{"id":87702,"date":"2026-05-19T11:38:37","date_gmt":"2026-05-19T11:38:37","guid":{"rendered":"https:\/\/bisedoshqip.de\/exploit-available-for-new-dirtydecrypt-linux-root-escalation-flaw\/"},"modified":"2026-05-19T11:38:37","modified_gmt":"2026-05-19T11:38:37","slug":"exploit-available-for-new-dirtydecrypt-linux-root-escalation-flaw","status":"publish","type":"post","link":"https:\/\/bisedoshqip.de\/sq\/exploit-available-for-new-dirtydecrypt-linux-root-escalation-flaw\/","title":{"rendered":"Exploit available for new DirtyDecrypt Linux root escalation flaw"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div>\n<p style=\"text-align:center\"><img fetchpriority=\"high\" decoding=\"async\" alt=\"Linux\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2024\/05\/31\/Linux.jpg\" width=\"1600\"\/><\/p>\n<p>A recently patched local privilege escalation vulnerability in the Linux kernel&#8217;s rxgk module now has a proof-of-concept exploit that allows attackers to gain root access on some Linux systems.<\/p>\n<p>Named <a href=\"http:\/\/github.com\/v12-security\/pocs\/tree\/main\/dirtydecrypt\" target=\"_blank\" rel=\"nofollow noopener\">DirtyDecrypt<\/a> and also known as <a href=\"https:\/\/github.com\/Delphos-Labs\/disclosures\/tree\/main\/DirtyCBC\" target=\"_blank\" rel=\"nofollow noopener\">DirtyCBC<\/a>, this security flaw was also autonomously found and reported by Delphos Labs and the V12 security team earlier this month, but maintainers informed V12 that it was a duplicate that had already been patched in the mainline.<\/p>\n<p>&#8220;We found and reported this on May 9, 2026, but was informed it was a duplicate by the maintainers,&#8221; <a href=\"https:\/\/github.com\/v12-security\/pocs\/tree\/main\/dirtydecrypt\" target=\"_blank\" rel=\"nofollow noopener\">V12 said<\/a>. &#8220;It&#8217;s a rxgk pagecache write due to missing COW guard in rxgk_decrypt_skb. See poc.c for more details.&#8221;<\/p>\n<p>A detailed <a href=\"https:\/\/delphoslabs.com\/blog\/36142374-e1fe-80a9-9456-d3c64df81bd5\/%20linux-rxgk-decrypt-mac\" target=\"_blank\" rel=\"nofollow noopener\">technical write-up on DirtyCBC<\/a> was shared by\u00a0Delphos Labs&#8217; senior security researcher, Kamil Leoniak,\u00a0on Friday.<\/p>\n<p>While there is no official CVE ID associated with this security flaw, according to Will Dormann (principal vulnerability analyst at Tharros), the information from the security researchers aligns with the details of <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-31635\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-31635<\/a>, which was patched on April 25.<\/p>\n<p>Successful exploitation requires running a Linux kernel with the <a href=\"https:\/\/www.kernelconfig.io\/CONFIG_RXGK\" target=\"_blank\" rel=\"nofollow noopener\">CONFIG_RXGK configuration option<\/a>, which enables <a href=\"https:\/\/docs.kernel.org\/networking\/rxrpc.html\" target=\"_blank\" rel=\"nofollow noopener\">RxGK<\/a> security support for the Andrew File System (AFS) client and network transport.<\/p>\n<p>This limits the attack surface to Linux distributions that closely follow the latest upstream kernel releases, including Fedora, Arch Linux, and openSUSE Tumbleweed. However, V12&#8217;s proof-of-concept exploit has only been tested against Fedora and the mainline Linux kernel.<\/p>\n<div style=\"text-align:center\">\n<figure class=\"image\" style=\"display:inline-block\"><img decoding=\"async\" alt=\"DirtyDEcrypt exploit test\" height=\"591\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1109292\/2026\/DirtyDEcrypt%20exploit%20test.jpg\" width=\"591\"\/><figcaption><em>DirtyDecrypt exploit Fedora test (Will Dormann)<\/em><\/figcaption><\/figure>\n<\/div>\n<p>DirtyDecrypt\/DirtyCBC belongs to the same vulnerability class as several other root-escalation flaws disclosed in recent weeks, including <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-linux-dirty-frag-zero-day-with-poc-exploit-gives-root-privileges\/\" target=\"_blank\" rel=\"nofollow noopener\">Dirty Frag<\/a>, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-fragnesia-linux-flaw-lets-attackers-gain-root-privileges\/\" target=\"_blank\" rel=\"nofollow noopener\">Fragnesia<\/a>, and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-linux-copy-fail-flaw-gives-hackers-root-on-major-distros\/\" target=\"_blank\" rel=\"nofollow noopener\">Copy Fail<\/a>.<\/p>\n<p>Linux users on distros potentially affected by this security flaw\u00a0are advised to install the latest kernel updates as soon as possible.<\/p>\n<p>However, those who can&#8217;t immediately patch their devices should use the same mitigation used for Dirty Frag (however, this will also break IPsec VPNs and AFS distributed network file systems):<\/p>\n<pre>&#13;\n<code>sh -c \"printf 'install esp4 \/bin\/false\\ninstall esp6 \/bin\/false\\ninstall rxrpc \/bin\/false\\n' &gt; \/etc\/modprobe.d\/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2&gt;\/dev\/null; echo 3 &gt; \/proc\/sys\/vm\/drop_caches; true\"<\/code><\/pre>\n<p>These disclosures follow recent reports that attackers are now <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-says-copy-fail-flaw-now-exploited-to-root-linux-systems\/\" target=\"_blank\" rel=\"nofollow noopener\">actively exploiting the Copy Fail vulnerability<\/a> in the wild.<\/p>\n<p>The Cybersecurity and Infrastructure Security Agency (CISA) <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/05\/01\/cisa-adds-one-known-exploited-vulnerability-catalog\" target=\"_blank\" rel=\"nofollow noopener\">added<\/a> Copy Fail to its <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?search=CVE-2026-32202&amp;field_date_added_wrapper=all&amp;field_cve=&amp;sort_by=field_date_added&amp;items_per_page=20&amp;url=\" target=\"_blank\" rel=\"nofollow noopener\">list of flaws exploited in attacks<\/a> on May 1 and ordered federal agencies to secure their Linux devices within two weeks, by May 15.