A newly disclosed native privilege escalation vulnerability affecting main Linux distributions could already be exploited within the wild.
The exploit, named Soiled Frag and Copy Fail 2, chains two flaws tracked as CVE-2026-43284 and CVE-2026-43500, permitting an unprivileged person to escalate permissions to root.
Researcher Hyunwoo Kim responsibly disclosed the vulnerability, however somebody made it public earlier than patches could possibly be launched, prompting Kim to make the technical particulars and PoC code obtainable.
“As a result of it’s a deterministic logic bug that doesn’t rely on a timing window, no race situation is required, the kernel doesn’t panic when the exploit fails, and the success price may be very excessive,” Kim defined.
The vulnerabilities have an effect on the xfrm-ESP (IPsec) and RxRPC elements of the Linux kernel, with the best affect on hosts that don’t run container workloads. In container deployments, an attacker might be able to exploit Soiled Frag to flee a container, however this has but to be demonstrated, Ubuntu builders famous.
Soiled Frag is much like Soiled Pipe, a vulnerability that emerged in 2022, and the lately found flaw named Copy Fail.
Copy Fail has been exploited within the wild, and Microsoft studies that Soiled Frag might also have been exploited.
In response to the tech big, Soiled Frag might be exploited after attackers acquire entry to the focused system, which might be achieved by means of varied means, together with compromised SSH accounts, internet shell entry by way of internet-exposed purposes, abusing service accounts, container escapes to the host atmosphere, or distant entry compromise.
Microsoft mentioned its Defender product has seen restricted in-the-wild exercise that would point out exploitation of both Soiled Frag or Copy Fail.
“After gaining elevated entry, the actor modifies a GLPI LDAP authentication file (evidenced by a .swp file from vim), performs reconnaissance of the GLPI listing and system configuration, and inspects an exploit artifact,” Microsoft defined.
“The exercise then shifts to accessing delicate information and interacting with PHP session information — first deleting a number of session information after which forcefully wiping further ones — earlier than studying remaining session information, indicating each disruption of lively periods and entry to session contents,” it added.
Linux distributions have began releasing patches and mitigations for Soiled Frag, together with Crimson Hat, Amazon Linux, Ubuntu, Fedora, and Alma Linux.



