A newly patched Linux kernel rxgk local privilege escalation flaw, dubbed DirtyDecrypt or DirtyCBC, now has a proof-of-concept exploit that can grant root access on some systems. The issue affects kernels built with CONFIG_RXGK, with Fedora, Arch Linux, and openSUSE Tumbleweed among the most likely targets, while users are urged to patch quickly or apply the temporary mitigation. #DirtyDecrypt #DirtyCBC #rxgk #Fedora #ArchLinux #openSUSETumbleweed
Keypoints
- DirtyDecrypt is a recently patched Linux kernel local privilege escalation flaw.
- The bug also goes by the name DirtyCBC and has a proof-of-concept exploit.
- Exploitation can lead to root access on systems using CONFIG_RXGK.
- Fedora, Arch Linux, and openSUSE Tumbleweed are among the most likely affected distros.
- Users should install kernel updates or use the temporary mitigation if patching is delayed.