Kah Zuhl List retweetledi

@penguins How was that not a delay of game?? 3 philly just covering the puck with their body!!
English

How is that not delay or game on the Flyers?
Non of those defenders lying on the puck were the goalie...
#Penguins
English
Kah Zuhl List retweetledi
Kah Zuhl List retweetledi
Kah Zuhl List retweetledi

Dude cross checked him twice then backhanded him, and acted like he got hit by a missile when Letang grazed his face
justin@phlysportsjw
You can literally see Letang look for a ref before doing it… dirty team. Point. Blank. Period.
English












