Linux Kernel ptrace Exit-race Vulnerability / ssh-keysign-pwn (CVE-2026-46333) — Mitigation and Kernel Update on CloudLinux

Right after the kernel privilege-escalation chain in the XFRM/ESP subsystem (Copy Fail, Dirty Frag, Fragnesia), Qualys disclosed a different Linux kernel issue. This time in the ptrace access-check path. CVE-2026-46333 is reserved for tracking this vulnerability. A public proof-of-concept exists. An unprivileged local user on an affected host can use it to read root-owned secrets (SSH host private keys and the shadow password database) without obtaining root privileges directly.

Linux Kernel ptrace Exit-race Vulnerability / ssh-keysign-pwn (CVE-2026-46333) — Mitigation and Kernel Update on CloudLinux

Right after the kernel privilege-escalation chain in the XFRM/ESP subsystem (Copy Fail, Dirty Frag, Fragnesia), Qualys disclosed a different Linux kernel issue. This time in the ptrace access-check path. CVE-2026-46333 is reserved for tracking this vulnerability. A public proof-of-concept exists. An unprivileged local user on an affected host can use it to read root-owned secrets (SSH host private keys and the shadow password database) without obtaining root privileges directly.

Fragnesia (CVE-2026-46300) — Mitigation and Kernel Update on CloudLinux

Less than a week after Dirty Frag, researcher William Bowling and the V12 team disclosed a third Linux kernel local privilege escalation in the same broad area (XFRM / ESP) and named it Fragnesia. A working public proof-of-concept exists. Any unprivileged local user can use it to gain root in a single command.

Fragnesia (CVE-2026-46300) — Mitigation and Kernel Update on CloudLinux

Less than a week after Dirty Frag, researcher William Bowling and the V12 team disclosed a third Linux kernel local privilege escalation in the same broad area (XFRM / ESP) and named it Fragnesia. A working public proof-of-concept exists. Any unprivileged local user can use it to gain root in a single command.

Dirty Frag (CVE-2026-43284, CVE-2026-43500): Mitigation and Kernel Update on CloudLinux

A week after Copy Fail (CVE-2026-31431), researcher Hyunwoo Kim disclosed a second Linux kernel local privilege escalation in the same broad area — IPsec ESP and rxrpc — and named it Dirty Frag. A working public proof-of-concept exists; any unprivileged local user can use it to gain root in a single command.

Dirty Frag (CVE-2026-43284, CVE-2026-43500): Mitigation and Kernel Update on CloudLinux

A week after Copy Fail (CVE-2026-31431), researcher Hyunwoo Kim disclosed a second Linux kernel local privilege escalation in the same broad area — IPsec ESP and rxrpc — and named it Dirty Frag. A working public proof-of-concept exists; any unprivileged local user can use it to gain root in a single command.

Copy Fail (CVE-2026-31431): Patching kernels without rebooting

Most kernel CVEs follow a predictable rhythm for hosting providers: read the advisory, schedule a maintenance window, reboot during off-peak. Copy Fail (CVE-2026-31431) breaks that rhythm. It's a deterministic vulnerability, universal across Linux distributions, and lets a single compromised account on a shared host pivot to root over every other account on the same node. CISA added it to the actively-exploited list with a May 15 federal patch deadline. A severe combination for shared hosting: high impact on multi-tenant servers, and a fix that requires a reboot on every box.

 

Copy Fail (CVE-2026-31431): Patching kernels without rebooting

Most kernel CVEs follow a predictable rhythm for hosting providers: read the advisory, schedule a maintenance window, reboot during off-peak. Copy Fail (CVE-2026-31431) breaks that rhythm. It's a deterministic vulnerability, universal across Linux distributions, and lets a single compromised account on a shared host pivot to root over every other account on the same node. CISA added it to the actively-exploited list with a May 15 federal patch deadline. A severe combination for shared hosting: high impact on multi-tenant servers, and a fix that requires a reboot on every box.

 

An Update on CloudLinux's Partnership with Seahawk

CL-CloudLinuxs Partnership with Seahawk_alt

We want to give our community an update: CloudLinux has ended its business relationship with Seahawk Global, LLC / Seahawk Media LLC. The termination of the business relationship is not a reflection of the service they provide.

