Dear Customers,
A critical vulnerability (CVE-2026-31431, "Copy Fail") has been identified affecting Linux systems running kernel 4.14 or newer. This is a kernel-level vulnerability that may impact servers you manage.
Major operating system providers are actively releasing patches and mitigations. Our team has been monitoring this situation closely.
What You Should Know:
- This is a preventive security measure
- Your service has not been interrupted
- Major OS providers have released patches
- KernelCare provides live kernel patching for supported distributions (no reboot required)
Operating System Advisories:
AlmaLinux: https://almalinux.org/blog/2026-05-01-cve-2026-31431-copy-fail/
AlpineLinux: https://security.alpinelinux.org/vuln/CVE-2026-31431
CloudLinux: https://blog.cloudlinux.com/cve-2026-31431-copy-fail-kernel-update
Debian: https://security-tracker.debian.org/tracker/CVE-2026-31431
Red Hat Enterprise Linux: https://access.redhat.com/security/vulnerabilities/RHSB-2026-02
Rocky Linux: https://kb.ciq.com/article/rocky-linux/rl-cve-2026-31431-mitigation
SUSE: https://www.suse.com/security/cve/CVE-2026-31431.html
Ubuntu: https://ubuntu.com/security/CVE-2026-31431
Control Panel Advisories:
Plesk: https://support.plesk.com/hc/en-us/articles/40124635047319-Vulnerability-CVE-2026-31431
SolusVM: https://support.solusvm.com/hc/en-us/articles/40185887408535-Vulnerability-CVE-2026-31431
Important Notes:
- If you use KernelCare, it provides live kernel patching across supported distributions without requiring a server reboot
- For cPanel & WHM security updates, please do contact us we guide you or check the links.
- This advisory covers CVE-2026-31431 only
If you have concerns about your specific environment or need guidance on applying patches, please contact our support team.
Thank you for your continued trust.
Best regards,
Your Security Team
יום ראשון, מאי 3, 2026
