Update - A new wave of KernelCare livepatches incorporating the additional upstream fix has been released to the testing feed. Affected distributions in this wave: EL8, EL9, Debian 12, and AlmaLinux 10.
To deploy from the testing feed:
kcarectl --update --prefix test
Livepatches incorporating the additional upstream fix are now promoted to the main feed. KernelCare-subscribed servers on the main feed receive the fix automatically on the next kcarectl --update.
Patch IDs released today:
K20260515_34 — Rocky Linux 10
K20260515_27 — Oracle Linux 9
K20260515_21 — Oracle Linux 8 (UEK 7)
K20260515_20 — Oracle Linux 9 (UEK 7)
K20260515_01 — Ubuntu Noble
K20260515_02 — Ubuntu Noble (AWS)
May 15, 2026 - 14:48 UTC
Update - For customers running the LTS kernel, patched versions are released. Target versions:
kernel-lts-5.14.0-284.1101.el8.tuxcare.7.els33 or newer
kernel-lts-5.14.0-284.1101.el9.tuxcare.7.els33 or newer
Update with:
dnf update 'kernel-lts*' --enablerepo=cloudlinux-updates-testing
reboot
Final patched kernels for CL7h and CL8 are released. Target versions:
CL7h: kernel-4.18.0-553.124.3.lve.el7h or newer
CL8: kernel-4.18.0-553.124.3.lve.el8 or newer
Both are available in the beta channel and rolling out to stable. Because the stable rollout is gradual, use the following command if you want to install immediately:
yum update cloudlinux-release --enablerepo=cloudlinux-updates-testing
yum update --enablerepo=cloudlinux-rollout-7-bypass 'kernel*'
reboot
May 15, 2026 - 12:54 UTC
Update -
Imunify360 already blocks the exploit related to Fragnesia (CVE-2026-46300) and uses extended heuristics to identify and mitigate new indicators more quickly! It does not replace the kernel update, but customers running Imunify360 are covered against currently observed exploitation attempts. More info: https://imunify360.com/
Update: May 15
CloudLinux kernel (CL7h, CL8)
The AlmaLinux 8 fix that CloudLinux kernels for CL7h and CL8 build on has been rebuilt as kernel-4.18.0-553.124.3.el8_10 (now in AlmaLinux testing) to incorporate additional upstream patches. CloudLinux kernel builds are being updated accordingly. CL target package versions and channel availability will be added here on release.
AlmaLinux kernel (CL9, CL10)
The patched kernels in the AlmaLinux testing repository have been rebuilt to incorporate additional upstream patches. Updated target versions:
CL9 / AlmaLinux 9: kernel-5.14.0-611.54.5.el9_7 or newer
CL10 / AlmaLinux 10: kernel-6.12.0-124.56.3.el10_1 or newer
These supersede the prior test builds (5.14.0-611.54.4.el9_7 and 6.12.0-124.56.2.el10_1). If you installed the earlier test kernel, update and reboot again.
Promotion to production repositories will follow once community verification is complete.
KernelCare:
First KernelCare livepatches are released for CloudLinux 9 customers running ELS or FIPS variants of the AlmaLinux 9 kernel.
KernelCare-subscribed servers in scope receive the fix on the next 'kcarectl --update'.
We'll keep you posted!
More details are in our Blog https://blog.cloudlinux.com/fragnesia-mitigation-and-kernel-update
May 15, 2026 - 12:20 UTC
Update - We are continuing to work on a fix for this issue.
May 15, 2026 - 12:16 UTC
Identified -
Fragnesia is a separate bug from Dirty Frag, not a re-announcement. It is, however, in the same XFRM/ESP class and the immediate mitigation is identical. Customers who have already applied the Dirty Frag mitigation need no further action until patched kernels are released.
Affected CloudLinux versions
CloudLinux 7 (CL7) No
CloudLinux 7h (CL7h) Yes
CloudLinux 8 (CL8) Yes
CloudLinux 9 (CL9 ) Yes
CloudLinux 10 (CL10) Yes
Apply this mitigation now
Until a patched kernel or KernelCare livepatch is installed, blacklist the esp4, esp6, and rxrpc modules so they cannot be loaded, and unload them if already present:
sudo sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"
If you already applied this exact mitigation for Dirty Frag, no further action is required. The file already exists and Fragnesia is blocked by the same rule.
