On 4/30/26 17:11, Ted Mittelstaedt wrote:
> I can confirm that the latest apt-get update to Ubuntu 24.04 as of a few 
> minutes ago is disabling the aead module.
>
> For an un-updated system, running python3 copy_fail_exp.py gets you a root 
> shell.   For an updated system it gets an error.  For Ubuntu 26.04 it merely 
> asks for the root password.
>
> Ted
>
>

or run

find / * -perm -4004 -type f -exec ls -ld {} \; > setuid.txt

and remove 'r' flag from user, user group, and other group.

On Slackware, most setuid root utilities are not user readable.

# ls -l /usr/bin/sudo
-rws--x--x 1 root root 289800 Jul 26  2025 /usr/bin/sudo*
# ls -l /bin/su
-rws--x--x 1 root root 59552 Feb 13  2021 /bin/su*

There are a few that are unfortunately.

This will mitigate the exploit until patched.

-Ed


Reply via email to