Site icon Fix I.T. Phill – Your Go-To Tech Guru

DirtyDecrypt CVE-2026-31635: Linux Kernel Patch Guide

DirtyDecrypt CVE-2026-31635 Linux kernel RxRPC RxGK patch checklist for hosting and container admins

DirtyDecrypt CVE-2026-31635 Linux kernel RxRPC RxGK patch checklist for hosting and container admins

May 20, 2026 update: DirtyDecrypt, also called DirtyCBC, is now being discussed publicly as a Linux kernel local privilege escalation risk tied to CVE-2026-31635. The safe takeaway for hosting providers is simple: check whether your running kernel includes RxRPC/RxGK support, install the latest vendor kernel, reboot in a controlled maintenance window, and do not assume that every Linux server has the same exposure.

This post is protect-only. We are not publishing proof steps, public exploit links, request details, or copy/paste attack material. The goal is to help Linux, cPanel, Proxmox-adjacent, Kubernetes, and web-hosting admins decide whether they need an emergency kernel patch window or a normal scheduled reboot.

What CVE-2026-31635 Is

The NVD record for CVE-2026-31635 describes a Linux kernel RxRPC/RxGK bug where oversized response authenticator lengths are accepted when they should be rejected. That bug was fixed in upstream stable kernel commits in late April 2026, and the NVD record currently gives it a high CVSS score of 7.5.

The public DirtyDecrypt discussion goes further: researchers and security news coverage connect the same affected code path to page-cache corruption and possible local root escalation on systems built with CONFIG_RXGK. BleepingComputer reported that public exploit material exists and that testing has focused on Fedora and mainline kernels. The Hacker News also covered the public DirtyDecrypt release and its relationship to CVE-2026-31635.

Important Scope Correction

Do not treat this as “every Linux server is automatically rootable.” That is not what the most careful sources say. The practical exposure depends on kernel version, vendor backports, whether the relevant RxRPC/RxGK code is present, whether the feature is built in or loadable as a module, and whether a local attacker already has a foothold.

For normal hosting fleets, this belongs in the same response family as Copy Fail CVE-2026-31431, Dirty Frag CVE-2026-43284, and Fragnesia CVE-2026-46300: patch kernels quickly, watch shared hosting and container worker nodes first, and avoid guessing based only on the upstream version number.

Who Should Prioritize This

Safe Checks For Admins

These checks do not validate the vulnerability. They only help you identify the running kernel and whether the relevant configuration may be present.

uname -r
test -r /boot/config-$(uname -r) && grep CONFIG_RXGK /boot/config-$(uname -r)
lsmod | grep '^rxrpc'

If your vendor ships kernel config files in a different location, use the vendor method for reading the running kernel configuration. If CONFIG_RXGK is not present, that lowers this specific risk, but it does not replace normal kernel patching because the recent Linux page-cache escalation wave includes multiple CVEs and code paths.

Patch Guidance

Virtualization And Hosting Notes

For Proxmox, VMware guest fleets, KVM hosts, and web-hosting nodes, the key question is where untrusted code can run. A local privilege escalation is not the same thing as a remote bug, but it can become the second step after a compromised website, leaked SSH account, vulnerable plugin, container escape chain, CI job, or stolen developer login.

Patch in a cluster-safe order. Verify backups first, drain workloads where possible, reboot one host at a time, confirm the new kernel is actually running, then continue. For Kubernetes or Docker worker nodes, cordon and drain before patching so customer workloads do not get knocked over mid-reboot.

What To Review After Patching

Customer Message

If customers ask, keep it plain: “We are applying Linux kernel updates for a high-severity RxRPC/RxGK vulnerability being discussed publicly as DirtyDecrypt. It requires local code execution first, but shared hosting and container systems deserve fast patching because a small application compromise can become more serious when kernel escalation bugs are present.”

Source Links

Bottom Line

Patch the kernel, reboot deliberately, and verify the running version. The DirtyDecrypt story is noisy because public write-ups, NVD wording, and distro status do not all emphasize the same risk. Hosting admins do not need the exploit. They need inventory, kernel updates, maintenance windows, local-user exposure review, and logs watched closely after the reboot.

Exit mobile version