すてあ

60.9K posts

すてあ banner
すてあ

すてあ

@steyr_1026

永遠にコールドスタンバイ アイコンは @omamiru 作 ヘッダは@m0co_ta 作

Katılım Nisan 2011
1.5K Takip Edilen720 Takipçiler
すてあ retweetledi
ローソン
ローソン@akiko_lawson·
5日間限定の無料券チャレンジ(^^) 今日はもちっと食感のスープ春雨無料の1日目です♪ 1)このアカウントをフォロー 2)この投稿をリポスト 3)抽選で毎日1万名様に無料券!結果は自動でお知らせ
日本語
623
231.2K
47.6K
47.4M
きゃなばーど
今日久しぶりにタイミーやったんですよ、初めてのピッキング作業 バカ楽しかった、またやりたい
日本語
1
0
3
163
すてあ
すてあ@steyr_1026·
Bar Show待機
日本語
0
0
1
81
すてあ
すてあ@steyr_1026·
休み明けの仕事の事が頭から離れず鬱
日本語
0
0
0
69
すい
すい@tiffersv·
スパゲティ食べる時2束(200g)茹でてるって聞いて驚愕した 男の子すごい
日本語
1
0
3
135
すてあ
すてあ@steyr_1026·
@Kya7y 特級呪物は出ましたか?
日本語
1
0
0
32
きゃなばーど
きゃなばーど@Kya7y·
GWマジでどこにも行かず誰にも会えないかと思ったけど、はなちゃんさんたちに誘ってもらえて助かった
きゃなばーど tweet media
日本語
1
0
3
117
すてあ retweetledi
鳥羽 周作
鳥羽 周作@pirlo05050505·
マックのダブルチーズバーガーは 半分に切って フライパンに油を軽く引いて 断面を香ばしく焼いて、仕上げにバターひとかけら入れて焼いたら 香ばしくサクサクでめちゃくちゃおいしいです お時間ある人は是非 他のバーガーもありです 是非
鳥羽 周作 tweet media鳥羽 周作 tweet media鳥羽 周作 tweet media
日本語
228
5.4K
43.1K
28.5M
すてあ
すてあ@steyr_1026·
マツケンに侵食される遊園地? 前代未聞の限定企画が横浜・八景島シーパラダイスで | いこーよニュース report.iko-yo.net/articles/31036# #いこーよニュース これは狂気だな
日本語
0
0
0
172
すてあ
すてあ@steyr_1026·
足つぼマット踏んでるけどめっちゃ痛い
日本語
0
0
2
103
すてあ
すてあ@steyr_1026·
月が綺麗ですね
日本語
0
0
1
49
すてあ
すてあ@steyr_1026·
とーきょー
日本語
0
0
1
43
すてあ
すてあ@steyr_1026·
あべのハルカス高い
日本語
0
0
1
89
すてあ retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 BREAKING: An AI found a Linux kernel zero-day that roots every distribution since 2017. The exploit fits in 732 bytes of Python. Patch your kernel ASAP. The vulnerability is CVE-2026-31431, nicknamed "Copy Fail," disclosed today by Theori. It has been sitting quietly in the Linux kernel for nine years. Most Linux privilege-escalation bugs are picky. They need a precise timing window (a "race"), or specific kernel addresses leaked from somewhere, or careful tuning per distribution. Copy Fail needs none of that. It is a straight-line logic mistake that works on the first try, every time, on every mainstream Linux box. The attacker just needs a normal user account on the machine. From there, the script asks the kernel to do some encryption work, abuses how that work is wired up, and ends up writing 4 bytes into a memory area called the "page cache" (Linux's high-speed copy of files in RAM). Those 4 bytes can be aimed at any program the system trusts, like /usr/bin/su, the shortcut to becoming root. Result: the next time anyone runs that program, it lets the attacker in as root. What should worry most: the corruption never touches the file on disk. It only exists in Linux's in-memory copy of that file. If you imaged the hard drive afterwards, the on-disk file would match the official package hash exactly. Reboot the machine, or just put it under memory pressure (any normal system load that needs the RAM), and the cached copy reloads fresh from disk. Containers do not help either. The page cache is shared across the whole host, so a process inside a container can use this bug to compromise the underlying server and reach into other tenants. The original sin was a 2017 "in-place optimization" in a kernel crypto module called algif_aead. It was meant to make encryption slightly faster. The change broke a critical safety assumption, and nobody noticed for nine years. That bug then rode every kernel update from 2017 to today. This vulnerability affects the following: 🔴 Shared servers (dev boxes, jump hosts, build servers): any user becomes root 🔴 Kubernetes and container clusters: one compromised pod escapes to the host 🔴 CI runners (GitHub Actions, GitLab, Jenkins): a malicious pull request becomes root on the runner 🔴 Cloud platforms running user code (notebooks, agent sandboxes, serverless functions): a tenant becomes host root Timeline: 🔴 March 23, 2026: reported to the Linux kernel security team 🔴 April 1: patch committed to mainline (commit a664bf3d603d) 🔴 April 22: CVE assigned 🔴 April 29: public disclosure Mitigation: update your kernel to a build that includes mainline commit a664bf3d603d. If you cannot patch immediately, turn off the vulnerable module: echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf rmmod algif_aead 2>/dev/null || true For environments that run untrusted code (containers, sandboxes, CI runners), block access to the kernel's AF_ALG crypto interface entirely, even after patching. Almost nothing legitimate needs it, and blocking it shuts the door on this whole class of bug...
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
232
2.7K
11.7K
2.4M
すてあ
すてあ@steyr_1026·
天王寺の変
日本語
0
0
0
54