<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Linux Linux_Kernel — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/linux-linux_kernel/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 22:01:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/linux-linux_kernel/feed.xml" rel="self" type="application/rss+xml"/><item><title>Linux Kernel DirtyDecrypt Local Privilege Escalation (CVE-2026-31635)</title><link>https://feed.craftedsignal.io/briefs/2026-05-dirtydecrypt-lpe/</link><pubDate>Tue, 19 May 2026 22:01:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dirtydecrypt-lpe/</guid><description>CVE-2026-31635, dubbed DirtyDecrypt, is a local privilege escalation vulnerability in the Linux kernel's rxrpc subsystem (rxgk component), allowing an unprivileged user to corrupt page cache and achieve arbitrary file writes, leading to root access on kernels 6.10 to 6.13 with CONFIG_RXGK enabled.</description><content:encoded><![CDATA[<p>A local privilege escalation vulnerability, CVE-2026-31635, dubbed &ldquo;DirtyDecrypt,&rdquo; affects Linux kernels from version 6.10 to 6.13 when <code>CONFIG_RXGK</code> is enabled. This vulnerability resides in the <code>rxrpc</code> subsystem&rsquo;s <code>rxgk</code> component. An unprivileged user can exploit the vulnerability to corrupt the page cache, leading to arbitrary file writes and, ultimately, root access. The public availability of a working exploit significantly increases the risk to vulnerable systems, potentially enabling attackers to gain elevated privileges and compromise affected Linux systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unprivileged local user gains access to the target Linux system.</li>
<li>The attacker enters a user and network namespace.</li>
<li>The attacker adds an RXGK key to the keyring using the <code>keyctl</code> utility.</li>
<li>The attacker uses <code>AF_RXRPC</code> sockets and <code>splice()</code> to force page cache pages into the RXGK decryption path.</li>
<li>This triggers in-place AES-CBC decryption without <code>skb_cow_data()</code>.</li>
<li>The in-place decryption corrupts the target file (<code>/etc/passwd</code>) byte-by-byte using a sliding window technique.</li>
<li>The attacker blanks the root password in <code>/etc/passwd</code>.</li>
<li>The attacker spawns a root shell, gaining complete control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31635 allows an unprivileged local user to gain root privileges on the affected system. This can lead to complete system compromise, data theft, and malicious activities. The vulnerability affects systems running Linux kernels between 6.10 and 6.13 with the <code>CONFIG_RXGK</code> option enabled. Common distributions such as Fedora, Arch Linux, and openSUSE Tumbleweed are potentially affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for the execution of binaries without a parent process, as this might indicate exploitation attempts (see &ldquo;Detect DirtyDecrypt Exploit Execution&rdquo; Sigma rule).</li>
<li>Monitor the execution of <code>keyctl</code> for the addition of RXGK keys, as this is a prerequisite for the exploit to work (see &ldquo;Detect RXGK Key Addition&rdquo; Sigma rule).</li>
<li>Upgrade to a patched Linux kernel version where CVE-2026-31635 is resolved.</li>
<li>Disable the <code>CONFIG_RXGK</code> option in the kernel configuration if <code>rxrpc</code> functionality is not required.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>lpe</category><category>linux</category></item></channel></rss>