<\/p>\n<p>&#8220;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise,&#8221; the U.S. cybersecurity agency warned.<\/p>\n<p>In April, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-pack2theroot-flaw-gives-hackers-root-linux-access\/\" target=\"_blank\" rel=\"nofollow noopener\">Linux distros rolled out patches<\/a> for another root-privilege escalation vulnerability (dubbed Pack2TheRoot) in the PackageKit daemon that had gone unnoticed for almost 12 years.<\/p>\n<p><em>Update: Added a link to Delphos Labs&#8217; DirtyCBC write-up.<\/em><\/p>\n<div class=\"article-callout\">\n<div class=\"article-media\">\n        <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener nofollow\"><br \/>\n            <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/p\/validation-gap.jpg\" alt=\"article image\"\/><br \/>\n        <\/a>\n    <\/div>\n<div class=\"article-body\">\n<p>Automated pentesting tools deliver real value, but they were built to answer one question: can an attacker move through the network? They were not built to test whether your controls block threats, your detection rules fire, or your cloud configs hold.<\/p>\n<p>This guide covers the 6 surfaces you actually need to validate.<\/p>\n<p>        <a class=\"article-link\" href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener nofollow\">Download Now<\/a>\n    <\/div>\n<\/div><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/exploit-available-for-new-dirtydecrypt-linux-root-escalation-flaw\/\">Source link <\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>A recently patched local privilege escalation vulnerability in the Linux kernel&#8217;s rxgk module now has a proof-of-concept exploit that allows<\/p>","protected":false},"author":1,"featured_media":87703,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[40],"tags":[],"class_list":["post-87702","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aktualitet"],"aioseo_notices":[],"magazineBlocksPostFeaturedMedia":{"thumbnail":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-150x150.jpg","medium":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-300x169.jpg","medium_large":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-768x432.jpg","large":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-1024x576.jpg","1536x1536":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-1536x864.jpg","2048x2048":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux.jpg","trp-custom-language-flag":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-18x10.jpg","colormag-highlighted-post":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-392x272.jpg","colormag-featured-post-medium":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-390x205.jpg","colormag-featured-post-small":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-130x90.jpg","colormag-featured-image":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-800x445.jpg","colormag-default-news":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-150x150.jpg","colormag-featured-image-large":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-1400x600.jpg","colormag-elementor-block-extra-large-thumbnail":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-1155x480.jpg","colormag-elementor-grid-large-thumbnail":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-600x417.jpg","colormag-elementor-grid-small-thumbnail":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-285x450.jpg","colormag-elementor-grid-medium-large-thumbnail":"https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-575x198.jpg"},"magazineBlocksPostAuthor":{"name":"Ioni","avatar":"https:\/\/secure.gravatar.com\/avatar\/4de7d1024908d847fc21ef50fe01465508cd6bac2b59b1c21485c2342bf8bf44?s=96&d=mm&r=g"},"magazineBlocksPostCommentsNumber":"0","magazineBlocksPostExcerpt":"A recently patched local privilege escalation vulnerability in the Linux kernel&#8217;s rxgk module now has a proof-of-concept exploit that allows","magazineBlocksPostCategories":["Aktualitet"],"magazineBlocksPostViewCount":4,"magazineBlocksPostReadTime":3,"magazine_blocks_featured_image_url":{"full":["https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux.jpg",1600,900,false],"medium":["https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-300x169.jpg",300,169,true],"thumbnail":["https:\/\/bisedoshqip.de\/wp-content\/uploads\/2026\/05\/Linux-150x150.jpg",150,150,true]},"magazine_blocks_author":{"display_name":"Ioni","author_link":"https:\/\/bisedoshqip.de\/sq\/author\/drilon_admin\/"},"magazine_blocks_comment":0,"magazine_blocks_author_image":"https:\/\/secure.gravatar.com\/avatar\/4de7d1024908d847fc21ef50fe01465508cd6bac2b59b1c21485c2342bf8bf44?s=96&d=mm&r=g","magazine_blocks_category":"<a href=\"#\" class=\"category-link category-link-40\">Aktualitet<\/a>","_links":{"self":[{"href":"https:\/\/bisedoshqip.de\/sq\/wp-json\/wp\/v2\/posts\/87702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bisedoshqip.de\/sq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bisedoshqip.de\/sq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bisedoshqip.de\/sq\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bisedoshqip.de\/sq\/wp-json\/wp\/v2\/comments?post=87702"}],"version-history":[{"count":0,"href":"https:\/\/bisedoshqip.de\/sq\/wp-json\/wp\/v2\/posts\/87702\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bisedoshqip.de\/sq\/wp-json\/wp\/v2\/media\/87703"}],"wp:attachment":[{"href":"https:\/\/bisedoshqip.de\/sq\/wp-json\/wp\/v2\/media?parent=87702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bisedoshqip.de\/sq\/wp-json\/wp\/v2\/categories?post=87702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bisedoshqip.de\/sq\/wp-json\/wp\/v2\/tags?post=87702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}