An Update on CloudLinux's Partnership with Seahawk

CL-CloudLinuxs Partnership with Seahawk_alt

We want to give our community an update: CloudLinux has ended its business relationship with Seahawk Global, LLC / Seahawk Media LLC. The termination of the business relationship is not a reflection of the service they provide.

CVE-2026-31431 (Copy Fail): Kernel Update on CloudLinux

CVE-2026-31431 (Copy Fail) is a Linux kernel local privilege escalation vulnerability in the algif_aead module (AF_ALG). Any unprivileged local user can gain root via a 732-byte Python exploit. All kernels since 2017 are affected.

CVE-2026-31431 (Copy Fail): Kernel Update on CloudLinux

CVE-2026-31431 (Copy Fail) is a Linux kernel local privilege escalation vulnerability in the algif_aead module (AF_ALG). Any unprivileged local user can gain root via a 732-byte Python exploit. All kernels since 2017 are affected.

CVE-2026-31431 (Copy Fail): Mitigation and Upcoming Patches for CloudLinux

Update on 2026-05-01

A follow-up advisory with full update instructions has been published here.

CVE-2026-31431 (Copy Fail) is a Linux kernel local privilege escalation in the algif_aead module (AF_ALG). Any unprivileged local user can gain root via a 732-byte Python exploit. All Linux kernels since 2017 are affected.

CVE-2026-31431 (Copy Fail): Mitigation and Upcoming Patches for CloudLinux

Update on 2026-05-01

A follow-up advisory with full update instructions has been published here.

CVE-2026-31431 (Copy Fail) is a Linux kernel local privilege escalation in the algif_aead module (AF_ALG). Any unprivileged local user can gain root via a 732-byte Python exploit. All Linux kernels since 2017 are affected.

What's coming at CloudLinux Product Pulse Q2 2026

A lot has shipped since the Q1 edition of CloudLinux Product Pulse. The Q2 session on April 29 at 4pm CET / 10am ET covers all of it: what's new, what it means for your hosting operations, and where the product roadmap is heading nextBlog-Webinar-ProductPulseQ2

Here's a preview of the topics we'll cover.

Cached WordPress pages, 3x faster

What's coming at CloudLinux Product Pulse Q2 2026

A lot has shipped since the Q1 edition of CloudLinux Product Pulse. The Q2 session on April 29 at 4pm CET / 10am ET covers all of it: what's new, what it means for your hosting operations, and where the product roadmap is heading nextBlog-Webinar-ProductPulseQ2

Here's a preview of the topics we'll cover.

Cached WordPress pages, 3x faster

CloudLinux GPG Package Signing Key Update for CloudLinux 7, 8, and 9

Starting May 1, 2026, CloudLinux will sign new packages for CloudLinux 7, 8, and 9 exclusively with a new GPG key.

CloudLinux GPG Package Signing Key Update for CloudLinux 7, 8, and 9

Starting May 1, 2026, CloudLinux will sign new packages for CloudLinux 7, 8, and 9 exclusively with a new GPG key.

CloudLinux Now Supports cgroup v2

cgroup-v2-post-header

CloudLinux now supports cgroup v2 on CloudLinux 8, 9, 10, and Ubuntu 22. New installations of CloudLinux 10 following this release will use cgroup v2 by default. On all other versions, cgroup v1 remains the default, and you can switch to v2 when you're ready.

From a day-to-day operations standpoint, practically nothing changes. Your LVE limits, control panel interface, and resource monitoring all continue to work the same way.

 

CloudLinux Now Supports cgroup v2

cgroup-v2-post-header

CloudLinux now supports cgroup v2 on CloudLinux 8, 9, 10, and Ubuntu 22. New installations of CloudLinux 10 following this release will use cgroup v2 by default. On all other versions, cgroup v1 remains the default, and you can switch to v2 when you're ready.

From a day-to-day operations standpoint, practically nothing changes. Your LVE limits, control panel interface, and resource monitoring all continue to work the same way.

 

imunify-logo

WEB SERVER SECURITY BLOG

Subscribe to CloudLinux Newsletter