Exploit available for new DirtyDecrypt Linux root escalation flaw

Exploit available for new DirtyDecrypt Linux root escalation flaw
A newly patched Linux kernel rxgk local privilege escalation flaw, dubbed DirtyDecrypt or DirtyCBC, now has a proof-of-concept exploit that can grant root access on some systems. The issue affects kernels built with CONFIG_RXGK, with Fedora, Arch Linux, and openSUSE Tumbleweed among the most likely targets, while users are urged to patch quickly or apply the temporary mitigation. #DirtyDecrypt #DirtyCBC #rxgk #Fedora #ArchLinux #openSUSETumbleweed

Keypoints

  • DirtyDecrypt is a recently patched Linux kernel local privilege escalation flaw.
  • The bug also goes by the name DirtyCBC and has a proof-of-concept exploit.
  • Exploitation can lead to root access on systems using CONFIG_RXGK.
  • Fedora, Arch Linux, and openSUSE Tumbleweed are among the most likely affected distros.
  • Users should install kernel updates or use the temporary mitigation if patching is delayed.

Read More: https://www.bleepingcomputer.com/news/security/exploit-available-for-new-dirtydecrypt-linux-root-escalation-flaw/