Update - We have delivered KernelCare patches for several distributions. The available patches on the main feed at the moment are:
K20260501_02 (oel8-uek6)
K20260501_10 (rocky9)
K20260430_07 (alma9.6 esu)
K20260430_13 (alma9.2 esu)


Additionally, patches for these distributions are released on the test feed:
oel7-uek6
cl7h
cl8
oel8
centos8
rhel8
alma8
alma9
cl9
rhel9
pve-7-5.15
ubuntu-focal-lts-jammy-aws
ubuntu-focal-lts-jammy
ubuntu-focal-lts-jammy-azure
ubuntu-jammy-aws
ubuntu-jammy
ubuntu-jammy-azure

A key detail for the patches still on the test feed, is that you need to enable said feed while running the update command:
kcarectl --update --prefix test

May 01, 2026 - 16:28 UTC
Update - Patched kernel has been released into testing repo:
for CloudLinux 8 - 4.18.0-553.121.1.lve.el8.x86_64
for CloudLinux 7h - 4.18.0-553.121.1.lve.el7h.x86_64

for CloudLinux 8:
yum update kernel --enablerepo=cloudlinux-updates-testing

for CloudLinux 7h:
yum update kernel --enablerepo=cl7h_beta

May 01, 2026 - 09:09 UTC
Update - We are continuing to work on a fix for this issue.
May 01, 2026 - 09:08 UTC
Identified - Patched kernel has been released into testing repo:
for CloudLinux 8 - 4.18.0-553.121.1.lve.el8.x86_64
for CloudLinux 7h - 4.18.0-553.121.1.lve.el7h.x86_64

yum update kernel --enablerepo=cloudlinux-updates-testing

May 01, 2026 - 09:02 UTC
Update - We've published a blog post with a lot of up-to-date information on the issue
CVE-2026-31431 (Copy Fail): Mitigation and Upcoming Patches for CloudLinux

Apr 30, 2026 - 16:54 UTC
Update - A temporary workaround has been found

It prevents the algif_aead_init() initialization function from being called during kernel boot.
Please note that applying this workaround requires a reboot!

What needs to be done:
grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"
reboot

Apr 30, 2026 - 16:35 UTC
Investigating - Copy Fail (CVE-2026-31431) is a Linux kernel bug in the crypto component authencesn. It allows a normal local user to make a very specific 4-byte change to the cached contents of any readable file on the system. In practice, that means a small Python script could tamper a setuid binary and gain root access on most major Linux distros shipped since 2017.

We're investigating the situation and a patch is on its way for CloudLinux kernels and KernelCare.

Apr 29, 2026 - 21:34 UTC
Monitoring - We are making significant changes to the mechanism of accessing CloudLinux repositories.
This release affects Cloudlinux 8, 9 and Ubuntu. CL7 will be handled later. CL10 also receives an update though it already uses no-auth repos.
License validation has been moved within CloudLinux OS itself, so no action is required on the customer side other than updating the packages, which will be discussed below.

The transition on the client servers will be implemented by updating the cloudlinux-release and rhn-client-tools packages; therefore, if these packages are excluded from the update for any reason, please unblock them so you do not lose the ability to receive updates.
The version of the rhn package that will be updated is rhn-client-tools 3.0.3-1; versions of the cloudlinux-release packages depend on the system being used and can be found in our changelog:
CloudLinux 8 release packages
CloudLinux 9 release packages
CloudLinux 10 release packages
For Ubuntu it is - cloudlinux-release 0.1-10

Rollout of the packages will begin on April 30.

ELS repos brough by php-els, python-els, etc packages can be accessed via JWT token.
If you have questions about how access to ALT-ELS repositories works, you can find more details in this article:
alt-PHP, Python, NodeJS, Ruby repositories changes in CloudLinux 10

Important! If, for whatever reason, you are currently unable to update your packages and switch to the new mirrors, you will not be left without updates. There will be a transition period lasting several months during which both the old and new mirror systems will operate simultaneously.

Apr 29, 2026 - 09:19 UTC

About This Site

Welcome to CloudLinux status page. Here you can see if there are any ongoing issues with the CloudLinux network or other services.

CloudLinux OS Components Under Maintenance
Alt-PHP Operational
CageFS Operational
MySQL Governor Operational
EasyApache4 PHP packages Operational
CloudLinux Kernel Under Maintenance
Mod_lsapi Operational
PHP Selector Operational
Python Selector Operational
Ruby Selector Operational
Node.js Selector Operational
CloudLinux Network Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
May 4, 2026

No incidents reported today.

May 3, 2026

No incidents reported.

May 2, 2026

No incidents reported.

May 1, 2026

Unresolved incident: Copy Fail Vulnerability - CVE-2026-31431.

Apr 30, 2026
Apr 29, 2026
Resolved - This incident has been resolved.
Apr 29, 17:29 UTC
Identified - After updating the kernel and kmod-lve, a CloudLinux server may start reporting a high load average, even though CPU, IO, and vmstat metrics do not suggest any load problems. Our kernel developers have investigated this and determined that the increased load average is normal and reflects the actual figures.

For more information, please visit: https://cloudlinux.zendesk.com/hc/en-us/articles/26160371122460-High-Load-Average-after-on-Cloudlinux-OS-with-kmod-lve-v-2-1-56.

Mar 16, 19:56 UTC
Apr 28, 2026

No incidents reported.

Apr 27, 2026

No incidents reported.

Apr 26, 2026

No incidents reported.

Apr 25, 2026

No incidents reported.

Apr 24, 2026

No incidents reported.

Apr 23, 2026

No incidents reported.

Apr 22, 2026

No incidents reported.

Apr 21, 2026

No incidents reported.

Apr 20, 2026

No incidents reported.