We've published a blog post with a lot of up-to-date information on the issue:
Fragnesia — Mitigation and Kernel Update on CloudLinux
May 13, 2026 - 15:31 UTC
Update - KernelCare live patches for CVE-2026-31431 ("CopyFail") have been released for the following operating systems:
almalinux8
almalinux9
almalinux10
alma9.6 esu
alma9.2 esu
cloudlinux7h
cloudlinux8
cloudlinux9
centos8
redhat8
redhat9
proxmox-ve-7-5.15
ubuntu-focal-lts-jammy-aws
ubuntu-focal-lts-jammy
ubuntu-focal-lts-jammy-azure
ubuntu-jammy-aws
ubuntu-jammy-azure
ubuntu-jammy
ubuntu-bionic-lts-focal
ubuntu-bionic-lts-focal-aws
ubuntu-focal-azure
ubuntu-focal-aws
ubuntu-focal
rockylinux8
rockylinux9
oraclelinux8
oraclelinux8-uek6
oraclelinux7-uek6
oraclelinux9
debian11
debian12
May 11, 2026 - 18:47 UTC
Update - We have delivered KernelCare patches for several distributions. The available patches on the main feed at the moment are:
K20260501_02 (oel8-uek6)
K20260501_10 (rocky9)
K20260430_07 (alma9.6 esu)
K20260430_13 (alma9.2 esu)
Additionally, patches for these distributions are released on the test feed:
oel7-uek6
cl7h
cl8
oel8
centos8
rhel8
alma8
alma9
cl9
rhel9
pve-7-5.15
ubuntu-focal-lts-jammy-aws
ubuntu-focal-lts-jammy
ubuntu-focal-lts-jammy-azure
ubuntu-jammy-aws
ubuntu-jammy
ubuntu-jammy-azure
A key detail for the patches still on the test feed, is that you need to enable said feed while running the update command:
kcarectl --update --prefix test
May 01, 2026 - 16:28 UTC
Update - Patched kernel has been released into testing repo:
for CloudLinux 8 - 4.18.0-553.121.1.lve.el8.x86_64
for CloudLinux 7h - 4.18.0-553.121.1.lve.el7h.x86_64
for CloudLinux 8:
yum update kernel --enablerepo=cloudlinux-updates-testing
for CloudLinux 7h:
yum update kernel --enablerepo=cl7h_beta
May 01, 2026 - 09:09 UTC
Update - We are continuing to work on a fix for this issue.
May 01, 2026 - 09:08 UTC
Identified - Patched kernel has been released into testing repo:
for CloudLinux 8 - 4.18.0-553.121.1.lve.el8.x86_64
for CloudLinux 7h - 4.18.0-553.121.1.lve.el7h.x86_64
yum update kernel --enablerepo=cloudlinux-updates-testing
May 01, 2026 - 09:02 UTC
Update - A temporary workaround has been found
It prevents the algif_aead_init() initialization function from being called during kernel boot.
Please note that applying this workaround requires a reboot!
What needs to be done:
grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"
reboot
Apr 30, 2026 - 16:35 UTC
Investigating - Copy Fail (CVE-2026-31431) is a Linux kernel bug in the crypto component authencesn. It allows a normal local user to make a very specific 4-byte change to the cached contents of any readable file on the system. In practice, that means a small Python script could tamper a setuid binary and gain root access on most major Linux distros shipped since 2017.
We're investigating the situation and a patch is on its way for CloudLinux kernels and KernelCare.
Apr 29, 2026 - 21:34 UTC
Update - Patched kernels are available in the AlmaLinux stable repository. Target versions:
CL9 / AlmaLinux 9: kernel-5.14.0-611.54.3.el9_7 or newer
CL10 / AlmaLinux 10: kernel-6.12.0-124.55.2.el10_1 or newer
Patched kernels for CL7h and CL8 are now available in the beta channel. Target versions:
CL7h: kernel-4.18.0-553.123.2.lve.el7h or newer
CL8: kernel-4.18.0-553.123.2.lve.el8 or newer
May 08, 2026 - 18:22 UTC
Update - KernelCare patches are actively deploying. Rollout is in progress for the following distros (signed versions included):
- RHEL 8
- CloudLinux 8
- CloudLinux 7 Hybrid
- Oracle Linux 8
- CentOS 8
- Rocky Linux 8
- AlmaLinux 8
These should reach the main feed within the next couple of hours. Further updates to follow.
May 08, 2026 - 11:43 UTC
Update - We are continuing to investigate this issue.
May 07, 2026 - 21:48 UTC
Investigating -
Dirty Frag [CVE Pending] is a Linux kernel local privilege escalation in the xfrm subsystem. The flaw lives in the ESP-in-UDP MSG_SPLICE_PAGES no-COW fast path and is reachable via the XFRM user netlink interface, which auto-loads the relevant modules. A working public proof-of-concept exists; any unprivileged local user can use it to gain root in a single command.
Affected Components:
CloudLinux 7h, 8, 9, and 10.
Published blog:
https://blog.cloudlinux.com/dirty-frag-mitigation-and-kernel-update
May 07, 2026 - 21:47 UTC