Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

A public exploit now exists for CVE-2026-31635 (DirtyDecrypt), a local privilege escalation flaw in the Linux kernel’s rxgk module affecting Fedora, Arch Linux, and openSUSE Tumbleweed systems built with CONFIG_RXGK enabled. Any attacker who gains unprivileged user access to an affected system can execute arbitrary commands with root privileges, allowing complete compromise of the host. This vulnerability appears alongside active exploitation of a closely related Linux kernel flaw already listed on CISA’s Known Exploited Vulnerabilities catalog, signaling coordinated threat actor interest in this vulnerability class.

Author

Tech Jacks Solutions