Linux DirtyFrag Mitigation

Scheduled Maintenance Report for InterServer

In progress

Scheduled maintenance is currently in progress. We will provide updates as necessary.
Posted May 07, 2026 - 19:30 EDT

Scheduled

A high-priority vulnerability, identified as DirtyFrag, has been detected within specific Linux kernel network modules. This flaw allows for unauthorized memory manipulation via targeted network packets. To ensure the continued integrity of our infrastructure and protect against potential remote code execution or data corruption, we are implementing immediate mitigation steps on our webhosting and storage servers rolling out now.

The following mitigation has been tested:

sudo sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"; echo 3 | sudo tee /proc/sys/vm/drop_caches

The above mitigation will stop this specific exploit. Vendor kernel updates are not yet fully released.

Kernelcare will be issuing patches. Users with KVM or Dedicated Servers running linux are recommended to consider security updates via kernelcare for rebootless updates. Further information is at https://blog.cloudlinux.com/dirty-frag-mitigation-and-kernel-update
Posted May 07, 2026 - 19:15 EDT